April 23, 20021 XKMS Requirements Update Frederick Hirsch, Mike Just April 23, 2002 Goals Requirements Summary –General, Security Last Call Issues –For.

Slides:



Advertisements
Similar presentations
OGSA Security Profile 2.0 (a.k.a. Express Authentication Profile) DUANE MERRILL October 18, 2007.
Advertisements

XKMS Specifications Phillip Hallam-Baker. Changes Since 1.1 Cosmetic Significant.
XML Key Management Services - Tutorial 9 December 01 Blair Dillaway Software Architect Microsoft Corp.
XML Key Management Requirements W3C XML Key Management Working Group Meeting – Dec 9 th, 2001 Frederick Hirsch (Zolera Systems) Mike Just (Entrust)
Web Services Security Requirements Stephen T. Whitlock Security Architect Boeing.
Yunling Wang VoIP Security COMS 4995 Nov 24, 2008 XCAP The Extensible Markup Language (XML) Configuration Access Protocol (XCAP)
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
IHE Profile Proposal: Dynamic Configuration Management October, 2013.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
SOAP & Security IEEE Computer Society Utah Chapter Hilarie Orman - Purple Streak Development Tolga Acar - Novell, Inc. October 24, 2002.
SOAP.
Web Services and AIXM. Introduction Subramanyam “Subbu” Nadavala Contractor, L-3 Communications FAA Air Traffic Organization (ATO) Information Technology.
Web Service Security CS409 Application Services Even Semester 2007.
Web Services Nasrullah. Motivation about web service There are number of programms over the internet that need to communicate with other programms over.
Integration Considerations Greg Thompson April 20 th, 2006 Copyright © 2006, Credentica Inc. All Rights Reserved.
IETF OAuth Proof-of-Possession
Public Key Infrastructure Ben Sangster February 23, 2006.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
Web Services Security Multimedia Information Engineering Lab. Yoon-Sik Yoo.
SIP Security Matt Hsu.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
PAWN: A Novel Ingestion Workflow Technology for Digital Preservation
ΗΛΕΚΤΡΟΝΙΚΟ ΕΜΠΟΡΙΟ Web Services Overview Mary Grammatikou 9/06/2009.
PAWN: A Novel Ingestion Workflow Technology for Digital Preservation Mike Smorul, Joseph JaJa, Yang Wang, and Fritz McCall.
Web services security I
Prashanth Kumar Muthoju
OAuth Security Hannes Tschofenig Derek Atkins. State-of-the-Art Design Team work late 2012/early 2013 Results documented in Appendix 3 (Requirements)
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
IDENTITY MANAGEMENT Hoang Huu Hanh (PhD), OST – Hue University hanh-at-hueuni.edu.vn.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
WSDL: Web Services Definition Language CS 795/895.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Enabling Embedded Systems to access Internet Resources.
OASIS ebXML Registry Standard Open Forum 2003 on Metadata Registries 10:30 – 11:15 January 20, 2003 Kathryn Breininger The Boeing Company Chair, OASIS.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
Web Services Standards. Introduction A web service is a type of component that is available on the web and can be incorporated in applications or used.
Session Peering Protocol over SOAP I-D ( draft-ietf-drinks-spp-over-soap-01) draft-ietf-drinks-spp-over-soap-01 0 Presenter: Vikas Bhatia (On behalf of.
W3C Web Services Architecture Security Discussion Kick-Off Abbie Barbir, Ph.D. Nortel Networks.
1 Possible Principles and Requirements Frederick Hirsch, Nokia 12 July 2008.
By Umair Ali. Dec 2004Version 1 -PKI - a security architecture – over the internet. -Provides an increased level of confidence for exchanging information.
Using XML Transactions Presented By Tony Alwardt The Boeing Company.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
1 G52IWS: Web Services Chris Greenhalgh. 2 Contents The World Wide Web Web Services example scenario Motivations Basic Operational Model Supporting standards.
Task Force CoRD Meeting / XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA.
BEA position on W3C ‘Web Services’ Standards Jags Ramnarayan 11th April 2001.
Introduction to Web Services Presented by Sarath Chandra Dorbala.
1 WS-Policy. 2 What’s the Problem? To use a web service a client needs more information than is provided in WSDL file. Examples: –Does service support.
©2009 HP Confidential1 Proposal to OASIS KMIP TC Stan Feather and Indra Fitzgerald Hewlett-Packard Co. 26 October, 2010 Encoding Options for Key Wrap of.
OASIS ebXML Registry Standard Open Forum 2003 on Metadata Registries 10:30 – 11:15 January 20, 2003 Kathryn Breininger The Boeing Company Chair, OASIS.
1 ECHO ECHO 9.0 for Data Partners Rob Baker January 23, 2007.
Web Services Security INFOSYS 290, Section 3 Web Services: Concepts, Design and Implementation Adam Blum
Web Services Blake Schernekau March 27 th, Learning Objectives Understand Web Services Understand Web Services Figure out SOAP and what it is used.
Web Services. XML Namespaces, Schemas XML processing. Week 2.
Web Services Security Standards Dr. Phillip M. Hallam-Baker C.Eng. FBCS VeriSign Inc.
S/MIME IBE Submissions Terence Spies Voltage Security.
Web Services Security Mike Shaw Architectural Engineer.
RESTFul SOAP Stéphane Nyombayire WHIM April 10, 2007.
1 XML Key Management Specification XKMS Dr Phillip Hallam-Baker FBCS CEng. VeriSign Inc.
Rserpool Security Trust Argument draft-ietf-rserpool-asap-13.txt Maureen Stillman November 6, 2006
1 OASIS BDX TC - March BDX Technical Committee Addressing Mechanism or BDX Technical Committee Addressing Mechanism or "how do I find where to send.
Sabri Kızanlık Ural Emekçi
draft-ietf-geopriv-lbyr-requirements-02 status update
Security in ebXML Messaging
Chapter 9 Web Services: JAX-RPC, WSDL, XML Schema, and SOAP
Presentation transcript:

April 23, XKMS Requirements Update Frederick Hirsch, Mike Just April 23, 2002 Goals Requirements Summary –General, Security Last Call Issues –For Discussion –(Potentially) Resolved –Clarifications

April 23, Goals Support XML security key management –Register, revoke, and update key bindings –Locate public keys –Validate key bindings Enable simple diverse clients by eliminating traditional client processing complexity

April 23, General Requirements Universal, usable, extensible: –XML with namespaces –SOAP with document literal encoding –Server (PKI) technology optionally transparent to client –Response values XML-schema typed Policy via URI Convey context with messages

April 23, Security Requirements –Trust services must support integrity and confidentiality via TLS and XML payload security. Mechanism such as VPN also allowed. –Responses must include request digest, URL –Registration authorization mechanisms –Proof of key possession –Specification must address issues of known- plaintext attacks and replay attacks.