Thanks Alexandre, I support you in only adding the text related to Malware Detection Optional Security Enabler (as you did) for 2.5a and keep the rest for D2.5b. BR Pascal -----Message d'origine----- De : Alexandre Boeglin [mailto:alexandre.boeglin at inria.fr] Envoyé : mardi 24 juillet 2012 21:19 À : BISSON Pascal Cc : Seidl, Robert (NSN - DE/Munich); GIDOIN Daniel; Rodrigo Diaz Rodriguez; DI CERBO, Francesco; TRABELSI, Slim; Michael Osborne; Antonio Garcia Vazquez; LELEU Philippe; fiware-security at lists.fi-ware.eu Objet : Re: [Fiware-security] FI-WARE - Security - D2.5a (Your input is now requested in complement of mine) Dear all, Here's our contribution to D2.5a. For now, I only included the paragraph about the malware detection GE: since it's the only one that was discussed during the first release cycle, maybe it would be more consistent to include the other paragraphs starting D2.5b. But if you feel otherwise, feel free to add them. """ The Malware Detection Optional Security Enabler is built around a rather simple Web Service described using the WSDL language, and implemented using the SOAP protocol. Both are freely available and widely used W3C standards, thus allowing on any third party application developer to easily interface with and benefit from it, as well as allowing them to replace the malware detection engine at its core by another asset of their choice, provided that it offers a similar set of features. The IoT Internet Protocols Fuzzer Generic Enabler will be provided under a GPL open source license, allowing any developer to study and adapt it to fit their particular needs. It is developed as an extension of the Scapy packet manipulation tool, which also allows third party developers to easily extend this GE to support new protocols. The Vulnerability Assessment Generic Enabler will be provided under a GPL open source license, allowing any developer to study and adapt it to fit their particular needs. It uses OVAL as its input, which allows it to benefit from the community-contributed OVAL definition repositories. Although it is developed targetting the CFEngine configuration management system, the fact that it is published under an open source license allows third parties to adapt it to work with other configuration management systems. The Andoird IPFIX Probe Optional Security Enabler will be provided under a GPL open source license, allowing any developer to study and adapt it to fit their particular needs. Furthermore, it exports data following the IPFIX standard published by the IETF, which allows it to be integrated with most of the existing monitoring tools. """ Best regards, Alexandre Le lundi 23 juillet 2012 à 16:50, BISSON Pascal a écrit: > Dear Task leads and Caretakers, > > This just to inform you that to give a start from our Security Chapter side to D2.5a I did enter some text. > > This text is for you to check and complete with your input (reflecting your thoughts and the ones of GE owners attached to your task - that btw you should have consulted already ...) > > https://docs.google.com/document/d/1HnmGAJ7LuHJs9oBIhVwbR9LuKMK-Xhb_c7SF-EVQi_Q/edit?pli=1#heading=h.w9bqlgh5tq19 > > Bear in mind that by EOB tomorrow you should have contributed your Task input. This as per minutes of last audio conference. Counting on you all to have it done. > > Thanks in advance for your cooperation and support. > > BR > Pascal > > > PS: Don't hesitate as add-ons you may think of in complement of the text I already provided to illustrate the added value (for the sake of 3rd party innovation) resulting from your GEs design to each of the stakeholder to which it applies. > > _______________________________________________ > Fiware-security mailing list > Fiware-security at lists.fi-ware.eu > http://lists.fi-ware.eu/listinfo/fiware-security -- Alexandre Boeglin Équipe-Projet Madynes Inria
You can get more information about our cookies and privacy policies clicking on the following links: Privacy policy Cookies policy