Pascal, I cannot easily access the googledoc, so perhaps you could paste the following text into the appropriate part of the document Content Based Security Security capabilities are essential for third party innovation but they are an area where third parties often lack the skills to develop their own solutions. The Content Based Security enabler is offered as a software service to help third party innovators incorporate application level security into their offering. By specifying open interfaces for both content producing and content consuming applications, it is feasible for application developers to incorporate content-based security into their products and services without having to develop the underlying security mechanisms that underpin content-based security. Security Monitoring The visualisation framework in the Security Monitoring GE has been architected to facilitate the incorporation of new visualisations by third parties. A flexibility point is introduced between the Data Broker component of the visualisation framework, which is responsible for converting the various monitoring data sources into a common format, and the visualisation component, which renders the common format data. This make it possible for third parties to exploit the common format when creating new visualistions, without having to provide interfaces to the pre-existing Security Monitoring data sources. Thanks Richard _____ From: fiware-security-bounces at lists.fi-ware.eu [mailto:fiware-security-bounces at lists.fi-ware.eu] On Behalf Of BISSON Pascal Sent: 24 July 2012 08:58 To: DI CERBO, Francesco; Seidl, Robert (NSN - DE/Munich); GIDOIN Daniel; Rodrigo Diaz Rodriguez; TRABELSI, Slim; Michael Osborne; Antonio Garcia Vazquez Cc: LELEU Philippe; fiware-security at lists.fi-ware.eu Subject: Re: [Fiware-security] FI-WARE - Security - D2.5a (Your input is now requested in complement of mine) Ok Thanks for this add-on Francesco. BR Pascal De : DI CERBO, Francesco [mailto:francesco.di.cerbo at sap.com] Envoyé : mardi 24 juillet 2012 01:32 À : BISSON Pascal; Seidl, Robert (NSN - DE/Munich); GIDOIN Daniel; Rodrigo Diaz Rodriguez; TRABELSI, Slim; Michael Osborne; Antonio Garcia Vazquez Cc : LELEU Philippe; fiware-security at lists.fi-ware.eu Objet : RE: FI-WARE - Security - D2.5a (Your input is now requested in complement of mine) Hello Pascal, I contributed with a few lines on USDL-SEC, they are already in the document. 3rd Party involvement in USDL-SEC can be significant, due to its open design principles. USDL-SEC permits to complement USDL service descriptions with security-specific non-functional information, through the Linked Open Data paradigm. With the same paradigm, also USDL-SEC can be complemented, for example adding additional details regarding a particular technology; 3rd Party here can integrate their contributions to the specification, besides being able to describe the security features of their services. BM__MailEndCompose Best, Francesco From: BISSON Pascal [mailto:pascal.bisson at thalesgroup.com <mailto:pascal.bisson at thalesgroup.com> ] Sent: lundi 23 juillet 2012 16:51 To: Seidl, Robert (NSN - DE/Munich); GIDOIN Daniel; Rodrigo Diaz Rodriguez; DI CERBO, Francesco; TRABELSI, Slim; Michael Osborne; Antonio Garcia Vazquez Cc: BISSON Pascal; LELEU Philippe; fiware-security at lists.fi-ware.eu <mailto:fiware-security at lists.fi-ware.eu> Subject: FI-WARE - Security - D2.5a (Your input is now requested in complement of mine) Importance: High Dear Task leads and Caretakers, This just to inform you that to give a start from our Security Chapter side to D2.5a I did enter some text. This text is for you to check and complete with your input (reflecting your thoughts and the ones of GE owners attached to your task - that btw you should have consulted already ...) https://docs.google.com/document/d/1HnmGAJ7LuHJs9oBIhVwbR9LuKMK-Xhb_c7SF-EVQ i_Q/edit?pli=1#heading=h.w9bqlgh5tq19 <https://docs.google.com/document/d/1HnmGAJ7LuHJs9oBIhVwbR9LuKMK-Xhb_c7SF-EV Qi_Q/edit?pli=1#heading=h.w9bqlgh5tq19> Bear in mind that by EOB tomorrow you should have contributed your Task input. This as per minutes of last audio conference. Counting on you all to have it done. Thanks in advance for your cooperation and support. BR Pascal PS: Don't hesitate as add-ons you may think of in complement of the text I already provided to illustrate the added value (for the sake of 3rd party innovation) resulting from your GEs design to each of the stakeholder to which it applies. Please consider the environment before printing a hard copy of this e-mail. The information contained in this e-mail is confidential. It is intended only for the stated addressee(s) and access to it by any other person is unauthorised. If you are not an addressee, you must not disclose, copy, circulate or in any other way use or rely on the information contained in this e-mail. Such unauthorised use may be unlawful. If you have received this e-mail in error, please inform us immediately on +44 (0)118 986 8601 and delete it and all copies from your system. Thales Research and Technology (UK) Limited. A company registered in England and Wales. Registered Office: 2 Dashwood Lang Road, The Bourne Business Park, Addlestone, Weybridge, Surrey KT15 2NX. Registered Number: 774298 Thales UK Limited. A company registered in England and Wales. Registered Office: 2 Dashwood Lang Road, The Bourne Business Park, Addlestone, Weybridge, Surrey KT15 2NX. Registered Number: 868273 -------------- next part -------------- An HTML attachment was scrubbed... URL: <https://lists.fiware.org/private/old-fiware-security/attachments/20120724/c058e715/attachment.html>
You can get more information about our cookies and privacy policies clicking on the following links: Privacy policy Cookies policy