Register now for the OASIS Series of SECURITY Standards Webinars!

It's everything you always wanted to know about security standards--from the people who create them.

Beginning 9 July, the OASIS international open standards consortium will present six free webinars covering everything from access control to provisioning, from authentication to encryption, from biometrics to digital signatures. Each webinar will be hosted by a different OASIS Technical Committee and cover established standards including SAML, XACML, SPML, and DSS, as well as exciting new work.

"Series of SECURITY Standards Webinars" timeframe:
3:00PM GMT, 12:00AM Tokyo, 8:00AM San Francisco, 11:00AM Boston, 4:00PM London.
Attend one or all.

  1. Service Provisioning Mark-up Language (SPML)

    Service Provisioning Mark-up Language (SPML): Where we are, how we got here, and where we are going.

    The OASIS Provisioning Services Technical Committee was charted to create an industry standard web service provisioning protocol. This Webinar will give history of SPML, starting with the effort to consolidate three vendor standards (ADPr, ITML, and XRPM) to the more recent drafting of the SPML 2.0 specification. An overview of the SPML 2.0 standard will be provided with examples of how it is used in different provisioning scenarios. Additional topics that be covered include Federated Provisioning and Standard Provisioning Schemas.

    SPML is a milestone in the development of a standards-based approach for the management of user identities across heterogeneous applications. Products that leverage SPML can help organizations provide user access to resources without custom provisioning connectors.

    Monday, 9 July 2007
    Speakers: Kent Spaulding - Chief Technology Officer, Tripod Technology Group
    Jeff Bohren - Software Architect, BMC Software

    Reserve your Webinar seat now at:

  2. Enterprise Key Management Infrastructure (EKMI)

    Using Enterprise Key Management Infrastructure (EKMI) to Secure your Data Across the Entire Enterprise.

    For over two decades, companies have been focused on protecting the perimeter of the enterprise while leaving the core exposed. Securing the core - the data - through enterprise-wide encryption has not been an option for most companies due to the lack of standards in symmetric key-management. OASIS - the Organization for the Advancement of Structured Information Systems - has taken up the gauntlet and created an Enterprise Key Management.

    Infrastructure Technical Committee (EKMI-TC) with four goals:

    1. To standardize on Symmetric Key Services Markup Language (SKSML).
    2. To create Implementation and Operations Guidelines for the creation of enterprise-scale EKMI.
    3. To create Audit Guidelines for Information Security Auditors to audit EKMIs.
    4. To create an interoperability test-suite for conformance testing of SKSML implementations.

    In this session, you will hear of architecture and see an open-source implementation of an SKMS implementing the proposed SKSML standard. You will understand how to secure your data across the entire enterprise, while controlling access to its decryption keys from a single focal point.

    Tuesday, 10 July 2007
    Speaker: Arshad Noor - Founder and CTO, StrongAuth, Inc.

    Reserve your Webinar seat now at:

  3. Biometric Identity Assurance Services (BIAS)

    Biometric Security - Roles & Resource

    Biometric Technology is carving out its place in the security arena - IT security, national security, and otherwise. There is a growing interest in biometrics and biometric systems are becoming more complex as they are integrated into larger identity management and credentialing systems. Today, they are increasingly being used in large-scale systems built on an SOA. A gap exists in the current set of biometric standards in the area of remotely invoked biometric services. The goal of this effort is to fill that gap by defining a standard method for accessing a set of such services over a services oriented framework.

    This seminar provides a brief overview of this interesting new technology and discusses its role in the broader security landscape. The OASIS Biometric Identity Assurance Services (BIAS) Technical Committee defines a framework for deploying and invoking biometrics-based identity assurance capabilities that can be readily accessed using services-based frameworks (e.g., web services).

    The webinar will also demonstrate how the OASIS (BIAS) Technical Committee supports the use of biometrics within a services-oriented environment.

    Wednesday, 11 July 2007
    Speakers: Guy Swope - US-VISIT Solution Architect, Raytheon
    Catherine Tilton - VP Standards & Emerging Technologies, Daon

    Reserve your Webinar seat now at:

  4. eXtensible Access Control Markup Language (XACML)

    OASIS eXtensible Access Control Markup Language (XACML) - Fine Grained Access Control - Present and Future

    This webinar will consist of three distinct presentations including an XACML Overview, XACML v3.0 and Web Services Profile of XACML (WS-XACML).

    1. Overview - XACML is a language for making fine grained access control decisions in large scale environments. This portion of the presentation will summarize the major features of XACML and show how policies are evaluated. It will describe the unusual features of XACML which make it suitable for deployment in federated environments. It will also briefly describe the XACML Profiles, including the SAML Decision Request, the RBAC Profile and the Privacy Profile.
    2. XACML 3.0 - This presentation gives an overview of the main new features in the upcoming XACML 3.0. In XACML 2.0 there was no built-in support for expressing the right to generate policies. XACML 3.0 introduces a delegation mechanism for solving this deficiency. XACML 3.0 also generalizes the attribute model, allowing users to specify their own categories for attributes.
    3. Web Services Profile of XACML (WS-XACML) - There is a hole in the current proposed standards for Web Services: policies for authorization and privacy. Since XACML is the approved OASIS and ITU-T standard for authorization and implementation-level privacy policies, the OASIS XACML Technical Committee is working on a specification for the use of XACML to specify such policies for use with Web Services. This presentation gives a high-level overview of the need for authorization and privacy policies in Web Services, and how WS-XACML works to satisfy that need by building on existing and in-progress standards such as XACML, P3P, and WS-Policy.

    Thursday, 12 July 2007
    Speakers: Erik Rissanen - Founder and CTO, Axiomatics AB
    Hal Lockhart - Principal Engineering Technologist, BEA Systems
    Anne Anderson - Senior Staff Engineer, Sun Microsystems

    Reserve your Webinar seat now at:

  5. Security Authorization and Assertion Markup Language (SAML)

    OASIS Security Services (SAML) for Identity Federation - What's It All About?

    SAML is the most widely deployed standard for Identity Federation. This talk is all about how SAML was developed, how it works, the key concepts, how SAML is used in the real world and what new features are coming soon. Learn how SAML can provide flexible solutions to many common problems in Identity Management and Federation.

    Friday, 13 July 2007
    Speaker: Hal Lockhart - Principal Engineering Technologist, BEA Systems

    Reserve your Webinar seat now at:

  6. Digital Signature Services (DSS)

    Digital Signature Services (DSS) OASIS Standard Assures Authenticity of Data for Web Services

    The Digital Signature Services (DSS) specifications define two XML-based request/response protocols - a signing protocol and a verifying protocol to use specialised servers for the creation and verification of signatures under control of remote clients. Through these protocols a client can send documents to a server and receive back a signature on the documents; or send documents and a signature to a server, and receive back an answer on whether the signature verifies the documents.

    DSS makes it easy to use digital signatures because it lets companies control their signature applications on an organizational basis through a network-based server instead of being managed individually, signing keys are maintained on a secure server with controls that minimize the risk of compromise. Signatures can still be created by authorized individuals, but instead of requiring specialized signing equipment for each person, DSS allows organizations to use their existing authentication mechanisms, such as passwords, two factors, biometrics, etc.

    Features included in the protocol for increasing the control of the client on the signature creation and validation processes carried by servers, will be presented. Finally, the most relevant profiles defined that optimise and/or extend the core protocol for specific use cases, will also be presented.

    Monday, 16 July 2007
    Speakers: Nick Pope - Thales eSecurity Ltd.
    Juan Carlos Cruellas - Centre d'aplicacions avanades d'Internet (CANET)

    Reserve your Webinar seat now at:

Gear Image