Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Attendees

NA/EU

APAC

Main Goal of this Meeting

...

TimeAgenda ItemLeadNotes
5 min
  • Start recording
  • Welcome & antitrust notice
  • Introduction of new members
  • Agenda review
Chairs
  • Antitrust Policy Notice: Attendees are reminded to adhere to the meeting agenda and not participate in activities prohibited under antitrust and competition laws. Only members of ToIP who have signed the necessary agreements are permitted to participate in this activity beyond an observer role.
  • New Members:
1 minReview of previous action itemsChairs
25 minsWOPPLI PresentationVikas Malhotra

Presentation on 5 core principles for next-generation cybersecurity (link to presentation to be added when available)

  • Architecture Principles and the IEEE proposal made by WOPPLI on cybersecurity for next generation systems
  • WOPPLI (Work, Play, Learn, Live) is a new startup focused on trust in digital ecosystems ("Safe, Fair and Trusted")
  • Digital Trust Statistics (vide ToIP Whitepaper v2.0 - to be published)
  • "It is all about data!" - how it is used, who has access to it. Verification → Data/information access → Data/information availability in honey pots → Updates and resolution times
  • 5 very high level principles - Human Centricity (the human should be the boundary of the control point of the data); Decentralisation; Distribution; Heterogeneity; Self Healing
    • Question/discussion - what about Security and Privacy as principles of architecture
      •  Drummond - at the ToIP these are subsets of the Confidentiality by Design and Default (more on the document)
  • (see slide deck for illustration of the conceptual layout of the proposed principles when viewed against a deployed architecture)
  • IEEE workgroup proposal - Cyber Security for Next Generation Systems
    • explore architecture based on the 5 principles
    • explore architecture and needs for specific technology areas (AI and Autonomous Systems; Web3.0 technologies and Quantum Computing)
    • Proposed Output - Consideration and guidance for Cyber Security for Next generation systems
25 minsKERI + DIDComm
5 mins
  • Review decisions/action items
  • Planning for next meeting 
Chairs

...