MIH Security Use Case Discussion
Yoshi and ALL:
I loaded two files to the server. One is a power point
document to high light the issues I would like to discuss in the group on
Wednesday about use cases. Another is a word document which includes some
sample use cases to reflect the points I made in the presentation.
Please notice that I have no intention to replace the current use
cases included in the TR. This is only for discussion
purpose. I did not use the "master copy" of TR to modify
or add comments, since it is full of comments from Marc (and probably
others). If I add comments there, it would not be easy to
read.
Regards,
Lily