§Conclusion: Approach provides us with a solid basis for moving
to next stepprototyping
and analyzing business models.
§Next Steps:
□Refine security approach
▪Interoperability and scalability tests Fall 2011
□Engage privacy advocates
▪Privacy Roundtable Outreach to privacy advocacy groups in
Winter 2011
□Identify options for organizational and operational
scenarios (see Roadmap for Safety Policy)
▪Certificate Management Entities Organizational and
Operational Interim Models Spring 2012
▪Costs Interim security cost estimates Spring
2012
▪Governance Develop options and guidance for
understanding roles and responsibilities
Spring 2012
□Develop technical design (if appropriate) Spring 2012
□Test prototype during Safety Pilot Model
Deployment
§