[TLS] New Liaison Statement, "LS on determined draft new Recommendation ITU-T X.1365 (ex X.ibc-iot) “Security methodology for using Identity Based Cryptography for IoT services over telecom networks”"

Liaison Statement Management Tool <statements@ietf.org> Fri, 20 September 2019 16:31 UTC

Return-Path: <statements@ietf.org>
X-Original-To: tls@ietf.org
Delivered-To: tls@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 37B06120113; Fri, 20 Sep 2019 09:31:17 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: Liaison Statement Management Tool <statements@ietf.org>
To: Christopher Wood <caw@heapingbits.net>, Sean Turner <sean+ietf@sn3rd.com>, Joseph Salowey <joe@salowey.net>
Cc: Transport Layer Security Discussion List <tls@ietf.org>, Scott Mansfield <Scott.Mansfield@Ericsson.com>, Sean Turner <sean+ietf@sn3rd.com>, Benjamin Kaduk <kaduk@mit.edu>, Christopher Wood <caw@heapingbits.net>, Joseph Salowey <joe@salowey.net>, Roman Danyliw <rdd@cert.org>, itu-t-liaison@iab.org, jhbaek@kisa.or.kr
X-Test-IDTracker: no
X-IETF-IDTracker: 6.101.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <156899707718.30251.14258014744854764738.idtracker@ietfa.amsl.com>
Date: Fri, 20 Sep 2019 09:31:17 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/b6L_NauHM7V-xiruKWWLjkjXfk4>
Subject: [TLS] New Liaison Statement, "LS on determined draft new Recommendation ITU-T X.1365 (ex X.ibc-iot) “Security methodology for using Identity Based Cryptography for IoT services over telecom networks”"
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Sep 2019 16:31:17 -0000

Title: LS on determined draft new Recommendation ITU-T X.1365 (ex X.ibc-iot) “Security methodology for using Identity Based Cryptography for IoT services over telecom networks”
Submission Date: 2019-09-20
URL of the IETF Web page: https://datatracker.ietf.org/liaison/1652/

From: Xiaoya Yang <xiaoya.yang@itu.int>
To: Christopher Wood <caw@heapingbits.net>,Joseph Salowey <joe@salowey.net>,Sean Turner <sean+ietf@sn3rd.com>
Cc: Transport Layer Security Discussion List <tls@ietf.org>,Scott Mansfield <Scott.Mansfield@Ericsson.com>,Sean Turner <sean+ietf@sn3rd.com>,Benjamin Kaduk <kaduk@mit.edu>,Christopher Wood <caw@heapingbits.net>,Joseph Salowey <joe@salowey.net>,Roman Danyliw <rdd@cert.org>,itu-t-liaison@iab.org
Response Contacts: jhbaek@kisa.or.kr
Technical Contacts: 
Purpose: For information

Body: ITU-T Study Group 17 (SG17) thanks IETF/TLS working group and ISO/IEC JTC 1/SC 27/WG 2 for your continuous collaboration with SG17 and sending us Liaison Statements on using identity-based cryptography in IoT networks.

SG17 in its 27 August – 5 September 2019 meeting determined draft new Recommendation ITU-T X.1365 (ex X.ibc-iot) “Security methodology for use of identity-based cryptography in support of Internet of things services over telecommunication networks” for TAP approval.

In the spirit of our continuous and ongoing collaboration, we attached the determined text of X.1365 (ex X.ibc-iot) for your consideration and look forward to further collaboration on IoT security.
Attachments:

    SG17-LS214
    https://www.ietf.org/lib/dt/documents/LIAISON/liaison-2019-09-20-itu-t-sg-17-tls-ls-on-determined-draft-new-recommendation-itu-t-x1365-ex-xibc-iot-security-methodology-for-using-identity-base-attachment-1.docx

    LS214-att-X.1365 TAP
    https://www.ietf.org/lib/dt/documents/LIAISON/liaison-2019-09-20-itu-t-sg-17-tls-ls-on-determined-draft-new-recommendation-itu-t-x1365-ex-xibc-iot-security-methodology-for-using-identity-base-attachment-2.docx