Workshop Outputs and Goals Hannes Tschofenig Internet Privacy Workshop, December 2010.

Slides:



Advertisements
Similar presentations
Shared vision development for the Kiraly street Business case.
Advertisements

© 2006 Open Grid Forum 2 nd March 09 Enterprise Grid Requirements Research Group OGF25 EGR-RG Session Group.
© 2006 Open Grid Forum OGSA Next Steps Discussion Providing Value Beyond the Specifications.
Business Plan and Outstanding Issues for Illinois Justice Network Portal IIJIS Technical Committee Meeting January 16, 2004.
’s TechStat Framework Agency Seal. Agenda 1.TechStat Overview 2.TechStat Process 3.Managing Outcomes 2.
Draft February 2010 OpenHAN TFSlide 1 Submission Title: OpenSG San Francisco Opening Report Date Submitted: February xx, 2010 Source: OpenHAN Task.
Title of Training Presentation Presented by Your Name.
Interconnecting Smart Objects with the Internet Workshop Hannes Tschofenig.
03 December 2003 Digital Certificate Operation in a Complex Environment Consultation/Stakeholders Meeting 3 December 2003.
IP Telephony Workshop 2001 April 2-3, 2001 Columbia University.
Let's Review Step 1: Identify the Top Ten Excuses for Failing to Attain Goals Step 2: Prioritize the Team’s Top 3 Step 3: Identify 2 strategies to rid.
Planetary Science Archive PSA User Group Meeting #1 PSA UG #1  July 2 - 3, 2013  ESAC Welcome and Logistics.
Logistics. wireless network Eduroam network is available Alternatively, use FSv-AP network with simple authentication (no encryption). Connect to this.
ACE BOF, IETF-89 London Authentication and Authorization for Constrained Environments (ACE) BOF Wed 09:00-11:30, Balmoral BOF Chairs: Kepeng Li, Hannes.
Welcome To the Objectives Pillar Workshop Introduction Business need Target Audience - technical and professional staff who support decision maker.
Smart Object Security Workshop 23 rd March 2012, Paris.
Problem Identification
Norman Wiseman JISC Head of Programmes Presentation to JISC Authentication Concertation Day March 1999 International Authentication Activities Joint Information.
Data Access Framework All Hands Community Meeting 1 September 23, 2015.
Managing an Enterprise GIS Project: Key Things You Need Right from the Start Gerry Clancy Glenn Berger.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
© 2007 Open Grid Forum Data Grid Management Systems: Standard API - community development Arun Jagatheesan, San Diego Supercomputer Center & iRODS.org.
Identity Management Hannes Tschofenig. Motivation OAuth was created to allow secure and privacy friendly sharing of data. OAuth is not an authentication.
© 2006 Open Grid Forum Service Level Terms Andrew Grimshaw.
Hosted by: Institute for Software Integrated Systems (ISIS) Vanderbilt University Software Reliability for FCS May 18-19, 2004 ARO Workshop.
Cooperation & Competition in building the Web, « the universe of network-accessible information » Jean-François Abramatic Chief Product Officer ILOG.
CES Seminar on “Organization of data collection and sharing, and the management challenges for the implementation of SDMX” Session 1 Hank Hermans CES /
“Interconnecting Smart Objects with the Internet” Tutorial Hannes Tschofenig.
September 17, 2003CEMS©VSE, CEMS Annual Events 2003 Prague December 4-6, 2003 Programme University of Economics, Prague Community of European Management.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Athens, Greece May 15, 2005 Global Public Policy.
Training Workshop on Responsible Innovation in ICT Siena, November 20, 2015, 14:30 – 17:30 (Room 20) © RESPONSIBILITY Project is co-funded by the European.
1 privecsg Privacy EC SG Update to NGP SG Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
What are our conclusions? What is the take-home work? Hannes Tschofenig, Thomas Roessler.
© BLR ® —Business & Legal Resources 1501 Effective Meetings How to for Supervisors.
Query Health Technical Working Group F2F meeting 10/17/2011 Agenda.
11 Identity Management Spacecraft ID Security CCSDS Security WG Fall 2005 Atlanta, GA USA Howard Weiss NASA/JPL/SPARTA September.
1 © 1998, Cisco Systems, Inc.Cisco Country Page Web Editor Workshop EMEA 1998/Dec/11-12.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Hanoi, Vietnam November 26, 2005 Chairman ’ s.
Technical Plenary Terms for the collaboration with P2413 From: oneM2M TP Chair Source: Meeting Date: Agenda Item:
1 Home Care Support Outcome Based Specification Workshop 26 th November 2009.
© 2006 Open Grid Forum OGSA-WG: EGA Reference Model GGF18 Sept. 12, 4-5:30pm, #159A-B.
2 United States Department of Education, Privacy Technical Assistance Center 1 Western Suffolk BOCES Data Breach Exercise.
Query Health Operations Workgroup Standards & Interoperability (S&I) Framework October 13, :00am – 12:00pm ET.
Adoption Technical Committee DITA Listening Sessions: General Template Location Host Company Date.
Executive Session Director’s Conceptual Design Review of Mu2e Project May 3-5, 2011 Jim Yeck.
© 2007 Open Grid Forum OGF Management Area Meeting OGF20 7 May, am-12:30pm Manchester, UK.
Web Authorization Protocol WG Hannes Tschofenig, Derek Atkins.
DaSy Conference Data Breach Exercise August 2016 [Logo]
Understanding Standards: Nominee Training Event
BEST PRACTICE IN MANAGEMENT OF MEETINGS
Office 365 Security Assessment Workshop
The Integrated Food Security Phase Classification in Sudan –Next Steps
Public Libraries and Access to Justice: Introduction
QUALITY IMPROVEMENT FINAL QUARTERLY COLLABORATIVE WORKSHOP
WS Naming OGF 19 - Friday Center, NC.
Dan Tofan | Expert in NIS 21st Art. 13a WG| LISBON |
3-Day Information Workshop A Foundation Course in Human Values & Professional Ethics Presenting a universal approach to value education -through self.
Successful Project Management
Machine Learning Session
Welcome to Workshop on Network-I/O Convergence: Experience, Lessons, Implications NICELI SIGCOMM August 27, 2003.
Introduction to Working Groups
SIT Chair Introduction
Welcome and Logistics European Commission CEOS 2018 Chair team
Stakeholder Workshop 1: Situation Analysis
Employee engagement Delivery guide
Effective Meeting.
WS Standards – WS-* Specifications
CERN Brief Update – April 2019
Joint Application Development (JAD)
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
Presentation transcript:

Workshop Outputs and Goals Hannes Tschofenig Internet Privacy Workshop, December 2010

Workshop Outputs Position Papers Press Release Meeting Minutes Joint Meeting Report Potential standards actions by IETF & W3

Process for Producing Outputs IPR – IETF Note Well does not apply. Position Papers – Let us know if you do not want to get your position paper published. – Deadline: End of the workshop. Press release – We were approached by press about the workshop; they are not invited. – We will compile a brief very high level statement. Meeting Minutes – We will take meeting minutes. – We will distribute the meeting minutes after the workshop to all workshop participants for review. – Let us know if you do not want to get quoted or attributed. – Tell us now or review the meeting minutes. Joint Meeting Report – Higher level summary, to be developed based on the minutes. Potential standards actions by IETF & W3C – Developed independently by the leadership of both organizations, on their own timelines.

Goals of the Workshop 1.How do we design systems so that they respect privacy? – What does that even mean? – What’s policy makers’ role in this discussion? – What guidance can we give to specification authors and implementers? 2.How do design decisions for Web and Internet relate in shaping the privacy properties of the overall system? 3.Is there specific work the W3C / IETF should do in the area of privacy?

Development Lifecycle Privacy related actions vary across the lifecyle. Privacy by Design implies steps to be taken along the entire lifecycle. Deployment Research Standardization System Design and Implementation

Agenda Wednesday, December 8 9:00am - 9:30am - Opening Remarks and Logistics, Goal Setting 9:45am - 10:15am - Privacy at IETF/W3C 10:15am - 12:00am - Network-Level Privacy Issues 12:00am - 1:00pm - Lunch 1:00pm - 2:45pm - Browser-Level Privacy Issues 2:45pm - 3:00pm - Coffee Break 3:00pm - 4:00pm - Browser-Level Privacy Issues (cont.) 4:00pm - 4:30pm - Lessons learned from Security 4:30pm - 5:00pm - Wrap-up for the day; plan for tomorrow 5:00pm - 6:00pm - Refreshment Break 6:00pm - Dinner

Session Structure 1.This is how systems works now. 2.How should they work (desired state)? 3.Is there a a way to get to the desired state? To stimulate discussion we will have a presentation.

Questions we will run into When you say privacy what do you mean? What is the threat model? How do we get the incentives right? How much do we rely on support from the legal framework? What can we reasonably expect of users? What is our technical approach for dealing with privacy beyond data minimization?