OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

trust-el message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: RE: [trust-el] Call for additional method examples


Thanks Bob

 

In the deck the relevant slides start at 24 through to about 34.

 

It begs the question whether the Trust-el TC needs to define a set of baseline ‘policy-to- architecture’ principles (one of which might be ‘we assume a separation of the identity from the credential that is subsequently bound’).

 

Alternatively we use this as an example of a criteria we use to separate out the use cases.

 

Cheers

Colin  

 

 

From: trust-el@lists.oasis-open.org [mailto:trust-el@lists.oasis-open.org] On Behalf Of Sunday, Robert
Sent: Wednesday, 21 December 2011 8:30 a.m.
To: 'trust-el@lists.oasis-open.org'
Subject: RE: [trust-el] Call for additional method examples

 

While not exactly a method example, we feel that it is important to recognize the separation of identity from credentials.

 

To this end I would like to point out the work done on the Pan-Canadian Assurance Model last year. (link below)

 

There is a discussion of the separation of identity and credential and a discussion of compensating factor.

 

The publicly available document is here

 

http://www.iccs-isac.org/en/km/transformative/docs/Pan-Canadian%20Assurance%20Model.PDF

 

A corresponding deck can be found here:

 

http://www.iccs-isac.org/en/km/transformative/pdf/assurance.asp

 

 

Regards,
Bob Sunday

Cyber Authentication Initiative I Initiative d’authentification Cyber

Chief Information Officer Branch | Direction du dirigeant principal de l'information

Treasury Board of Canada Secretariat | Secrétariat du Conseil du Trésor du Canada

Ottawa, Canada K1A 0R5

Office: 613-941-4764

Email: robert.sunday@tbs-sct.gc.ca

Government of Canada | Gouvernement du Canada

 


From: trust-el@lists.oasis-open.org [mailto:trust-el@lists.oasis-open.org] On Behalf Of Mary Ruddy
Sent: December 8, 2011 9:42 AM
To: trust-el@lists.oasis-open.org
Subject: [trust-el] Call for additional method examples

 

Thank you again to those who submitted the first 7 trust elevation method examples that we discussed at the Face-to-face meeting.

 

Attached are the template format for method examples and a sample draft (KBA).

 

Please submit your method examples using the template.  (It is ok if they are rough, we have editors to polish them.)

 

Let me know if you have any questions.  We don’t yet have any examples involving phones, so it would be particularly helpful to get some phone examples.

 

Let me know what questions you have.


Best regards,

 

Mary

====
CAUTION:  This email message and any attachments contain information that may be confidential and may be LEGALLY PRIVILEGED. If you are not the intended recipient, any use, disclosure or copying of this message or attachments is strictly prohibited. If you have received this email message in error please notify us immediately and erase all copies of the message and attachments. Thank you.
====


[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]