Some people and specs associate holder of key with asymmetric keys.  Proof of 
possession is thought to be a broader category including symmetric and key 
agreement eg http://tools.ietf.org/html/rfc2875.

NIST defines the term PoP Protocol 
http://fismapedia.org/index.php?title=Term:Proof_of_Possession_Protocol

In SAML the saml:SubjectConfirmation method  is called 
urn:oasis:names:tc:SAML:2.0:cm:holder-of-key 

In WS* the term proof of possession is more common.

So I think for this document as an overview "Proof of Possession (PoP) 
Architecture" is fine.

John B.

On Apr 3, 2014, at 12:41 PM, Phil Hunt <phil.h...@oracle.com> wrote:

> What was wrong with HOK?
> 
> Aside: Why was “the” so important in HOTK?
> 
> Phil
> 
> @independentid
> www.independentid.com
> phil.h...@oracle.com
> 
> On Apr 3, 2014, at 9:37 AM, Anil Saldhana <anil.saldh...@redhat.com> wrote:
> 
>> Prateek,
>>   why not just use "proof"? 
>> 
>> draft-hunt-oauth-proof-architecture-00.txt
>> 
>> Is that allowed by IETF?
>> 
>> 
>> Regards,
>> Anil
>> 
>> On 04/03/2014 11:30 AM, Prateek Mishra wrote:
>>> "key confirmed" or "key confirmation" is another term that is widely used 
>>> for these use-cases
>>>> I really *like* the name "proof of possession", but I think the acronym 
>>>> PoP is going to be confused with POP.  HOTK has the advantage of not being 
>>>> a homonym for aything else.  What about "Possession Proof"?
>>>>  
>>>> -bill
>>>> 
>>>> 
>>>> --------------------------------
>>>> William J. Mills
>>>> "Paranoid" MUX Yahoo!
>>>> 
>>>> On Thursday, April 3, 2014 1:38 AM, "internet-dra...@ietf.org" 
>>>> <internet-dra...@ietf.org> wrote:
>>>> 
>>>> A new version of I-D, draft-hunt-oauth-pop-architecture-00.txt
>>>> has been successfully submitted by Hannes Tschofenig and posted to the
>>>> IETF repository.
>>>> 
>>>> Name:        draft-hunt-oauth-pop-architecture
>>>> Revision:    00
>>>> Title:        OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
>>>> Document date:    2014-04-03
>>>> Group:        Individual Submission
>>>> Pages:        21
>>>> URL:            
>>>> http://www.ietf.org/internet-drafts/draft-hunt-oauth-pop-architecture-00.txt
>>>> Status:        
>>>> https://datatracker.ietf.org/doc/draft-hunt-oauth-pop-architecture/
>>>> Htmlized:      
>>>> http://tools.ietf.org/html/draft-hunt-oauth-pop-architecture-00
>>>> 
>>>> 
>>>> Abstract:
>>>>   The OAuth 2.0 bearer token specification, as defined in RFC 6750,
>>>>   allows any party in possession of a bearer token (a "bearer") to get
>>>>   access to the associated resources (without demonstrating possession
>>>>   of a cryptographic key).  To prevent misuse, bearer tokens must to be
>>>>   protected from disclosure in transit and at rest.
>>>> 
>>>>   Some scenarios demand additional security protection whereby a client
>>>>   needs to demonstrate possession of cryptographic keying material when
>>>>   accessing a protected resource.  This document motivates the
>>>>   development of the OAuth 2.0 proof-of-possession security mechanism.
>>>> 
>>>>                                                                            
>>>>        
>>>> 
>>>> 
>>>> Please note that it may take a couple of minutes from the time of 
>>>> submission
>>>> until the htmlized version and diff are available at tools.ietf.org.
>>>> 
>>>> The IETF Secretariat
>>>> 
>>>> 
>>  
>> _______________________________________________
>> OAuth mailing list
>> OAuth@ietf.org
>> https://www.ietf.org/mailman/listinfo/oauth
> 
> _______________________________________________
> OAuth mailing list
> OAuth@ietf.org
> https://www.ietf.org/mailman/listinfo/oauth

_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to