Re: [ESDS] RE: ESDS Digest, Vol 5, Issue 2

Mark Harrison <mark.harrison@cantab.net> Thu, 31 January 2008 10:23 UTC

Return-path: <esds-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1JKWa6-0006Yp-EP; Thu, 31 Jan 2008 05:23:42 -0500
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1JKWa4-0006Yk-Sj for esds@ietf.org; Thu, 31 Jan 2008 05:23:40 -0500
Received: from ppsw-1.csi.cam.ac.uk ([131.111.8.131]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1JKWa3-0003RT-VL for esds@ietf.org; Thu, 31 Jan 2008 05:23:40 -0500
X-Cam-SpamDetails: Not scanned
X-Cam-AntiVirus: No virus found
X-Cam-ScannerInfo: http://www.cam.ac.uk/cs/email/scanner/
Received: from cpc2-cmbg9-0-0-cust593.cmbg.cable.ntl.com ([82.16.102.82]:47643 helo=[10.0.1.3]) by ppsw-1.csi.cam.ac.uk (smtp.hermes.cam.ac.uk [131.111.8.151]:25) with esmtpsa (PLAIN:mgh12) (TLSv1:AES128-SHA:128) id 1JKWa1-0003K2-5R (Exim 4.67) (return-path <mgh12@hermes.cam.ac.uk>); Thu, 31 Jan 2008 10:23:38 +0000
From: Mark Harrison <mark.harrison@cantab.net>
To: philippe.gautier@benedicta.com
In-Reply-To: <006601c863f1$5661b050$032510f0$@gautier@benedicta.com>
Subject: Re: [ESDS] RE: ESDS Digest, Vol 5, Issue 2
X-Priority: 1 (Highest)
References: <E1JJZ7Q-000363-EZ@megatron.ietf.org> <006601c863f1$5661b050$032510f0$@gautier@benedicta.com>
Message-Id: <FA37ABA5-3B4F-451A-8207-EDBDD2E4A11E@cantab.net>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed; delsp=yes
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Apple Message framework v915)
Date: Thu, 31 Jan 2008 10:23:36 +0000
X-Mailer: Apple Mail (2.915)
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 311e798ce51dbeacf5cdfcc8e9fda21b
Cc: esds@ietf.org
X-BeenThere: esds@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: "Discussion of the ESDS \(Extensible Supplychain Discovery Service\)" <esds.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/esds>, <mailto:esds-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/esds>
List-Post: <mailto:esds@ietf.org>
List-Help: <mailto:esds-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/esds>, <mailto:esds-request@ietf.org?subject=subscribe>
Errors-To: esds-bounces@ietf.org

Dear Philippe,

Kary Främling has made a similar remark earlier this week.

I agree that an ESDS protocol should support linking to potentially  
all organizations within an object's lifecycle, from the design phase,  
through manufacture, distribution and retail, usage data (including  
service, repair, maintenance, overhaul) and even including end-of- 
life, including collection, sorting, remanufacturing and recycling.

Best regards,

- Mark



On 31 Jan 2008, at 10:08, Philippe Gautier wrote:

> Dear all,
> Sorry for this late reply.
> My first comment could be "why only focusing on Supply Chain issues  
> and not
> on Object's Lifecycle's ones ?".
> Actually, a DS standard will potentially cover a wider scope than  
> the Supply
> Chain itself.
> Regards,
> Philippe
>
> -----Message d'origine-----
> De : esds-request@ietf.org [mailto:esds-request@ietf.org]
> Envoyé : lundi 28 janvier 2008 19:54
> À : esds@ietf.org
> Objet : ESDS Digest, Vol 5, Issue 2
>
> Send ESDS mailing list submissions to
> 	esds@ietf.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
> 	https://www1.ietf.org/mailman/listinfo/esds
> or, via email, send a message with subject or body 'help' to
> 	esds-request@ietf.org
>
> You can reach the person managing the list at
> 	esds-owner@ietf.org
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of ESDS digest..."
>
>
> Today's Topics:
>
>   1.  Proposed Charter (Ali Rezafard)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Mon, 28 Jan 2008 13:52:48 -0500
> From: Ali Rezafard <arezafar@ca.afilias.info>
> Subject: [ESDS] Proposed Charter
> To: esds@ietf.org
> Message-ID: <479E2480.7080702@ca.afilias.info>
> Content-Type: text/plain; charset=ISO-8859-1; format=flowed
>
> Dear ESDS group,
>
> Below is the proposed charter and work items for our work group.  
> Please
> review and comment.
>
> Extensible Supply-chain Discovery Service (ESDS)
> =====================================
>
> Chair(s):
>    Mark Harrison <mark.harrison at cantab.net>
> Applications Area Director(s):
>    Lisa Dusseault <lisa at osafoundation.org>
>    Chris Newman <chris.newman at sun.com>
> Applications Area Advisor:
>    Lisa Dusseault <lisa at osafoundation.org>
> Mailing List(s):
>    esds at ietf.org
> General information about the mailing list is at:
>    https://www1.ietf.org/mailman/listinfo/esds
>
> Purpose of Working Group:
> -----------------------------------
> The use of Supply chain Tracking Systems is rising at an unprecedented
> rate, particularly as various industry sectors are increasingly  
> adopting
> automatic identification technologies such as Radio-Frequency
> Identification (RFID) to automatically track individual physical  
> objects
> as they move through a supply chain.  Rather than tracking at batch or
> lot level, the ultimate goal of this technology is that each  
> individual
> physical object will have its own unique ID, which can be used to  
> gather
> and retrieve complete lifecycle information about the object, which is
> fragmented across the supply chain. Deployment of these systems has
> grown to a point where they can no longer operate effectively in
> isolation from other systems.  There is a need to share data among  
> these
> disparate systems, which are owned and operated by separate  
> organizations.
>
> ESDS has been chartered to architect and define the protocol of a
> Discovery Service for global supply chains. ESDS's goal is to enable
> searching for information on physical objects flowing in a supply  
> chain,
> by authorized and authenticated users.  Economic and technical factors
> dictate that Discovery Services and their protocol ESDS must be  
> designed
> for deployment on the Internet. Access control, data protection and
> security are of utmost importance, due to sensitivity and value of the
> information generated by the supply chain.
>
> Goals and Milestones:
> ----------------------------
> The work group will address to the following work items:
>
> 1) Define common vocabulary and terminology
> 2) Define core data sets for sharing on Discovery Service, including
> required data fields, optional data fields, and extensible data fields
> (e.g. who, what, when, where, why, links, identifier, lifecycle,  
> class,
> etc.)
> 3) Define fault tolerance for missing required data fields
> 4) Define mechanism for uniquely identifying objects in a supply chain
> without requiring a global unique identifier for each and all objects
> that enter a supply chain
> 5) Define handling for time zones (e.g. accepting only UTC timestamps
> vs. accepting timestamps with any timezone)
> 6) Define a protocol for advertising/publishing data resources  
> (Resource
> Discovery)
> 7) Define a protocol and policy for retracting or voiding published  
> data
> 8) Define a protocol for querying published data, facilitating both
> one-time queries and standing queries (e.g. pull vs. push queries)
> 9) Define a common interface for access control configuration (e.g.
> supply chain, partner, user, roles)
> 10) Define security architecture and mechanisms for authorization,
> authentication , encryption (e.g.
> integrating security certificates into the protocol vs. relying on a
> security layer such as SSL)
> 11) Architect a bootstrapping policy for objects while ensuring  
> security
> and confidentiality
> 12) Define a common configuration interface for each category of
> policies (e.g. access policies, retention policies, archiving  
> policies,
> purging  policies, audit policies, QoS policies, propagation policies)
> 13) Define policies for updating stale and broken links (e.g. for
> records with a long retention period, it is vital that links can be
> updated, when required)
> 14) Validate that the deployment architecture is independent, scalable
> and robust
> 15) Determine how aggregation and disaggregation events should be
> handled including policies for access control and visibility of these
> events (e.g. a pallet is broken down into boxes and each box has its  
> own
> destination supply chain)
> 16) Determine if multilayer information visibility is required (e.g. a
> query with limited access can be informed of the existence of
> information for a particular object, but to view the actual  
> information,
> full access privileges would be required. This has particular
> implications for peer-to-peer searching across multiple Discovery  
> Services)
> 17) Define a peer-to-peer protocol to enable linking Discovery Service
> servers together
>
>
>
>
>
> ------------------------------
>
> _______________________________________________
> ESDS mailing list
> ESDS@ietf.org
> https://www1.ietf.org/mailman/listinfo/esds
>
>
> End of ESDS Digest, Vol 5, Issue 2
> **********************************
>
>
>
> _______________________________________________
> ESDS mailing list
> ESDS@ietf.org
> https://www1.ietf.org/mailman/listinfo/esds


_______________________________________________
ESDS mailing list
ESDS@ietf.org
https://www1.ietf.org/mailman/listinfo/esds