transcribed flip charts from June 2002 f2f

=====================================================
(review of architecture doc outline)

(1) where are the w/s in the doc?
(2) what is the scope of this group's work?
    where do we "draw the line"?
(3) lifecycle? conceptual model?
(4) how to deal with separation of concerns?
(5) utility of the conceptual model currently proposed?
(6) what is the arch metamodel?
    ("ilities" go here), characteristics, aspects

- careful about use of term "service"
- horizontal vs vertical (tilt your head)
|-------------------------|
| Aggregation             |
|-------------------------|
| web services            |
|-------------------------|
| infrastructure services |
|-------------------------|
| infrastructure          |
|-------------------------|
| fundamental bldg blocks |
|-------------------------|

    or

|------------------------------|
| everything else              |
|------------------------------|
| core infrastructure services |
|------------------------------|
| fundamental bldg blocks      |
|------------------------------|

- what is the universe?
- what is this thing?
- where does it fit?
- lifecycle type stuff
- is the web arch == web services arch?

Lessons
- end-to-end stuff addressed up front
    - security, versioning, reliability
- loose vs tight coupling
- assertions; isAs vs ilities
=====================================================
(Glossary review)
- self contained?
- organization?
    - topical?
    - alphabetical?
    - other?
    - functional?
- ilities
- completeness
=====================================================
(Brainstorm scoping of proposed security WG)
Dave - Security framework
    - trust model
    - technological solutions
        - authentication
        - integrity
        - confidentiality
Daniel - not world hunger
Jeff - pick relevant subset of requirements
    - end-to-end at least one path
Roger - influence or authority
Joe - priority six aspects
    1- auth/n, integrity, confidentiality
    2- auth/z
    3- NR
    4- Accessibility
    5- remainder
Heather - not broad scope
    - specific targetted solution
TomC - agrees with Heather
    feedback loop to arch framework
Martin - phase 1, 2, 3
Oisin - life after REC process
DaveO - flexibility of market okay with TimBL
Allen - another structure that is shaped by our architecture
    e.g. security @ message level
    as being an alternative to Joe's "onion"
Daniel - highest priority problems
Doug - WSSWG recognizes shaded boxes we define to specify,
    or do we fill in the blanks?
Joe: do we do threat model or is that a function of the WSSWG?
Jeff - do we pick a couple of use cases and scope by picking
one? end-to-end with specific technology
Martin - +1
Chris - what is an intermediary? is it in scope?
Joe - integrity, confidentiality
DaveO - XMLEncryption is new, maybe omit?
Daniel - low hanging fruit
Joe - message vs channel
DaveO - "process model" problem?
Joe - PM not a problem for channel aspect
=====================================================
(what the chair heard from discussion above)
- Focus on Joe's level 1
    auth/n, integrity, confidentiality
- phased approach
- end-to-end (steel thread)
- message level end-to-end
- pick relevant subset of requirements
- use case driven
=====================================================
(from Martin's breakout group (authentication))

[cust]---(1)--->[t.a.]
       <---------
       ---(2)--->
       <--------
       ---(3)--->
       <---(4)---

(1) ask for credentials
(2) search for flights
(3) book
(4) ask for details (ccc, address, dob) whatever been told by credit
     card company

[customer]---(1)--->[travel agent]
           <---(2)---

(1) option to ask for credentials (challenge/response)
     assume no authentication of customer
     assume TA is known
     assume no delegation
(2) request for credentials

1. preestablishment of identity
   a) two parties do not know eachother
   b) two parties do know eachother

scenarios
1. first time
2. second visit same tx
3. another visit, another tx

issues
diff between identity and trust
once authenticated, amsquerading can happen
role vs personal authentication
point-to-point vs end-to-end

=====================================================
(from DaveO's breakout group (confidentiality))

Issue   1) two parties talking
        known/unknown
    2) privacy

[A] --- CC ---> [B] --- CC ---> [C]
User 
    travel      hotel
         ^
         |
      send credit

      synch      asynch
   | -- HTTP/S -- |
   |              | -- SMTP -- |
   |

Received on Thursday, 20 June 2002 15:40:14 UTC