Dee,
The only thing I'd add would be:
Identity Management in Information Sharing Systems for Critical
Infrastructure Protection and Homeland Security. That would cover a
range of issues.
On te time question, from my experience, and depending on how many
papers are received, there would be a request to review and rank/comment
on submissions. That could take perhaps 3-4 hours depending on how
thorough the review. In addition, the chair sometimes asked if there
were champions for topics where the paper needed work, and that might
involve additional time with the author and committee.
John
__________________________________
John T. Sabo, CISSP
Director, Global Government Relations
CA, Inc.
Suite 1220
1401 I Street NW
Washington DC 20005
Tel: +1 202-513-6304
Mobile: +1 443-629-6198
Fax: +1 202-513-6395
------------------------------------
This e-mail message is for the sole use of the intended recipient(s) and
may contain confidential and/or privileged information. Any unauthorized
review, use, disclosure or distribution is prohibited. If you are not
the intended recipient, please contact the sender by reply e-mail and
destroy all copies of the original message.
Original Message-----
From: Dee Schur [mailto:dee.schur@oasis-open.org]
Sent: Thursday, July 19, 2007 4:54 PM
To: Sabo, John T; 'Terwilliger, Ann'; idtrust-sc@lists.oasis-open.org
Subject: RE: [idtrust-sc] Minutes July 05, 2007
I totally agree, you have called my cell and I've started to call back
each
time ;) The only commitment I have tomorrow is 11:00EDT - 1:00 EST, so
whatever works for you.
I don't think you need to feel pressure about this responsibility as we
can
ping you when necessary.
Two things:
How much time will our SC need to commit?
And
If you could comment on this email for the NIST CfP, I'd be so grateful:
"Identity is all about Trust - Identity and Trusted Infrastructures"
How do you measure the level of trust? How do we develop and coordinate
a
generic Identity Management Framework?
Who is solving which Identity and Trust problem? And how do the pieces
fit
together? Compete? Overlap? Or just cause confusion in the market place.
Identity Management Services need discovery and interoperability.
The Workshop will discuss Identity and Trust Policies and Enforcement,
including policies and policy issues; policy and attribute mapping and
standardization; assurance; technical validation mechanisms; and trust
path
building and certificate validation in open environments.
We are interested in real world use-cases and business case scenarios,
best
practices and adoption reports and papers.
Barriers and Emerging Issues associated with Identity and Trusted
Infrastructures, including data privacy issues; interoperability; cross
border/ organizational trust; outsourcing; cryptographic issues;
application
integration; and international issues.
Other topics to consider:
1) National Identity Infrastructures
2) Identity and Privacy;
3) User Centric Identity - Open-ID.
4) Rich Attributes.
5) What constitutes a Certifying authorities (identity providers - user,
application or network level); and legal implications.
6) What is 'Claims-based' identity authentication?
7) Issues related to Audit and Compliance.
8) Best practices modeling.
9) Identity Management of objects from RFID tags to cells phones.
Original Message-----
From: Sabo, John T [mailto:John.T.Sabo@ca.com]
Sent: Thursday, July 19, 2007 4:27 PM
To: Dee Schur; Terwilliger, Ann; idtrust-sc@lists.oasis-open.org
Subject: RE: [idtrust-sc] Minutes July 05, 2007
Dee,
Sorry - I've been swamped as usual, but thought I had responded to the
list of topics saying it looked very comprehensive and I had nothing to
add. I've left a couple of voicemails to discuss, since I've been
falling behind. Are you available tomorrow late afternoon or Friday
morning for a quick call?
I did serve on the committee last year, but given my schedule I may have
to beg off this year. I tend to volunteer for too many things
Sorry I've been silent, but I have many new projects now and simply not
enough time. Minutes look good.
John
__________________________________
John T. Sabo, CISSP
Director, Global Government Relations
CA, Inc.
Suite 1220
1401 I Street NW
Washington DC 20005
Tel: +1 202-513-6304
Mobile: +1 443-629-6198
Fax: +1 202-513-6395
------------------------------------
This e-mail message is for the sole use of the intended recipient(s) and
may contain confidential and/or privileged information. Any unauthorized
review, use, disclosure or distribution is prohibited. If you are not
the intended recipient, please contact the sender by reply e-mail and
destroy all copies of the original message.
Original Message-----
From: Dee Schur [mailto:dee.schur@oasis-open.org]
Sent: Thursday, July 19, 2007 4:19 PM
To: 'Terwilliger, Ann'; idtrust-sc@lists.oasis-open.org
Subject: RE: [idtrust-sc] Minutes July 05, 2007
John has to get off the call at this point? John, are you interested?
Remember, please look at my call for presentations and make comments
please??
Best,
d
Original Message-----
From: Terwilliger, Ann [mailto:aterwil@visa.com]
Sent: Thursday, July 19, 2007 4:13 PM
To: Dee Schur; idtrust-sc@lists.oasis-open.org
Subject: RE: [idtrust-sc] Minutes July 05, 2007
Dee,
I thought that John was also on the NIST 2008 program committee????
Original Message-----
From: Dee Schur [mailto:dee.schur@oasis-open.org]
Sent: Thursday, July 19, 2007 12:05 PM
To: idtrust-sc@lists.oasis-open.org
Subject: [idtrust-sc] Minutes July 05, 2007
Please review.
Best,
Dee