Table of Contents
Participants
Panel | ||||
---|---|---|---|---|
| ||||
|
...
Panel | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||||||||
#Enter the persons who are participating in the team that works on this Activity - delete this line after using the template#
|
Panel | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
| ||||||||||||
|
Panel | |||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| |||||||||||||||||||||||
#Enter the persons who are internal projects or external stakeholders of this Activity - delete this line after using the template# Name | | Role Organisation |
Activity overview
Panel | ||
---|---|---|
| ||
This activity constitutes to be the follow-up activity of the topic Second Factor Authentication - Distributed Vetting (see: https://wiki.geant.org/x/zLAuBw) of the previous Incubator cycle. It investigates analogously to the preceding cycle how identity vetting and token registration can be scaled for second-factor authentication scenarios where participants are distributed over EU and beyond and thus takes into account the report which was delivered as part of the first Incubator cycle. As part of this activity a specific flow - based on a community-based approach - will be investigated. It takes into account the concept of the Web of Trust which is also used in (Open)PGP to establish a binding between a key and its owner. While this mechanism typically does not work well in broad user groups, it is very well suited to distribute trust between small groups where a pre-existing trust fabric is already in place, as we typically have in research communities. What seems to be missing is a means to make this trust network auditable and transparent. In order to make the trust network transparent, this activity seeks to identify/develop tools to support this flow. |
...
Panel | ||
---|---|---|
| ||
|
Activity Details
Panel | ||
---|---|---|
| ||
<Enter here>Based on the specified flow, tools to support and implement the flow need to be identified. The following output outputs of the previous Incubator cycle will be taken into account:
|
Panel | ||
---|---|---|
| ||
#What is the business case for the Activity? Who would be beneficiaries of the results of the Activity and what would potential business case look like if applicable? - delete this line after using the template# |
Panel | ||
---|---|---|
| ||
#Are there risks that influence either the implementation of the activity or its outcomes? - delete this line after using the template# <Enter here> | ||
|
Panel | ||
---|---|---|
| ||
Personal data which is processed during the act of identity vetting must be reduced to a minimum and transmitted/stored by using cryptographical means. |
...
Panel | ||
---|---|---|
| ||
|
Activity Results
Panel | ||
---|---|---|
| ||
|
Meetings
Date | Activity | Owner | Minutes |
---|---|---|---|
January 1, 2017 | Kickoff meeting | ||
Documents
Attachments