February 20, 2014 Meeting Page: Difference between revisions
Jump to navigation
Jump to search
m (3 revisions imported: Initial Upload of old pages from IDESG Wiki) |
(No difference)
|
Latest revision as of 03:58, 28 June 2018
SECURITY COMMITTEE / FUNCTIONAL MODEL MEETING NOTES
Meeting Date: February 20, 2014
ATTENDEES
- Adam Madlin
- Andrew Hughes
- Ann Racuya-Robbins
- Bev Corwin
- Cathy Tilton
- Chan Lim
- Charles Palmer
- Christopher Spottiswoode
- Glenn Schoonover
- Jonathan Rosenberg
- Kate Kingberger
- Mark C. Wallace
- Mike Garcia
- Ryan Galluzzo
- Sal D'Agostino
- Suzanne Lightman
- Winthrop A Baylies
MEETING NOTES
- Roll call; Completed an informal quorum calculation. Confirmed that we have quorum.
- IPR policy reminder -
- Review and edit agenda
- Review, update and approve meeting notes from last meeting
- Discussed Topics for Next Plenary - Adam led discussion, suggesting possible topics or approaches:
- The Functional Model breakout meeting at the plenary will be a working session continuing current work
- What about any presentations or joint meetings:
- Without another plan, could present the state of work related to use case analysis relative to draft functional elements
- Adam asks - Is there an opportunity for something else, something more?
- Meeting on Interim ecosystem?
- Something on the Security Evaluation Methodology
- Other
- PLEASE CONSIDER IDEAS FOR DISCUSSION NEXT WEEK
- Ann requested that we keep the recording link for last week’s meeting available for at least another week
- Attribute AHG update
- This AHG meets every other Friday
- The goal remains an Attribute Practice Statement
- They have a wiki page, and have completed a Terms of Reference
- Had 7 attendees last week. Need some additional leadership support to make progress.
- Adam shared that he will help to move this forward
- Use Case Analysis Feedback
- Cathy Tilton shared feedback from the Standards Coordination Committee
- Consider adding the creation of a Digital Identity under registration
- Identity proofing could be under other core functions as well
- Subfunctions could be aligned differently
- Credentials and tokens need to be better classified
- Federation and inter-federation are not included
- Human actors are not included
- Attributes could be at the top level, core function
- Cathy Tilton shared feedback from the Standards Coordination Committee
- Use Case Analysis Discussion - this was constructive
- Trust Elevation Use Case – Mark Wallace volunteered to review the progress that he made on his use case
- Mark described his progress and identified issue areas that he found including, user agent,
- It was mentioned that the included workflow diagram is from IMI, and might not be the best for this use case
- This exercise helped the group to understand what their responsibilities for the use cases are so that they can make progress on their work
- Trust Elevation Use Case – Mark Wallace volunteered to review the progress that he made on his use case
- Assignments for next week
- Other business – Anne requested to share a status on Attributes, see above
- ACTION ITEMS
- Everyone to brainstorm about presentation and approach for upcoming plenary
- Everyone to make as much progress on their use case analysis
- Will continue to review use case analysis results at next meeting, with a goal to make sufficient progress in time to have a complete (holistic) feedback session at the next plenary.
Quick Links: Security Committee | Functional Model | Security Committee Meeting Notes | Security Committee Content