Draft principles and framework for CAP identifiers Tony Rutkowski Cybersecurity Rapporteur (ITU-T Q.4/17) V1.0, 21 Jun 2009 WORLD METEOROLOGICAL ORGANIZATION.

Slides:



Advertisements
Similar presentations
CSO/NGO Consultations Report to IATI Signatories, Partner Countries and Steering Committee Paris, 4 July 2011.
Advertisements

Network Virtualization and Service Awareness Properties of FNs
Dynamic Sessions OASIS Security Services Face to Face #3 June 25, 2001.
A Unified Approach to Combat Counterfeiting: Use of the Digital Object Architecture and ITU-T Recommendation X.1255 Robert E. Kahn President & CEO CNRI,
Web Service Ahmed Gamal Ahmed Nile University Bioinformatics Group
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
1 NODC, Russia GISC & DCPC developers meeting Langen, 29 – 31 March E2EDM technology implementation for WIS GISC development S. Sukhonosov, S. Belov.
Geneva, Switzerland, 4 December 2014 ITU-T Study Group 17 activities in the context of digital financial services and inclusion: Security and Identity.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
Geneva, Switzerland, September 2014 Introduction of ISO/IEC Identity Proofing Patrick Curry Director, British Business Federation Authority.
Lecture 7 Access Control
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
CORDRA Philip V.W. Dodds March The “Problem Space” The SCORM framework specifies how to develop and deploy content objects that can be shared and.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
DataCite: Making Data Citable Jan Brase (DataCite/TIB Hannover) Brigitte Hausstein (GESIS) Wolfgang Zenk-Möltgen (GESIS)
1 9 th CJK NID WG, Beijing, China Status report on USN related activities in ITU-T Q.25/16 Document number Beijing, China July 2009 Hyoung Jun KIM,
Session 6 Windows Platform Dina Alkhoudari. Learning Objectives What is Active Directory Logical components of active directory Physical components of.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
 Cloud computing  Workflow  Workflow lifecycle  Workflow design  Workflow tools : xcp, eucalyptus, open nebula.
Jeju, 13 – 16 May 2013Standards for Shared ICT CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart, Fellow.
EREG: an Intelligent Network capability set for User and Infrastructure ENUM Tony Rutkowski VeriSign Switzerland Andrew Newton.
SAML Right Here, Right Now Hal Lockhart September 25, 2012.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
Proposal for OID-based M2M Node ID Group Name: WG2 Architecture at TP#8 (Miyazaki, December 2013) Source: Yong-Suk Park, KETI, Meeting.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
HTTP Extension Framework Name: Qin Zhao Id:
(Business) Process Centric Exchanges
Web Services Standards. Introduction A web service is a type of component that is available on the web and can be incorporated in applications or used.
Geneva, Switzerland, April 2012 Introduction to session 7 - “Advancing e-health standards: Roles and responsibilities of stakeholders” ​ Marco Carugi.
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
Access Control for Federation of Emulab-based Network Testbeds Ted Faber, John Wroclawski 28 July 2008
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
IETF63 - enum WG1 ENUM validation architecture & friends Alex Mayrhofer enum.at / 3.4.e164.arpa Bernie Höneisen SWITCH.
S&I Integration with NIEM (DRAFT) Standards Development Support June 8, 2011.
Presented by Eliot Christian at the EMERGENCY ALERTING POLICY WORKSHOP Montreal, Canada, 1-3 May 2012 OASIS, ITU, WMO, Environment Canada, Public Safety.
GRID Overview Internet2 Member Meeting Spring 2003 Sandra Redman Information Technology and Systems Center and Information Technology Research Center National.
Scalable Grid system– VDHA_Grid: an e-Science Grid with virtual and dynamic hierarchical architecture Huang Lican College of Computer.
Module 3 Creating Groups and Organizational Units.
Geneva, Switzerland, September 2014 ITU-T SG 17 Identity management (IdM) Progress Report Abbie Barbir Ph.D., ITU-T Study Group 17 Q10/17 (Identity.
Introduction to Active Directory
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Omar Baddour Chief World Climate Data and Monitoring WMO, Geneva WMO Climate Watch System Common Alerting Protocol (CAP) Implementation.
Status & Challenges Interoperability and global integration of communication infrastructure & service platform Fixed-mobile convergence to achieve a future.
March 20, 2007BLISS BOF IETF-681 Requirements and Implementation Options for the Multiple Line Appearance Feature using the Session Initiation Protocol.
Fostering worldwide interoperabilityGeneva, July 2009 ITU-T Telecom Security Update Arkadiy Kremer ITU-T SG 17 Chairman Global Standards Collaboration.
COMMON ALERTING PROTOCOL IMPLEMENTERS WORKSHOP 2008 Dr Carol Cosgrove-Sacks OASIS Advancing open standards for the Information Society
Slide 1 2/22/2016 Policy-Based Management With SNMP SNMPCONF Working Group - Interim Meeting May 2000 Jon Saperia.
OASIS ebXML Registry Standard Open Forum 2003 on Metadata Registries 10:30 – 11:15 January 20, 2003 Kathryn Breininger The Boeing Company Chair, OASIS.
April 4, 2002Atlas Testbed Workshop ATLAS Hierarchical MDS Server Patrick McGuigan.
The “application” Profile Type (draft-channabasappa-sipping-app-profile-type-01) Sumanth Channabasappa Josh Littlefield Salvatore Loreto 70th IETF, Vancouver,
New gTLD Applicant Support Draft Recommendations Summary.
CGMS-42 EUM-WP-32.ppt, v1A, 19 May 2014 Coordination Group for Meteorological Satellites - CGMS Presented to CGMS-42 Working Group IV, agenda item WGIV/9.1.
{ Domain Name System DNS & IP Address Protocols within the Internet Ecosystem. - Amanda Sparling, EMAC 6300.
Designing a Federated Testbed as a Distributed System Robert Ricci, Jonathon Duerig, Gary Wong, Leigh Stoller, Srikanth Chikkulapelly, Woojin Seok 1.
Domain Name System: DNS To identify an entity, TCP/IP protocols use the IP address, which uniquely identifies the Connection of a host to the Internet.
Towards a High Performance Extensible Grid Architecture Klaus Krauter Muthucumaru Maheswaran {krauter,
Resource subscription using DDS in oneM2M
Issues need harmonization
Module 8: Networking Services
Course Content Oracle E-Business Fundamentals
Chapter 3: Data Management Systems
Health Ingenuity Exchange - HingX
Digital Certificates and X.509
Session 5: open discussion
Issues Mechanisms to discover and validate CAP feeds
WebDAV Design Overview
Windows Active Directory Environment
Cg-18 Special Sessions Topic 4; Infrastructure -
Intellectual Property Rights in a Global Economy
Presentation transcript:

Draft principles and framework for CAP identifiers Tony Rutkowski Cybersecurity Rapporteur (ITU-T Q.4/17) V1.0, 21 Jun 2009 WORLD METEOROLOGICAL ORGANIZATION WMO INFORMATION SYSTEM (WIS) WIS Common Alerting Protocol (CAP, X.1303) Implementation Workshop Geneva, Switzerland, June 2009

2 Why cooperate globally  CAP can be used by anyone for anything, anywhere, at any time –No way to control CAP use However…  Common interests may exist among user communities regarding “CAP identifiers” concerning –Creation –Administration –Discovery –Verification –Use

3 CAP Identifier Value Propositions  Enhance the value of the CAP messages –Enable widespread sharing of the related event information –Enable analysis of events over long periods of time  Enhance the security of CAP messages –Enable information associated with the message to be obtained for verification  Enhance the flexibility of CAP messages –Enable new or additional information associated with the message to be obtained, e.g., message status

4 What are CAP identifiers  message schema or module identifier  individual message identifier  associated event identifier  identifiers for the entities (persons, organizations, or objects, physical or virtual) associated with the handling chain of the message –Creator (source) –Sender –Conveyor –Recipient  identifiers for policies associated with the message  message language identifier

5 Identifier Principles - Mandatory  CAP identifiers MUST be globally unique in a common namespace  The CAP identifier common namespace MUST accommodate distributed, autonomous, dynamic, extensible CAP uses and communities.  CAP identifiers MUST be structured to enable autonomous, distributed global discovery through hierarchical recursive queries in the hierarchy.  CAP identifiers MUST not exceed a length of [TBD] or a hierarchical depth exceeding [TBD] levels

6 Identifier Principles - Optional  CAP identifiers SHOULD have minimal internationaliz- ation impediments, e.g., consist of numbers  CAP identifiers SHOULD be structured so that usage, geographical, jurisdictional, and global hierarchical assignments can exist concurrently in the overall namespace (see next slide)  Registrars that assign CAP identifiers SHOULD obtain, with levels of assurance sufficient for the application, information concerning the registrants or objects to which the identifiers are assigned  Registrars that assign CAP identifiers SHOULD, as appropriate for the application or usage, support common structured query-response availability of the registrant or object information or a pointer to the information location for other users within the same community

7 Namespace Hierarchy Alternatives Countries Applications 3 3 Geography-Jurisdiction CentricUse Centric CAP ExclusiveHybrid Users Countries Applications Users An exclusive CAP Arc (Domain) for all CAP implementations Some combination