This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Summit 2011 Working Sessions/Session028"
From OWASP
Sandra Paiva (talk | contribs) |
John Steven (talk | contribs) m |
||
| Line 110: | Line 110: | ||
|- | |- | ||
| − | | short_working_session_description= | + | | short_working_session_description=This section will focus on providing mechanisms for protecting important or sensitive data applications and services need to store client-side. Contexts this section aims to cover include: |
| + | |||
| + | * Personal or user-specific information | ||
| + | * Application-specific information (tokens, secrets) | ||
| + | * Key configuration data, other EIS/service information | ||
| + | |||
| + | This section will treat these topics over three contexts: | ||
| + | |||
| + | * "Classic" 3-tier application | ||
| + | * Phones (ios, Android) | ||
| + | * RIA | ||
|- | |- | ||
Revision as of 03:20, 25 January 2011
Global Summit 2011 Home Page
Global Summit 2011 Tracks
| Please see/use the 'discussion' page for more details about this Working Session | ||||||
|---|---|---|---|---|---|---|
| Working Sessions Operational Rules - Please see here the general frame of rules. |
| WORKING SESSION IDENTIFICATION | ||||||
|---|---|---|---|---|---|---|
| Short Work Session Description | This section will focus on providing mechanisms for protecting important or sensitive data applications and services need to store client-side. Contexts this section aims to cover include:
This section will treat these topics over three contexts:
| |||||
| Related Projects (if any) |
| |||||
| Email Contacts & Roles | Chair John Steven @ |
Operational Manager |
Mailing list Subscription Page | |||
| WORKING SESSION SPECIFICS | ||||||
|---|---|---|---|---|---|---|
| Objectives | ||||||
| Venue/Date&Time/Model | Venue/Room OWASP Global Summit Portugal 2011 |
Date & Time
|
Discussion Model participants and attendees | |||
| |
|---|
| WORKING SESSION OPERATIONAL RESOURCES | ||||||
|---|---|---|---|---|---|---|
| Projector, whiteboards, markers, Internet connectivity, power | ||||||
| |
|---|
| WORKING SESSION ADDITIONAL DETAILS | ||||||
|---|---|---|---|---|---|---|
| WORKING SESSION OUTCOMES / DELIVERABLES | ||
|---|---|---|
| Proposed by Working Group | Approved by OWASP Board | |
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
Working Session Participants
(Add you name by clicking "edit" on the tab on the upper left side of this page)
| WORKING SESSION PARTICIPANTS | ||||||
|---|---|---|---|---|---|---|
| Name | Company | Notes & reason for participating, issues to be discussed/addressed | ||||
| Elke Roth-Mandutz @ |
GSO-University of Applied Sciences |
| ||||
| Colin Watson |
| |||||
| Chris Schmidt @ |
Aspect Security |
| ||||
| Justin Clarke @ |
Gotham Digital Science |
| ||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||