This wiki has undergone a migration to Confluence found Here
Difference between revisions of "May 12th, 2009 Security Conference Call"
Jump to navigation
Jump to search
(→Agenda) |
(→Agenda) |
||
Line 39: | Line 39: | ||
** purpose of use | ** purpose of use | ||
** consent directives | ** consent directives | ||
− | ** emergency access | + | ** emergency access (?) |
#''(15 min)'' '''Item3''' | #''(15 min)'' '''Item3''' | ||
#''(5 min)'' '''Other Business''' | #''(5 min)'' '''Other Business''' |
Latest revision as of 17:00, 12 May 2009
Security Working Group Meeting
==Attendees== (expected)
- Steven Connolly
- Ed Coyne
- Mike Davis Security Co-chair
- Suzanne Gonzales-Webb CBCC Co-chair
- Russ Hamm
- Rob Horn
- Glen Marshall Security Co-chair
- Rob McClure
- John Moehrke
- Milan Petkovik
- Pat Pyette
- Scott Robertson
- David Sperzel
- Richard Thoreson CBCC Co-chair
- Ioana Singureanu
- Tony Weida
- Craig Winter
Agenda
- (05 min) Roll Call, Approve Minutes & Accept Agenda
- Administrative change to Live meeting link starting next week, instead of GoToMeeting
- (15 min) Object Vocabulary - approval to have RBAC TF revisit current object list
- assist terminologists with proper object identification for mapping
- confirm objects to be protected
- deprecate and/or replace objects
- identification of new objects if necessary
- (15 min) Constraints Permission Constraint Catalog Example
- tagging objects for sensitivity to start constraint process
- review of current constraints due to:
- sensitivity
- confidentiality
- purpose of use
- consent directives
- emergency access (?)
- (15 min) Item3
- (5 min) Other Business