22090140150000meetingminutesofthesecurityandmanagementplaneproceduresadhocsWord格式文档下载.docx

上传人:b****6 文档编号:20414203 上传时间:2023-01-22 格式:DOCX 页数:36 大小:35.07KB
下载 相关 举报
22090140150000meetingminutesofthesecurityandmanagementplaneproceduresadhocsWord格式文档下载.docx_第1页
第1页 / 共36页
22090140150000meetingminutesofthesecurityandmanagementplaneproceduresadhocsWord格式文档下载.docx_第2页
第2页 / 共36页
22090140150000meetingminutesofthesecurityandmanagementplaneproceduresadhocsWord格式文档下载.docx_第3页
第3页 / 共36页
22090140150000meetingminutesofthesecurityandmanagementplaneproceduresadhocsWord格式文档下载.docx_第4页
第4页 / 共36页
22090140150000meetingminutesofthesecurityandmanagementplaneproceduresadhocsWord格式文档下载.docx_第5页
第5页 / 共36页
点击查看更多>>
下载资源
资源描述

22090140150000meetingminutesofthesecurityandmanagementplaneproceduresadhocsWord格式文档下载.docx

《22090140150000meetingminutesofthesecurityandmanagementplaneproceduresadhocsWord格式文档下载.docx》由会员分享,可在线阅读,更多相关《22090140150000meetingminutesofthesecurityandmanagementplaneproceduresadhocsWord格式文档下载.docx(36页珍藏版)》请在冰豆网上搜索。

22090140150000meetingminutesofthesecurityandmanagementplaneproceduresadhocsWord格式文档下载.docx

Phone

email

ApurvaMody

BAESystems

P.O.Box868,MER15-2350,Nashua,NH03061-0868

603-885-2621

404-819-0314

apurva.mody@,

apurva_mody@

RangaReddy

USArmy(CERDEC)

FtMonmouth,NJ

-

Ranga.reddy@us.army.mil

TomKiernan

Thomas.kiernan@us.army.mil

Abstract

ThisdocumentprovidestheminutesoftheSecurityAd-Hocconferencecallsheldon,

Year2009–August3rd,August10th,August17th,August24th,August31st,Sept.14th,October5th,October12th,October26th,November2nd,November9th,November30th,December7th,December14th2009,

Year2010–January4th,January25th,April5th

Notice:

ThisdocumenthasbeenpreparedtoassistIEEE802.22.Itisofferedasabasisfordiscussionandisnotbindingonthecontributingindividual(s)ororganization(s).Thematerialinthisdocumentissubjecttochangeinformandcontentafterfurtherstudy.Thecontributor(s)reserve(s)therighttoadd,amendorwithdrawmaterialcontainedherein.

Release:

Thecontributorgrantsafree,irrevocablelicensetotheIEEEtoincorporatematerialcontainedinthiscontribution,andanymodificationsthereof,inthecreationofanIEEEStandardspublication;

tocopyrightintheIEEE’snameanyIEEEStandardspublicationeventhoughitmayincludeportionsofthiscontribution;

andattheIEEE’ssolediscretiontopermitotherstoreproduceinwholeorinparttheresultingIEEEStandardspublication.ThecontributoralsoacknowledgesandacceptsthatthiscontributionmaybemadepublicbyIEEE802.22.

PatentPolicyandProcedures:

ThecontributorisfamiliarwiththeIEEE802PatentPolicyandProcedures

<

http:

//standards.ieee.org/guides/bylaws/sb-bylaws.pdf>

includingthestatement"

IEEEstandardsmayincludetheknownuseofpatent(s),includingpatentapplications,providedtheIEEEreceivesassurancefromthepatentholderorapplicantwithrespecttopatentsessentialforcompliancewithbothmandatoryandoptionalportionsofthestandard."

EarlydisclosuretotheWorkingGroupofpatentinformationthatmightberelevanttothestandardisessentialtoreducethepossibilityfordelaysinthedevelopmentprocessandincreasethelikelihoodthatthedraftpublicationwillbeapprovedforpublication.PleasenotifytheChair<

CarlR.Stevenson>

asearlyaspossible,inwrittenorelectronicform,ifpatentedtechnology(ortechnologyunderpatentapplication)mightbeincorporatedintoadraftstandardbeingdevelopedwithintheIEEE802.22WorkingGroup.Ifyouhavequestions,contacttheIEEEPatentCommitteeAdministratorat<

patcom@ieee.org>

.

1.August3rd2009–SecurityAd-HocConferenceCallMeetingMinutes

MeetingMinutes

1.Attendance

ApurvaMody–BAESystems

GeraldChouinard-CRC

RangaReddy–USArmy

WinstonCaldwell–Fox

2.1Agenda

∙Attendance

∙Chairaskedifeveryoneattending 

was 

familiarwiththeIEEEpatentpolicy-http:

//standards.ieee.org/board/pat/pat-slideset.pdf-Everyonewasfamiliar.

∙Minutes 

 

of 

alltheSecurityAd-HocConferenceCalls 

previouslyheld 

canbefoundat–https:

//mentor.ieee.org/802.22/dcn/08/22-08-0163-22-0000-meeting-minutes-of-the-security-ad-hoc-group-in-802-22.doc

∙DiscussiononProtectionMechanismsforCo-existenceBeaconingPackets–ledbyRangaReddy.https:

//mentor.ieee.org/802.22/dcn/08/22-08-0296-03-0000-cbp-security-protection-mechanisms.doc

∙RecommendedTextforSection7onSecurityin802.22 

–includedinDraftv2.0canbefoundathttps:

//mentor.ieee.org/802.22/dcn/08/22-08-0174-18-0000-recommended-text-for-section-7-on-security-in-802-22.doc

∙ReferenceDocument-TableofContentsforSection7.Thereferencedocumentfortheproposedtextcanbefoundat 

https:

//mentor.ieee.org/802.22/file/08/22-08-0165-00-0000-table-of-content-for-the-security-section-in-802-22.doc

∙ReferenceDocument-ScopeandtheWorkplanfortheSecurityAd-HocGroup–https:

//mentor.ieee.org/802.22/file/08/22-08-0159-00-0000-scope-agenda-workplan-and-timeline-for-the-security-ad-hoc-in-802-22.doc

∙ReferenceDocument-PresentationonthePRMandSecurityEnhancementsin802.22–802.22ThreatAnalysis

//mentor.ieee.org/802.22/dcn/08/22-08-0083-08-0000-security-and-prm-enhancements-in-80222-v3.ppt

∙ProposedReferenceArchitecturefor802.22-https:

//mentor.ieee.org/802.22/dcn/08/22-08-0121-10-0000-text-on-protocol-reference-model-enhancements-in-802-22.doc

∙802.22DatabaseInterfaceArchitectureandSecurityMechanisms-https:

//mentor.ieee.org/802.22/dcn/09/22-09-0111-02-0000-database-interface-architecture-and-security-mechanisms.ppt

∙WhitespaceDatabaseService-https:

//mentor.ieee.org/802.19/dcn/09/19-09-0047-00-tvws-white-spaces-database.ppt

MinutesandDiscussions

∙Comments667,668,673,674,675,676,679and680wereresolved.TheproposedresolutionscanbefoundintheDocumenthttps:

//mentor.ieee.org/802.22/dcn/09/22-09-0120-03-0000-wran-draft-2-0-ballot-comment-database.xls

∙Comment#662–GeraldChouinard.Thereweresomediscussionsonthiscomment.Gerald’scommentistokeepthecomplexityofthesecuritysuitesin802.22lowsothatthereisnotahighbarriertothemarket

∙RangaReddysuggestedthatwhenthesecurityad-hocstartedexploringthearchitectureforthesecurityin802.22,wefoundthe802.16modelmostappropriate.Manythingsfromthe802.16securityarchitecturehavebeenstreamlined.Thereisalsoanoption,thatifauserdoesnothaveacapabilitytoperformsecurityrelatedfunctionssuchasencryption/authentication,itmaytelltheBSandtheBSmayeitherchoosetoservetheuserwithnosecurityfeaturesoritmaydecidetode-authorizetheuserfromthenetwork.

∙ApurvaModysuggestedthatthesecurityad-hocwillconsiderprovidingsome802.11typeofmechanismssothatitmayfacilitatequickeradoptionofthestandard.

∙RangaReddysuggestedthatsecurityad-hocisalreadyconsideringaddingExtensivleAuthenticationProtocol(EAP)whichwillallowtheserviceproviderstoautomaticallygeneratethecertificatesandkeys.

∙RangaReddysuggestedthatwewaituntilallthecommentsareresolvedandthenre-vistithiscommenttoseeifsomethingcanbedonetoreducethecomplexity.

∙Winston–Weneedtokeepinmindthemarketwhere802.22islikelytobedeployedmore–notAfricabuttheUS

∙ApurvaModysuggestedthatlookingatthetrendsin802.16/WiMAX,itlookedlike802.22maybeadoptedmorequicklyinothercountrieswithlesserbroadbandpenetrationascomparedtotheUS.

2.August10th2009–SecurityAd-HocConferenceCallMeetingMinutes

∙DiscussionsonsecurityaspectswiththeexternalWhitespacedatabasewascarriedout.

∙RangaReddybroughttotheattentionofthegroupthattheWhitespacesDatabasesGrouphasstartedtalkingaboutthesecurityissuesofthedatabasewiththeWhitespaceDevice.ThisdocumentincludesPublicKeyInfrastructure(PKI),TransportSecurityandDeviceSecurity.

∙PKI-ForPKI,X.509baseduseofcertificatesissuggestedforkeyexchange.TheseX.509certificateswillholdanentitynameintheSubjectAltNamefield,followingtheconventionoftheWorldWideWeb.A2048-bitRSAkeyforinitialdeploymentissuggestedwithforwardcompatibilityforkeysizeincreases.Usekeyrolloverproceduresbasedonpre-publishedsupersessiontoensurelong-termstabilityofthesecurityarchitectureisproposed.TheOSCPprotocol(RFC2560)maybeusedbyWSDstoverifythatWSSPcertificateshavenotbeenrevokedbytheRepository.

∙TransportSecurity–TransportLayerSecuri

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > PPT模板 > 可爱清新

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1