Sorry — here’s a better subject line!

On 21 Aug 2015, at 9:01 AM, Eve Maler <eve@xmlgrrl.com> wrote:

Attending: Eve, Andrew, Jon, Adrian, Randy, Dazza, Tom, Mark, Jeff


  • Analyze new (positive and negative) use cases sent to the list
    • Is this list complete enough to be going on with, for our purposes?
    • Do we need to capture use cases for different “topologies" (deployment ecosystems) too?
  • What would “structuring the transaction” look like in terms of accomplishing our mission?
  • How would consent receipts/logging/auditing come into play?
Dazza can sweep questions and answers into the wiki. The idea with the “roles” page is also to capture term definitions. “Principal” is often used in the law for a individual person. There’s also “Agent” and “Third Party”, to complete the triangle. So perhaps we can leverage “Principal” when we talk about any one use case — if we focus on Alice, is she the principal? or is, say, someone else the principal in this use case?

Does UMA allow RqPs to connect to the data of ROs “by reference”? No; RqPs (and their client applications) really do “get” the data. Adrian wants to stress that UMA differs from traditional PHR models, however. In contrast to shinkwrapped licenses, consent directive models, and any static prior-consent model, UMA enables fine-grained revocation, adjustment, remediation, and transactional authorization of data access.

The value proposition, as Adrian sees it, to putting this type of system in place, is that breaches would be detected instantly rather than in many months. (This is interesting but offtopic; can Adrian write this up for further consideration?)

Consent vs. Authorization - should we see a distinction here? There are definitions of consent in various laws.

User Control vs. User Management - let’s suss this out too. Does this come out of 29100? Let’s just collect use cases and note their potential applicability to the terms.

Is the use case where Alice runs her own RS interesting to us? Adrian believes it’s not particularly interesting (personal clouds/data stores aside). His interest runs to a personally run AS. Let’s take a use case with that assumption and work it through. Eve believes we also need to run through an institutionally run AS. Where would the consent receipts get sent? They would kind of go to the same place that they’re generated. Is that a problem?

This seems to be our first “minimal pair” of use cases. If we assume Alice is the principal, that’s our perspective. What vertical (if any) should we pick? Healthcare has the danger of being not very cross-jurisdictional. Could we pick something like students and schools, which has privacy concerns (in the US it would be FERPA), or merchant and consumer transactions (which have trade and sale-of-goods laws)?

As an aside, Eve notes that the UMA authorization framework could actually be used as a payment framework. “Claims” demanded for access could be something like a receipt proving payment. Dazza mentions US’s FCRA coming into play in that case. And then the FIPPs come in.

Adrian’s concern about schools is that they tend to use identity federations, which he doesn’t want to put into play. Could we avoid that element in putting together our use cases? Eve’s point about “topologies” above was about how many "access federation" parties are in the picture, and we have been talking about that so far — but can we just leave the equivalent identity federation topologies aside?

AI: Dazza and Eve: Coordinate on producing 2 or 3 candidate distinctive use cases that flesh out the AS possibilities, non-vertical-specific and identity-federation-agnostic.

Eve Maler | cell +1 425.345.6756 | Skype: xmlgrrl | Twitter: @xmlgrrl | Calendar: xmlgrrl@gmail.com

_______________________________________________
WG-UMA mailing list
WG-UMA@kantarainitiative.org
http://kantarainitiative.org/mailman/listinfo/wg-uma


Eve Maler | cell +1 425.345.6756 | Skype: xmlgrrl | Twitter: @xmlgrrl | Calendar: xmlgrrl@gmail.com