New draft: draft-ietf-geopriv-reqs-00.txt

From: Cuellar Jorge ^lt;Jorge.R.Cuellar@mchp.siemens.de>
Date: Tue Jun 25 2002 - 04:34:05 EDT

We have submitted the following draft:
Geopriv requirements
draft-ietf-geopriv-reqs-00.txt

You may find the draft at:

http://www.ersue.de/geopriv/draft-ietf-geopriv-reqs-00.txt

Please let me know, if you have any comments.

Regards,

Jorge
------------------------------

                                                J. Cuellar
                                                Siemens AG

                                       John B. Morris, Jr.
                      Center for Democracy and Technology

                                               D. Mulligan
       Samuelson Law, Technology, and Public Policy Clinic

Expires: Dec. 2002 June 2002

Geopriv requirements

Abstract

Location-based services, navigation applications, emergency services,
management of equipment in the field, and other location-dependent
services need geographic location information about a target (user,
resource or other entity). There is a need to securely gather and
transfer location information for location services, protecting the
privacy of the individuals involved.

This document describes the requirements for the geopriv Location
Object (used to transfer location data and perhaps some other
information) and for further IETF protocols that use this Location
Object as an embedded protocol. We focus on authorization, integrity
and privacy requirements.

Table of Contents

 1. Overview 2
 2. Conventions used in this document 4
 3. Usage Model 4
 3.1. Roles and attributes 4
 3.2. Data 8
 3.3. Identification, Authentication, and Authorization 9
 3.3.1. Identifiers 9
 3.3.2. Authentication 10
 3.3.3. Authorization 10
 3.4. Data Flows 10
 3.4.1. Relationship framework 12
 3.4.2. Scenarios of Data Flow 12
 3.5. Further explanations 14
 3.5.1. Location Data Types 14
 3.5.2. Public Global Identities 15
 3.5.3. Authorization without Explicit Authentication 15
 4. Requirements 17
 4.1. Protocols 17
 4.2. Policy based Location Data transfer 17
 4.3. Location Object, Location Data Field 18
 4.4. Requests 19
 4.5. Identity Protection 19
 4.6. Authentication Requirements 20
 4.7. Actions to be secured 21
 4.8. Non-Requirements 21
 5. Security Considerations 21
 6. Acknowledgements 21
 7. References 21
 8. Author's Addresses 22
 9. Full Copyright Statement 22
---------------------------------
--------------------------------------------
Dr. Jorge R Cuellar T +49 89 636-47 585
Security
CT IC 3
Siemens jorge.cuellar@mchp.siemens.de
----------------------------------------------
Received on Tue Jun 25 04:38:15 2002

This archive was generated by hypermail 2.1.8 : Thu Jan 22 2004 - 12:32:23 EST