- From: Joseph M. Reagle Jr. <reagle@w3.org>
- Date: Mon, 23 Oct 2000 18:33:07 -0400
- To: "Public XML Encryption List" <xml-encryption@w3.org>
I put together a very rough agenda at [1]. I looked through my mailbox for those folks who said they were interested in speaking. If I include you and I shouldn't, if I should and I didn't, or if I said you're going to talk about something you aren't, let me know! (One of the best ways to do that is to post to the list those things you will talk about <smile>.) I'm not convinced this is the best structure, but in playing with the time, this is what I came up with, any suggestions are welcome. ___ [1] http://www.w3.org/2000/09/XML-Encryption-Agenda.html NOTE: This is very very rough; the speakers are not necessarily confirmed and the characterization of their discussion make be inaccurate. DRAFT PROGRAM In the morning we begin by understanding the difference between encryption and authorization and the resulting the requirements of authorization; we expand our scope of requirement discussion; then focus the question on protocol and end-to-end security issues. The afternoon we focus on the present proposals, identify issues, determine direction, and discuss how to move forward. THURSDAY 02 NOVEMBER 8.30 - 9.00 Continental Breakfast _________________________________________________________________ 9.00 - 9.35 (35 minutes): Introduction 1. Group, Introductions Around the Room (15m) 2. Joseph Reagle, [6]Agenda (10m) 3. Group, Agenda Bashing (10m) 9.50 - 10.30 (40 minutes): Encryption versus Authentication versus Authorization * the distinction between encryption and authorization, and the requirements resulting from authorization applications. 1. Mark Scherling, XCert: Encryption requirements resulting from [7]proposed authorization model 2. Christian Geuer-Pollmann, Uni-Siegen: Comparison/analysis of encryption and authorization. _________________________________________________________________ 10.30 - 10.45 break _________________________________________________________________ 10.45 - 12.50 (125 minutes): RequirementsI * Applications, Parsers, References, and Protocol -- or lack thereof! 1. Steve Wiley, MyProof (20m): Requirements with respect to deployed parsers, target document fragments, nested encryption, etc. 2. Eric Cohen, PriceWaterHouseCoopers (20m): XBRL requirements and lots of questions (process and technical). 3. Thane Plambeck, Verisign (20m): Verisign requirements for XML Encryption 4. Mike Wray, Hewlett-Packard (20m): XML and end-to-end security . 5. Barb Fox, Microsoft (20m): Fire-and-forget encryption. _________________________________________________________________ 12.50 - 2.00 lunch _________________________________________________________________ 2.00 - 3.30 Proposals (90 minutes) * Proposals (90 minutes) 1. Ed Simon, Entrust (45 minutes): Report on experimenting with <EncryptedData/Node> element within within common XML scenarios (eg. encrypting element (easy), element content (easy with DOM level 2), attribute values (in progress) in DOM and XSLT frameworks). Fill out overview and syntax part of the XML Encryption spec that focuses on the <EncryptedData> element. 2. Takeshi IMAMURA (45 minutes): <EncryptionInfo> element for algorithm and keying information _________________________________________________________________ 3.30 - 3.45 break _________________________________________________________________ 3.45 - 5:30 Content IV (105 minutes) 1. Joseph Reagle, Close Technical Issues with Action Items (60m) 2. Joseph Reagle, Process and Action-items (45m) 1. Summary of W3C Process 2. Charter 3. Requirements Document 4. Specification Proposals __ Joseph Reagle Jr. W3C Policy Analyst mailto:reagle@w3.org IETF/W3C XML-Signature Co-Chair http://www.w3.org/People/Reagle/
Received on Monday, 23 October 2000 18:33:10 UTC