- From: Mark Needleman - DRA <mneedlem@dra.com>
- Date: Thu, 21 Sep 2000 12:31:12 -0500 (CDT)
- To: Z3950 Mailing List <www-zig@w3.org>, NISO Circulation Protocol Committee <NISOCIPC@OCLC.ORG>
FYI in case you are interested both in XML and encryption mark ---------- Forwarded message ---------- Date: Thu, 21 Sep 2000 08:52:19 -0400 From: Janet Daly <janet@w3.org> To: w3c-ac-members@tux.w3.org Cc: reagle@w3.org Subject: DRAFT Call for Participation: XML Encryption Workshop Resent-Date: Thu, 21 Sep 2000 08:49:14 -0400 (EDT) Resent-From: w3c-ac-members@w3.org Dear Advisory Committee Member, W3C is pleased to announce the "XML Encryption" Workshop to be held in Lafayette, California, on 2 November 2000. The Call for Participation is available online at http://www.w3.org/2000/09/XML-Encryption-Workshop.html and is attached for your review. If you have any questions, please contact Joseph Reagle <reagle@w3.org>. We look forward to your participation. Best regards, Janet Daly ---- W3C XML-Encryption Workshop Thursday, November 2, 2000 Lafayette/San Francisco, CA Host : XCert Chair: Joseph Reagle <reagle@w3.org> Registration and rules for participation Participants do not have to be W3C members. However, everyone must REGISTER by October 23. Participants are expect to be familiar with the reading below. Registration is on a first-come-first-served basis and registration will be limited to 35 participants. So make sure you use the REGISTRATION FORM to ensure that you can attend. Workshop Goals and Scope If XML is to become the language of trusted Web applications (e.g., electronic commerce) it needs standard mechanisms for digitally signing and encrypting XML entities (and it needs them soon!). Furthermore, this mechanism must be fully functional in environments where only XML tools are available. While the joint IETF-W3C Working Group is completing a XML Digital Signatures specification, its charter expressly precludes work on encryption. Consequently, this Workshop will focus on (1) the requirements for XML encryption, (2) the proposals being discussed on the public XML Encryption list as potential starting points for a specification and (3) the structure of a possible W3C activity to advance such a specification to Recommendation. Relevant topics include: Scope of encryption: should the scope apply to elements only, or any Information Set Item? How should the scope of encryption be described/ identified: should the data model be based on a simple ad-hoc representation or the complete Information Set? Should the data model be represented via URIs or an XML instance using RDF Schema or XSet? KeyInfo: Given that encryption keys might encrypt content or other keys, in what way must the Signature KeyInfo be extended to handle the common Encryption applications? Digital Signature "awareness" and syntax alignment: to what degree can XML-Encryption use use similar syntax and algorithm identifiers? Schema design: how will encryption portions of an XML instances affect that instances XML schema validity? Algorithm, modes, and formats: which algorithms and formats MUST be supported? Parser impact: will parser have to either post-process or be "callback equipped" to avoid re-parsing of an entire document after a portion has been decrypted? What rat holes can be identified as out of scope? Related topics that are not part of XML Encryption (though they may provide requirements as an application) are: XML Access Control Policies: specifying policies and mechanisms beside encryption that control access to XML content. Trust Mechanisms: specifying how much a key is trusted in a given application context. Expected audience We expect several groups will be interested in the workshop: Experts in XML and data-models, who understand the affect and requirements related to parsing/validity and how to best represent the relation between the plain text and encrypted content within a single instance. Experts in Encryption, who wish to ensure XML Encryption applications are properly secured and which KeyInfo structures are critical to dependent applications. Experts in Message Protocols, who understand the requirements messaging protocols may have with respect to encrypting a conversation/interaction as part of the protocol. Draft Agenda A preliminary draft agenda is available. Position Papers Position papers are not required. However, attendees must be informed with respect to the reading below. If you would like to give a presentation on related issues or proposals, please contact the Chair. Workshop organization The workshop will last for a single day. The structure of the workshop will be focussed on addressing the issues and leaving with specific approaches towards the technology and its standardization. Meeting Location Details The meeting will be taking place at the Lafayette Park Hotel, a ~40 minute drive from San Francisco. Methods for getting from San Francisco to Lafayette include rent-a-car, door-to-door van service, taxi, and public transport. Driving directions from San Francisco and Oakland Airports, as well as from SanJose are available. The Workshop will take place at: George Washington Meeting Room Lafayette Park Hotel 3287 Mount Diablo Boulevard Lafayette, CA 94549 925-283-3700 Hotel Details A set of rooms have been reserved at the Lafayette Park Hotel at a reduced fee. While the registration page asks if you require a room, this is only for planning purposes. You must make your own room reservation by October 23 and state that you wish to have the XCert rate. Further Reading The XML Encryption Discussion List Another proposal of XML Encryption, Takeshi Imamura (Mon, Aug 14 2000) XML Encryption strawman proposal Ed Simon (Wed, Aug 09 2000) XML-Signature Syntax and Processing Canonical XML
Received on Thursday, 21 September 2000 13:31:14 UTC