OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

ekmi message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: [Fwd: [security-sig] THU: Open Source Security Key Management]


FYI, in case anyone in the San Francisco Bay Area is interested.

Arshad Noor
StrongAuth, Inc.

-------- Original Message --------
Subject: [security-sig] THU: Open Source Security Key Management
Date: Wed, 21 Feb 2007 04:19:20 +0000
From: Ames <ames@montebellopartners.com>
Reply-To: securitysig@sdforum.org
To: security-sig@lists.montebellopartners.com

Hi,

This Thursday the 22nd will have re-invited Arshad Noor of StrongAuth to
give the second half of the presentation he began last month.  Arshad
will demonstrate an open-source, Java-based, management system for
encryption keys.  We hope to see you there.

Topic:

As the internet becomes increasingly hostile, companies are forced to
review their need for data-encryption for protecting customer
information, as never before.

However, given the highly distributed nature of applications,
confidential data is spread across many applications in the enterprise,
and encrypting all of them consistently, while ensuring a low TCO is
challenging.

Because of the many point-solutions on the market, IT Operations is
typically saddled with managing multiple key-management infrastructures
with unique OA&M (Operations, Administration & Maintenance) and
increased TCO.  What is needed is a consistent way of managing symmetric
encryption keys across operating systems, applications, databases and
devices to simplify the process and to reduce costs.

To enable this, OASIS has created an Enterprise Key Management
Infrastructure Technical Committee (EKMI-TC).  This TC is focused on the
standardization of an XML-based client-server protocol - Symmetric Key
Services Markup Language (SKSML) - for how a client may request
symmetric key-management services securely, from a centralized Symmetric
Key Services (SKS) server.  The protocol will enable application
developers to use a consistent and standards-based communication method
for generating, escrowing and recovering symmetric keys from the SKS
server.

In this session, you will hear about the architecture and the DRAFT
protocol submitted to the TC for consideration, as well as see a
demonstration of an open-source implementation of SKSML.

Hosts: Ira Victor (http://dataclonelabs.com)

Location
Cubberley Community Center
4000 Middlefield Road, Room H-1
Palo Alto, CA 94105


Price
$15 at the door for non-SDForum members
No charge for SDForum members
No registration required

- Ames & Ira

-- 
Ames Cornish  ~  http://montebellopartners.com/
650-331-1402  ~  ames@montebellopartners.com

_______________________________________________
SDForum Security SIG
Mailing list: http://lists.montebellopartners.com/listinfo/security-sig
Unsubscribe (email): mailto:security-sig-leave@lists.montebellopartners.com
Unsubscribe (web): http://lists.montebellopartners.com/options/security-sig
Web site: http://sdforum.org/sigs/security


[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]