Dear Jan, Find attached the document with the two changes (add-ons) implemented. As for your remark that I share let's have it discussed tomorrow with TL and decide on it . In the meantime feel free to propose a text for TL to implement. Regards, Pascal De : Jan Camenisch [mailto:jca at zurich.ibm.com] Envoyé : jeudi 23 juin 2011 15:12 À : BISSON Pascal Cc : Fiware-security at lists.fi-ware.eu; Robert Seidl; Michael Osborne; Slim TRABELSI Objet : Re: [Fiware-security] FI-WARE - Security AT - WP8 - Audio-conf Minutes (17/06/2011) Importance : Haute Hej Pascal, Here's references that can be included in the High-Level description. As I do not have microsoft word available (no licenses by IBM policy), here they are in acsii (I could edit in openoffice, but that might be more of a pain for references than plain ascii, I'm afraid). Hope that works. [idemixspec] IBM Research - Zurich, Specification of the Identity Mixer Cryptographic Library, Version 2.3.3 http://www.zurich.ibm.com/~pbi/identityMixer_gettingStarted/IdentityMixer_ProtocolSpecification_2-3-3.pdf [idemixlib] http://www.zurich.ibm.com/~pbi/identityMixer_gettingStarted/index.html [biccam] P. Bichsel and J. Camenisch. Mixing Identities with Ease. IFIP Working Conference on Policies & Research in Identity Management (IDMAN '10), Oslo, Norway, November 18-19, 2010. For the terms, section 3.1.4, I'd like to add: Partial identity: a partial identity is a set of attributes of a user. Thus, an identity is composed of all attributes of a user, a partial identity is a subset of a user's identity. Typically, a user is known to another party only as a partial identity. A partial identity can have a unique identifier. The latter is a strong identifier if is allows for a strong authentication of the user (holder) of the partial identity, such a cryptographic "identification" protocol. In the paragraph about identity management I'd like to replace "idenfied" by "authenticated" Regarding to the document itself: right now, the enablers of NSN, IBM, and SAP are described independently, however they are overlapping and would need to be integrated into each other. I guess for this documents we won't do this, but it would be good if we would point that out to the reader. What do you think? Best, Jan On 20.06.2011, at 14:00, BISSON Pascal wrote: Dear Colleague, Please find attached to this email the minutes from our last weekly audio-conf on WP8 (17/06/2011). Counting on each of you to go through these minutes and make your actions. As you will see there are actions for ALL and more specifically for INRIA and FT-Orange which were unfortunately not on the call. Counting on INRIA and FT-Orange to catch up on things with help of these minutes and by contacting Task lead for which they have still pending actions. Counting on you all to make your duties. Best Regards, Pascal <WP8 Audio-conf 170611 Minutes.doc>_______________________________________________ Fiware-security mailing list Fiware-security at lists.fi-ware.eu<mailto:Fiware-security at lists.fi-ware.eu> http://lists.fi-ware.eu/listinfo/fiware-security Dr. Jan Camenisch Member, IBM Academy of Technology IBM Research - Zurich www.zurich.ibm.com/~jca<http://www.zurich.ibm.com/~jca> tel: +41 44 724 8279 fax: +41 44 724 8953 http://twitter.com/#!/dtiIeynt_xreMi -------------- next part -------------- An HTML attachment was scrubbed... URL: <https://lists.fiware.org/private/old-fiware-security/attachments/20110624/546bade9/attachment.html> -------------- next part -------------- A non-text attachment was scrubbed... Name: FI-WARE High-Level Description Security v2.1 11-06-22 valid until 11-06-23.doc Type: application/msword Size: 1492992 bytes Desc: FI-WARE High-Level Description Security v2.1 11-06-22 valid until 11-06-23.doc URL: <https://lists.fiware.org/private/old-fiware-security/attachments/20110624/546bade9/attachment.doc>
You can get more information about our cookies and privacy policies clicking on the following links: Privacy policy Cookies policy