/
Issues need harmonization Issues need harmonization

Issues need harmonization - PowerPoint Presentation

pasty-toler
pasty-toler . @pasty-toler
Follow
385 views
Uploaded On 2017-09-06

Issues need harmonization - PPT Presentation

New Resolutions Over The Top Open Source Privacy see Adhoc results Resolutions related with DoA Resolution 50 Cybersecurity Resolution 60 The evolution of the identification and numbering systems to meet the emerging technological trends including Internet of Things ID: 585710

digital itu including texts itu digital texts including doa resolution information system study proposed architecture based framework object management

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Issues need harmonization" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Issues need harmonization

New Resolutions: Over The Top, Open Source, Privacy (see Ad-hoc results)

Resolutions related with DoA

Resolution 50: CybersecurityResolution 60: The evolution of the identification and numbering systems to meet the emerging technological trends including Internet of Things (IoT)Resolution 78: Information and communication technology applications and standards for improved access to e-health servicesNew proposed Resolution on “Counterfeit”

Proposed ways

Basic reference: PP Resolution 188, recognizing: add all Res as a basic reference

e) that Recommendation ITU-T X.1255, which is based on the digital object architecture, provides a framework for discovery of identity management information;

Remove

words:

DoA

,

DONA Foundation and Handle Systems

Add

descriptive texts to explain features: see each resolutions (blue parts)

After

agreement

at

HoD

,

propose to COM4

as a Chairman’s proposalSlide2

Proposed Amendments

1. Resolution 50: Cybersecurity

Texts in Ad-Hoc

Proposed Textsrecognizinge) that Recommendation ITU-T X.1255 [,which is based on the Digital Object Architecture (DoA),] provides a framework for discovery of identity management information;

e)

that Recommendation ITU-T X.1255 , which is based on the Digital Object Architecture, provides a framework for discovery of identity management information;

* remove bracket[

i

) that the Handle System, which is a component of the DOA, provides a secure identifier service that has built-in mechanism to protect service integrity and data confidentiality and provides management functions which are self-contained and changes are controlled by the use of a Public Key Infrastructure (PKI) that is also self-contained in the system, ]

[h) that the Handle System, which is a component of the DOA, has many benefits including storing the Handles as hierarchic Identifiers with secure access to attributes that must be authorized, management functions are self-contained and changes are controlled by the use of a Public Key Infrastructure (PKI) which is also self-contained in the system, and access to the Handle System may be signed and validated by the user,]

[f) the importance of a system which provides unique identification, assignment and resolution of digital objects including the use of handles and abstracts references;

*

Remove and aggregate as in above textsSlide3

Proposed Amendments

2. Resolution 60: The evolution of the identification and numbering systems to meet the emerging technological trends including Internet of Things (

IoT)

Texts in Ad-HocProposed TextsRecognizing furthera) that Recommendation ITU-T X.1255 [,which is based on the Digital Object Architecture (DoA),]

provides a framework for discovery of identity management information;

e) that Recommendation ITU-T X.1255 , which is based on the Digital Object Architecture, provides a framework for discovery of identity management information;

* remove bracket

b) [that DOA key features include security, integrity & privacy of data, Unicode-based multilingual support of all types of languages and scripts, open architecture, interoperability of heterogeneous systems, quality of information and its scalability];

d) [that the approach for identification as implemented by the Handle System (which is a component of the DOA) which has many benefits, including facilitating the interoperability of heterogeneous systems],

recognizing the benefits of a system which provides unique identification, assignment and resolution of digital objects including the use of handles and abstracts references;

*

Remove and aggregate as in above textsSlide4

Proposed Amendments

3. Resolution 78:Information and communication technology applications and standards for improved access to e-health services

Texts in Ad-Hoc

Proposed TextsRecognizing furtherc) that Recommendation ITU-T X.1255 [,which is based on the Digital Object Architecture (DoA),]

provides a framework for discovery of identity management information;

c) that Recommendation ITU-T X.1255 , which is based on the Digital Object Architecture, provides a framework for discovery of identity management information;

* remove bracket

[d)

that the Handle System, which is a component of the DOA, has many

key features

including

security, integrity, privacy of data, interoperability of heterogeneous systems, quality of information and its scalability

,

 

]

the importance of a system which provides unique identification, assignment and resolution of digital objects , including the use of handles and abstract references

*

Replace as above text

instructs ITU-T Study Group 16 and ITU-T Study Group 20….

3 for ensuring the broad deployment of e-health services in diverse operating conditions, to study communication protocols relating to e-health, especially among heterogeneous networks,

taking into account the use of the Handle System

;

instructs ITU-T Study Group 16 and ITU-T Study Group 20….

3 for ensuring the broad deployment of e-health services in diverse operating conditions, to study communication protocols relating to e-health, especially among heterogeneous networks,

and the use of unique identification, assignment and resolution of digital objects

;Slide5

Proposed Amendments

4. New Proposed Draft Resolution: Counterfeit (title is a on-going discussion issue)

Texts in Ad-Hoc

Proposed TextsResolves6 to facilitate the standardization of mechanisms and technologies standardized by the ITU and other standardization Bodies, as well as the framework agreement between the ITU and the DONA Foundation, for the creation of a global model for combating counterfeit and tampered telecommunication/ICT devices, and to involve experts and external entities in this activity as appropriate;6 to facilitate the standardization of mechanisms and technologies

standardized by the ITU and other standardization Bodies, as well as the framework agreement between the ITU and the DONA Foundation

, for the creation of a global model for combating counterfeit and tampered telecommunication/ICT devices, and to involve experts and external entities in this activity as appropriate;

* delete texts as shown above red

color

instructs ITU-T Study Group 11

3 to study existing as well as new reliable, unique, persistent and secure identifiers, in collaboration with ITU-T Study Groups 2, 17 and 20

[including those based on the Digital Object Architecture (DOA)],

that have the potential to be used in combating counterfeit and tampered products and telecommunication/ICT devices; including their scope of application and level of security in the context of their possible duplication/cloning;

3 to study existing as well as new reliable, unique, persistent and secure identifiers, in collaboration with ITU-T Study Groups 2, 17 and 20

[including those based on the Digital Object Architecture (DOA)],

that have the potential to be used in combating counterfeit and tampered products and telecommunication/ICT devices; including their scope of application and level of security in the context of their possible duplication/cloning;

* delete

texts as shown above red

color