Minutes: Martijn Steenbakkers, Joni Hahkala Encrypted data storage (EDS) (John) * How to split the key? Joni: We're considerig two methods, Secret sharing algorithm and splitting into two and xoring them to make third. This goes to three places. In this way you need 2 out of 3 to be up. * Predrag: what about doing file striping? Joni: Yes, but that's not secure enough. Delegation (Joni) * Peter: How to do the porttype. Joni: merge the wsdls... DMSecurity (Peter) * CAS model. All capabilities for the user have to be signed. Also the source and destination TURL. * Oscar: use VOMS kind of model, IO server to sign an attribute cert that gets embedded to the user cert just like a VOMS cert is currently. Predrag signed message type of thing. Token. (sign action). Need to discuss. GPBOX (Vincenzo) * Erwin: Is there any way of knowing if a site doesn't accept the VO policy. notification. The VO can then in a policy ban them if they so wish.