February 6, 2014 Meeting page: Difference between revisions
Jump to navigation
Jump to search
m (2 revisions imported: Initial Upload of old pages from IDESG Wiki) |
(No difference)
|
Latest revision as of 03:58, 28 June 2018
SECURITY COMMITTEE / FUNCTIONAL MODEL MEETING NOTES
Meeting Date; February 6, 2014
Attendees (see link to attendance and quorum calculation spreadsheet File:Sec Comm Member List 20140206.xlsx)
- Adam Madlin
- Andrew Hughes
- Ann Racuya-Robins
- Art Friedman
- Ben Wilson
- Chan Lim
- Christopher Spottiswoode
- Jonathan Rosenberg
- Mark Wallace
- Ryan Galluzzo
- Sal D’Agostino
- Seetharama Durbha
- Steve Orrin
- Win Baylies
NOTES
- Roll call was taken
- Functional Model, attached to Adam’s e-mail / agenda, will be reviewed, updated by Adam following today’s meeting.
- Last week’s discussion – topics are proceeding, Adam will post Sal’s meeting notes. Use case selection to be discussed later today.
- Functional Model. Adam will present our current work Feb 26th to Trust Framework Committee, called “Draft Functional Elements”. To include schedules for
- Deliverables release
- Feedback
- Update
- Publish
- Review above in ~ 2 weeks
- Gap Analysis – 14 current use Cases will be examined using gap analysis templates (on-line wiki sources), or other gap analysis tools, for existing models – NSTIC, others, NSTIC Pilots, Daon Model, . . . etc. Art suggested the teams identify existing gap analysis tools and which ones could apply to NSTIC identity systems. For instance:
- InCommon Identity Assurance Package
- NIST 800-63
- 4-party Authentication
- Daon Componentized Services / Credential Services
- Ryan Galluzzo will examine these and report next week
- Next Steps
- Analysis work off-line [see list] on current Use Cases
- Review results
- Target 1st-pass review next week. Adam will write a guideline and Ryan Galluzzo will supply a template for this work.
- Adam will supply a Functional Model list.
- Check visuals against anticipated use for each functional element: are the elements in current figures sufficient? What others are needed?
USE CASE GAP ANALYSIS ASSIGNMENTS
Volunteers to examine / report on the following cases [item numbers from Wiki listing]
Use Case # | Description | Assignment |
---|---|---|
1 | Device Integrity Supporting User Authentication | Steve Orrin |
2 | Authenticate Person Use Case | Adam Madlin |
3 | Identify Proofing Use Case | Ben Wilson |
4 | Cryptographic Authentication for Access to Online Resources | Chan Lin |
5 | Delegated Authentication for User Managed Access | Sal d’Agostino |
6 | Credential Issuance Use Case | Seetharama Durbha |
7 | Access Age Restricted Content Use Case | Seetharama Durbha |
8 | Privacy Enhanced by User Agent | TBD |
9 | Secure Anonymous Digital Identity | Future |
10 | Trust Elevation Use Case | Mark Wallace |
11 | Four Party Authentication and Authorization Use Case | Ryan Galluzzo |
12 | Un and Underserved People Use Case | Ann Racuya-Robins |
13 | Selectively Disclose Attributes Use Case | Christopher Spottiswoode |
14 | Remote Electronic Identity Proofing Use Case | Win Baylies |
Quick Links: Security Committee | Functional Model | Security Committee Meeting Notes | Security Committee Content