New Resolutions Over The Top Open Source Privacy see Adhoc results Resolutions related with DoA Resolution 50 Cybersecurity Resolution 60 The evolution of the identification and numbering systems to meet the emerging technological trends including Internet of Things ID: 585710
Download Presentation The PPT/PDF document "Issues need harmonization" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Issues need harmonization
New Resolutions: Over The Top, Open Source, Privacy (see Ad-hoc results)
Resolutions related with DoA
Resolution 50: CybersecurityResolution 60: The evolution of the identification and numbering systems to meet the emerging technological trends including Internet of Things (IoT)Resolution 78: Information and communication technology applications and standards for improved access to e-health servicesNew proposed Resolution on “Counterfeit”
Proposed ways
Basic reference: PP Resolution 188, recognizing: add all Res as a basic reference
e) that Recommendation ITU-T X.1255, which is based on the digital object architecture, provides a framework for discovery of identity management information;
Remove
words:
DoA
,
DONA Foundation and Handle Systems
Add
descriptive texts to explain features: see each resolutions (blue parts)
After
agreement
at
HoD
,
propose to COM4
as a Chairman’s proposalSlide2
Proposed Amendments
1. Resolution 50: Cybersecurity
Texts in Ad-Hoc
Proposed Textsrecognizinge) that Recommendation ITU-T X.1255 [,which is based on the Digital Object Architecture (DoA),] provides a framework for discovery of identity management information;
e)
that Recommendation ITU-T X.1255 , which is based on the Digital Object Architecture, provides a framework for discovery of identity management information;
* remove bracket[
i
) that the Handle System, which is a component of the DOA, provides a secure identifier service that has built-in mechanism to protect service integrity and data confidentiality and provides management functions which are self-contained and changes are controlled by the use of a Public Key Infrastructure (PKI) that is also self-contained in the system, ]
[h) that the Handle System, which is a component of the DOA, has many benefits including storing the Handles as hierarchic Identifiers with secure access to attributes that must be authorized, management functions are self-contained and changes are controlled by the use of a Public Key Infrastructure (PKI) which is also self-contained in the system, and access to the Handle System may be signed and validated by the user,]
[f) the importance of a system which provides unique identification, assignment and resolution of digital objects including the use of handles and abstracts references;
*
Remove and aggregate as in above textsSlide3
Proposed Amendments
2. Resolution 60: The evolution of the identification and numbering systems to meet the emerging technological trends including Internet of Things (
IoT)
Texts in Ad-HocProposed TextsRecognizing furthera) that Recommendation ITU-T X.1255 [,which is based on the Digital Object Architecture (DoA),]
provides a framework for discovery of identity management information;
e) that Recommendation ITU-T X.1255 , which is based on the Digital Object Architecture, provides a framework for discovery of identity management information;
* remove bracket
b) [that DOA key features include security, integrity & privacy of data, Unicode-based multilingual support of all types of languages and scripts, open architecture, interoperability of heterogeneous systems, quality of information and its scalability];
d) [that the approach for identification as implemented by the Handle System (which is a component of the DOA) which has many benefits, including facilitating the interoperability of heterogeneous systems],
recognizing the benefits of a system which provides unique identification, assignment and resolution of digital objects including the use of handles and abstracts references;
*
Remove and aggregate as in above textsSlide4
Proposed Amendments
3. Resolution 78:Information and communication technology applications and standards for improved access to e-health services
Texts in Ad-Hoc
Proposed TextsRecognizing furtherc) that Recommendation ITU-T X.1255 [,which is based on the Digital Object Architecture (DoA),]
provides a framework for discovery of identity management information;
c) that Recommendation ITU-T X.1255 , which is based on the Digital Object Architecture, provides a framework for discovery of identity management information;
* remove bracket
[d)
that the Handle System, which is a component of the DOA, has many
key features
including
security, integrity, privacy of data, interoperability of heterogeneous systems, quality of information and its scalability
,
]
the importance of a system which provides unique identification, assignment and resolution of digital objects , including the use of handles and abstract references
*
Replace as above text
instructs ITU-T Study Group 16 and ITU-T Study Group 20….
3 for ensuring the broad deployment of e-health services in diverse operating conditions, to study communication protocols relating to e-health, especially among heterogeneous networks,
taking into account the use of the Handle System
;
instructs ITU-T Study Group 16 and ITU-T Study Group 20….
3 for ensuring the broad deployment of e-health services in diverse operating conditions, to study communication protocols relating to e-health, especially among heterogeneous networks,
and the use of unique identification, assignment and resolution of digital objects
;Slide5
Proposed Amendments
4. New Proposed Draft Resolution: Counterfeit (title is a on-going discussion issue)
Texts in Ad-Hoc
Proposed TextsResolves6 to facilitate the standardization of mechanisms and technologies standardized by the ITU and other standardization Bodies, as well as the framework agreement between the ITU and the DONA Foundation, for the creation of a global model for combating counterfeit and tampered telecommunication/ICT devices, and to involve experts and external entities in this activity as appropriate;6 to facilitate the standardization of mechanisms and technologies
standardized by the ITU and other standardization Bodies, as well as the framework agreement between the ITU and the DONA Foundation
, for the creation of a global model for combating counterfeit and tampered telecommunication/ICT devices, and to involve experts and external entities in this activity as appropriate;
* delete texts as shown above red
color
instructs ITU-T Study Group 11
3 to study existing as well as new reliable, unique, persistent and secure identifiers, in collaboration with ITU-T Study Groups 2, 17 and 20
[including those based on the Digital Object Architecture (DOA)],
that have the potential to be used in combating counterfeit and tampered products and telecommunication/ICT devices; including their scope of application and level of security in the context of their possible duplication/cloning;
3 to study existing as well as new reliable, unique, persistent and secure identifiers, in collaboration with ITU-T Study Groups 2, 17 and 20
[including those based on the Digital Object Architecture (DOA)],
that have the potential to be used in combating counterfeit and tampered products and telecommunication/ICT devices; including their scope of application and level of security in the context of their possible duplication/cloning;
* delete
texts as shown above red
color