W3C home > Mailing lists > Public > public-wot-wg@w3.org > April 2017

Re: [scripting] management interface

From: Kis, Zoltan <zoltan.kis@intel.com>
Date: Tue, 11 Apr 2017 13:39:42 +0300
Message-ID: <CANrNqUfdumhVZQ0W2d4xyaucUgg7gJK7QFLTt0pcg30UFUJyqg@mail.gmail.com>
To: Dave Raggett <dsr@w3.org>
Cc: "Hund, Johannes" <johannes.hund@siemens.com>, Public Web of Things WG <public-wot-wg@w3.org>
On Tue, Apr 11, 2017 at 12:37 PM, Dave Raggett <dsr@w3.org> wrote:

> We need to consider the security requirements in order to be able to
> better understand the design choices for the scripting API.
Definitely. The proposed API is already aligned with the draft security
document (in its second iteration) that is not yet shared with the WG, but
it's imminent (pending WG/IG member announcement of the author). As agreed
in the last Scripting TF call, I will update the Scripting rationale.md
document with current information on this.

> The right to install/run a thing on a hub suggests the need for a means to
> authenticate the request. There is also likely to be a requirement to limit
> which entities can access a thing, e.g. to preserve privacy for different
> family members of the same household.

First we need to clarify actors, threat model, then move on to
identification, authentication, access management, integrity (data and
comms), security policies etc.

Actors include end users, solution providers, hardware manufacturers. We
also need to be able to identify/authenticate a Thing and a WoT Runtime.

The threat model takes into account the use cases needed in WoT. So the
first thing to get right in the WG for covering security is a set of use
cases that involve the actors above.

> I have started a survey of end to end security and privacy across a range
> of IoT standards suites on behalf of the EU project Create-IoT.  What are
> the requirements that they seek to address?  How do these vary from one
> platform to another? Is it practical to have a security model that embraces
> different platforms?  If not, what are the barriers for convergence?
This would be tremendously useful. Again, we need to elicit
- use cases
- actors in use cases
- threats
- threat mitigation options
- and only then move on to weighing which protocols and technologies to
support in WoT.

Best regards,
Received on Tuesday, 11 April 2017 10:40:19 UTC

This archive was generated by hypermail 2.4.0 : Friday, 17 January 2020 19:27:46 UTC