OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

security-services message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [Elist Home]


Subject: Minutes of 6 March 2001 Security Services TC telecon


Minutes of the OASIS Security Services Technical Committee telecon
6 March 2001

Please note the ACTION items below.


Administrative
==============
- Membership report: new/removed members (Heather)

   3 new members (effective at this meeting):

   Ed Simon, Entrust
   Mark Griesi, OpenNetworks
   Aravindan Ranganathan, Sun

   1 removed members (removed for non-attendance as of F2F #1):

   Jason Penney, Brokat

- Roll call (Heather)

   Attendance list appears at the end of these minutes.  Quorum reached.

- Approval of minutes for the last meeting

   Not approved yet.  [Minutes from F2F #1 are now available at

   http://lists.oasis-open.org/archives/security-
   services/200103/msg00015.html.]

- Status of action items accepted at F2F #1

   Most actions were Eve's, such as set up Evite polls etc.  Eve has
   initiated her action items.


Substantive
===========
- Use Cases and Requirements (security-use)
   Additional comments on strawman #3?

   Some discussion about requirements, use cases, and scenarios.
   Requirements and use cases are "normative" in guiding the design, and
   scenarios are illustrative of what the use cases mean.  Discussion on
   how high-level to make use cases without being uninformative, but low
   enough to be useful without binding people to flows of application data.
   One issue is with situations where state changes because of lack of
   input by user (for example, time out situations). Question was asked if
   there will be a lot more requirements added to use cases (driven by the
   observation that most requirements are in the form of "goals"). The use
   case group has been working breadth-first, and will probably get more
   specific once they've attended to the rest of the candidate use cases.
   There will probably another round of refinement on requirements to put
   them into "requirement-speak."  Consensus is that there won't be many
   new use cases but there will be drilling down on details on existing use
   cases.

   Additional question on "meaning" of Use Case 3. Prateek and Zahid are
   working through this case in more detail. Stephen was looking for
   "guiding" text.

   ACTION: All members to review Strawman and relate comments that are of
   interest to their subgroups directly to their subgroups for discussion.
   Undocumented assumptions should be identified if found.

- Models
   It might be worthwhile to discuss different "models" for viewing our
   problem space.

   The use case group needs to develop domain/terminology model of shared
   words to describe what they need to describe.  They need a shared
   understanding so that we can discuss what exists/is, and a shared
   understanding of the "skeleton" of what is inside our own design (which
   doesn't exist yet).  David and Hal had put a drawing together with
   different chronological steps to authenticate, authorize, and make
   authorization stick. Drawing was intended to figure out what is in and
   out of scope.

   Next telecon we will try and focus on one or two subgroups to get status
   and detailed discussion.


Liaison reports
===============
W3C XML Encryption WG meeting: Not much to report from their first F2F
last week.

Next meeting
============
- 20 March 2001 telecon

   ACTION: Eve to find out what the mute command is on her conference
   service. If there is none, Heather or Marc will set up the call with a
   service that allows for *6 type muting.  [DONE.  AT&T claims that if you
   press #0, you get a menu that allows you to mute/unmute yourself.]

- Should a regular security-leaders meeting be scheduled on alternate
   weeks?

   ACTION: Eve to set up a regular security-leaders meeting on alternate
   weeks.

Attendance List
===============
Michah Lerner           AT&T
Bill Perry              Aventail
Tim Winston             Aventail
Stephen Farrell         Baltimore
Patrick McLaughlin      Baltimore
Irving Reid             Baltimore
Alex Ceponkus           Bowstreet
Krishna Sankar          Cisco
Zahid Ahmed             CommerceOne
Ken Yagen               Crosslogix
Fred Moses              Entitlenet
Carlisle Adams          Entrust
Alex Berson             Entrust
Robert Griffin          Entrust
Tim Moses               Entrust
Ed Simon                Entrust
Joe Pato                HP
Jason Rouault           HP
Kelly Emo               Jamcracker
David Orchard           Jamcracker
Gilbert Pilz            Jamcracker
Prateek Mishra          Netegrity
David McNeely           Netscape
Adam Prishtina          Netscape
Charles Knouse          Oblix
Eve Maler               Sun
Aravindan Ranganathan   Sun
Marlena Erdos           Tivoli
Heather Hinton          Tivoli
Ron Williams            Tivoli
Warwick Ford            Verisign
Philip Hallam-Baker     Verisign
Thane Plambeck          Verisign
Shawn Campbell          Windermere Group
--
Eve Maler                                             +1 781 442 3190
Sun Microsystems XML Technology Development  eve.maler @ east.sun.com



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [Elist Home]


Powered by eList eXpress LLC