Internet Platform Special Interest Group

Agenda

Monday, 24 July 2002

 

0900 0915 Greetings and Administrivia

 

0915 1015 Presentation: M-Commerce and Location-based Services

Shel Sutton

 

1015 1030 Break

 

1030 1130 Discussion: Future of the Internet PSIG

 

1130 1300 Lunch

 

1300 1700 Joint meeting with C4I DTF and Security SIG

 

Presentation: Security Needs Beyond Access Control in

Multi-Enterprise Environments

Shel Sutton

 

Presentation: Secure Information Sharing in a Multi-Enterprise

Environments

Jack Wool, Senior Vice President, Cryptek, Inc.

Description of presentation:

Technical mechanisms exist for the data separation of different communities of interest and the controlled release of data from one community to another. The policy to use these mechanisms is generally well established where the data is primarily owned and controlled by one authority. The basic problem for collaboration exists where groups with different data ownership's with different data handling policies have to mediate use of the available data pool to meet a combined goal or activity. A technical mechanism is needed which can 1) quickly and clearly support this policy mediation, 2) provide a way for the parties to understand the proposed resolved policy for data handling, 3) provide for a policy release to initiate to new policy, 4) provide for data/process mapping during the span of the new policy, and 5) to provide for the scope of new operations to be gracefully terminated when the term of the new policy expires.

Mr. Wool has over twenty years of IT experience including professionalservices, software development, marketing strategy, business development, 24x7 customer support, domestic and international sales, value added reseller and original equipment manufacturer support. Currently, Mr. Wool is a Senior Vice President at Cryptek, Inc., and responsible for business development, sales and customer support. Cryptek manufactures and sells secure networking and facsimile products for clients that have sensitive and proprietary data handling requirements. Mr. Wool was involved in the design and use of secure operating systems (evaluated to NSA or ISO standards), networking and other security products, including delivery of courses on Trusted systems concepts and the use of Trusted products to achieve enterprise-wide business objectives. His experience includes operational management as a former COO, professional services management, data center management, software development ma! nagement, systems design, systems integration, and transition of legacy systems to new technologies.

 

Discussion: Communications and Computing Infrastructure Information Assurance and Security Considerations for C4I and Crisis Response

Objective: Ongoing development of White Paper on high level requirements for architectural convergence for Information Assurance and Security paradigms (CORBASec and Common Criteria)

Current WP text is at c4i/02-04-03