Deliverables and assignments Device Security v8 December 14 th, 2011.

Slides:



Advertisements
Similar presentations
Paulo Manso CDM EB September, 2011 Proceeder for Submission & Approval Standardized Baselines.
Advertisements

Installation & User Guide
Hitchcock ISD TELPAS Training. Rater Credentials Each teacher selected to rate an ELL must 1) have the student in class 2) be knowledgeable.
Doc.: 18-14/0055 Submission July, 2014 Michael Lynch, MJ Lynch & Associates LLCSlide 1 RR-TAG Closing Report Notice: This document has been prepared to.
Starting an OASIS TC Timeline. 2 Key milestones Day 0: Submit TC Charter to OASIS TC Administrator –Copies to participants and primary representatives.
Physical WG on the REVISION OF THE PRINCIPLES FOR THE ESTABLISHMENT AND APPLICATION OF MICROBIOLOGICAL CRITERIA FOR FOODS EFSA, Parma, May 29 to June 1,
Deliverables and Assignments TopicPrimary Owner/sSecondary Owner/sStart Date / StatusEst. Completion Cryptographic Hardware Shrinath Eswarahally (Infineon)
LP Seminar – Madrid – 20 October 2008 EUROPEAN REGIONAL DEVELOPMENT FUND REPORTING & MONITORING PROCEDURES Lead Partner Seminar Madrid, 20 October 2008.
Auditing, Assurance and Governance in Local Government
Digital Certificate Installation & User Guide For Class-2 Certificates.
Financial report and audited financial statements
Funding Models & Guidance Championing Young People’s Learning.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Recent NERC Standards Activities RSC – Jan. 5, 2011 NSRS Update Date Meeting Title (optional)
[ENTITY NAME] [FUNCTION CERTIFYING] Certification for [RELATED ENTITIES] [LOCATION] – [DATES OF ON-SITE VISIT] [ Presenter Name, Title] Closing Presentation.
(Project) SIGN OFF PROCESS June 21, 2010
Revision of UNDG standard legal agreements for pass-through UNDG-Donor meeting on Joint Funding New York, 18 November 2014]
December 3, 2010 SAIF Governance Framework A Brief Update on work to date.
MODULE B - PROCESS SUBMODULES B1.Organizational Structure B2.Standards Development: Roles and Responsibilities B3.Conformity Assessment: Roles and Responsibilities.
ASME C&S Training Module B5 MODULE B - PROCESS SUBMODULES B1. Organizational Structure B2. Standards Development: Roles and Responsibilities B3. Conformity.
C-TPAT Security Link Portal Online Application. Online C-TPAT Application - Part 1. Part 1 of the Online C-TPAT Application process: Complete the Company.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Project Charter – Softball NSW Team Cathy Kerr – General Manager Andrew Dodshon – President Andrew Hamilton – Consultant Steering Committee Frances Crampton.
The Tax Credit Process (Once credit has been awarded) Reservation and Carryover Gross Rent Floor Election Form Commitment 10% Certification Quarterly Progress.
IEEE MEDIA INDEPENDENT HANDOVER DCN: srho
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 KTN106 – KTN Account Team / Partner Presentation_ v1.1.ppt KTN Preparation for Account.
Market Meeting Support Susan Munson ERCOT Retail Market Liaison Commercial Operations Subcommittee (COPS) June 10, 2008.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Deliverables and Assignments TopicPrimary Owner/sSecondary Owner/sStart Date / StatusEst. Completion Cryptographic Hardware Shrinath Eswarahally (Infineon)
Eccles Housing Market Report Community Committee Meeting 25 th January 2005 Shahla Zandi Strategy and Planning (Partnerships and Planning)
1 Planning of the Stage 3 In-depth Review 2008 Joint TFEIP/EIONET air emissions meeting Tallinn, May 2008 Martin Adams Expert Panel on Review European.
1 Economic Directorate’s Quality Audit Program Steven S. Klement Office of Statistical Methods and Research for Economic Programs.
IDESG Security Committee Charter Update. Objectives The Security Committee is responsible for defining a Security Model for the Identity Ecosystem Framework.
John Carwardine 1 TDR Editorial WG Summary Global Design Effort John Carwardine.
Regional Policy Veronica Gaffey Evaluation Unit DG Regional Policy International Monitoring Conference Budapest 11 th November 2011 Budapest 26 th September2013.
Text #ICANN51 13 October 2014 Cross Community Working Groups.
Washington System Center © 2005 IBM Corporation August 25, 2005 RDS Training Secure Socket Layer (SSL) Overview z/Series Security (Mary Sweat, Greg Boyd)
IM NETWORK MEETING 20 TH JULY, 2010 Disclosure Logs.
1 RMS TAC Update April 3, Test Plan Flight Dates It is the practice of RMS to approved the dates for future testing flights. This enables new.
Pairing Based Cryptography Standards Terence Spies VP Engineering Voltage Security
Exit Capacity Substitution and Revision Transmission Workstream meeting, 3 rd December 2009.
UCAIug OpenSG Embeded Systems Security Task Force Update Rohit Khera.
BU610 Applied Business Research 2015 Section A (Waterloo Part-time MBA) Faculty Advisors: Shelly Jha Detlev Nitsch Jack Schnabel.
1 Serbian Association of Accountants and Auditors (SAAA) IFRS and ISA TRANSLATION.
1 Session # Relay TG Opening Remarks and Session Agenda IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE j-08/010.
BU610 Applied Business Research 2016 Section A (Waterloo Part-time MBA) Faculty Advisors: Mitali De Shelly Jha Kalyani Menon
Transfer Reviews September 2016 – March 2018 February 2016.
Doc.: IEEE /0467r1 Submission May 2005 Richard Paine, BoeingSlide 1 11k LB73 Security Resolutions Notice: This document has been prepared to assist.
MyFloridaMarketPlace CRB Meeting MFMP 2.0 Upgrade Status December 19, 2006.
Supplier information session Support for development of a rail industry cyber security strategy Presented by Maria Grazia Vigliotti 10 December 2015.
Financial Sector Assessment Program (FSAP) :The Role of the Regulator International Monetary Fund.
Online Training Course
DROPS Focus Groups Human Factors
Security Working Group
GIRO usage and GSICS Lunar Observation Dataset Policy S. Wagner
Admissions Tutorial for schools
CJK 10th NGN-WG (Follow up IPTV-GSI) Chae Sub, Lee
Overview of the FEPAC Accreditation Process
IEC Activities affecting HSSC Hannu Peiponen Chair of IEC TC80
Technology Audit Plan ----BCSY University
Important Dates for the HSP3U CPT
Feedback on the Draft Cycle 4 ESSP
Exit Capacity Substitution and Revision
Online Training Course
CUSC Amendment Panel Recommendation
A Global Consensus Process
Ottawa/Quebec Trip Information Meeting #2
(Project) SIGN OFF PROCESS MONTH DAY, YEAR
WG 03 IoT Identifier Task Force Status 11/2017
Presentation transcript:

Deliverables and assignments Device Security v8 December 14 th, 2011

TopicPrimary Owner/s Secondary Owner/s Start Date / StatusEst. Completion Cryptographic Hardware and Hardware Security SES RST CGO MVU Underway (first draft submitted) All comments included those from Mike A. taken into account. Latest version available on shared drive. Action: request for a specialist review for the hardware security part. Random Number Generation JBL WNU RKH TGO Contribution from James sent and put on the shared drive. Temporarily Wim Nuyts assigned instead of Thierry Gouraud for primary ownership. Subject to change in January. Device Identity and Device Authentication MVU WNU MAH SBA SES TTO CGO Contribution a draft to be expected in January rd week Ciphers (refer to NISTIR 7628 Crypto Section) RKH RST DTHUnderway Move to device security, already agreed on how to proceed January 31 st, 2012 Secure protocolsRKHJBLDraft completed and submitted for review by JBL Someone from NXP should join the Secondary owners for review Key ManagementCGO RST DSE SBA MVU CDU GSO This activity is put on hold waiting for finalization of the CSWG design principles working group on key management.

TopicPrimary Owner/s Secondary Owner/s Start Date / StatusEst. Completion Authorization/Role/Acc ess control/Coarse grain policy SBAOPEN Compliance and certification MAHMVUAsk Mike to prime the pump when the output from the CSWG TCC testing certification and compliance group is available Use casesSESMVU RKH use cases contributed by SES in draft circulated: request for reviews and more use cases SES will contribute additional uses cases Scope: embedded security use cases Device MgmtBAKMVU SDO SBA Put on hold as well because we expected that someone from IBM would contribute but they indicated that dont have the bandwitdh to participate actively Dec 14: Someone from IBM (colleague of SBA) may join. Device Robustness & Resilience DTHCGOBora recommended the incorporation of that category: put it on hold for the time being,