Re: Minutes Auto WG 2016-04-19

Hi,

I'm wondering how we integrate a token-based access control into the 
current spec. Do you think we need a special DOM API to pass tokens to 
runtime?

Regards,
Junichi

On 2016/04/21 17:34, Gavigan, Kevin wrote:
> Hi Junichi,
>
> The Candidate Logical Architecture is meant to show an example of how
> the APIs could be exposed, rather than a detailed exposition of how to
> implement an IVI system using the APIs.
>
> Kind regards,
>
> Kevin
>
>
>
> /Kevin Gavigan BSc, MSc, PhD, MCP, MCTS/
> /Software Architect/
> /Connected Infotainment/
> /Electrical, Electronic and Software Engineering (EESE)//
> /
> Jaguar Land Rover
> /
> /
> /Mobile: 07990 084866
> /
> /Email:/ kgavigan@jaguarlandrover.com <mailto:kgavigan@jaguarlandrover.com>
>
> /Office address:/
> GO03/057 • Building 523, Gaydon • Maildrop: (G03)/
> /Jaguar Land Rover • Banbury Road • Gaydon • Warwick • CV35 0RR
>
> On 20 April 2016 at 08:50, Junichi Hashimoto <xju-hashimoto@kddi.com
> <mailto:xju-hashimoto@kddi.com>> wrote:
>
>     Hi Kevin,
>
>     Thank you for sharing your logical architecture.
>     If possible, could you also share a sequence diagram where a token
>     is requested, generated, sent and consumed so that we can understand
>     the security model more clearly.
>
>     Regards,
>     Junichi
>
>
>     On 2016/04/20 4:08, Ted Guild wrote:
>
>         Minutes for today's call are online
>
>         https://www.w3.org/2016/04/19-auto-minutes.html
>
>         Please send me any corrections
>
>
>
>


-- 
<>------------------------------------------------<>
          au x HAKUTO  MOON CHALLENGE
            http://au-hakuto.jp/
    KDDI/au competing in the Google Lunar XPRIZE
    Providing communication technology support for
    the Japanese team - HAKUTO
<>------------------------------------------------<>

Received on Friday, 22 April 2016 06:12:04 UTC