[Fiware-security] FI-WARE - Security - D2.5a (Your input is n ow requested in complement of mine)

Seidl, Robert (NSN - DE/Munich) robert.seidl at nsn.com
Tue Jul 24 11:48:49 CEST 2012


Here some text for IDM and Privacy.

 

@ Francesco: If you think some sentences for Data Handling would be worth mentioning please add them.

 

____________________________

 

The Identity Management Generic Enabler acts as the identity provider; it provides federated identity for Web-SSO and attributes for an authenticated user; identity federation and single-sign-on support ease of use. Given the heterogeneity of the FI Core Platform, identities should be usable across trust domains. The identity management approach used in FI-WARE will combine established technologies and bridge them where possible, thus offering a flexible system being used by 3rd parties.

 

Europe has taken a specific direction with respect to privacy protection. The right to respect for private and family life, home and correspondence are deeply rooted in the European Convention on Human Rights and have since been the foundation for extensive regulation on privacy and data protection. Privacy protection in Europe is geared towards protection of a right to respect and personal dignity as well as to data minimisation and minimum disclosure as basic implementation principles on the infrastructural level. FI-WARE is providing Attribute Based Credential (ABC) mechanisms in order to enable trustworthy identity management and trust relations between users and service providers while respecting privacy. 3rd party instances can make use of ABC functionality and will be enabled providing privacy respecting services.

 

 

 

Greetings

Robert

 

From: ext Egan, Richard [mailto:Richard.Egan at uk.thalesgroup.com] 
Sent: Tuesday, July 24, 2012 10:52 AM
To: 'BISSON Pascal'; 'DI CERBO, Francesco'; Seidl, Robert (NSN - DE/Munich); 'GIDOIN Daniel'; 'Rodrigo Diaz Rodriguez'; 'TRABELSI, Slim'; 'Michael Osborne'; 'Antonio Garcia Vazquez'
Cc: 'LELEU Philippe'; 'fiware-security at lists.fi-ware.eu'
Subject: RE: [Fiware-security] FI-WARE - Security - D2.5a (Your input is n ow requested in complement of mine)

 

Pascal,

 

I cannot easily access the googledoc, so perhaps you could paste the following text into the appropriate part of the document

 

Content Based Security

 

Security capabilities are essential for third party innovation but they are an area where third parties often lack the skills to develop their own solutions. The Content Based Security enabler is offered as a software service to help third party innovators incorporate application level security into their offering. By specifying open interfaces for both content producing and content consuming applications, it is feasible for application developers to incorporate content-based security into their products and services without having to develop the underlying security mechanisms that underpin content-based security.

 

Security Monitoring

 

The visualisation framework in the Security Monitoring GE has been architected to facilitate the incorporation of new visualisations by third parties. A flexibility point is introduced between the Data Broker component of the visualisation framework, which is responsible for converting the various monitoring data sources into a common format, and the visualisation component, which renders the common format data. This make it possible for third parties to exploit the common format when creating new visualistions, without having to provide interfaces to the pre-existing Security Monitoring data sources.

 

Thanks

Richard

 

________________________________

From: fiware-security-bounces at lists.fi-ware.eu [mailto:fiware-security-bounces at lists.fi-ware.eu] On Behalf Of BISSON Pascal
Sent: 24 July 2012 08:58
To: DI CERBO, Francesco; Seidl, Robert (NSN - DE/Munich); GIDOIN Daniel; Rodrigo Diaz Rodriguez; TRABELSI, Slim; Michael Osborne; Antonio Garcia Vazquez
Cc: LELEU Philippe; fiware-security at lists.fi-ware.eu
Subject: Re: [Fiware-security] FI-WARE - Security - D2.5a (Your input is now requested in complement of mine)

Ok Thanks for this add-on Francesco.

 

BR

Pascal

 

De : DI CERBO, Francesco [mailto:francesco.di.cerbo at sap.com] 
Envoyé : mardi 24 juillet 2012 01:32
À : BISSON Pascal; Seidl, Robert (NSN - DE/Munich); GIDOIN Daniel; Rodrigo Diaz Rodriguez; TRABELSI, Slim; Michael Osborne; Antonio Garcia Vazquez
Cc : LELEU Philippe; fiware-security at lists.fi-ware.eu
Objet : RE: FI-WARE - Security - D2.5a (Your input is now requested in complement of mine)

 

Hello Pascal,

 

I contributed with a few lines on USDL-SEC, they are already in the document.

 

3rd Party involvement in USDL-SEC can be significant, due to its open design principles. USDL-SEC permits to complement USDL service descriptions with security-specific non-functional information, through the Linked Open Data paradigm. With the same paradigm, also USDL-SEC can be complemented, for example adding additional details regarding a particular technology; 3rd Party here can integrate their contributions to the specification, besides being able to describe the security features of their services.

 

Best,

 

Francesco

 

From: BISSON Pascal [mailto:pascal.bisson at thalesgroup.com] 
Sent: lundi 23 juillet 2012 16:51
To: Seidl, Robert (NSN - DE/Munich); GIDOIN Daniel; Rodrigo Diaz Rodriguez; DI CERBO, Francesco; TRABELSI, Slim; Michael Osborne; Antonio Garcia Vazquez
Cc: BISSON Pascal; LELEU Philippe; fiware-security at lists.fi-ware.eu
Subject: FI-WARE - Security - D2.5a (Your input is now requested in complement of mine)
Importance: High

 

Dear Task leads and Caretakers,

 

This just to inform you that to give a start from our Security Chapter side to D2.5a I did enter some text.

 

This text is for you to check and complete with your input (reflecting your thoughts and the ones of GE owners attached to your task - that btw you should have consulted already ...)

 

https://docs.google.com/document/d/1HnmGAJ7LuHJs9oBIhVwbR9LuKMK-Xhb_c7SF-EVQi_Q/edit?pli=1#heading=h.w9bqlgh5tq19

 

Bear in mind that by EOB tomorrow you should have contributed your Task input. This as per minutes of last audio conference. Counting on you all to have it done. 

 

Thanks in advance for your cooperation and support.

 

BR

Pascal

 

 

PS: Don't hesitate as add-ons you may think of in complement of the text I already provided to illustrate the added value (for the sake of 3rd party innovation) resulting from your GEs design to each of the stakeholder to which it applies. 

 

Please consider the environment before printing a hard copy of this 

e-mail. 

The information contained in this e-mail is confidential. It is intended 

only for the stated addressee(s) and access to it by any other person is 

unauthorised. If you are not an addressee, you must not disclose, copy, 

circulate or in any other way use or rely on the information contained in 

this e-mail. Such unauthorised use may be unlawful. If you have received 

this e-mail in error, please inform us immediately on +44 (0)118 986 8601 

and delete it and all copies from your system. 

Thales Research and Technology (UK) Limited. A company registered in 

England and Wales. Registered Office: 2 Dashwood Lang Road, The Bourne 

Business Park, Addlestone, Weybridge, Surrey KT15 2NX. Registered Number: 

774298 

Thales UK Limited. A company registered in England and Wales. Registered 

Office: 2 Dashwood Lang Road, The Bourne Business Park, Addlestone, 

Weybridge, Surrey KT15 2NX. Registered Number: 868273 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.fiware.org/private/old-fiware-security/attachments/20120724/97dc6af5/attachment.html>


More information about the Old-Fiware-security mailing list

You can get more information about our cookies and privacy policies clicking on the following links: Privacy policy   Cookies policy