OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

trust-el message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: Minutes for Nov 17 Trust-elevation call


Minutes for the Seventh meeting of the Electronic Identity Credential Trust Elevation Methods (Trust Elevation) Technical Committee

17 November, 2011

 

0. Call to Order and Welcome.

 

1. Roll Call

Attending (please notify me if you attended the meeting but are not on the list below)

Abbie Barbir, Bank of America  - y

Anil Saldhana, Red Hat 

Brendan Peter, CA Technologies – y

Carl Mattocks, Bofa

Cathy Tilton, Daon

Charline Duccans, DHS

Duane DeCouteau

Colin Wallis, New Zealand Government - y

Dale Rickards, Verizon Business 

David Brossard, Axiomatics

Dazza Greenwood

Debbie Bucci, NIH 

Deborah Steckroth, RouteOne LLC

Detlef Huehnlein, Federal Office for Information

Don Thibeau, Open Identity Exchange  - y

Doron Cohen, SafeNet

Doron Grinstein, BiTKOO

Ed Coyne, Dept Veterans Affairs - y 

Ivonne Thomas, Hasso Plattner Institute

Jaap Kuipers, Amsterdam

Jeff Broburg, CA

John Bradley

John "Mike" Davis, Veteran's Affairs

John Walsh, Sypris Electronics

Julian Hamersley, Adv Micro Devices

Kevin Mangold, NIST - y

Marcus Streets, Thales e-Security

Marty Schleiff, The Boeing Company

Mary Ruddy, Identity Commons  - y

Massimiliano Masi, Tiani "Spirit" GmbH  - y

Nick Pope, Thales e-Security

Peter Alterman, NIST  - y

Rebecca Nielsen, Booz Allen Hamilton  - y

Rich Furr, SAFE-BioPharma Assn – y

Ronald Perez, Advanced Micro Devices

Scott Fitch Lockeed Martin

Shaheen Abdul Jabbar, JPMorgan Chase Bank, N.A. - y

Shahrokh Shahidzadeh (Intel Corp)  -y

Tony Rutkowski – y

Thomas Hardjono, M.I.T. 

William Barnhill, Booz Allen Hamilton

47 percent of the voting members were present at the meeting.  We did not have quorum.

 

We used the following chat room for the call: http://webconf.soaphub.org/conf/room/trust-el - chat room text is included at the end of the minutes.

 

2. Agenda review and approval
 
There were no additions.
 
3. Approve Minutes
 
We deferred approval of the previous minutes, due to lack of quorum. 
 
Abbie noted that due to a bug in TC event calendar and the recent clock change the event was listed at 9:00 AM rather than 10:00. 
 

4. Mary to review F2F details and action items 

Mary explained that we started by agreeing that there were four factors: the traditional who you are, what you have and what you know, and context.  We also agreed on a definition of trust elevation. As part of next steps, Mary started a spreadsheet with the categories of trust elevation methods discussed: biometrics, UN/PW, OTP, tokens, KBA, end point identity, and context.  During the F2F, a couple of subcategories were suggested: whether the method is primary or secondary, and the boundary for the method [e.g. session.] Mary captured these and method sub variations in a spreadsheet.
 
There was discussion.
 
Colin commented that a method may be added, but doesn’t necessarily make trust stronger if they have the same level of weakness.
 
Abbie agreed a secondary method is no help if the vulnerabilities are the same
 
Rebecca noted that this is an area of interest. 
 
Abbie commented that we haven’t captured this component.  We are still trying to explain strength and explain what we are trying to protect.  We need to nail this down pretty quickly in order to start putting the information into the deliverable.  One thing we need to talk about is the definition of trust-el.
 
During the F2F we came up with a definition (statement) on trust elevation.
Abbie commented that we will need to bless this.  We should only refine it now if we need to do it now.
 
Mary read the statement (which is in the notes from the F2F):
 

Trust elevation is increasing the strength of trust by adding factors from the same or different categories of methods that don’t have the same vulnerabilities. There are four categories of methods: who you are, what you know, what you have and the context. Context includes location, time, party, prior relationship, social relationship and source. Elevation can be within the classic four NIST and ISO/ITU-T levels of assurance or across levels of assurance.

 
Mary talked about possible next steps, such as identifying which threats we are trying to protect against, and therefore which weakness holes we need to fill with trust elevation.
 
It was commented that there are distinctions between strength of passwords 8 vs. 4 character, etc.  Yet a longer password is no help against social engineering and key logging attacks. Rather than talking about how a modification affects some and not other approaches, we need to develop a mechanism to depict this in the document.  
 
It was commented that we need to structure this in the next couple weeks so editors can start taking the use cases and quickly plugging them in.
 
Mary made a suggestion about evolving the categories in a spreadsheet to capture the data on methods.
 
Peter commented that we are analyzing the data before we finish collecting the data.  This is a risk.  We should gather the data then, do the analysis, otherwise we are biasing the data.
 
Rebecca was not sure she agreed.  But she noted that it was important to have the data.
 
Peter commented, we don’t even know the range of information we will get.  We are speaking out of ignorance.
 
Abbie said we can document now. We know at the end of the day we can do the analysis.  When we do it, is a different topic.  
 
Tony talked about intriguing similar considerations in other groups. This group can add value by engaging in outreach.
 
Abbie said that we need to liaison with this Kantara group quickly.  
It has to be on the action item agenda here.  He knows more about ITU-T and will look into how to leverage that relationship.
 
Tony talked about the importance of understanding the sea change in last week or two in terms of driving more of the cyber security changes and trust. So OASIS enhancing that relationship will be good.
 
Don led the meeting from this point forward.
 
Peter asked Tony to send us the list of documents we need in our reading room.
Tony agreed.
 
We need to be reaching out to right documents or groups with relevant activities.
 
Tony reminded the group about the 3GGP.  It was not clear to him if there was a pre existing relationship and OASIS.
 
Peter commented that that is something Abbie should find out about in the board meeting. We have some forum, but it is not really official.  This is something we need to work on.
Tony commented that 3GGP is massive = all other stands bodies together in this trust and identity space. Because of the players involved, they have considerable control over the infrastructure
 
Don asked to review a list of those groups relevant to our work:
·         ITF (IETF?  sp?)
·         Q4 and Q10 
·         ETSI
·         OIX for trust framework
·         OMA (sp?)
 
Tony said PC68 (sp?) is about banking trust.
 
Abbie said a new multifactor doc coming. 
 
Europe is driving a new trust mechanism.  They are extremely active.
 
ETSI (European Telecommunications Standards Institute) is the code name for the electronic signatures technical committee – joined at the hip with the euro commission to establish PKI for Europe.
 
Don asked for an overview.
 
Peter explained that he and Judy were engaged with ETSI for 5 or 6 years.  He is not arguing with Tony.  The group may or may not be ahead of us.
 
Don explained that he is hoping we can do a bit of a triage and see which groups are going to be the most value adding. Maybe we can establish individuals who will be our active links and inform the group.
 
Peter commented that Tony is well connected.  He is the right guy.
 
Don suggested that we might want to consider having a liaison activity like Peter suggested with Tony for some of these key groups.  
 
We need to triage to make a pragmatic distinction on these things.
 

5) Hand over of use cases to Editors.   

Mary explained that we spent the second half on the face-to-face on use cases. The use cases were documented (as original input or notes) in the minutes of the face-to-face.  She also plans to put the use-cases, etc into a separate document that would become a section of the first deliverable.
 
She asked for additional use cases, and noted that a couple of the use cases presenters had action items to follow-up with more detailed write-ups of their use cases.
 
Brendan asked for a list.
 
6) TC funding request from Member Section and next F2F meeting
Peter provided a status update. The OASIS member section steering committee is putting together its budget requests for 2012 and as part of that, the member section is asking for budget requests. This year we are trying to collect the request for resources in categories. 
·         Travel
·         Professional services
·         Tech services
·         Admin services
·         Conference and event services
 
We had the official call right after the face-to-face. Abbie has proposed to the member section a budget of $30K for the coming year. We don’t know what the member section will grant, but the request has been made. The budget request was for 3 categories:  $13K professional services for phase 2 deliverable, $8K for face-to-face meetings and $9K to defray travel expenses for independents.  The next potential face-to-face meeting being proposed is to discuss the phase one results, documentation and data. We think a face-to-face would be pretty useful, and to minimize travel, we are looking at having a 1 or 2 day meeting after the NIST/NSTIC event on March 13-14 http://www.nist.gov/nstic/upcoming-workshops.html.  This would be March 16 and 17.  Perhaps starting end of day on the 15th after the NIST/NSTIC meeting has ended.
 
So Abbie should follow-up as the budget request makes its way through the process.
 
Mary said that as part of the budgeting process she has put a preliminary request into the Holiday Inn where the NIST/NSTIC event is being held, for space for a Trust-el face-to-face meeting after the NIST event.  Further details would need to be worked out if/when funding was received.
 
Don asked if anyone had questions or concerns about the request for funding.
 
Mary asked how long this budget process takes.
 
Abbie responded that the steering committee has to agree on the request, and then it goes back to the board to approve.  The board meets monthly.   Abbie explained there was no new input from the current month’s board meeting.  The December 15 board meeting is the earliest they can look at the budget request.
 
Peter commented we are assuming the member section budget will be comparable to 2011.
Abbie noted it is up to the steering committee to send requests to the board.  He will support it when it comes to the board.
 
Peter noted our budget request is just that, a request.  We will see what the board tells the member section and what the member section tells the board.
 
Don asked if there were any more questions about the current state of play on the request for funding.  Hearing no other questions, he moved on.
 
Mary reviewed the remaining action items from the face-to-face that had been sent to the list that had not yet been covered. (Leveraging the NIST/NSTIC event was one of these).
 
Don commented on the benefit of the common sense leveraging of the NIST/NSTIC event that TC members would already be attending.  He noted that since we didn’t have quorum, we couldn’t put this to a motion on the call.  He commended that using the event as a forcing function to put our work in the broad context of the OASIS/NSIT meeting was good.  
 
Don asked to indicate in the minutes that there were no objections.  
 
Don also said it would be nice to hear if folks are comfortable with what is going on and what had been discussed.
 
Rich replied he is comfy.
 
Don noted that he was hearing no objecting or seeing none and said he took this as a good sign. 
Don summarized that it is also a good sign to be building out our 2012 planning and awareness of liaison activities with other groups that are highly related; and to be continuing in the work about getting use cases organized and into the system with some of the other reference doc identified earlier.  This is fair work for laying our foundation.
 
Don asked if there were any more issues.
Hearing none, he called for a close and thanked all on the call.  We will continue on building momentum thru the holidays.
 
The meeting concluded.
 
>>>>>>>>>>>>>>>>>>>> 
anonymous morphed into Rich Furr
anonymous1 morphed into Tony Rutkowski
abbie: yes
anonymous morphed into Kevin Mangold (NIST)
Don Thibeau Open Identity Exchange : sorry to join late
Mary Ruddy: Trust elevation is increasing the strength of trust by adding factors from the same or different categories of methods that dont have the same vulnerabilities. There are four categories of methods: who you are, what you know, what you have and the context. Context includes location, time, party, prior relationship, social relationship and source. Elevation can be within the classic four NIST and ISO/ITU-T levels of assurance or across levels of assurance.
Don Thibeau Open Identity Exchange : mary can you post the agenda for this meeting thanks
colin_nz: Source..does that cover device?
Don Thibeau Open Identity Exchange : source is both device and channels e.g.
Don Thibeau Open Identity Exchange : telephone
Don Thibeau Open Identity Exchange : can we generate a list of liaison groups relevant to our work
colin_nz: Hmm..not sure will quite do it. Some handhelds are more vulnerable than others. Isn't it Google's system that can interrogate the device as part of authentication?
Tony Rutkowski: I argue that cloud infrastructure are rapidly putting an end to the PSTN and the Internet; and getting liaisons estabished with the many emerging industry cloud venues is important as well.
Tony Rutkowski: (Grammar isn't enhanced by chat...  aargh)
abbie: 30 K
abbie: id trust meeting in march with NIST
Kevin Mangold (NIST): Putting an end to the Internet?
Tony Rutkowski: Indeed...a logical extrapolation of a global cloud architecture.  It's also a more stable, extensible result.  We get rid of the PSTN and the Internet in one cosmological event. http://webconf.soaphub.org/conf/images/smile.gif
Kevin Mangold (NIST): Hmmm... how would one use this cloud infrastructure without the Internet?
abbie: dropping out
Tony Rutkowski: How would it be without the PSTN - which is a significantly larger and more important infrastructure.  This gets us into religous arguments about exactly what "the Internet" is.  Any Internet universe religious dogma one adhers to, pretty much spells the same cosmological end.
Tony Rutkowski: ps. previous cloud infrastructures were variously based on X.25 (e.g., Minitel) or SS7 (e.g., Intelligent Network).  The protocols for schlepping bits don't make much difference.
 
 
 
 
 
 
 
 

 



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]