►
From YouTube: IETF101-I2NSF-20180321-0930
Description
I2NSF meeting session at IETF101
2018/03/21 0930
https://datatracker.ietf.org/meeting/101/proceedings/
A
B
B
B
C
A
B
D
B
B
D
Okay,
so
this
basically
shows
what
we
have
so
far.
You
know
working
group,
and
so
our
deliverables
are
the
data
models
and
to
prepare
for
data
models.
We
have
some
information
models
and
those
are
the
optional
is
what
we
up
to
the
working
group
decision,
whether
raesha
published
them
or
not.
So
from
from
the
top
information
model,
we
have
the
base
model,
which
is
capability
information
model
and
from
there
we
derived
the
consumer
facing
information
model.
We
have
an
SF
facing
and
we
have
monitoring.
D
So
we
have
registration
device
and
for
the
data
models
we
have
an
SF
facing
consumer
facing
and
we
have
registration.
So
one
option
we
could
be
in
the
final
deliverable
could
be.
We
merge
the
information
with
the
data
model
it's
like
appendix
or
we
can
publish
them
independently,
depending
on
the
content
and
which
one,
whichever
is
easier
so
so
those
is
basically
the
summary
of
what
we
have
and
what
we
want
to
deliver.
Since
this
working
was
over
two
years
old
and
we
need
to
finish
those
data
models
as
soon
as
possible.
Okay,.
F
D
F
E
F
F
There
are
some
overlapping
or
some
something,
not
very
clear.
For
me,
those
thing
from
those
data
motors
should
be
or
if
it's
totally
correct
or
something
yeah.
It's
just
my
personal
feeling
and
a
last
point
up
is
about
the
information
model.
I
want
to
say
that
I
agree
with
this
graph
and
it
seems
it
elaborated
that
separated
motor
or
capability
drafter
is
the
basic
motor
for
all
the
other
information
motor
right.
It
provides
a
physical
structure
and
the
physical
concept
for
the
other
info
interface
information
motor,
so
so
activate,
but
country
there's.
F
D
So
so,
just
summarize
what
I
heard
from
you
you're
saying
that
first
point
is
the
data
model
they're,
the
NSS
facing
and
consumer
facing.
Those
are
two
definitely
deliverables
from
the
working
group
and
you
feel
there's
some
overlap
between
those
two
and
the
registration
and
capability.
Is
that
I'm
just
trying
to.
F
G
I
think
that
that
we
should
agree
somehow
is
which
are
the
documents
we
have
to
the
group
or
should
put
most
effort
on
to
have,
as
I
said,
to
deliver
something
on
time
and
precisely
a
will.
I
will
ask
the
people
are
working
on
this
verse.
We
need,
we
need
the
a
capability.
The
capability
model
I
tend
to
talk
about
the
capability
model,
because
it's
not
only
an
information
model.
Is
it
as
as
the
core.
G
E
G
E
H
This
is
a
poison
from
a
sketchy
you,
so,
according
to
other
pcs,
three
protocol
information
model
is
for
Catalan
to
describe
that.
A
motor,
the
object
so
I
think
at
the
current
information
model,
especially
a
capability,
is
a
good
stage,
so
my
group
are
working
for
information
model
based
on
current
item
s
at
the
capability,
our
working
undocumented.
So
we
try
to
power
ETA
the
paradigm
we
try
to
address
the
plus
V,
so
my
opinion
is
the
information
model
still
are
usable.
H
To
give,
however,
idea
to
people
understand
that
there
are
more
eventually
without
a
good
description
over
an
model.
The
object
using
the
information
model.
It
is
a
very
typical
to
understand.
There
are
actually
a
molar,
so
my
opinion
is
our
current
separation
of
information
data
model
is
know,
concisely
can
describe,
for
the
people
can
lead.
The
power
concern
is
the
table
mentioned
the
consistency
between
information
model
and
their
mother.
So
in
the
case
he
also
can
collaborate
and
they
try
to
make
synchronization.
H
So
in
that
case
are
either
durable
and
also
we
can
ask
the
people
in
our
working
room.
We
have
to
merge
their
armor
information
model
or
we
can
separately
so
can
ask
this
meeting.
Okay
and
also
the
the
other
model
case.
I.
Have
it
all
comment?
Sugiyama
dark
is
also
we.
The
previous
arrests
are
five
custom
project.
H
We
are
used
the
students
at
the
Harris
capability
data
model
where
the
basis
so
we
already
pulled
so
the
Sudan
and
data
model
is
a
foundation
for
isolation,
so
patient
reservation
interface
data
model
I
was
playing
a
load
end
of
my
presentation.
It
had
a
three,
so
I
think
Sudan
also
are
a
good
stage.
We
can
are
working
together.
So
that's
why
I
suggested
option
of
working
okay.
H
Morning,
this
is
a
cold
from
skq,
some
human
university,
oh
yeah,
so
this
hackathon
is
our
v
hackathon
for
our
I
to
and
as
a
framework
of
project.
So
this
time
we
explained
to
pictures
the
first
one:
a
dynamic
comparation,
given,
however,
a
security
service
how
to
map
into
the
actual
NSF.
The
second
one
is
consumer
facing
an
interface
that
we
used.
Let's
be
calm,
we
are
made
more
completely.
H
So
this
one
is
implemented
by
my
university:
seven
are
courageous
student,
so
also
we
are
involved
in
our
to
outside
people
from
a
tree
and
Korea
telecom,
so
the
research
lab
and
actually
operator
so
I
mentioned
the
diner
computation
consumer
page.
In
the
page
we
reflect
the
latest
our
data
on
mobile,
so
the
first
one
is
a
consumer
facing
so
like
listen
to
Li,
we
adopt
right,
so
we
deflected
this
data
model
into
this
hackathon.
H
The
second
one
is
also,
and
as
a
facing
case,
we
are
providing
dynamic
configuration
from
Security
Service
into
actual
NSF.
So
next
time
we
try
to
make
a
security
controller
or
fully
translate
high
level
security
into
low
level
security
using
automaton
such
as
a
context-free
grammar.
So
my
student
and
I
actually
working
on
it.
Hopefully
the
next
Monteiro
meeting
we
tried
to
show
security
consumer
translate
high
level
policy
into
low
level
policy,
so
this
is
a
funding
source.
H
This
is
a
scenario
dissimilar
freaked-out
previous,
our
kazan
group
based,
acted
rockin,
keep
hub
and
youtube
of
providing
open
source
and
menu.
End
video
clip
to
share
the
step
up
to
demonstrate.
So
we
proved
our
hackathon
or
using
a
user's
think
of
the
source
I
to
NSF
framework
and
interfaces
are
very
useful,
providing
data
driven
our
security,
our
management
and
enforcement.
D
C
C
H
The
operability
are,
the
document
describes
how
to
deploy
I
to
NSF
into
year
or
security
system.
So
the
update
is
at
a
section
for
we've,
clarified,
motivation
and
vanity.
Combining
sta
and
with
I
can
ask
that,
but
secondly,
also
clarify
the
type
of
policy
rule
can
be
imported,
Sdn,
suite,
gene
or
another,
depending
on
our
Secret
Service,
a
fire
or
deep
packet
inspection.
H
Something
like
that,
and
also
we
explained
that
the
role
of
a
security
control
of
divided
us,
which
may
simple
filtering
can
be
are
performed
in
to
open
aperture,
often
our
suite
Nugent
of
Pro
table.
Secondly,
some
more
complicated
a
security
services
can
be
performed
on
the
NSF,
so
we
show
so.
The
main
contents
also
be
published
I
totally.
Our
communication
method
agent,
so
I
believe
this
applicability
document
also
already
have
provide
academia,
so
I
believe
we
can
for
help
for
the
publication
for
others.
So
I
mentioned.
H
H
So
this
one
it
already
is
playing
their
last
meeting.
So
I
can
skip
it.
So
the
frame,
oh,
you
can
see
the
SDM
sweets.
Can
be
part
of
security,
salty
steady,
the
main
idea,
so
we
demonstrate
our
three
of
interfaces
for
over
I
to
NSF,
consumer
NSF
or
legislation,
or
we
show
that
the
use
police
and
also
this
is
other
accelerators,
50
serviced,
I
explain
so
my
solution
is
our.
We
are
publish
our
working
group
last
call
after
your
bling
and
then,
if
you
have
a
suggestion
or
some
comment,
we
can
address
yeah.
That's
it!
E
G
Will
try
to
provide
so
second,
is
that
looking
at
this
presentation
and
the
and
two
other
documents
are
somehow
related
with,
this
is
one
that
is
dealing
with
in
it.
In
a
V
and
SFC
I
was
wondering
whether
we
could
try
to
put
all
of
them
together,
because
it
would
build
again
a
consistent
story
of
the
different
applicability,
because
applicability
using
using
applicability,
use
immersive,
see
something
that
looks
a.
G
H
My
question
and
my
answer
is
as
a
preface
the
trap:
history
is
still
ongoing.
We
try
to
use
the
interesting
SFC,
so
my
team
is
implement
using
open
daylight,
the
SFC
functionality,
but
Linda
and
I
discussed
Oh.
Should
we
use
the
current
SSE
or
we
are
using
our
own
traffic,
you
can
say
are
just
the
traffic
analyzer
based
that
forwarding.
So
maybe
we
have
different
approach,
so
that
document
is
also
important.
H
It
takes
time
to
verify
so
my
cousin,
my
suggestion
is
this
document
already
showed
the
pure
electively
environment,
I
to
an
SEO
service
and
also
we
showed
other
operability
over
st
and
how
to
combine
STL
and
I
join
as
this
one
is
already.
We
show
the
using
episode
we
prove
so
also
we
are
show
the
three
services.
The
one
is
a
primer
that
security
service.
The
second
one
is
a
dpi
for
security
content
service.
Other
one
is
the
videos
of
mitigation
means
the
attack
mitigation
right,
so
three
attacks.
H
Our
main
attacks
are
interested
in
our
human
right,
so
we
address
this.
So
that's
why
I
believe
this
is
related
for
what's
new
Rosco,
if
we
consider,
but
your
second
comment
is
the
edge
and
actively
promote
case
still,
nobody
implemented
I
to
a
recipe
into
near
system.
My
student,
my
other
clever
lights,
are
still
working
on.
H
It
takes
another
one
or
two
years
we
do
not
actual
of
Africa
or
not
so
it
takes
another
yeah
so
that
you
I
will
try
to
minimize
the
feasibility
of
our
I
too
and
as
a
to
include
reality
and
there
we
can.
So
in
later
on
your
Connecticut.
We
can't
work
on
some
server
yeah
other
yeah
work.
So
that's
it.
G
Freeze
somehow,
content
and
I
think
that
would
be
a
battle.
If
there
is
some
related
work,
I
mean
the
document
is:
is
a
world
is
adopted
this
year,
but
that
we
wait
a
little
bit
till
it's
through
the
through
the
last
call
simply
that
just
incorporate
these
other
cases,
I
think
it
will
translate
into
a
higher
quality
of
the
documents.
I,
don't
think
I
don't
know.
This
is
something
that
I
leave
to
the
church
to
decide
whether
there
is
a
strong
pressure
in
publishing
this.
It
is
a
lot
this
adopted
draft.
G
A
F
Holloway
is
French
a
hobby
I'd
like
to
introduce
our
capability
motor
just
latest
progress
right
now.
We
we
haven't
finished,
it
is
updated,
or
this
works
are
updated.
That
in
this
life,
I
will
give
you
a
clear
description
of
what
is
in
the
very
near
future,
in
what
is
a
content
with
a
new
modification
in
our
updated
version.
So
that's
today's
slides
code,
okay
for
some
people
who
may
be
not
very
familiar
with
a
white
Wednesday
for
work
in
general
or
how
we
are
what
Co?
F
F
The
key
update
of
the
next
version:
we
want
to
incorporate
the
decorator
motor
into
the
capability,
a
motor
to
make
it
more
flexible
and
more
more
efficient
when,
when
the
policy
is
in
the
ground-
and
we
want
to
use
it
so
that's
a
week-
we
can
see
how
to
use
it
and
then
another
another
planning
updates.
We
reintroduce
okay
and
so.
F
So
the
disk
ability
motor
is
general
goal
is
to
define
the
concept,
although
the
only
of
NSF
capability
and
these
semantics,
so
you
can
say
that
it's
an
information
model
because,
based
on
the
model,
we
know
what
is
the
capability
and
how
to
use
them,
and
what
is
semantics
of
that?
Okay
and
then
based
on
the
capability
model,
we
define
the
concept
of
the
only
safe
policy
rule
and
also
its
semantics,
with
the
form
of
an
information
model.
So
this
is
a
prolific
model.
It's
our!
You
know
this.
F
This
is
a
go
of
this
working
group.
By
using
the
policy
model,
we
can
combine,
we
can
control
and
manage
all
the
security
capabilities
at
the
to
provider
that
require
the
functions
for
our
customer,
so
that
that's
Jessica
and
also
so.
Okay
I
have
sedatives,
and
so
the
most
important
goal
is
to
achieve
the
multi
vendor
interoperability
right,
okay,
then
so,
and
so
the
basic
content
of
the
our
hybrid
motor
is
is
a
structure
of
ECA,
the
Cody
TCA,
because
it's
it
consists
three
causes.
Everyone
is
a
event
condition
and
action.
F
So
and
in
addition
to
this
basic
structure
element,
we
also
provide
a
some
extension
to
the
policy
security
policy
rule
which
include
a
one
is
the
resolution
strategy
with
the
resolution
strategy
is
mainly
for
to
to
to
provide
a
template
for
the
policy
rule
and
to
solve
the
solve
the
conflicts
in
the
policy
rule,
and
the
metadata
is
many
used
by
the
rest
of
your
strategy
to
make
the
division.
Okay
and
also
the
Iraqis
thought
action
in
the
policy
Ruach,
which
is
also
useful
for
some
for
some
some
some
specific
condition.
F
F
F
We
have
our
decorated
motor
class
and
in
the
below
that
decorator
class,
we
can
add
a
different
kind
of
specific
or
specific
or
policy
rule
such
as
authentication,
raw
organisation
or
the
virtual
user
control,
or
something
and
those
who
are
the
runtime
Gras,
which
means
that
they
are
not.
They
are
not
defined
in
the
used
in
the
world,
beginning
that
they
can.
They
can
define
and
put
there
and
when
we
use
when
we
need
it,
which,
after
dynamically
loaded
then
to
our
basic
apology
rule.
So
that
makes
the
this.
F
Okay
and
I
got
to
not
one
protein
to
take
care
of
this,
but
the
basic
idea
is
that,
comparing
to
our
previous
desire,
our
creative
active
eyes
that
we
just
reuse
where,
in
normal
way,
we
define
the
class
inheritance
subclass
way
to
define
from
the
very
basic
a
class
to
our
very
special
class.
That
way
is
very
simple,
but
it's
under
is
very
intuitive
and
easy
to
design,
but
it
has
its
costs.
It's
it's
not
very
arrogant,
and
it
also
requires
some
non-trivial
mentions
when
we
need
to
to
sound
any
update.
F
So
a
later
cannot
work
we're
at
one
time.
So
that's
what
I
mentioned.
So
that's
why
we
think
that
maybe
decorating
motor
can
be
introduced
to
hear
and
to
solve
this
problem.
We're,
okay
and,
in
addition
to
the
decorate
mode,
I
think
we
have
another
plan
updates,
which
included
a
tree
which
we
are
extending
our
event
and
the
condition
crosses
with
some
more
more
powerful
away
with
the
CF
and
poor.
F
Cautious
definition
to
make
a
mixin
to
cocaine
can
include
more
semantics
and
also
we
can
make
our
inventor
to
be
to
render
and
evaluation
function
to
be
more
complex,
to
have
to
can
express,
more
more
information
and
more
powerful
actions
of
the
traffic
so
and
and
another
extension
other
other,
including
extension,
included.
The
action
class
you
by
division
strategy,
and
we
were
also-
we
include
more
meditators-
to
help
the
budget
resolution
strategy.
F
So
they
are
all
very
detailed,
an
extension
to
the
current
policy
who
are
modern
or
the
her
ability
motor-
and
this
is
actually
the
previous
condition-
may
be
in
100
a
meeting.
We
have
this
kind
of
situation,
we
have.
We
have
our
basic
or
capability
motor,
shaft
and,
based
on
this,
this
mode,
this
basic
model,
we
can
define
the
customer
facing
interface,
information
motor.
F
F
We
can
work
together
on
there
and
so
the
laughter
that,
just
out
like
what
I
told
you,
we
will
provide
our
updated
version
of
the
capability
draft
in
the
near
of
two
or
three
weeks,
and
so
we
could
make
the
work
can
continue
for
other
information
model
and
data
model
draft
and
the
way
we
have
provide
our
helps.
We
work
as
a
team
to
make
the
alignment
between
the
ability,
motor
and
the
other
information
motor
and
take
moto
jars.
So
that's
our
current
plan.
F
D
H
Weeks
so
this
is
a
poem
I
scheduled
you,
so
the
current
the
capability
information
model
is
a
very
good
safe
for
Metro
security,
so
we
search
at
the
firewall
and,
however,
content
security
or
eternity
asian
case
still
a
block
shape,
so
we
needed
to
go
into
more
detail.
My
suggestion
is
the
probability
sticks
the
ears
or
the
threat,
expressions
and
data
model,
the
language,
as
you
know
so
properly.
We
can
take
advantage
over
how
to
describe
content,
security
or
swap
or
authentication,
and
then
we
can
more
clarify
our
information
order.
F
Okay,
we
will
consider
and
the
URI
to
Calgary
in
our
very
beginning
picture.
We
want
to
cover
all
the
different
categories
of
security
capabilities,
but
when
we
proceed
all
these
work,
we
find
that
the
content,
the
content,
security
in
the
application
they
are
and
the
attack
mitigation
are
serious
functions-
is
not
so
easy
at
the
network
layer
security
function
to
to
define
their
policy.
You
are
so.
F
F
F
But
maybe
you
missed
and
NVP
sorry
I
just
use
authentication
after
example,
but
you're
right
away.
We
cannot
define
all
the
different
kinds
of
security
bill.
The
security
capability
in
our
base
motor
I
just
mean
that
how
to
use
the
decorated
motor
in
our
motor
in
our
design,
so
I
use
the
authentication
after
example.
But
you
know
not.
E
F
G
G
E
D
Since
people
mentioned
content,
security,
I
just
reminds
me
of
I-
was
seeing
I'm
sharing
this
Oh
knock
open,
never
user
group
there's
a
working
group.
There
called
software-defined
security
service
working
group
and
over
there
is
primarily
enterprise,
large
enterprise
communities,
providing
requirement
a
use
cases
and
their
pain
point.
So
over
there
they
define
three
distinct
security.
D
D
Third,
one
is
security
being
enforced
by
the
application,
so
they
categorize
in
three
different
places,
and
another
thing
is
there's
so
much
talking
about.
Since
they're
lots
of
enterprises
want
to
move
their
workload
to
the
cloud.
Actually,
they
are
like
many
companies
are
moving
like
intrude
is
moving
forty
percent
already
into
the
cloud.
Many
companies
are
following
the
suit
and
the
biggest
part
is
how
do
we
validate
the
environment?
I
think,
maybe
later
at
the
end
of
this
session.
We
talk
about
this
anticipation.
That's
the
part
of
our
dresses,
okay,.
C
H
H
We
added
a
double
neon
or
absolute
time
zone
pot.
Also,
all
periodic
handle
to
the
on
the
Turkish
did
capability.
Are
we
added
photo
number
to
our
concern
or
close
associate
or
TCP
and
UDP
cloud?
Oh,
this
is
listed
or
we
will
change
the
county
and
data
model
to
the
orientation
of
reject
foreign
TV
outside
miracle
pie.
F
F
H
Document
so
Sudan
capability
currently
are
either
used
for
graduation
interface,
such
as
a
we
register
NSF
capability
and
also
we
are
search
if
security.
Our
controller
deceive
us
on
to
the
service,
and
if
there
is
no
register
MSF,
it
ask
developed
for
a
milliner
system
to
have.
It
is
kind
of
copper,
bullet,
NSF,
so
kind
of
a
sort
intentionality
the
so
the
one
is
a
China
lipo
cycling.
So
the
information,
the
lifers
are
only
part
of
a
man
also,
but
the
interaction
between
the
I
to-
and
s
are,
persistent
mono
also
still
required.
F
F
Not
sure
don't
work
this
in
scope
of
who
I
draw
myself
because
we
haven't
it
is
cast
all
these
scenes
until
now
matter,
I
said
how
to
manage
the
registration
information
Moodle.
Actually
we
only
discussed
what
should
be
what
conduct
know
what
kind
of
host
code
the
Coverity
is
that
you
to
be
registered
to
the
tremendous
anger,
chanting,
psychotic
controller,
but
the
point
you
mentioned
I,
don't
think
we
have
discussed
analytical,
very
good
and,
however
bizarre
at
Edition,
so
I'm
not
sure
with
a
reshoot
yeah,
actually.
H
F
G
Yeah
I
mean
when
it
comes
with
the
urban
histories.
You
interface,
there
is
another
graph
on
registration
and
we
will
discuss.
I
have
a
couple
of
questions
or
that,
but
later
on,
there
is
a
methane.
That's
passes
me
in
these
graphs
and
several
others
is
about
the
time.
So
what
do
you
mean
by
a
time
soon,
because
if
the
time
song
is
exposing
things
over
over
date
is
not
a
time
zone,
the
date
is
that
I
won't
understand
what
the
time
zone
is
simply.
H
G
H
Okay,
let
me
declare
by
so
you
can
see
in
the
past
the
hecka
stone.
We
are
show
the
time
based
adapter,
which
a
military,
what
kind
employee
cannot
access
about
Facebook
or
YouTube
right
the
kind
of
description
right,
so
we
can
specify
security
policy
there,
what
time
start
enforced?
What
kind
is
aspire,
but
it
is
a
depending
on
the
time
duration.
While
so
we
can
specify
that
one
10
days
to
send
the
security
service,
so
you
try,
but
we
needed
some
type
of
here.
We
will
fix
it.
J
J
H
Exactly
so
sometimes
description
of
a
couple
built
in
maybe
some
something
long
indicated
we
needed
to
modify
just
right
or
we
modified
some
parts,
so
it
depending
on
some
operational
policy.
So
maybe
you
guys
at
shoulder
incremental
ISO
hitch
approach.
You
do
better
and
they
become
smarter,
which
one
you
can
select.
Okay,.
J
Okay,
I
I
think
maybe
I
can
understand
your
explain,
but
but
maybe
you
should
consider
today's
terminology,
you
mean
sad,
her
capability,
all
limited
a
smoke
ability,
so
it
can
make
more
clearly
I.
Just
a
reveal
quickly,
boyo
this
in
your
trees,
but
the
tree
ask
about
trees,
all
right,
not
really
you're
coding,
so
I
believe.
If
you
don't
want
to
change
your
modified
terminology,
maybe
you
should
careful
and
different
more
detail
in
your
description.
Okay,
thank
you.
Okay,.
A
H
This
presentation
is
about
the
totient
function,
space
interface,
yong-dae
to
moodle
or
disturbed
our
each
other.
Are
you
working
or
documented
this
time
at
least
a
command
or
different
or
yong-dae
to
move?
According
to
the
information
model
for
an
insufficient
to
face
this
young
data
model
are
was
verified
to
frost
I
implemented,
or
I
kept
our
101
hackathon.
H
H
If
this
is
our
indoor,
this
module
of
this
youngin
data
model
name
are
interchangeable
for
our
ITF
items
and
as
a
patient,
replace
it
to
a
table.
I
trained
several
police.
She
grew
up
or
NSF
or
we
added
another
an
absolute
a
time
zone,
but
also
already
time
to
eat,
shape
policy
rules,
and
we
added
an
opportunity
to
our
TCP
and
UDP
college
included.
H
Auditioning,
are
we
changing
our
choice
case
structure
into
a
container
structure
or
about
condition
cloudy
for
multiple
configuration
or
likewise
action
clouds?
Are
we
changing
our
choice
case
structure
into
a
container
structure
on
for
multiple
configuration?
Finally,
we
have
or
multiply
the
invented
condition
and
as
jean-claude
to
be
obligated
into
a
priest.
H
H
So
let
me
clarify
last
couple
muscles
what
happened
so
the
Giants
also
know
he
gave
a
very
constructive
comments
on
this
and
attract
so
he
addressed
most
of
the
huge
at
a
comment
except
the
object-oriented
style
and
also
personalization
between
the
capability
information
model,
and
that
is
a
tell
another
case,
so
we
were
willing
to
to
address
his
the
command,
try
to
object-oriented
style
next
year.
The
division
I.
H
So
I
think
as
long
and
public
Hank
and
he's
also
export
also,
that
was,
according
to
the
cases
business
that
so
we
try
to
use
an
identity.
It's
a
point
of
a
kind
of
with
the
pointer,
so
some
existing
structure
point
our
musings
and
the
kinds
of
identity
trying
to
reduce
it
to
another
additional,
but
the
computers
and
data.
So
we
probably
try
to
do
not
actual
Java
style
object-oriented
in,
but
we
follow
the
concept
of
object-oriented
style.
Yes,
but
actually,
unfortunately,
though
it
emotive
just
actual
so
you
need
to
make
yeah.
H
D
H
Okay,
so
information
model
are
updated
case,
actually,
the
minor
updates.
So
the
previous
version
to
read
the
some
description
are
match.
Direction
description
was
something
long,
so
I
pissed.
So
the
previous
description
is
just
a
match
letter.
They
match
our
attraction
so
that
the
Russian
means
the
security
policy
should
be
applied
of
of
I
directional
or
one
direction
another
direction.
So
we
fixed
this.
This
is
a
major.
Our
actual
change
so
also
I
want
probably
Diego
and
Frank
and
I
discussed.
H
This
information
model
is
a
tool
that
simple
so
which,
but
our
data
model
K
is
based
on
previous
hackathon
in
implement
fire
and
the
back
face
of
Hitler.
We
have
more
career
or
that
era
structure
we
tracked
early
because
we
try
to
address
that
more
detailed,
some
specification
and
also
there
go
ask
question
a
multi-ton,
10,
Tennessee
and
and
also
our
integral
what
is
difference.
So
you
need
to
clarify
this
one.
Maybe
we
can
work
over.
We
can't
separate
so
what
they
tell
us
case.
H
The
one
house
domain
can
have
multiple
talents,
such
as
some
department,
HR
for
law
or
some
finance,
or
something
like
that.
We
deploy
policy
depending
on
the
Tennessee
so
but
in
the
group,
current
information
model
case
that
device
a
guru
or
employee
guru.
Something
like
that.
So
maybe
we
need
to
discuss
this
one
next
there
it
try
to
refine
the
draft
online
or
synchronized
current
capability
information
model,
and
also
we
extend
information
model,
accommodate
security
policies
and
threat
expression
using
some
open
source
such
as
our
sticks,
structured
security
of
threat,
information
expression.
H
H
F
The
point
that's
what,
but
maybe
there
are
still
further
work
need
to
do
because
Hungary,
because
the
capability,
both
my
mother
and
the
customer
facing
from
his
mother,
are
designed
and
proposed
individual,
apparently
so
so,
but
anyway
at
the
last,
it
should
be
consistent
with
each
other,
so
I
think
III
can't
really
I.
Don't
have
our
clear
thought
how
to
how
to
how
to
resolve
the
inconsistency
between
that.
So
we
we
should
all
yeah.
We
should
consider
in
work
together
hard.
J
J
That's
is
it
some
kind
of
service
module,
so
a
question
it
is
in
the
service
model
is
work
song
only
one
device
or
set
off
to
Mars.
It
means
set
off
a
set
of
devices
side.
E
J
F
H
So,
actually
the
one
example
the
duty,
what
time
employee
cannot
access
a
Facebook?
Something
like
that.
So
there
is
a
high
level
policy
right,
so
security,
our
control,
a
translate
who
our
employee,
what
time
the
prevention
time?
What
is
the
web,
such
as
Facebook
YouTube?
We
pure,
are
using
support
phone
number
IP
address
something
like
that
so
from
the
database.
Other
information,
so
security
controller.
Has
the
in
intelligence
interpret
that,
however,
policy
into
low
level
policy,
I
call.
J
H
Your
current
over
here
custom
for
the
case
we
know
if
employee
case
we
have
some
internal
domain
network.
So
we
have
database
who
are
the
employee
devices
of
with
the
IP
address,
so
the
switches
can
filter
out
with
that
IP
address
information.
So
the
topology
case,
the
our
I
and
I
sub
security,
controller
and
Sdn
switch
controller
has
interact
so
sthe
controller
has
information
yeah.
F
F
To
this
question,
I
think
we
only
concern
on
the
on
the
maybe
serious
function,
sure
information,
how
many
are
security
functions
between
the
our
customer
and
the
service
and
how
they
construct
our
service
from
human.
That's
that's
what
kind
of
the
populating
information
that
we
are
concerned,
but
we
don't
care
about
the
network
topology
right
so
because
we
are
working
on
the
security
service
layer
or
how
to
say
we
are
an
application
layer.
F
We
don't
care
about
the
network
of
the
I
topology
and
under
then
our
policy
model
doesn't
care
about
in
his
any
Syria
to
networker
resort
or
something
we
just
care
about.
The
security
policy
security
policy
means
that
how
we
apply
the
Howie
Howie
is
priced.
The
security
requirement
of
the
courageous
service,
mad
the
firewall
I
have
ideas.
We
are
a
security
configuration,
so
it's
only
about
all
he's
only
limited
on
the
security
area,
so
I
I
will
consider
your
suggestion.
It
may
be
hard
relation,
but
I
don't
think
it's
so
much.
H
J
G
These
group
of
customers,
or
whatever
that
make,
could
make
sense
I,
don't
think
that
the
that
the
way
of
nobody
needs
right
now
is
correct
means
it's
a
waiver
correct
because
you
say
groups
and
diamonds.
What
on
earth
is
a
group
and-
and
it's
not
enough
to
take,
for
example,
human
resources,
for
example,
accounting?
No,
this
is
you
find
that
the
babies
you
have
to
define
whether
tendencies
which
are
what
defines
a
tenant?
What
makes
attendance
and
then
wait
for
the
moment.
G
H
G
I
am
the
Sangha
degree
piece,
the
same
way,
I
understand
where
the
function
is,
but
when
we
are
talking
about
the
function
here
in
this
part
of
the
common
understanding,
I
mean
I'm
mixing,
simply
tenant.
How
do
you
express
the
tenant?
What
is
a
tenant
because
I
simply
say,
and
you
identify
that
enough?
You
see.
L
D
D
Okay,
so
so
I
would
like
to
show
you
this
in
the
anak
last
year
in
the
fall,
we
organized
this
Salford
different
security,
proof
of
concept,
so
we
have
several
enterprise
community
is
showing
what
they
would
like
to
have
I
would
have
them
there
showing
how
they
implement
that
so
I
find
it's
a
kind
of
give
you
a
example
of.
What's
the
client
facing
interface.
Look
like
sorry.
This.
H
Yeah,
okay,
that's
a
good
comment:
yeah
go!
Okay!
A
consumer
facing
the
interpret
data
model
is
more
career
structure
because
of
a
curse
on
the
project
fire
with
time
based
the
regulatory
we
implemented
web
based
access
control.
So
we
are
other
address
that
the
comment,
so
young
Dara
model
modified
policy
domain
object
can
have
a
multiple
tenants,
so
this
is
from
I
believe
the
John
Stossel
yeah
get
this
comment,
and
also
over
the
organization
of
young
dinner
model
and
Eric
I
clarified,
and
also
the
Dara
model
tree
or
the
young,
fully
addressed
ECA
or
paradigm.
H
So
this
is
the
structure
of
polished
era.
Model
have
a
you
can
see.
So
if
especially
policy
rule
is
that
is
more
clearly
defined.
The
other
domain
case
is
still
we
needed
to
clarify
what
kind
of
multi-tenancy
and
integrals
read
it
the
telemetry,
so
maybe
the
Linda
providing
that
information.
We
can
improve
our
au
phase
information
model
and
also
we
can
improve
the
era
model
together.
So
the
major
changes
we
accommodate
a
multi
currency
in
the
policy
rule
and
you
can
see
on
policy
domain
that
policy.
H
Our
talent
can
attract
me
in
the
party,
for
instance,
so
we
can
accommodate
the
multiple
talent
also
we
can
providing
policy
management
of
syndication
masterda
minor
changes,
we
double
check
there
are
time
and
that
we
can
improve
right
so
endo
group,
for
example,
we
can
double
check
all
of
the
field.
Have
it
us
correct
the
time
or
not?
So
we
reflect
the
next
step.
We
will
discuss
the
information
data
model,
the
authors
so
so.
H
The
issue
is
that
we
needed
to
combine
the
information
model
and
data
model
for
consumer
facing
into
one
document
or
two
document.
So
I
want
to
listen
to
your
voice
and
also,
we
also
add
more
attack.
Currently,
videos
attack
at
a
mitigation
is
currently
not
included.
That's
where
I
asked
Frank
to
consider
our
capability
model.
So
we
need
to
collaborate
that
this
yes
and
also
the
sticks.
I
mentioned
the
structure.
H
The
threat
information,
our
expression-
has
a
powerful
tool
is
process,
read,
maybe
the
I
to
MSF
a
user-specified,
more
detail,
scalable
policy
using
that
kind
of
structure.
So
that
way,
my
current
group
investigating
sticks
is
the
use
of
rapport
improve
our
consumer
case
interface.
That's
it
thank
you
yeah,
but
I
assume
as.
H
H
D
So
I
just
want
to
some
key
part,
so
this
is
the
topology
of
the
security
services.
So
from
anak
perspective
is
really
the
northbound,
like
our
consumer,
facing
like
what
kind
of
policies
they
were
like
user
to
impose
and
it
own
arc,
because
enterprises
want
to
move
the
workload
to
the
cloud
so
in
this
POC,
what
they
have
decided
to
do
is
we
have
public
clouds
a
and
B.
D
D
The
workload
in
cloud
B
allows
them
kind
of
access
and
then
the
workload
in
the
on-premise
data
center,
who
they
allow,
what
time
they
allow
like
if
they
change
that
into
I
to
SF
frame
format.
Policies
like
that
condition
will
be
what
time
or
environment
who
has
access,
and
then
the
action
or
the
matching
condition
and
the
action
condition,
and
then
they
have
a
default
or
others
are
blocked.
So
so
this
just
gives
us
a
simple
example
like
when
we
do
the
consumer
facing
interface.
D
G
A
K
K
We
are
doing
this
cause
young
push
and
subscribe.
Notifications
are
now
a
thing
thanks
to
Eric
and
that
confident
others,
of
course,
but
I
just
see
Erika,
and
so
there
is
the
possibility
to
subscribe
to
a
data
store
and
in
our
case
we
created
a
lot
of
statically
defined
notifications.
This
is
up
to
discussion
and
up
to
understand
what
we
are
doing
here
right
now,
so
basically,
the
module
shrank
to
a
lot
of
small
things,
and
these
are
the
events
alarms
and
logs
and
not
sorry.
K
The
modules
trained
to
a
lot
of
tiny
bit
of
things
is
only
the
counters,
because
those
we
do
not
want
to
report
out,
for
example,
an
unchanged
subscription
to
an
continuously
changing
counter
would
be
basically
waste
of
benefit
and
time,
so
you
could
do
an
periodic
update
or
just
retain
the
old
model
of
Pauline
counters,
because
everybody
does
that
that
is
very
usual
and
so
counters
are
still
a
standard
game
module
representation.
At
the
moment.
K
Everything
else
here
on
this
message
type
list,
which
is
a
valid
alert
alarm
cetera,
is
now
a
specific
notification,
as
you
can
see
here
with
the
new
information
monitoring
information
which
is
in
the
data
model
and
not
to
forget
this,
and
this
is
high
granularity.
So
every
for
every
system,
type
of
system
event-
and
you
have
a
single
notification
in
the
process
above
one
for
every
type
of
NSF
event
like
a
flood
detection
or,
like
some
other
unauthorized
access.
We
have
a
specific,
hard-coded
notification
at
the
moment.
That
might
be
too
fine
granular.
K
What
we
might
want
to
have
is
to
have
a
generic
system
notification
and
a
generic
NSF
notification
in
which
we
can
introduce
case
choices
and
use
any
other
concept
that
was
on
a
slide
before
I
will
not
go
back
that
uses
identities
to
make
these
choices
so,
but
we
also
introduced
next
to
the
this
split
between
a
standard
data
store
model
and
the
notification
definitions.
We
introduced
a
lot
of
identities,
and
this
comes
up
here
now.
This
is
basically
our
yeah
a
lot
of
identities.
K
This
is
exactly
the
right
slide,
so
what
was
once
a
container
I
think
that's
a
pointer
yeah,
so
which
was
once
a
container
that
had
just
a
set
of
boolean
in
it
is
now
an
identity
that
is
creating
taxonomy.
So
we
have
a
accessmode
identity
and
a
lot
of
specific
access
modes
that
have
a
parent
identity.
With
a
substrate
number
base,
so
now
we
can
have
taxonomy
of
things
and
our
models,
for
example,
in
this
kind
access
modes
and
which
I
think
is
especially
appealing.
K
We
can
have
text
on
amis
of
attack
methods,
and
that
is
something
that
will
be
very
useful
in
the
post-processing
of
these
reported
notifications,
because
associating
specific
attacks
that
are
detected
is
very
more
easier
if
you
have
a
semantic
distance
between
them.
So,
for
example,
a
flood
attack
and
a
web
attack
might
be
closely
correlated
because
they
are
on
the
same
as
they
have
the
same
parent,
for
example,
and
and
with
this
taxonomy
we
started
basic
selection.
We
built
on
that
stuff.
We
had
already.
K
K
So
this
is
the
basic,
the
basically
the
biggest
change
we
made
to
the
to
the
layout
of
the
data
model
at
the
moment,
and
the
the
big
advantage
here
is
that
SF
is
going
to
publish
this
information
to
the
subscriber
and
we
do
not
have
to
pull
everything
all
the
time
arbitrarily
from
a
yang
data
store.
So
if
you
have
a
report,
telemetry
channel,
it's
been
so
speaker,
the
extra
drama
stream,
we're
usually
using
this
identity
a
lot.
We
are
also
using
something
that
I
don't
know
as
always
validating.
K
We
have
at
some
point,
for
example,
two
parents,
so
TCP
and
our
model
can
be
have
a
parent
and
a
layer
3.
So
this
layer
for
a
protocol
has
a
parent
to
layer,
3
protocols
that
are
basically
ipv4
and
ipv6.
That
does
not
validate
with
every
tool,
and
it
is
not
really
clear
to
me
how
established
and
implemented
having
multiple
parents
and
identity
actually
is,
as
a
yang
1.1
most
certainly
allows
for
it.
K
Implementation
wise!
You
might
have
to
divert
from
that,
because
it
might
not
be
effectively
usable,
attractive
right
now.
I
am
Not
sure,
maybe
there's
a
change.
Why?
We
write
this,
but
that's
not
a
biggie,
but
there
was
one
thing
that
was
not
basically
validated
before,
but
we
are
using
that
kind
of
structure
at
the
moment,
so
we
can
have
also
text
on
a
list
of
protocol
types
in
this
case
spending
layers.
K
So
what
we
will
do
is
we
want
to
go
forward
and
have
more
unbearable
telling
how
to
build
these
taxonomies
of
identities
here
again,
which
will
be
helpful
in
post
process
mint
and
gives
cement
more
semantic,
meaning
to
post
470
very
a
monitoring
component.
Basically,
we
would
really
like
to
have
input
from
outside
of
this
working
production
that
conf
how
the
notification
statements
that
we
are
using
now
could
be
improved,
especially
in
terms
of
extending
them
later
on.
That's
the
most
important
thing,
I
think
that
today
we
have
a
set
of
informations.
K
We
want
to
report,
but
tomorrow
it
might
be
more
more
advanced
or
a
different
type
of
the
same
attack
type
and
the
context
and
the
connotation
changes
I
mean.
So
we
have
to
plan
for
extensibility
and
changes
in
the
model,
and
that
is
something
we
have
to
improve
on
I.
Think,
because
the
static
notifications,
I
would
just
add
new,
steady
notifications,
you
then
have
to
have
to
have
know
about
so
distributing
knowledge
of
the
existing
of
something
is
always
a
problem.
K
Maybe
just
use
this
module
anyone
and
then
have
this
identity
choices
and
then
I
guess
that's
a
better
way,
but
we're
still
discussing
that.
So
that's
one
way
to
go
forward.
We
want
to
have
this
the
next
check
of
them,
also
because
the
hackathon
team
is
great
I,
mean
literally
outputting
all
the
time,
excellent
proof
of
concept,
so
so
I'm
looking
forward
to
that
next
time
and
yeah
I
think
when
we
are
done
with
the
proof
of
concept,
we
can
basically
go
to
adoption,
I.
Think
high.
F
K
Is
in
flux
it
was
it
was
going
out
of
on
draft
is
not
arrived
in
another
draft.
If
this
is
this
ongoing
work
in
the
net
community,
Eric
might
have
another
comment
on
that.
I
think
it's
better
answer
than
my
answer,
but
the
the
basic
answers.
Yes,
of
course
you
can
do
exactly
that,
but
it
might
have
a
comment.
M
To
answer
the
and
there's
really
two
kinds
of
subscriptions
being
developed
in
the
Nick
Kampf,
you
can
subscribe
to
a
data
store
or
you
can
subscribe
to
a
stream.
When
you
subscribe
to
a
stream,
you
have
the
option
of
getting
the
events
as
they're
produced
out
of
the
stream.
You
also
have
a
replay
buffer.
So
if
you
want
to
replay
them
later,
that's
fine
once
they're
identified
and
selected
do
you
have
the
ability
to
still
batch
process
and
send
them
as
groups,
but
that's
part
of
the
marshaling
effort.
M
M
M
K
This
is
also
ongoing
and
yeah.
There's,
if
you
do
bundling
of
for
some
periodic
subscription,
would
be
possible
as
a
data
store
subscription
to
the
counter
module
and
a
stream
subscription
could
also
be
bundled
to
the
notifications
that
are
defined,
but
these,
then
would
have
would
educate
the
would
buffer.
You
would
not
receive
them,
but
you
would
have
them
after
a
minute
and
get
all
verification.
This
notification
bundle
message,
so
both
varieties
subscriptions
to
data
store
into
streams
can
have
this
periodic
interval
by
their
own.
K
K
M
Direct
answer
that
the
early
drip
that
got
adopted
for
the
bundled
messages
did
have
the
choice
of
storing
the
messages
for
later
retrieval.
Many
people
thought
that
was
overkill,
because
the
ability
to
query
events
out
of
a
data
store
seemed
a
little
much
so
if
there
was
a
desire
for
it
recreating
or
taking
the
structure
that
already
exists
for
for
random
access
to
the
events
is
possible,
but
you're
going
to
go
up
a
long
hill
to
have
somebody
who
wants
to
do
random
access
into
the
events.
It's
a
hard
processing
model,
yeah.
I
K
We
have
a
building
the
bundle
under
notification
message
draft
right
now,
this
one
and
yes,
there
is
a
semantic
there's,
a
big
semantic
overlap
between
events
and
logs
they're.
Basically,
the
same
thing.
Events
imply
that
you
are
somehow
conveying
them
in
close
to
real
time
like
as
soon
as
possible
and
logs
somehow
imply
that
you
store
them
a
little
bit
and
then
somehow
access
them,
but
that
is
literally
the
only
difference
between
the
content.
Semantically
is
the
same.
K
So
if
you
really
want
to
have
a
aggregating
block
of
notifications
that
you
retrieve
on
your
periodic,
you
have
control
of
when
to
get
it.
You
could
aggregate
the
things
in
the
message
certification,
but
that
was
pushed
back
a
little
bit.
So
I
was
considering
actually
aggregating
events
and
Lots
in
the
same
notification,
just
adding
an
optional
part
of
metadata.
That
is
necessary
to
express
the
lock.
H
K
K
It
is
up
to
you
how
to
dampen
and
how
to
subscribe
to
the
unchanged
subscription
method,
and
so
you
have
already
little
bit
of
control
there
and
but,
if
is
still
actually
really
the
the
use
case,
that
you
want
to
query
an
aggregating
block
of
notifications
or
lock
fire
lines
whatever
we
can
build
it
in
again,
but
I
actually
don't
see
that
use
case.
But
Frank
might
have
a
use
case
for
that.
And
if
that
is
there,
we
can
build
something
in
quality.
H
Okay,
this
is
Paul
from
skq,
so
the
registration,
information,
interface,
information
model
and
data
model.
We
addressed
some
like
recycling,
but
this
is
for
some
interaction
with
the
NF
of
a
mano,
so
laceration
face
are
had
three
functionality.
The
first
one
is
the
register
and
at
NSF
into
secret
controller.
Second,
one
is
some
consumer
in
top
needs
delivering
some
security
service
the
cast.
So
what
kind
of
capability
is
exist
if
there
is
no
such
kind
of
a
capability?
Nsf,
our
script
controller?
Can
our
quarry
to
the
vendors
or
developer
marina
system?
H
Third,
one
is
interaction
with
an
appropriate
manner
to
recast
the
life
for
life,
the
cycling
service.
So
the
first
one
is
regulation.
You
can
see
develop
manual
system
register,
NSF
capability,
so
which
means
currently
the
surgeons
capability.
Data
model
is
used
to
register
capability
of
NSF
and
then
security
controller
are
stored
into
eternal
kala,
patthar,
three
NSA
and
its
capabilities.
H
H
So
if
currently
we
are
using
the
monitoring,
interface
or
Hank
I
mentioned
so
you
can
see,
are
the
NSF
is
over
all
d2
something
like
there
or
there
is
something
long
because
of
some
DDoS
attack.
Something
like
that.
In
that
case,
we
can
make
me
may
be
make
another
NSF.
In
that
case,
we
needed
to
ask
the
development
system
create
new
or
NSF
to
carry
over
that
the
cast,
and
then
it
can
create
something
like
that.
So
here
one
point
is
we
don't
handle
a
monitor?
H
Actually,
just
we
I
would
to
say
some
interaction
for
library.
Cycling
is
a
required
because
our
field
controller
also
working
for
that
kind
monitoring.
So
next
step
is
we
needed
to
identify
what
kind
of
modularity
I
think
the
first
one
laceration
of
NSF
capability
and
the
quarry
I
think
of
most
of
our
group
can
agree,
but
other
one
may
be
at
least
the
Diego
I
had
some
concern
about
our
dead
ones.
So
we
needed
to
decide
that
that
kind
of,
like
recycling
interface,
we
can
consider
in
isolation
interface
ona,
that's
it.
Thank
you.
N
G
G
G
K
G
E
G
H
L
Good
morning,
just
a
small
request
for
clarification
very
much
animals.
They
were
saying
the
sewer.
You
know
whether
you
want
to
do
it
in
an
open
stack
or
car
environment
or
in
a
mono
environment
the
better
four
dozen
we
can
concentrate
and
see
what
we
want
to
do.
I
think
throwing
both
concepts
to
to
the
air
is
a
bit
is
creating
a
bit
too
much
of
fog
in
the
situation
and
I.
H
I
would
say
we
just
focus
on
that.
You
can
see
two
functions:
Rachel
Esther
and
the
quarry
and
the
third
one
is:
maybe
we
just
our
discussion
section
in
the
destructors,
so
maybe
some
like
recycling,
maybe
TMS.
We
think
this
is
a
kind
of
Guernica
manager
sunrise.
So
in
the
case
it
somehow
controller
can
talk
to
or
we
enough
manager
to
look
at
something.
So
currently
our
I
and
I
said
doesn't
consider
interaction.
H
We
that
that
kind
of
a
mama
sister
right,
so
the
currently
and
my
team
considered
yeah
laceration
to
be
maybe
can
be
used
because
it
can
already
use
the
to
register
or
quarry.
So
that
is
a
what
option.
Otherwise
we
need
to
make
another
some
interface
right:
interaction
with
security,
controller
and
the
mono
system
right.
So
so
I
think
that
maybe
it's
sort
of
one
we
can
say
discussion
section.
This
restoration
interface
may
be
used
for
interaction,
for
libraries
are
clean
for
mono
yeah.
There's.
H
It
I'm
really
interested
in
actually
my
steam
already
started.
The
OpenStack
based
I
and
I
said
implementation.
We
try
to
make
our
Breanna
on
top
of
a
stair
a
man.
Ok
is
the
open
source
mono
we
may
be
ta.
Other
people
can
help.
He
are
you
okay,
so
we
can
take
advantage
of
your
sound
knowledge
and
experience.
We
so
integrate
our
castle
system
into
the
actual
your
system.
Okay,.
H
L
L
D
C
D
H
Yep
so
I
think
the
SFC
case.
The
okay
I
will
give
you
some
update
in
the
past
other.
We
our
approach,
my
team
approach
to
try
to
use
our
own
view
or
sub
function
training,
but
some
group,
some
people
say
exception,
already
exist,
so
we
just
take
advantage
of
SMC,
for
example,
or
obvious
reaching
often
their
line
already
provided
as
a
piece
of
functionality.
My
group
actually
working
using
on
the
OBS
as
a
PC,
so
so
the
one
saying
we
need
to
how
to
use
or
how
to
extend
current.
H
Our
answer
is
what
we
tried
to
using
metadata
field
for
an
SH
header
to
select
the
next
discrete
function,
such
as
the
current
packet
is
handled
by
fiber
and
then
look
like
TCR
is
a
request.
In
the
case
the
packet
forwarded
to
DPI
and
a
copy
so
colorful
dementia
opendaylight
the
controller
OBS
which
can
be
used
for
our
subconscious,
meaning
so
you
can
see
obviously
sweet
she
can
be
performing
for
classifier
and
subsequently
empower
the
SFF
fair,
so
security
controller,
but
security,
controller
and
classifier
or
the
SFF
require
something
our
interfaces.
H
Currently,
we
don't
have
any
kind
of
interface.
That
is
a
meeting
point
so
also
security
controller
can
act
as
some
function,
training
because
OBS,
which
she
usually
classifier
and
a
set
path
so
also
the
actual
top
order.
Yet
unity
right.
So
in
that
case
we
need
to
some
interaction,
security,
controller
and
SDM
sweetie
controller,
so
that
some
chain
information
deliver
and
also
we
need
to
our
configure
so
major
missing
part-
is
some
interaction
between
the
skitty
security
controller
and
Assefa
she
some
stuff.
H
What
should
be
our
finish,
that
there
are
young
model
for
three
interfaces
first
and
then,
but
I
believe
actual
service,
I
told
Ms,
Deb
Caid
Essebsi
still
are
important,
so
we
try
to
keep
going
and
there
we
get
some
him
input
from
our
group
and
we
can
our
pure
C
in
a
cursor.
That's
it
yeah.
Thank
you.
Thank
you.
Any
question
comment.
Okay,.
N
This
is
the
young
young
boy
from
China
Mobile,
a
very
physical
question,
because
this
is
my
first
time
attending
so
I
noticed
as
a
security
fire
service,
a
interface
between
the
security
controller
and
there's
a
steam
controller,
so
Shaz
this
piece
only
universe
between
legacy
security,
controller
and
as
I
stink,
I,
don't
know
where
we
have
other
kind
of
control.
It
control.
My
sir,
the
such
as
maybe
logging
or
some
kind
of
scenes
so.
H
I
think
that
currently
are
we
don't
clarify
such
kind
of
interface,
between
security,
controller
and
Sdn,
GG
controller
or
Sdn,
or
the
security
controller
and
last
classifier,
because
some
given
some
flow,
we
needed
to
say
some
subsequent
and
Cheney.
Some
traffic
flow
should
experience
the
fibre
dpi
or
DDoS
attack.
Certain
traffic
is
very
clean.
In
that
case.
Does
the
fire
is
enough?
Something
like
that
that
kind
of
flow
information
should
be
delivered
to
classifier
to
provide
a
service
function
Cheney,
but
that
kind
of
interface
is
not
defined
yet.
H
So
that's
why
we
try
to
define,
but
I
say
there
is
a
kind
of
secondary
I
work
for
our
kingdom,
because
our
working
religious
consumer,
NSF
and
restaurant
in
the
pace
is
more
important.
Yeah,
okay,
in
order
to
provide
actual
sub
function,
I
think
at
SF
is
your.
So
that's
why
we
keep
working
for
this
yeah
understanding,
hey.
N
Please
go
back
to
the
graph
this
one:
yes,
exactly
Oh
No,
previously,
okay
yeah.
This!
Actually,
from
my
point
of
view,
I
too
seems
that
maybe
the
better
way
is
to
let
a
steam
controller
to
decide
whether
it
will
need
a
service
function,
Qi
or
not:
okay,
expertise,
I'm
for
the
security
controller
to
Tuesdays.
It's
only.
H
H
N
D
F
Frank
sure
how
oscillations
the
Chairman
give
us
kindly
give
us
this
session
to
introduce
mutata
station
concept,
or
this
comment
in
clear
because
we,
this
is
a
problem
or
disease
of
question
risk
in
a
27-7
several
long
time.
We
have
some
description
in
the
Atmos,
a
framework
documented
that
how
to
County
that
that
mood
network
security
function
is
trustworthy.
So
this
is
also
very
altered
for
the
whole
architecture.
F
So
here
we
we
bring
our
youth
Chris
draft
to
describe
the
problem
we
have
met
and
we
want
to
get
a
more
discussion
and
more
comments
from
from
from
people
here.
Okay,
next
page
hope
and
let
in
history,
okay,
clear
in
these
slides,
we
work
in
some
group
reject
brief
introduction
and
what
is
our
motivation
to
to
have
this
kind
of
solution
and
the
the
overview
of
this
draft
and
the
main
content
northeast
draft
is
that
we
have
to
use
cases
or
we
call
the
true
models
to
that.
F
We
need,
as
a
remote
hesitation
function
to
apply
to
them
and
okay
and
firstly,
what
is
the
remote
attestation?
This
is
a
very
general
and
we're
aware
Journal,
also
or
aware,
general
explanation.
So
the
security
is
integrated.
Attestation
is
to
make
a
statement
that
the
state
of
the
assistant
is
considered
to
be
cha,
to
be
to
be
good,
could
be
trustworthy
or
it
takes
a
Mauritius
one.
So
we
want
to
do
it
who
want
to
do
that
attention
on
it,
but
the
country
there
isn't.
No.
F
There
are
some
a
priority
solutions
from
different
vendors,
but
there's
no
a
standard
solution
in
industry,
so
it
makes
this
very
useful.
Functions
cannot
be
widely
applied
in
in
encounter
network
and
therefore,
in
addition
to
this
particular
question,
we
also
what
we
face
right
now
is
in
the
cloud
and
network
or
in
some
modern
mobile
network,
such
as
visualized
on
every
scenarios.
There
are
some
additional
questions
when
we
want
to
do
this,
that
hesitation
functions,
I
were
talkin,
ater
and
so
so
steer.
F
This
is
a
summary,
so
country,
the
Ramudu
Constitution
will
Lake
appropriate
protocol
specification
and
without
it
it
will
lead
us.
The
in
capability
among
the
different
vendors,
the
different
devices
and
also
what
we
face
is
that
for
the
utilized
of
network
and
multi
vendors
Department
that
the
activities
in
the
network
and
for
the
visualize
the
network,
there
are
different
stakeholders.
They
are
also
so
it
makes
a
mix
scenario
more
complex
to
hinder.
So
we
want
to
talk
about
it
and
the
last
one
is
our
scalability.
F
You
know
if
we
deploy
the
and
if
we
network
a
lot
all
from
that
network
security
function,
visualize
the
functions
is
deployed
in
the
cloud
or
in
the
network.
So
there
are.
If
we
avoid
operations,
there
will
be
a
lot
of
message
and
to
sender
equally
always
changing
among
the
NSF
and
the
attestation
center
or
some
many
center.
So
the
scalability
will
be
a
big
problem.
F
The
multi-stakeholder
trouble
is
that
for
a
cloud
network
we
have
a
cloud
service
provider
and
we
also
have
the
cloud
service
customer
and
we
have
the
cloud
service
user,
which
means
that,
for
example,
the
Amazon
user
cost
rate
provider
and
some
enterprise
is
his
the
customer.
So
they
are
the
different
stakeholders.
F
They
want
to,
they
want
to
use
a
hard
test
ation
for
different
ago
and
in
their
in
their
scope,
so
so
so
it
where
resulting
that
how
to
control
the
notification
area
or
its
image,
how
to
give
a
sunny
speaker
view
of
the
of
the
it's
just
overseas
stadiums
or
state
to
the
tester
center.
So
there's
a
lot
of
across
domain
across
time
and
across
stakeholders
problem
and
another
big
problem
is
that
actually
there
are
some
constraints
among
different
stakeholders.
One
thing
once
records
can
only
get
his
information.
F
He
cannot
get
others,
but
they
can
cooperate
together,
maybe
through
some
Canada.
So
so
we
must
have
considered
this
constraints
on
how
to
get
his
information.
How
to
put
that
heavy
issue?
Okay,
and
so
we
this
document
they
use
constructor
hundred.
We
only
propose
to
use
cases
for
the
visualizer
network
or
only
free
network.
Why
is
that
he
centralized
mode
and
the
another
is
the
centralized,
the
mode
so
like
Leonel,
so
they
have
different
operation.
Motor.
F
In
short,
defender
has
noted
that
different
stakeholders
implement
that
they
are
all
without
hesitation
in
their
scope
or
in
their
network,
and
they
may
share
their
a
temptation
without
attestation,
information
with
other
stakeholders,
but
it
depends
on
their
construct,
their
their
their
business.
Relation
of
the
inter
interaction
relation.
So
it's
a
it's
a
little
painted
difficulty
for
sharing
this
information.
When
the
decoder
has
many
button
photo
centralized
the
motor
we
have.
F
We
have
a
centralized
the
attestation
Center
this
gender
can
capture
different
kind
of
information
from
different
stakeholders
and
the
chicken
to
the
whole
order
or
into
all
kinds
of
attestation
for
four
different
stakeholders
and
the
catheter
overview
information.
So
maybe
that's
a
more
either
way
to
do
things.
So
the
last
of
the
next
page
is
about
regulation,
so
variation
among
the
cloud
service
provider
across
service,
customer
customer,
the
user
and
the
other
external
entity.
There
are
the
relation
between
that.
F
This
these
foster
lines
about
measurement
information
means
that
we
collected
their
configuration
of
the
estates
from
an
SS
and
that
the
prior
information
means
that
we
had.
We
have
some
stored
information
that
that
is
the
correct
information
that
they
used
to
compare
that
the
yuneisia
I
collected
to
counting
that
the
devices
are
grants,
grants
where
and
the
oppressor
result
means
that
okay,
we're
comparing
this
to
do
that
and
we
catch
that.
Whether
this
dysfunction
is
what
we're
or
it's
being
attacked
and
how
to
access.
F
This
will
be
that
so
there
are
different
kind
of
tradition
among
different
stakeholders.
Okay-
and
this
picture
is
about
when
you
centralize
the
motor,
how
they
can
access
different
information
and
work
together.
Ok,
so
welcome
everyone.
If
you
are
interested
to
read
this
chapter
to
learn
more
details,
but
in
general
we
just
want
to
say
that
country
for
us
for
the
natural
environment,
attention
is
a
it
way.
We
need
our
protocols
that
specification
to
solve
this
problem
so
country.
F
We
may
propose
that
use
kids
here
and
the
later
I
want
to
mention
that
in
the
next
version
will
incorporate
another
use
cases
for
our
other
windows.
Several
for
accent
it's
about
sound,
maybe
not
to
further
a
memory
environment
for
the
other
environment,
because
I
think
I
guess
is
a
place
to
define
the
general
protocol
not
only
folder
and
if
we,
but
for
the
older
network.
So
so
that's
our
goal.
Ok,
that's
all.
Thank
you.
F
H
F
Are
different
disease
monitoring
is
that
how
I
can
I
can
monitor
the
the
devices
running
stages
and
how
I
can
attack
the
the
things
happened
in
the
network
for
the
number
of
the
our
normal
traffic
or
some
some
some
network
events,
but
the
attention
is
very
specifically
about
the
integrity
of
the
device.
It's
it's
its
operating
systems
integrate
here.
Is
software
integrated
it's
wrong
time,
processing
to
pretty
so
actually
country
in
industry?
There
are
two
T,
the
two
category
of
information
to
collect
and
to
attract
different.
G
G
Why
do
we
need
to
remote
at
the
station
in
general,
when
dealing
with
the
living
I
would
say
we're
dealing
with
many
different
in
many
different
environments,
but
especially
when
we're
dealing
with
security
and
security
functions,
the
idea
is
that
is
to
to
provide
the
consumer
reasonable
evidence
that
is
dealing
with
with
that
function.
That
can
be
trusted,
since
this
is
one
of
the
very
basis
of
security,
and
it's
about
create
evidence
from
the
end.
G
E
G
Of
the
problem
of
the
security
breach
of
the
attack,
or
whatever
happens,
the
idea
that
we're
talking
about
bajamas
environments
as
we
watch
as
Frank
was
mentioning
or
what
Linda
was
showing
when
talking
about
the
clouds.
Yes
to
do
as
well
to
detect
the
detect
in
a
remote
way,
the
alteration
of
the
components
that
you've
used,
because
in
those
cases
the
potential
or
the
threat
surface
is
much
bigger
because
you
don't
have
the
physical
axis.
G
Etcetera,
would
act
precisely
earth
as
an
Orchestrator
of
the
via
the
station
proceed.
Well,
these
are
some
definition
about
remote
at
the
station
when
coming
to
definition,
the
only
thing
I
can
do
is
reading
before
you
and
I
guess
that
you
would
be
much
better
than
me
in
reading
them,
and
your
accents
put
sound
much
more
correct
than
my
strong
Spanish
accent.
So
please
read:
it
basically
is
about
defining
what
is
at
the
station.
What
is
conveying
the
evidence
from
one
from
one
part
of
one
element
to
the
other?
G
What
we
mean
we're
talking
about
the
verification,
and
what
do
you
mean
we
want
to
get
out
to
three
modes
of
the
station?
In
particular,
there
is
a
draft
precisely
that
defines
this
terminology,
and
this
is
good,
but
should
be
at
the
core
of
any
at
the
station
activity
way
we
have.
This
is
a
general
model
from
another
draft
in
which
that
gentleman
with
the
stripped
shirt
is
here
is
working.
That
precisely
applies
the.
G
G
To
guarantee
freshness
and
integrity,
etc,
there
is
a
collection
of
the
integrity
claims
and
they
are
sent
back
to
the
verify
that
makes
it
yeah
well
assesses
the
the
evidence.
How
does
this
perform
at
the
test
with?
How
do
you
establish
trust
on
the
on
declines
and
how
this
grinds
are
verified
by,
via
by
the
very
far
part
of
the
of
the
particular
at
the
station
frame?
This
is
again,
this
is
from
my
general
donford
describes
the
general
mode.
G
If
you
are
developing,
you
won't
request
to
attach
the
security
controller,
but
when
we
see
it's
critical
is
in
the
to
Portugal,
interfaces
in
the
case
of
the
of
the
registration
seems
that
mutual
authentication
should
show
the
developer
system
knows
who's.
The
security
controller
can
and
can't
be
sure
that
is
talking
with
a
a
well
identified.
G
G
Data
playing-
and
that
happens-
and
this
is
why
we
need
the
vertical
at
the
station.
Basically,
so
there
is
a
draft
that
I
have
just
updated
a
few
minutes
ago,
because
I
remember
it
was
about
to
expire
in
which
we
were
making
some
proposals
of
how
to
apply
remote
at
the
station
procedures
at
UNICEF,
using
the
security
controller
as
the
verified.
G
The
reverse
is
about
this
fire
because
it
was
a
lot
to
spare
because
we
are,
we
were
waiting
about
what
the
group
wanted
to
do
with
it.
In
parallel,
Hank
and
Ray
Frank
have
started
to
work
on
this.
We
have
other
grads
and
I'll
probably
have
to
look
through
somehow
combine
them
in
that
in
the
nets
in
a
remote
of
the
station
track
here
or
elsewhere.
G
The
idea,
basically,
as
you
can
see,
is
that,
first
of
all,
just
as
a
summary
first,
the
customer
system
goes
for
another
station
of
the
security
controller,
so
he
can
be.
It
can
be
sure
that
is
talking
with
the
right
security
controller.
Then
it
can
start
requesting
the
security
controller
to
forward
2
to
4
at
the
station
evidence
from
the
different
platform
network
security
functions
that
the
the
controller
knows,
and
the
important
thing
is
that
we-
what
here
is
not
only
the
other
station,
but
he
we
ate
trust
the
channels,
sorts
of
channels
are
connections.
G
G
The
point
is
that
many
of
these
procedures
are
applicable
in
the
air
to
NSF
environment
that
could
be
applicable
in
other
environments,
and
this
is
something
that
we
have
to
take
into
account.
It's
a
little
bit
the
same
as
I
believe
that,
for
example,
the
capability
mobile
can
be
extended
for
other
cases,
but
we
are,
we
are
in
the
under
the
scope
we
are
well
here.
G
E
G
A
trusted
device
inside
the
attesa
that
is
based
on
a
trusted
source
of
time
and
correct
me
if
I'm
wrong,
and
this
wonderful
friend
has
presented
on
day
on
the
use
cases
that
we
go
to
nfe.
There
is
another
in
preparation
that
is
the
one
I
should
the
one
that
gives
is
the
figure
that
I
used
before
about
the
general
at
the
station
procedure.
G
The
boot
considered,
together
with
the
terminology
foundation
for
the
for
the
remote
of
the
station
case,
and
there
are
some
a
couple
of
platforms
that
we
have
started,
not
sure
whether
we
were
going
to
be
asked
by
the
chairs
to
be
to
move
apart.
Our
discussions
as
well,
so
we
have
started
a
list
that
is
called
rats
about
remote
as
a
station,
as
you
can
imagine,
and
there
is
a
github
repository
for
documentation
related
to
remote
of
the
station.
G
Well.
Finally,
those
who
are
those
who
are
part
of
the
Rat
Pack
believe
that
this
is
an
essential
matter
for
for
18
SF,
which
have
which
have
implications
well
beyond
the
working
group
that,
but
we
can
establish
definitions
here.
That's
all
I
mean
this
is
just.
It
was
precisely
to
open
the
discussion
to
know
what
the
groupthink
thinks
about
these.
G
This
idea,
whether
we
should
press
I,
my
personal
interpretation
in
the
scope
is
that
we
are
within
school,
but
maybe
we
need
to
to
feel
a
little
bit
with
the
scope
to
make
everything
all
whether
you
think
that
we
should
go
as
well
take
our
or
baggage
and
go
build
a
bigger
image
from
group
to
group
or
the
security
ideas
asking
for
for
a
place
for
the
rats.
That's.
B
G
B
D
H
G
Well,
the
the
attestation
mechanisms,
my
well
off
for
sure
I
mean
they
had
to
realize
on
how
and
things
that
are
physical
at
the
end,
bad,
the
one
hands.
Currently
there
are
these
TPMS
and
enclaves,
and
the
HSM,
which
is
your
technology,
they're
they're,
hoping
I,
mean
they're
open
standards,
so
you
rely
on
open
standards
that
are
implemented
by
then
doors,
so
that
would
be
will
be
right.
This
is
I
mean
for
the
kind
of
attestation
we
are
used
to.
G
It
is
the
base
of
our
trust,
module
that
there
are
I
mean
am
aware,
at
least
over
the
Torah
proposal
that
uses
trusted
source
of
time.
Hang
can
tell
you
about
the
details
and
which
is
different
in
that
sense,
and
I
am
aware
of
people
that
are
working
on.
Another
kind
of
digital
signature
well,
say,
say
evidence
that
can
be
derived
from
the
behavior
of
physical
systems.
G
They
are
knows
otherwise,
as
far
as
I
can
tell,
but
probably
we
could
even
experiment
with
this.
It
refers
to.
These
is
something
that
can
be
I
mean
it's
something
that
I
think
we
can.
We
can
deal
with
as
long
as
we
request
for
sure
we
were
to
require
that
there
was
a
trusted
source
of
something
in
which
you
can
you
can
base
your
rabbit,
ate
the
evidence,
but.
D
G
That
we,
with
a
being
a
group
I'm
working
with
Andre,
for
example,
some
time
ago,
was
defining
a
set
of
level
of
assurance.
So,
depending
on
how
important
is
for
you
that
the
station
you
can
go
to
a
level
of
assurance,
zero
or
road
to
level
for
sure
own
sake?
Remember
the
maximum
was
six.
The
six
was
purely
paranoid,
even
not
using
technology-
that's
not
even
available,
but
that
we
could
think
about.
G
D
G
Do
basically
this
you
do
require
to
the
to
view.
In
this
case
you
would
move
on
to
the
to
the
security
controller.
You
will
send
a
message.
Send
me
send
me
your
evidence,
security
controller.
What
could
have
already
stored
as
long
as
air
freshener
will
calculate
them,
will
the
replies
and
the
reply
to
the
system,
and
then
that
depends
on
the
system,
whether
you
decide
to
run
your
own
verification
or
to
rely
on
a
third
party
that
you
trust
in
principle,
normally
in
in
a
normal
environment.
G
C
K
How
does
this
thing
get
the
mic?
A
few
comments,
just
education
in
general
has
this
concept
of
freshness
so
evidence
that
is
basically
a
day
old,
doesn't
help
you.
So
if
you
can
replay
evidence,
that's
not
about
the
current
state
of
trustfulness,
but
from
maybe
another
system,
and
then
identity
comes
in
again,
so
it
has
to
be
from
that
specific
system,
energy
and
it
has
to
be
fresh.
So
these
are
typical
early
requirements
of
remote
Association
procedures
and
they
are
protocols.
Try
to
somehow
true
freshness,
convey
evidence
in
the
way
that
it
is.
K
You
can
see
that
it
is
fresh
and
it
is
from
that
specific
system
entity.
So
these
are
the
I
think
the
basic
fundamental
things
here
on
that
is,
for
example,
to
prove
that
it
is
from
a
specific
thing.
Then
we
are
going
beyond
the
scope
of
a
protocol.
Jegos
HHS,
M
elite
are
a
lot
of
times
now
the
Harper
security
model
inside
the
component,
which
is
a
little
it's
unusual
for
the
i8,
yet
because
it
is
a
characteristic
this
outside
of
the
protocol.
K
But
this
you
need
that
shielded
secrets,
basically
to
create
evidence
that
is
useful
and
as
payload
inside
the
protocol.
So
we
have
a
little
bit
a
dependency
that
has
beyond
a
protocol
definition
here,
and
that
is
the
only
real
new
thing
that
everybody
has
to
wrap
their
minds
around
a
little
bit
here.
The
IDF
also
have
to
highlight
that
there
is,
of
course,
our
they're
off
course
and
our
other
our
standardization
bodies,
which
of
course
first
comes
to
mind,
is
the
trusted
computing
group
who
builds
Asia's
MS.
K
That
can
include
huge
secrets,
for
example,
and
they
are
also
working
on
education
procedures
and
frameworks,
but
they
are
not
interested
to
build
all
the
protocols,
but
they
are
more
about
the
things
that
you
need
to
create
the
evidence.
So
this
goes
a
little
bit
hand-in-hand
as
you
don't
think
that
the
the
ITF
is
very
concerned
about
operations
on
edges.
K
Ms
inside
a
system,
they're,
probably
more
concerned
about
the
extra
conveyance
of
evidence,
the
architecture
and
I
to
an
ACEF
structure,
for
example,
so
I
think
reaching
out
to
them
and
then
maybe
have
a
aligned
terminology
which
are
basically
the
eight
Association
terminology
is
about.
One
of
the
offers
is
a
member
of
the
TCG
and
Monte
Wiseman
from
General
Electric's
Global
Research,
and
he
is
he's
basically
the
guy
who
who
was
in
charge
of
the
glossary
over
there
and
trusted
computing
group,
so
we're
trying
to
align
in
terms.
K
A
D
G
Yeah
I
mean
maybe
I
have
in
mind,
is
precisely
when
we
have
finished
the
this
general
model.
I
would
like
to
make
gree
rewriting
of
the
draft
pastoral
to
precisely,
to
put
it
in
the
same
terms
as
they
as
a
general
mobile.
So
in
that
moment
we
will
have
a
general
model
for
the
station,
on
the
one
hand,
pass
a
terminology
that
probably
could
be
combined,
and
then
we
would
have
the
that
general
mobile
plus
and
the
document.
The
book
is
described,
how
to
apply
the
general
model
in
the
h1s,
F,
environment,
okay,.
D
G
A
G
K
K
They
are
also
not
very
specific,
to
I
to
honest
effort
to
very
sure
components
of
core
self,
then
interesting
to
H
NSF,
but
they
also
have
each
one
has
a
specific.
So
we
wouldn't
know
what
of
a
mismatch
here.
Impedance
mismatch
about
where
we
place
the
stuff
but
I
to
NSF
is
the
only
place,
that's
really
interested
and
doing
it
and
implementing
it
as
a
protocol
as
a
variety
as
a
bouquet
of
protocols.
Maybe
that
is
it
is
a
customer.
K
Specific
photos
is
consumer-facing
our
visits
and
if
s
facing
or
it's
an
vertical
or
individual
to
the
part,
so
we
have
specific
solutions
that
are
that
we
can
choose
from
and
therefore
I
think
it
is
okay
to
do
it
here,
but
you're
right.
The
attestation
terminology
draft
is
basically
highlighting.
This
is
beyond
the
idea
when
SF
domain,
especially
because
we're
pulling
and
stuff
and
she
CG
and
a
global
platform
there,
so
it
is
not
associated
with
the
height
when
a
deaf
there
is
an
individual
drop.
Okay.
K
To
roman
about
that,
but
then
again
I
think
how
do
you
flock
so
what
is
going
where
and
why
and
and
and
I
don't
want
through
clock
this
working
group
with
half
of
it
is
just
recitation
and
nobody
is
interested
in
this,
so
to
speak,
but
I've
seen
a
lot
of
people
are
at
the
moment
interested
here
and
and
and
as
an
intermediate
solution.
I
seen
talking
here.
Is
nice
really
nice,
because
it's
a
lot
of
people
interested
here
and
talking
to
Rome
and,
of
course
seems
to
be
mandatory?
Yes
right.