In a new video series, eight members talk candidly about the value they receive from participating in OASIS Interop events. The videos are part of a new online guide to the Interop program, which also features photos from past events, instructions for hosting Interops, and other valuable links. Many thanks to members, Albert Biketi of HP, Valerie Fenwick of Oracle, Tim Hudson of Cryptsoft, Graham Steel of Cryptosense, Jim Susoy of P6R, Nathan Turajski of Thales e-Security, Mike Yoder of Vormetric, and Jessie Zhang of Feitian, for their video interviews.
|
|
The eXtensible Access Control Markup Language (XACML) defines a profile for the use of expressing policies for TCG TNC Metadata Access Points (MAP) in which a MAP utilizes an XACML PDP to make MAP content authorization decisions. Congratulations to XACML TC chairs, Hal Lockhart of Oracle and Bill Parducci, and to all TC members for accomplishing this milestone.
|
|
The XML Localisation Interchange File Format (XLIFF) gives multilingual content owners a single interchange file format that can be understood by any localization provider using a conforming localization tool. Congratulations to XLIFF TC chair, Bryan Schnabel, and to all TC members for accomplishing this milestone.
|
|
|
Message Queuing Telemetry Transport (MQTT) 3.1.1 provides a Client Server publish/subscribe messaging transport protocol ideal for use in Machine to Machine (M2M) and Internet Of Things (IoT) contexts where a small code footprint is required and/or network bandwidth is at a premium. This public review ends 6 May.
MQTT and the NIST Cybersecurity Framework 1.0 provides guidance for organizations wishing to deploy MQTT in a way consistent with the US NIST Framework for Improving Critical Infrastructure cybersecurity. This public review ends 21 May.
Virtual I/O Device (VIRTIO) 1.0 allows virtual environments and guests to have a straightforward, efficient, standard and extensible mechanism for virtual devices, rather than boutique per-environment or per-OS mechanisms. This public review ends 28 Apr.
Key Management Interoperability Protocol (KMIP) 1.2 enables communication between encryption systems and a broad range of new and legacy enterprise applications, including email, databases, and storage devices. This public review ends 6 May.
Cloud Authorization Use Cases (CloudAuthZ) 1.0 develops enhanced models for managing authorizations and entitlements in SaaS, PaaS, and IaaS contexts and enables contextual attributes and contextual entitlements sets to be delivered to Policy Enforcement Points in real time. This public review ends 26 Apr.
|
|
Experts from the PMRM and PbD-SE TCs will be featured presenters at the upcoming European Identity & Cloud Conference on 13 May in Munich. The workshop is designed to help business owners, software developers, and policy makers understand how to move from the abstract Privacy-by-Design (PbD) principles toward implementation and conformance assessment. By designing privacy into our smart systems, improved functionality can be achieved, more effective risk management and greater public awareness and confidence. The workshop is complimentary and is open to all conference attendees.
|
|
LogMeIn provides solutions for remote control, file sharing, systems management, data backup, business collaboration and on-demand customer support of PCs, servers, Macintosh computers, smartphones and other connected devices. LogMeIn uses MQTT in its Xively Cloud Services IoT platform.
New OASIS Contributor members include IJIS Institute, Raytheon, NextDocs, Pacific Disaster Center, and Politecnico di Milano. Welcome all!
|
|
|
|
Nathan Turajski, Thales e-Security, OASIS KMIP Interop at RSA 2014:
"How are you supposed to sell solutions that are not based on standards? Our customers want interoperability."
|
|
|
|
|
|