This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Summit 2011 Working Sessions/Session028"
John Steven (talk | contribs) m |
|||
(8 intermediate revisions by 6 users not shown) | |||
Line 8: | Line 8: | ||
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1= | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1= | ||
− | | summit_session_attendee_name2 = | + | | summit_session_attendee_name2 = Jim Manico |
− | | summit_session_attendee_email2 = | + | | summit_session_attendee_email2 = [email protected] |
| summit_session_attendee_username2 = | | summit_session_attendee_username2 = | ||
− | | summit_session_attendee_company2= | + | | summit_session_attendee_company2=Infrared Security |
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2= | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2= | ||
Line 26: | Line 26: | ||
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4= | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4= | ||
− | | summit_session_attendee_name5 = | + | | summit_session_attendee_name5 = Neil Matatall |
− | | summit_session_attendee_email5 = | + | | summit_session_attendee_email5 = [email protected] |
− | | summit_session_attendee_username5 = | + | | summit_session_attendee_username5 = nmatatal |
| summit_session_attendee_company5= | | summit_session_attendee_company5= | ||
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5= | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5= | ||
− | | summit_session_attendee_name6 = | + | | summit_session_attendee_name6 = Tony UcedaVelez |
− | | summit_session_attendee_email6 = | + | | summit_session_attendee_email6 = [email protected] |
− | | summit_session_attendee_username6 = | + | | summit_session_attendee_username6 = Tony UcedaVelez |
− | | summit_session_attendee_company6= | + | | summit_session_attendee_company6= VerSprite |
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6= | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6= | ||
− | | summit_session_attendee_name7 = | + | | summit_session_attendee_name7 = Fred Donovan |
− | | summit_session_attendee_email7 = | + | | summit_session_attendee_email7 = [email protected] |
| summit_session_attendee_username7 = | | summit_session_attendee_username7 = | ||
− | | summit_session_attendee_company7= | + | | summit_session_attendee_company7= Attack Logic |
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7= | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7= | ||
− | | summit_session_attendee_name8 = | + | | summit_session_attendee_name8 = Alexandre Miguel Aniceto |
− | | summit_session_attendee_email8 = | + | | summit_session_attendee_email8 = [email protected] |
− | | summit_session_attendee_username8 = | + | | summit_session_attendee_username8 = Alexandre Miguel Aniceto |
− | | summit_session_attendee_company8= | + | | summit_session_attendee_company8= Willway |
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8= | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8= | ||
− | | summit_session_attendee_name9 = | + | | summit_session_attendee_name9 = Antonio Fontes |
− | | summit_session_attendee_email9 = | + | | summit_session_attendee_email9 = [email protected] |
| summit_session_attendee_username9 = | | summit_session_attendee_username9 = | ||
− | | summit_session_attendee_company9= | + | | summit_session_attendee_company9= L7 Sécurité |
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9= | | summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9= | ||
Line 218: | Line 218: | ||
|summit_session_deliverable_name2 = (see objectives) Code Snippets | |summit_session_deliverable_name2 = (see objectives) Code Snippets | ||
− | |summit_session_deliverable_name3 = | + | |summit_session_deliverable_name3 = Plan and Extra-summit work-items for exercises in Phone and RIA contexts during next summit |
|summit_session_deliverable_name4 = | |summit_session_deliverable_name4 = |
Latest revision as of 11:35, 9 February 2011
Global Summit 2011 Home Page
Global Summit 2011 Tracks
Protecting Information Stored Client-Side | ||||||
---|---|---|---|---|---|---|
Please see/use the 'discussion' page for more details about this Working Session | ||||||
Working Sessions Operational Rules - Please see here the general frame of rules. |
WORKING SESSION IDENTIFICATION | ||||||
---|---|---|---|---|---|---|
Short Work Session Description | This section will focus on providing mechanisms for protecting important or sensitive data applications and services need to store client-side. Contexts this section aims to cover include:
For the purpose of the Portugal Summit, the session will focus on development within a "classic" N-tier Java application environment. | |||||
Related Projects (if any) |
| |||||
Email Contacts & Roles | Chair John Steven @ |
Operational Manager |
Mailing list Subscription Page |
WORKING SESSION SPECIFICS | ||||||
---|---|---|---|---|---|---|
Objectives |
| |||||
Venue/Date&Time/Model | Venue/Room OWASP Global Summit Portugal 2011 |
Date & Time
|
Discussion Model participants and attendees |
|
---|
WORKING SESSION OPERATIONAL RESOURCES | ||||||
---|---|---|---|---|---|---|
Projector, whiteboards, markers, Internet connectivity, power |
|
---|
WORKING SESSION ADDITIONAL DETAILS | ||||||
---|---|---|---|---|---|---|
Within the N-tier Java environment, the session will tackle the following development scenarios:
1) - Coat Check
2) - Purse
3) - Nuclear Briefcase
Future summits will address the following two contexts as well:
However, for the purpose of this coming session, we will only conduct planning and 'homework assignments' for these contexts in the next session (likely Minnesota). The session will work each of the three above development scenarios within the n-tier environment using the following work stream:
Participants will be taken through the above work stream, an abbreviated 'build security in' process designed to focus on implementation (rather than documentation or assurance), to restructure applications to demonstrate security patterns, integrate existing security functionality, or build security controls as necessary. |
WORKING SESSION OUTCOMES / DELIVERABLES | ||
---|---|---|
Proposed by Working Group | Approved by OWASP Board | |
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. | ||
Plan and Extra-summit work-items for exercises in Phone and RIA contexts during next summit |
After the Board Meeting - fill in here. | |
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. |
Working Session Participants
(Add you name by clicking "edit" on the tab on the upper left side of this page)
WORKING SESSION PARTICIPANTS | ||||||
---|---|---|---|---|---|---|
Name | Company | Notes & reason for participating, issues to be discussed/addressed | ||||
Elke Roth-Mandutz @ |
GSO-University of Applied Sciences |
| ||||
Jim Manico @ |
Infrared Security |
| ||||
Chris Schmidt @ |
Aspect Security |
| ||||
Justin Clarke @ |
Gotham Digital Science |
| ||||
Neil Matatall @ |
| |||||
Tony UcedaVelez @ |
VerSprite |
| ||||
Fred Donovan @ |
Attack Logic |
| ||||
Alexandre Miguel Aniceto @ |
Willway |
| ||||
Antonio Fontes @ |
L7 Sécurité |
| ||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
|