OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.


Help: OASIS Mailing Lists Help | MarkMail Help

trust-el message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]

Subject: RE: [trust-el] Call for additional method examples

Thanks Bob


In the deck the relevant slides start at 24 through to about 34.


It begs the question whether the Trust-el TC needs to define a set of baseline ‘policy-to- architecture’ principles (one of which might be ‘we assume a separation of the identity from the credential that is subsequently bound’).


Alternatively we use this as an example of a criteria we use to separate out the use cases.






From: trust-el@lists.oasis-open.org [mailto:trust-el@lists.oasis-open.org] On Behalf Of Sunday, Robert
Sent: Wednesday, 21 December 2011 8:30 a.m.
To: 'trust-el@lists.oasis-open.org'
Subject: RE: [trust-el] Call for additional method examples


While not exactly a method example, we feel that it is important to recognize the separation of identity from credentials.


To this end I would like to point out the work done on the Pan-Canadian Assurance Model last year. (link below)


There is a discussion of the separation of identity and credential and a discussion of compensating factor.


The publicly available document is here




A corresponding deck can be found here:





Bob Sunday

Cyber Authentication Initiative I Initiative d’authentification Cyber

Chief Information Officer Branch | Direction du dirigeant principal de l'information

Treasury Board of Canada Secretariat | Secrétariat du Conseil du Trésor du Canada

Ottawa, Canada K1A 0R5

Office: 613-941-4764

Email: robert.sunday@tbs-sct.gc.ca

Government of Canada | Gouvernement du Canada


From: trust-el@lists.oasis-open.org [mailto:trust-el@lists.oasis-open.org] On Behalf Of Mary Ruddy
Sent: December 8, 2011 9:42 AM
To: trust-el@lists.oasis-open.org
Subject: [trust-el] Call for additional method examples


Thank you again to those who submitted the first 7 trust elevation method examples that we discussed at the Face-to-face meeting.


Attached are the template format for method examples and a sample draft (KBA).


Please submit your method examples using the template.  (It is ok if they are rough, we have editors to polish them.)


Let me know if you have any questions.  We don’t yet have any examples involving phones, so it would be particularly helpful to get some phone examples.


Let me know what questions you have.

Best regards,



CAUTION:  This email message and any attachments contain information that may be confidential and may be LEGALLY PRIVILEGED. If you are not the intended recipient, any use, disclosure or copying of this message or attachments is strictly prohibited. If you have received this email message in error please notify us immediately and erase all copies of the message and attachments. Thank you.

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]