Agenda for W3C Security meeting 22 Feb 95
The second W3C security meeting will be held
in room 518, 545 Technology Square, Cambridge MA 02139,
starting informally at 8:30 and formally at 9:00
on Wednesday, February 22nd, 1995.
The meeting is open to security experts from
W3C member companies, and MIT/LCS members
involved in the area. Notification of intent to
participate is required to help us count cookies.
If you intend to submit any considerations which merit reading by attendees
please mail timbl@w3.org for them to be added to the resources list
before the meeting.
Aims
The aims of the meeting are
- to ensure that the requirements
list (largely defined the previous meeting)
accurately reflect the needs of the web as perceived
by attendees;
- To refine the negotiation protocol, either resolving or integrating
the security negotiation and other negotiation;
- To define the feature set which and software architecture
to be provided as W3C reference code;
- To discuss the political and licensing constraints and
find a course of action to achieve the goals expressed at the
previous meeting.
Agenda
This is an outline agenda. Agenda modifications will be
considered if the need arises.
- 8:30
- Continental breakfast
- 9:00
- Introduction.
- 9:30
- Informal report from ISOC meeting (Ron Rivest)
- 09:45
- IBM will present a brief summary of a
proposal for W3C consideration
"iKP: a family of payment protocols" and a proposal for
pluggable security client architecture. (Juan Garay. See
paper)
- 10:05
- Presentation of the requirements for a standard security
protocol. See Tony Eng's
summary
of requirements.
- 10:20
- NeXT Inc. has offered Fast Elliptic Encryption technology. Discuss.
- 10:30
- Break
- 10:45
- Discussion of points arising, and
of negotiation. Should negotiation for security
be a special case addressed by the security protocol,
or should a separate negotiation protocol be used?
- 12:30
- Buffet lunch will be provided
- 13:30
- Discussion of licensing issues, exportability.
Modular grouping of features for release packaging.
Generation of a list of items for inclusion in each release
level. Consideration of sources of contributed code
with advantages and disadvantage.
- 15:30
- Break
- 15:45
- Resource planning. Possible contributions of
resources by consortium members. The generation of
milestones for W3C release including security features.
- 17:30
- Close
Background reading
TBL,
14-Feb-95