Report: W3C IG on Web-of-Things Security and Privacy Oliver Pfaff

Slides:



Advertisements
Similar presentations
1Copyright © 2010, Printer Working Group. All rights reserved. PWG Plenary Status Report Workgroup for Imaging Management Solutions (WIMS/PMP) Printer.
Advertisements

Web & TV IG Overview Giuseppe Pascale, Opera Software.
Mary Jo Sariscsany Assessing Health- Related Fitness and Physical Activity 13 chapter.
CAIM Inservice: November 15, Focus: 2-3 topics focused on deeply in each grade. 2.Coherence: Concepts logically connected from one grade to.
Obstacles to PKI Deployment and Usage - Survey Results and Draft Action Plan Steve Hanna, Co-chair, OASIS PKI TC.
1 Chapter 14 Marketing. 2 Learning Objectives Suggest how markets for international expansion can be selected, their demand assessed, and appropriate.
Project Tracking and Scheduling Infsy 570 Dr. R. Ocker.
December 3, 2010 SAIF Governance Framework A Brief Update on work to date.
System Design/Implementation and Support for Build 2 PDS Management Council Face-to-Face Mountain View, CA Nov 30 - Dec 1, 2011 Sean Hardman.
Problem Based Learning (PBL) David W. Dillard Arcadia Valley CTC.
Staff Structure Support HCCA Special Interest Group New Regulations: A Strategy for Implementation Sharon Schmid Vice President, Compliance and.
Software Engineering Chapter 15 Construction Leads to Initial Operational Capability Fall 2001.
IPv6 Home Networking Architecture - update IETF homenet WG Interim meeting Philadelphia, 6 th Oct 2011 draft-chown-homenet-arch-00.
1IETF 63, Remote UI BoF WiDeX Problem Statement Dean Willis Vlad Stirbu RUI BoF, IETF 63, Paris August 2 nd, 2005.
TF-DI Meeting 13-Aug Agenda Discovery presentation from William Miller Review of discussions at F2F Sunnyvale Interaction patterns of tech landscape.
Sharing Using Social Networks in a Composable Web of Things Presenter: Yong-Jin Jeong Korea University of Technology and Education.
Identify steps for understanding and solving the
IETF-50 UPnP Update Prakash Iyer Intel Corporation
High Level Architecture Overview and Rules Thanks to: Dr. Judith Dahmann, and others from: Defense Modeling and Simulation Office phone: (703)
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
AAI-enabled VO Platform “VO without Tears” Christoph Witzig EGI TF, Amsterdam, Sept 15, 2010.
1 AutoconfBOF2.PPT / Aug / Singh,Perkins,Clausen IETF Not Confidential Ad hoc network autoconfiguration: definition and problem statement (draft-singh-autoconf-adp-00.txt)
Dnssd WG Chairs: Tim Chown Ralph Droms IETF 89, London, 3 rd March 2014.
Web Services Based on SOA: Concepts, Technology, Design by Thomas Erl MIS 181.9: Service Oriented Architecture 2 nd Semester,
Rational Unified Process Fundamentals Module 5: Implementing RUP.
SOA Landscape Recommendations By >. Who we are  Team Members  Company History  Current & Past Client Projects  Note: have fun here. Make up your history.
PROPOSAL OF AN INNOVATIVE ARCHITECTURE FOR WEB BASED EDUCATION SYSTEMS CATE 2012 Superior School of Computer Science of National Polytechnic Institute.
Summary of Local Seminars & Focus Groups 20/06/ Athens WP8 – TESTING II coordinated by IFI.
WCAG 2.0 Web Content Accessibility Guidelines Update Last Updated August 2007.
Access and Query Task Force Status at F2F1 Simon Miles.
Best Current Operational Practices – Efforts from the Internet Society Deploy360 – Internet Society.
Applicability and Tradeoffs of ICN for Efficient IoT draft-lindgren-icnrg-efficientiot-00 presented by Olov Schelén IRTF ICNRG IETF 90, Toronto.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
Web & TV IG Overview Giuseppe Pascale, Opera Software.
The Geosciences are a discipline that is strongly data driven, and large data sets are often developed by researchers and government agencies. The complexity.
NGCWE Expert Group EU-ESA Experts Group's vision Prof. Juan Quemada NGCWE Expert Group IST Call 5 Preparatory Workshop on CWEs 13th.
Privacy Considerations for Internet Protocols Alissa Cooper 1.
6lowpan ND Optimization draft Update Samita Chakrabarti Erik Nordmark IETF 69, 2007 draft-chakrabarti-6lowpan-ipv6-nd-03.txt.
Data Access Framework (DAF) John Feikema ONC Initiative Coordinator.
DEFENSE THREAT REDUCTION AGENCY JOINT SCIENCE AND TECHNOLOGY OFFICE CHEMICAL AND BIOLOGICAL DEFENSE create collaborate communicate Click to add title of.
1.We will use the ECCO global ocean circulation model as the foundation of model development and adaptation. This model is not a "general global circulation.
DetNet WG 1 ST Meeting Chairs: Lou Berger Pat Thaler Secretary: Jouni Korhonen.
PPTTEST 12/26/ :41 1 IT Ron Williams Information Technology Management Project Management.
Member Exit 1 eGrants Coaching Unit Members who are approaching the end of their service (30 days prior to their expected completion date) will be listed.
Dissuasion, Working Group Scope and Deliverables Lou Berger Pat Thaler
Make it Work and the EU law-making process Martin Nesbit, Institute for European Environmental Policy Make it Work Conference Regulatory Insights, Experiences.
IETF #65 Network Discovery and Selection Problem draft-ietf-eap-netsel-problem-04 Farooq Bari Jouni Korhonen.
What is the WCCTW Challenge? The Siemens We Can Change the World Challenge is the premier national environmental sustainability competition for grades.
Securing Counselor Meetings Action Planning and Brainstorming to Secure Counselor Meetings, especially in difficult situations.
1 Aratos Disaster Control TM
Subtopics: 1. Frameworks :Reusable systems 2. Design Patterns 1.
DOTS Requirements Andrew Mortensen November 2015 IETF 94 1.
Easy, like an attachment. But can your doc stand on its own? Yes. Only teachers can upload files to course site. So definitely a push- tool. Maybe.
Netmod Netconf Data Modeling Sharon Chisholm Nortel
12 th Meeting of the GBIF Participant Nodes Committee 6-7 October 2013, Berlin, Germany Towards a generic work programme for a Node Olaf Bánki Senior Programme.
ASH EDU 644 W EEK 5 DQ 1 M ORE W EBSITE S HARING AND F EEDBACK Check this A+ tutorial guideline at
Amadeus Open Profile Suite
Dovetail project update
Distribution and components
Report: W3C IG WoT Conf Call Security and Privacy
Advantages OF BDD Testing
Cloud Modeling Framework CloudMF
Criteria of the Humanitarian Development Nexus
Super’s Theory: A Life-Span, Life-Space Approach to Careers
Batch Parties Changes.
What is likely to go wrong?
IETF Network Discovery and Selection Overview
Initial Draft Requirements Concepts
Contributions to SmartGrid Security Centre
Next Steps Bundang, Korea, July 2018.
Presentation transcript:

Report: W3C IG on Web-of-Things Security and Privacy Oliver Pfaff

Coordinates Abbreviation: SP Mailing list prefix: [IG-SP] Landing page: (linked on the Wiki page of the W3C WoT IG)

Working Hypotheses There will be no one-size-fits-all solution for security and privacy Given constraints do vary too much across WoT scenarios/use cases Corresponding work does not start on an empty page Patterns, (standard) protocols, mechanisms, components that can be re-used (with or without adaptation) do exit But it can not assume to find re-usables for every requirement The set of available offerings will have white spots There will be a suite of security and privacy artifacts from which WoT products/projects will serve themselves according given needs Think of this suite as a chocolate box ;-)

Planned Deliverables 1.Security&Privacy ChallengesSecurity&Privacy Challenges 2.Security&Privacy RequirementsSecurity&Privacy Requirements 3.Landscape of Security&Privacy MeansLandscape of Security&Privacy Means 4.Security&Privacy Advanced ConceptsSecurity&Privacy Advanced Concepts 5.Security&Privacy GlossarySecurity&Privacy Glossary 6.Security&Privacy ReferencesSecurity&Privacy References

Security&Privacy ChallengesSecurity&Privacy Challenges Status Objective: explain the drivers behind adaptation and innovation needs State: draft Open points: Reflect opinions/positions of other member organizations (the current draft presents the view of Siemens)

Security&Privacy RequirementsSecurity&Privacy Requirements Status Objective: identify the security and privacy requirements for the use cases considered in the WoT IG State: draft (already considered use cases), not yet stated (others) Open points (joined effort between [IG-SP] and [TF-*]): Already considered use cases: revisit/refine Others: add coverage

Landscape of Security&Privacy MeansLandscape of Security&Privacy Means Status Objective: assess the fitness of existing/emerging security and privacy means State: late draft (design-time means), not yet stated (runtime means) Open points: Design-time means: review, update to latest IETF drafts, consider to add graphics Runtime means: elaborate

Security&Privacy Advanced ConceptsSecurity&Privacy Advanced Concepts Status Objective: address more complex or specific situations (e.g. requiring compositions of single security and privacy means) State: brainstorming (things discovery authorization), not yet stated (others e.g. end-to-end security) Open points: Things discovery authorization: elaborate (joined effort between [IG-SP] and [TF-TD] with interested parties at IRTF T2TRG) Others: identify and elaborate

Security&Privacy GlossarySecurity&Privacy Glossary Status Objective: housekeeping State: late draft Open points: n.a.

Security&Privacy ReferencesSecurity&Privacy References Status Objective: housekeeping State: draft Open points: n.a.

Further Open Points Address resilience Augment (next) plugfest with security and privacy functionality