based on concepts developed in Southeast Michigan 2014 project.
|More likely that
system will be interoperable.
continent-wide deployment. Everything
in the testing is being developed to be deployed on a much larger scale.
critiques are welcome
|Question: How do
we know when a particular application is “approved”
policy question – no answer yet. We
will learn more about the level of governance and peer review needed as we
|Question: What is
the threat model used to evaluate security?
Who is the attacker?
from innocent pranksters to malicious hackers