- From: Frederick Hirsch via cvs-syncmail <cvsmail@w3.org>
- Date: Mon, 21 Jun 2010 14:24:07 +0000
- To: public-dap-commits@w3.org
Update of /sources/public/2009/dap/policy
In directory hutz:/tmp/cvs-serv21964
Modified Files:
Framework.html
Log Message:
add material to trust domain section based on Nokia contribution
Index: Framework.html
===================================================================
RCS file: /sources/public/2009/dap/policy/Framework.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -d -r1.12 -r1.13
--- Framework.html 18 Jun 2010 23:36:58 -0000 1.12
+++ Framework.html 21 Jun 2010 14:24:05 -0000 1.13
@@ -33,17 +33,24 @@
as post-sales installation of web runtimes.
</p> <p>
As a general high-level objective, it should be noted that the security
- framework is intended to protect the device and its user from web applications
- that pose a security risk from unintentional but undetected implementation flaws
+ framework is intended to protect the device and its user from
+ web applications
+ that pose a security risk from unintentional but undetected
+ implementation flaws
as well as those that are malicious.
</p> <p>
- The intention is that the framework, at the most general level, allows a very
+ The intention is that the framework, at the most general level,
+ allows a very
wide range of policies to be represented (although manageability and
- interoperability concerns require there to be a certain level of similarity and
+ interoperability concerns require there to be a certain level of
+ similarity and
compatibility in policy structure). However, the framework must permit
- fine-grained security policies to be represented as well as policies based on
- broad groupings of APIs and assignment of web applications to a small number of
- trust domains. For example, a fine-grained access policy is necessary to grant
+ fine-grained security policies to be represented as well as
+ policies based on
+ broad groupings of APIs and assignment of web applications to a
+ small number of
+ trust domains. For example, a fine-grained access policy is
+ necessary to grant
or deny access to individual APIs for individual web applications.
</p> <p>
This framework is based on a very general model that governs
@@ -54,10 +61,17 @@
and <a href=#policy-set>policy sets</a>, where each policy
consists of a number of <a href=#rule>rules</a>.
A subject corresponds to an entity that may attempt security-relevant actions and represents a single identity. This identity can describe either a widget resource or a website.
- Resources are associated with the API <a href=#feature>features</a> and <a href=#device-capability>device capabilities</a> used to access device features or services (e.g. the location module or PIM database) that are being protected.
+ Resources are associated with the
+ API <a href=#feature>features</a>
+ and <a href=#device-capability>device capabilities</a> used to
+ access device features or services (e.g. the location module or
+ PIM database) that are being protected.
Subjects and resources are characterised by a
- number of defined <a href=#subject-attribute>subject attributes</a> and <a href=#resource-attribute>resource attributes</a>, respectively. A range of
- attributes is defined so that access policies can be expressed based
+ number of defined <a href=#subject-attribute>subject
+ attributes</a> and <a href=#resource-attribute>resource
+ attributes</a>, respectively. A range of
+ attributes is defined so that access policies can be expressed
+ based
on a widget resource signer's identity, or an individual widget resource
identity, or the widget resource signature’s root certificate, or a website's
URL.
@@ -75,6 +89,30 @@
<section id="trust-domains">
<h2>Trust Domains</h2>
<p>
+ Content properties such as content origin and
+signatures can be used to map to trust domains.
+Trust policies may be used to specify these mappings. For example, a
+ policy
+can specify the set of origin URLs corresponding to a trust domain, or
+ map a certificate associated with a widget signature to a trust
+ domain.
+Trust domains may be assigned when content is installed or at run time.
+In the first case, the installer determines a
+trust domain from the trust engine and saves this securely to the
+installed content registry. When content is run, the runtime can retrieve
+the saved trust domain from the registry. In the second case, the runtime
+gets the trust domain directly from the trust engine when the content
+is run. In both cases, the runtime must maintain a reference to the trust
+domain associated with the content in such a way that the trust domain
+can be specified when requesting an access control decision.
+</p>
+<p>
+Trust domains can be based on origin, signatures or be "Untrusted", to
+list three common cases.</p>
+<p>
+Access control is a two step process. First the trust domain is
+determined, and then based on that trust domain the appropriate access
+control policy is used to make a policy decision.
</p>
</section>
<section id="features">
Received on Monday, 21 June 2010 14:24:10 UTC