Presentation is loading. Please wait.

Presentation is loading. Please wait.

PS 1 19 September 2005 SEA Area Report Atlanta, Georgia, USA, 19 September 2005.

Similar presentations


Presentation on theme: "PS 1 19 September 2005 SEA Area Report Atlanta, Georgia, USA, 19 September 2005."— Presentation transcript:

1 PS 1 19 September 2005 SEA Area Report Atlanta, Georgia, USA, 19 September 2005

2 PS 2 19 September 2005 Points to Ponder Things should be as simple as possible, But no simpler. Albert Einstein Internet Robustness Principle - Be liberal in what you accept, and conservative in what you send. Jon Postel, RFC 793 & 1122 Though ambition in itself is a vice, Yet it is often a source of virtue. Old Chinese proverb (from Hsu’s Fortune Cookie) Suggested for consideration by all ADs and WG chairs

3 PS 3 19 September 2005 SEA Meeting Overview 12 Sept, Mon AM: CCSDS Plenary, MOIMS coord and other discussions PM: SEA Plenary and Overview 13 Sept, Tues AM: SAWG Mtg PM: SAWG Mtg 14 Sept, Wed AM: SecWG and InfoArchWG in parallel PM: SecWG and XML Stds SIG in parallel 15 Sept, Thurs AM: SecWG and SANA BoF in parallel PM: SecWG and other WG meetings 16 Sept, Fri AM: SGIA BoF Kickoff PM: SEA summary including WG reports PM (late): CESG tag up

4 PS 4 19 September 2005 System Engineering Area Overview SEA Includes: System Architecture, Information Architecture & Security Working Groups SANA BoF (seeking WG status now) SGIA BoF (initial meeting) XML Standards and Guidelines SIG (initial meeting) Responsibilities Overall architecture for space mission communications, operations, and cross-support Coordinate and collaborate with the other areas about architectural choices and options Support the CESG in evaluating consistency of all area programs of work with the defined architecture Create such working groups and BoFs as are required to progress the work of CCSDS

5 PS 5 19 September 2005 System Engineering Area Summary: Current WGs and BOFs System Architecture WG - Met this week Develop a high level system architecture reference model and formal methodology and tools. Finalize Reference Architecture for Space Data Systems (RASDS) V1 Magenta Book Discuss how to progress future work on architectural formalisms Information Architecture WG - Met this week Develop a high level Information Architecture reference model and definitions of active and passive information objects Finalize Reference Architecture for Space Information Management (RASIM) V1 Green Book Discuss how / where to begin work to define component interfaces and standards Security WG - Met this week Develop security overview & threat assessment, and security architecture, framework and related standards Progress Security Architecture and other specific security elements ( Key management, Crypto and Authentication Standards) Discussions with other WGs as needed

6 PS 6 19 September 2005 System Engineering Area Summary: Current WGs and BOFs SANA BoF - Met this week Develop detailed requirements for the Space Assigned Numbers Authority (SANA), an implementation approach and a plan for a rapid prototype to demonstrate functionality Finalize SANA charter Demo SANA prototype New BoF & SIGs Space Ground Interoperability Architecture (SGIA) BoF - Met this week Develop an end to end space / ground cross support architecture and services catalog in response to IOAG request Initiate SGIA charter discussions, create shared vision for task XML Standards & Guidelines (XSG) SIG - Met this week Develop guidelines and standard approaches for XML schema and namespaces, short fuse due to immediate WG needs Created agreed task concept, identified chair and members, initiated discussions

7 PS 7 19 September 2005 System Engineering Area Summary: Current WGs and BOFs New BoF & SIGs, contd Delta-DOR End to End Processing - brief discussion this week Develop an end to end approach to Delta-DOR processing, including RF signals, data reception, raw data capture & transmission, data processing, delivery of products and ancillary information such as quasar catalogs Initiate discussions, create shared vision for task and where / how the work should be carried out, co-location problems Data Management / Data Accountability - brief discussion this week Develop an end to end data management and data accountability approach Initiate discussions, create shared vision for task and where / how the work should be carried out

8 PS 8 19 September 2005 SAWG Executive Summary 1. Review of the RASDS document was done by the SAWG members and an expert on RM-ODP. Some issues were found but the WG agreed to necessary updates to the document. 2. It was agreed to send the updated RASDS document, based on the discussion at this meeting, to CESG and CMC for approval as a Recommended Practice document. 3. It was also agreed that the work on development of a RASDS formal model should be continued in some form (preferably by a CCSDS BoF/WG) leveraging the liaison relationship established with the ISO/IEC group developing “UML for ODP.”

9 PS 9 19 September 2005 SAWG Summary Technical Status 1.Systems Architecture WG Goal: Develop a reference architecture and a formal representation method Working Group Status: Active ___ Idle ___ Will be terminated _X_ Working Group Summary Situation: Working Group Summary progress: Updated the RASDS document (near BCP), Started to develop a formal model (before WB) Problems and Issues: Ordered by CMC to terminate Development of formal model is deemed essential by SAWG Status:OKCAUTIONPROBLEM Comment:Must be terminated

10 PS 10 19 September 2005 SAWG Summary of Goals and Deliverables 1.Define a reference architecture that provides a framework for generation of space data systems standards and development of space data systems. 2.Document the reference architecture identifying basic elements. 3.Develop a document that provides to the other Working Groups and BoFs guidelines on how to apply the reference architecture. 4.Develop formal methods for representing space data systems architectures that will enable sharing of architectural information among engineers. 5.Develop tools that will facilitate design, modeling, and simulation of system architectural designs. SAWG Work Stopped

11 PS 11 19 September 2005 SAWG Progress Achieved 1. With regard to items 1 and 2 (see the previous page), a review of the RASDS document was by the SAWG members and an expert on RM-ODP. The WG agreed to necessary updates to the document and the final draft of the document will delivered shortly. 1. Change the”attribute” section to “characteristics” section 2. Define Software & Hardware Engineering Objects 3. Clarify Viewpoint Specifications vs. Views 4. Change order of the sections for better flow 2. With regard to item 4, it was agreed that it should be developed by another BoF/WG of CCSDS with a close liaison relationship with the ISO/IEC WG that is developing “UML for ODP.”

12 PS 12 19 September 2005 SAWG Near-Term Schedule The SAWG will be terminated after delivering the final Recommended Practice document to CESG. Some members of SAWG will participate in the activities of SGIA and there is an intention to use the RASDS to develop SGIA. A draft charter for a BoF that develops a formal model of space data systems will be generated. In the meantime, some of us (at least NASA, CNES and JAXA), as representatives from the space community, plan to review “UML for ODP” and generate comments.

13 PS 13 19 September 2005 SAWG Risk Management Update We believe that one of the reasons why RASDS is not accepted well within CCSDS may be that we haven’t successfully shown how it can be used in space data systems. SGIA is seen as a means to validate the RASDS concepts by applying them to a real problem that the IOAG and CMC have posed. JAXA has a plan to use RASDS to develop a database that stores information on spacecraft with a standard format. The concept of the database in the first phase is shown in the next slides. JPL has a research task that is also extending RASDS to describe space systems.

14 PS 14 19 September 2005 SecWG Executive Summary Attendees from CNES, BNSC (telecon), NASA/GSFC, NASA/ Langley (telecon), ESA/ESOC (a first!), DLR, NASA/JPL & NASA/GRC (brief) Discussed and revised the SecWG Security Architecture documents Discussed and accepted proposals for CCSDS standards for: Encryption (AES w/ min 128-bit key, additional algorithms allowed) Authentication/integrity (Digital Signature Standard for public key- based authentication, HMAC-SHA1 for MAC-based authentication) Discussed CNES approach to developing security requirements and their use of the EBIOS tool Discussed the development of: Security Policy Framework Information Security Planning Guide - Potential usage of Common Criteria to develop mission Protection Profiles Discussed issues from NASA DSWG – identity management, SCID “exposure” on SANA (aggregates of public data may be a security risk).

15 PS 15 19 September 2005 SecWG Summary Technical Status 1.Security WG Goal: Working Status: Active __X_ Idle ____ Summary progress: Three documents actively being produced (Security Green Book, Security Architecture, Threat). All docs green. Green Book to CESG. Progress since last meeting: Completed Green Book, completed Threat document, completed Encryption and Authentication Trade Studies – agreed on algorithms Problems and Issues: Resources – need to ensure continued participation from all member agencies status:OKCAUTIONPROBLEM Working Group is advancing and producing good products. Docs OK. New work OK. Resources – always need more

16 PS 16 19 September 2005 SecWG Summary of Goals and Deliverables 1.Security Green Book revision is complete and has been submitted to the CESG – poll has just closed – awaiting review comments 2.Threat Document is completed and has been submitted to the CESG – poll has just closed – awaiting review comments. 3.Security Architecture document has undergone another revision taking into account the previous comments – to be sent out for WG review/comments. 4.Trade-off analysis of potential CCSDS encryption standards as a means of deciding on a recommendation was completed and WG recommends distributing as a Green Book for the Encryption Algorithm Blue Book. 5.Trade-off analysis of potential CCSDS authentication standards as a means of deciding on a recommendation was completed and WG recommends distributing as a Green Book for the Authentication Algorithm Blue Book. 6.CCSDS key management standard still in process – controversy regarding public key exchanges vs. shared, symmetric keys. 7.Policy Framework and Mission Planners Guides still in process. 8.Continue to work with other Areas and their WGs with respect to security.

17 PS 17 19 September 2005 SecWG Near-Term Schedule DeliverableMilestoneDate Green Book revisions Completed – awaiting CESG poll comments Threat Document Completed – awaiting CESG poll comments CCSDS Security Architecture (5nd Draft) Publish a draft document (White Book) Red Book-1 Red Book-2 Blue Book-1 Done 12/05 03/06 07/06 Encryption Algorithm Trade Study completed Agreement to adopt algorithm Blue Book planned 06/05 09/05 12/05

18 PS 18 19 September 2005 SecWG Near Term Schedule (cont) Authenticati on/Integrity Trade study completed Agreement reached on algorithm adoption Blue Book planned 08/05 09/05 02/06

19 PS 19 19 September 2005 SecWG Near Term Schedule (cont) Key Management document Revise trade analysis for conclusions and recommendations 12/05 First draft Security Policy Guide Develop a rough draft Security Policy Guide based on NIST 800-47 01/06 Mission Planners Security Guide Look at the tailoring of the CCToolbox to develop mission protection profiles 06/06

20 PS 20 19 September 2005 IAWG Executive Summary Six people attended the IA meeting from JPL, GSFC, Marshall and CSA. The draft Reference Architecture for Space Information Management Green Book was discussed Included the updates from the NASA TIM that occurred in August. Established much improved convergence between GSFC and JPL with respect to the relationship between IA and OAIS. Chapter 2, the information model, requires more substantial updates than Chapter 3, the functional information management components. The afternoon IAWG session was canceled in lieu of the meeting on XML best practices (XSG SIG)

21 PS 21 19 September 2005 IAWG Summary Technical Status 1.Information Architecture WG Goal: Develop a reference architecture for space information management as extension to RASDS Working Group Status: Active _X_ Idle ___ Working Group Summary Situation: Working Group Summary progress: Updated the RASIM document (nearly complete GB), Discussed how to transition to development of components & interfaces Problems and Issues: Agreement on transition is still unclear Availability of agency participants with right skill set is uncertain Transition Unclear Comment: PROBLEMCAUTIONOKStatus:

22 PS 22 19 September 2005 IAWG Progress Achieved Significant progress has been achieved since July and we have received quite a few positive comments. Participants seems willing to continue their involvement and to see the Green Book get published. Some discussion occurred on the need to develop more examples to clarify use of abstract components to build different classes of information systems. Some discussion occurred on the need for a TIM on registries, at least at the NASA level, but broader participation is welcomed.

23 PS 23 19 September 2005 IAWG Near Term Schedule

24 PS 24 19 September 2005 IAWG Open Issues Similarities exist between “Reference Architecture for Space Information Management” and the OAIS, but differences are: OAIS is an archival reference model and process that focuses on preservation and data archives. Data model is specific to archiving. IA focuses on a cross-cutting information management reference architecture applicable across mission lifecycle and components that can be used to build a variety of informtion management systems. May need to develop a separate process model for the RASIM end to end information infrastructure Modeling notations and disagreement on how to best render an architecture still continues to be problematic Using UML class diagrams for components, interfaces and data models

25 PS 25 19 September 2005 IAWG Resource & Coordination Issues Participation by individuals with solid experience architecting data-driven systems IA-related meetings occurring in multiple places (Atlanta and Toulouse) which prevents adequate cross-group interactions. There may not be commitments from member agencies for enough resource to achieve deliverables. ESA and CNES considered important stakeholders, but participation has been very limited. Critical that a combined registries effort be initiated across existing groups. XSG SIG discussion identified need for schema registry, other have been identified Once it completes current high priority task XSG SIG may form nucleus for discussion of this topic

26 PS 26 19 September 2005 SANA BOF Executive Summary SANA BOF on 15 September 2005 in Atlanta, GA 8 representatives included NASA (JPL, GSFC, MSFC), ESA Intention Establish plan, processes and recommended practices for CCSDS Space Assigned Numbers Authority (SANA) Define content, overall approach, and means for updating included information Define how the SANA would work with different CCSDS WGs, registries, and with agency specific elements Establish practice for future maintenance and sustaining of the SANA Motivation: Primarily provide access to CCSDS global information - Manage central info centrally as authoritative source - Support local management of distributed agency & mission info, provide central pointers to their authoritative sources Existing SANA is largely conceptual, as defined in CCSDS A02.1-Y-2. Restructured Organization and Processes for the Consultative Committee for Space Data Systems. Yellow Book. Issue 2. April 2004: “SANA” materials are in some existing repositories and also are buried within a number of different CCSDS documents Users have a very difficult time locating these within the CCSDS web site and understanding how they relate one to the other

27 PS 27 19 September 2005 SANA BOF Recommendations Update the SANA charter to reflect agreements from meeting and submit to the CESG for approval Ensure that the SANA can deal with the complexity of future spaceflight programs, projects and the technologies involved Help reduce stove piping Setup a mechanism to access and apply specific information technologies through registry processes and artifacts (CCSDS common S/W) Introduce information management commonality across operational domains Enable interoperability & reuse (data dictionaries & glossary, schemas, assigned numbers, common name registry) Provide commonality at the technical & operational level among disparate projects and development organizations Single point of (common) access for management, technologists, developers and operators to technically relevant CCSDS related information (SANA=web link management)

28 PS 28 19 September 2005 SANA BoF Recommendations, contd Primary SANA Contents, in order of priority, are to be: CCSDS Registries - Common IDs (ground stations, spacecraft and space objects) - Services discovery (cross support, interoperability) - Common Metadata (Data element, dictionary, glossary, acronyms) - Schema - Pointers to agency registry entrypoints Standard Information Models Standard Namespaces Assigned numbers from standards e.g. CCSDS, IETF….. SCPS-TP: Keith Scott - Vendor IDs for specific implementations i.e. gateway SCPS-TP White Paper June 23, 2005 - Assignment of Extended Capability Binding Space Identifiers Pointers to standard software objects, XFDU plug-ins, applications services and APIs Pointers to reference implementations (XML, coding, compression, protocols, …) Potential future activities: Space name and address domains e.g. operational, network…. Messaging e.g. AMS - Continuums, nodes, zones….. - Message types

29 PS 29 19 September 2005 SANA BoF Objectives Objective 1: Establish a CCSDS system of registries for space assigned numbers for current and future international space operations and information management. Objective 2: Coordinate and integrate current registry processes and other operational information into a single unified standardized framework working with cooperating organizations. Objective 3: Provide a focal point from which any authorized organization or individual can acquire technically relevant CCSDS registry and other information. Objective 4: Setup SANA operations group and develop rules and processes to operate and support the SANA and identify the resources needed for the continuing operation, deployment, outreach, and evolution. Objective 5: Transition this to a working organization under CESG responsibility.

30 PS 30 19 September 2005 SANA BoF Issues & Risk Management Technical risks: No significant technical risk is involved. Technical risks are low since this is essentially process based. The prototype activity does not entail any cutting edge technologies. Management risks: Some management risk is involved including the usual politics and consensus building necessary for success. Issues: Issues of privacy, ownership of data Issues of security and access to aggregated information International resources for the WG and operations team

31 PS 31 19 September 2005 SGIA BoF Executive Summary 11 representatives included NASA (JPL, MSFC), ESA and JAXA participation Attendees: Shames, Okino, Crichton, Weiss, Yamada, Kearney, Peccia, Gannet, Hughes, Reich, Hartmann Coordination Identified: - JPL and MSFC are actively supporting effort - ESA has indicated that they will provide some level of support (telecon, email coordination level) – support from existing SAWG members - CNES & JAXA are seeking support General agreement on: Charter of SGIA Some CHANGE in terms of generalization as to the service provider/user model, specifically do not constrain to SLE General agreement on: 5 step process Some CHANGE in terms of language to capture iteration and stakeholder feedback towards - the cross support service catalog - cross support service architecture Some CHANGE in terms of refinement of the content, including process as well as the level of detail of the cross support service catalog was identified.

32 PS 32 19 September 2005 SGIA BoF Discussion There was general concern as to what the SGIA architecture would entail: A specific suggestion was that it may be sufficient to provide gateway interfaces Possible options are to present interoperability at the gateway level or end-to-end service along with identified confederated nodes and profiles. Desire to ensure that existing organizational boundaries and implementation approaches are accommodated Leverage IOAG DRAFT catalog and architecture Schedule - general belief we could get an initial WB by June 06 meeting There was some concern about the scope and meaning of “profiles”.

33 PS 33 19 September 2005 SGIA BoF Action Items Update Charter and process to represent agreements, submit to CESG Agencies need to identify suitable Technical Point Of Contact (TPOC) within their operational organizations to be participants in the process - TPOC must be able to provide view of current and future services - TPOC will also act as IOAG “stakeholder” and early reviewer of the proposed products of the WG - Intent is to pursue from top-down and bottom-up approach Expressed need for contact with JAXA, CNES, and DLR (at a minimum) for participation in WG No representation at meeting from DLR & CNES

34 PS 34 19 September 2005 SGIA Risk Summary Not yet getting essential support - CCSDS WG Technical Personnel - IOAG TPOCs as Active Stakeholders

35 PS 35 19 September 2005 XSG SIG Executive Summary XSG SIG on 14 September 2005 in Atlanta, GA 23 representatives included NASA (JPL, GSFC, MSFC), ESA, CNES, OMG SDTF, and other participation Intention Establish guidelines and recommended practices for CCSDS XML schema, naming, and usage before this first set of schema, from several different working groups, become finalized and externally visible Define common rules, naming and style guides, define URL hierarchy and namespace architecture, define versioning and use schema location as a resolvable URL Motivation: Get CCSDS namespace and rules sorted out before current standards are finalized Four separate XML schemas are in development, there is no consistency of naming, usage, namespace, etc across them Enable interoperable implementations of SW and systems Create collaborative solutions and an authoritative source for CCSDS and agency use

36 PS 36 19 September 2005 XSG SIG Recommendations Create a small working group of current XML schema authors and experts to develop short term approach XML Stds & Guidelines SIG Erik Barkley David Berry Lou Reich (chair) Gerry Simon CNES ? (Lapaian acting) ESA ? (Peccia acting) Define a URL hierarchy and namespace architecture Create a naming and style guide, including guidelines for development of schema and namespace Define versioning approach Create a resolvable URL for schemaLocation, ( create a CCSDS server for these, future) Define levels of XML schema reusable components (potentially based on the UBL model) Define approach for consistent use of qualified and unqualified types, elements and attributes Get a CCSDS NID by submitting an RFC to IETF, establish base for URN, list of 23 exist now (RFC 3406, May 2005), see also IANA registry of URI (RFC 3986)

37 PS 37 19 September 2005 XSG SIG Issues Issue of impact of this stds effort on immediate WG products and schedules? Approach for current standards, hold until modified or release as Red-1 now with agreement to change before Red-2 is sent out? How long will it take to develop these top level standards elements? (by Xmas is target) How long will it take to modify existing XML schema to be compliant? How to arrange agreements on common schema between CCSDS & OMG?

38 PS 38 19 September 2005 XSG SIG Action Items Create CWE area and mailing list ActioneeShames Due date1 October 2005 (done 14 Sept 05) Have initial XSG SIG discussion, review schemas ActioneeReich Due date16 Sept 05 Plan for XSG SIG working approach ActioneeReich Due date23 Sept 05 Initial XSG SIG feedback to CESG ActioneeReich Due date4 Nov 05 Initial XSG SIG Recommendation to CESG ActioneeXSG SIG, Reich Due date16 Dec 05

39 PS 39 19 September 2005 SEA Liaisons SysML Partners have developed a system engineering modeling language based upon UML 2.0. A liaison has been agreed to, which opens up a communication channel between the SEA and SysML groups. The intent is to provide the SysML solution to CCSDS for their validation for application to Space Systems. SysML agreed to form a liaison w/ CCSDS. SEA, on behalf of CCSDS, has agreed to that liaison and several joint meetings have been held. The SysML spec is currently at version 0.9. Four UML tool vendors have demonstrated SysML 0.9 compliant versions of their tools. A summary presentation is available from the SysML web site. An informal liaison has been developed with ISO/IEC JTC 1 / SC7 which is developing an UML for RM-ODP approach. This opens up a useful communication channel between the two groups. The intent is to validate the RASDS to the RM-ODP and to provide feedback to the SC7 WG it its applicability to Space Systems. The JTC 1 / SC 7 chair has agreed to establish an informal liaison w/ CCSDS. SEA, on behalf of CCSDS, has agreed to that liaison and a joint meeting and telecons have been held.

40 PS 40 19 September 2005 SEA Cross Area Coordination CSS: SGIA role TBD Transport security Use of SecWG authentication & access control MOIMS: Coordination between Information Packaging and Registries & Information Architecture, discussions on-going SGIA role TBD Discussions of development of DM / DA BoF effort needed Use of RASDS in SM&C doc Use of SecWG authentication and security framework SIS: Relationships among AMS, MTS, and MOIMS S/C Mon & Con protocol (SM&C) SGIA role TBD Uplink & downlink network layer security SLS: SGIA role TBD Uplink & downlink link & physical layer security SOIS: SGIA role TBD Uplink, downlink & on-board security

41 PS 41 19 September 2005 Cross Area WG / BOF Issues IAWG needs on-going coordination with MOIMS Information Packaging and Registries (IPR). Much more partnering is occurring with a focus on how to define an information infrastructure (interfaces, specifications, architecture, components and best practices) Recommend that BoF be created for cross-cutting information infrastructure specification (registries, repositories) that gets participation from agency specialists as well as stakeholders IA becoming more important to other groups SLE (data dictionaries, XML schemas, …) XML Standards and Guidelines SANA

42 PS 42 19 September 2005 Cross Area WG / BOF Issues Security is a cross-cutting discipline that needs to be included in many other Areas and WGs. CESG is alerted that other Areas and WG should request support from the Security WG (in addition to the SecWG being proactive). We believe that the mandatory security section in documents will force the other Areas and WG to seek out help. Propose a SecWG overview briefing at the Spring ‘06 meeting opening plenary to cover everyone at one time Security 101 and SecWG initiatives within CCSDS

43 PS 43 19 September 2005 SEA Resolutions to be Sent to CESG and Then to CMC RESOLUTION 1 : SEA-SecWG-R-0509-001 Considering that: 1.The SecWG sent a resolution up requesting that every CCSDS document contain a standard security section. The return flow indicated this was passed. 2.More than a year later we learn that the language was changed (only blue books, resource problems allow provide a waiver, etc). And recognizing that: 1.CCSDS must ensure that security is adequately addressed in our standards, 2.The current wording in the CMC resolution is too weak, The AREA resolves that: The Standard security section should require that include ALL CCSDS documents, not just Blue Books, include the mandatory security section, and … The security section be mandatory and not waived based on resources. ACTION ITEM 1: SEA-SecWG-A-0509-001 Request that the CMC update policy on security section to make it mandatory on all CCSDS documents and to remove simple “resources waiver”. At minimum this should apply to Blue, Orange, and Magenta Books.

44 PS 44 19 September 2005 Outcomes of Earlier SEA Resolutions Sent to CESG ACTION ITEM 1: SEA-SecWG-A-0504-001 Request that the CMC review SecWG scope and requirements for cross support and interoperability with agency security policy experts. ACTION ITEM 1: SEA-SecWG-A-0504-002 Request that the CMC provide adequate resources to the SEA / SecWG to accomplish development of encryption and authentication/integrity standards which are fully adapted to the space community and have been profiled, implemented, and tested before becoming CCSDS recommended standards no later than the end of April 2005. ACTION ITEM 3: SEA-A-0504-001 Request that the CESG develop a clear and unambiguous process for submitting and resolving RIDs no later than the end of May 2005. ACTION ITEM 1: SEA-A-0504-002 Request that the areas that have developed or are developing reference architectures or service interfaces to provide them to the SAWG and work with the SAWG to ensure that they and their cross area interactions are correctly understood and properly documented.

45 PS 45 19 September 2005 SEA Other Issues & Concerns CESG Agreement on definition of “Recommended Practice” XML Standards & Guidelines SIG resources SANA coordination with other WGs & agencies SGIA participation from WGs & IOAG agency TPOC representatives Delta-DOR end to end process and flow DM/DA BoF and where to do the work

46 PS 46 19 September 2005 BACKUP SLIDES

47 PS 47 19 September 2005 SAWG Open Issues 1. The standard “UML for ODP,” which is being developed by a ISO/IEC WG, should be used as a basis for developing the formal model of RASDS. However, both RM-ODP and RASDS are instances of domain specific reference models and there should be a mechanism to develop domain specific reference models in a coherent way. 1. There is no standard that defines what Views and Viewpoints are. 2. We should develop comments that reflect our concerns and deliver them to both SysML and the UML for RM-ODP groups.

48 PS 48 19 September 2005 SAWG Action Items 1. Revise the RASDS document based on the discussion at the meeting ActioneeShames Due date30 October 2005 2. Review the RASDS document distributed by Shames ActioneeAll Due date15 November 2005 3. Edit a Green Book (informational) that explains the concept of RASDS ActioneeYamada Due date30 November 2005 4. Develop a charter of a BoF to develop a formal model of RASDS (or something more generic) ActioneeYamada Due date30 October 2005

49 PS 49 19 September 2005 SAWG Resource Problems We don’t need any more resources for this WG because it is going to be terminated.

50 PS 50 19 September 2005 SecWG New Working Items, New BOFs, etc. There is a plan to create a BoF at the CCSDS Spring 2006 meeting that defines the charter of a WG that develops a formal model of space data systems. At least two Agencies (NASA and JAXA) is willing to provide necessary resources to support this BoF/WG.

51 PS 51 19 September 2005 JAXA Example of RASDS Use: General Concept of the Database Spacecraft Information Base (SIB) Virtual Spacecraft Definition of Functional Object A Definition of Information Object X SIB Access Tool Standard Spacecraft Model (Supplied as a UML model library) Subsystem/Instrument Designers Simulator Operations System Testing System SIB Generation Tool The future versions of the database will contain Nodes, Enterprise Objects, etc.

52 PS 52 19 September 2005 JAXA Example of RASDS Use: How the Database is Used Generic Data Conversion Generic Controller Application Communications Protocols Information Object Definition Testing/ Operations Procedure Functional Object Definition Generic Monitor and Control System SIB This system can be used for testing at test facilities, flight operations at control centers and autonomous operations onboard spacecraft.

53 PS 53 19 September 2005 JAXA Example of RASDS Use: Example of a Functional Object

54 PS 54 19 September 2005 SecWG Progress Achieved Attended and participated in the High Rate Uplink BOF, CisLunar WG, and a splinter group of the SLS participants concerning how the Internet protocols work and can be used. Reviewed the latest incarnation of the Security Architecture document and its relationship with the final version of the RASDS. Area of contention within the Security Architecture revolves around key management issues: architecture is heavily slanted towards public key technologies that may not be universally applicable. Also issues revolving around how to do emergency commanding. More review to occur. Reviewed the security algorithm trade studies Encryption: must use AES-128 w/128-bit key at min; additional algorithms may be used at mission/agency/govt discretion. Authentication/Integrity: dual standards that must be used - Digital Signature Algorithm (DSA) for public key-based authentication - Hash-based Message Authentication Code (HMAC) using SHA-1 for shared secret-based authentication - Other hashing algorithms (e.g., MD5, SHA256, SHA384, UMAC) may be used Discussed the beginning of the Security Policy Framework Guide – attempt a CCSDS re-write of the NIST Guide (800-47) and a starting point and re-affirmed the adaptation of the NIST document for CCSDS use. Again discussed the potential use of the Common Criteria for development of mission Protection Profiles. CNES makes heavy use of the CC but does not produce full-blown PPs. The WG did not want to develop PPs (too much boilerplate, too large, too hard to read, etc) but did agree it makes sense to use the CC as a basis for developing mission security requirements and this will be introduced in the mission planners guide that remains to be written. CNES described their level of security involvement in mission development. CNES has an independent security organization that works hand-in-hand with mission planners to develop the mission security requirements, the threat study, the trade studies, and the security life- cycle. They also discussed the risk analysis tool (available as open source), EBIOS, that they use to develop the mission security requirements. This needs to be examined for potential use by others and maybe to be introduced as a CCSDS recommended practice.

55 PS 55 19 September 2005 SecWG Open Issues Key management white book Support for proximate and long haul domains Public vs. symmetric keying Number of round-trips required for public key negotiations Caching of public keys if not on-line negotiation

56 PS 56 19 September 2005 SecWG Action Items Item NumberAction Item:Assigned to:Date Due: SecWG0905:1Add three types of security (file encryption, TLS, and network layer) to the security architecture document. Gavin Kenny12/05 SecWG0905:2Ensure that integrity-only mechanisms in the security architecture are in concert with the authentication algorithm blue book Gavin Kenny12/05 SecWG0905:3Add examples of how the security architecture can be used. Gavin Kenny12/05 SecWG0905:4Ensure that the latest Security Architecture document has been distributed to the working group and posted to CWE Howie WeissASAP

57 PS 57 19 September 2005 SecWG Action Items (2) SecWG0905:5Investigate “standard” AES modes (e.g., CBC, ECB) for inclusion in the encryption algorithm blue book. Howie Weiss11/05 SecWG0905:6Reconcile AES with the security architecture’s allowance of a NULL encryption algorithm Gavin Kenny12/05 SecWG0905:6Write a blue book to adopt FIPS 197 as a CCSDS encryption algorithm recommendation. Howie Weiss12/05 SecWG0905:8Formulate a resolution to have the CMC clarify the mandatory security section wording. Howie WeissASAP SecWG0905:9Write an authentication algorithm blue book Howie Weiss02/06

58 PS 58 19 September 2005 SecWG Action Items (3) SecWG0905:10Submit the encryption algorithm and authentication algorithm trade studies as Green Books (accompaniment to the yet to be developed blue books). Howie Weiss02/06 SecWG0905:11Memo to Peter Shames regarding SecWG discussions on SANA visible information (e.g., SCIDs) and identify management. Howie Weiss09/05

59 PS 59 19 September 2005 SecWG Resource Problems Resources are adequate to perform the current tasks. Resources are increasing: ESA/ESOC has provided a new SecWG participant and has promised an additional person by the Spring meeting.

60 PS 60 19 September 2005 SecWG New Working Items, New BOFs, etc. Encryption algorithm blue book. Authentication algorithm blue book. Security Architecture red book. Key Management red book. Security Policy Framework based on NIST 800- 47. Mission Planning Guide.

61 PS 61 19 September 2005 SecWG Risk Management Update Must ensure that the current trend of additional resources remains and that resources don’t shrink.

62 PS 62 19 September 2005 IAWG Action Items Send meeting notes, presentations and comments to IAWG To: Info Arch WG Members Due: Due September 30, 2005 Add participants to mailing list and send RASIM document to SEA Exec To: SEA Exec Due: Due September 2005 Send an updated version of the RASIM Green Book by Oct 10, 2005 To: IAWG Members Due: Due October 2005 Send to the RASIM Green Book to the CESG for approval To: CESG Due: November 2005


Download ppt "PS 1 19 September 2005 SEA Area Report Atlanta, Georgia, USA, 19 September 2005."

Similar presentations


Ads by Google