[6lowpan] Fwd: Smart Object Security Workshop Announcement

Carsten Bormann <cabo@tzi.org> Thu, 19 January 2012 14:36 UTC

Return-Path: <cabo@tzi.org>
X-Original-To: 6lowpan@ietfa.amsl.com
Delivered-To: 6lowpan@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E858C21F8624; Thu, 19 Jan 2012 06:36:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.249
X-Spam-Level:
X-Spam-Status: No, score=-106.249 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MIcfjaT3WZD3; Thu, 19 Jan 2012 06:36:08 -0800 (PST)
Received: from informatik.uni-bremen.de (mailhost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::12]) by ietfa.amsl.com (Postfix) with ESMTP id C698221F861F; Thu, 19 Jan 2012 06:36:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at informatik.uni-bremen.de
Received: from smtp-fb3.informatik.uni-bremen.de (smtp-fb3.informatik.uni-bremen.de [134.102.224.120]) by informatik.uni-bremen.de (8.14.3/8.14.3) with ESMTP id q0JEZvR8020602; Thu, 19 Jan 2012 15:35:57 +0100 (CET)
Received: from [192.168.217.117] (p5489B242.dip.t-dialin.net [84.137.178.66]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by smtp-fb3.informatik.uni-bremen.de (Postfix) with ESMTPSA id 1DFA1161; Thu, 19 Jan 2012 15:35:57 +0100 (CET)
Content-Type: text/plain; charset=windows-1252
Mime-Version: 1.0 (Apple Message framework v1251.1)
From: Carsten Bormann <cabo@tzi.org>
Date: Thu, 19 Jan 2012 15:35:54 +0100
Content-Transfer-Encoding: quoted-printable
Message-Id: <666B33A3-CD9C-47C9-8DB5-25A3234572A0@tzi.org>
References: <9E2944CA-16CF-4985-9DA6-B7A1A03EFF10@gmx.net>
To: 6lowpan <6lowpan@ietf.org>, core WG <core@ietf.org>, lwip@ietf.org
X-Mailer: Apple Mail (2.1251.1)
Subject: [6lowpan] Fwd: Smart Object Security Workshop Announcement
X-BeenThere: 6lowpan@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Working group discussion for IPv6 over LowPan networks <6lowpan.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6lowpan>, <mailto:6lowpan-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6lowpan>
List-Post: <mailto:6lowpan@ietf.org>
List-Help: <mailto:6lowpan-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6lowpan>, <mailto:6lowpan-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jan 2012 14:36:09 -0000

This workshop should be of interest to the whole constrained node/network cluster of working groups*)
If you plan to come to Paris, plan to go to:

-- Fri 2012-03-23: Smart Object Security Workshop
-- Sat/Sun -24/-25: ETSI CoRE plugtest
-- Mon-Fri -26..-30: IETF83

If you don't have an implementation with you, you get a nice free weekend in Paris :-)

Please see below for the link to the announcement.

Grüße, Carsten

*) If you wonder why ROLL is not in the To:-list: The ROLL mailing list already got it's own copy due to an attentive AD in the right time zone :-)

Begin forwarded message:

> From: Hannes Tschofenig <Hannes.Tschofenig@gmx.net>
> Subject: Smart Object Security Workshop Announcement
> Date: January 19, 2012 11:21:57 +0100
> To: IETF-Discussion list <ietf@ietf.org>
> 
> Hi all,
> 
> we would like to make you aware of a workshop on Smart Object Security on the 23rd March 2012 in Paris (attached to the IETF meeting).
> 
> We are seeking input from participants to share their thoughts about the ability to utilize existing and widely deployed security mechanisms for smart objects.
> 
> In particular, we are interested to hear about:
> 	• What techniques for issuing credentials have been deployed?
> 	• What extensions are useful to make existing security protocols more suitable for smart objects?
> 	• What type of credentials are frequently used?
> 	• What experience has been gained when implementing and deploying application layer, transport layer, network layer, and link layer security mechanisms (or a mixture of all of them)?
> 	• How can “clever” implementations make security protocols a better fit for constrained devices?
> 	• Are there lessons we can learn from existing deployments?
> 
> More workshop details can be found on the webpage of our host:
> http://www.lix.polytechnique.fr/hipercom/SmartObjectSecurity/
> 
> If you plan to participate at the workshop please drop us a message (with a short description of what you are planning to contribute) and we can give you an early notice regarding your participation. 
> 
> Greetings
> The Workshop Organizers
> 
> _______________________________________________
> Ietf mailing list
> Ietf@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf