ABOUT THE ICSG PRIVILEGE MANAGEMENT PROTOCOLS WORKING GROUP
The Privilege Management Protocols WG will focus on the development of protocols for efficient authentication and the secure determination of "who can do what". The "who" is a cryptographic based identity that supports authentication and key establishment. The "what" consists of the manageable attributes of a system. The enforcement decisions are based on policy rules that define the relationships of entities to the manageable attributes. The target applications are embedded devices and wireless systems that require efficient and compact implementations.
The group will develop proposals for this problem area in phases that will include, but are not limited to:
- Cryptographic protocols to support device authentication and key establishment. Existing standards based cryptographic algorithms will be used. A "key centric" approach will be pursued that uses public-keys as the primary identification mechanism.
- The definition of schema mechanisms and encodings for efficient management attribute representation. An extensible encoding format will be selected or defined that supports both a canonical human readable and efficient machine readable encoding. Wherever possible semantic hints will be supported to allow the meaning of the attributes and associated policies to be readily understood by humans.
- Policy statements will describe how entities relate to their capabilities. The policy statements will be based on the same or similar definitions as the attribute encodings.
Working Group Participation
To participate in the Privilege Management Protocols (PMP) Working Group, the entity with which you are associated (company, organization, etc.) must become a member of ICSG.
Only entity members of the ICSG can have voting rights in the Working Group. Additionally, some individual subject experts may be invited to participate in the Working Group (without voting rights).