Trust in Trust Frameworks, the missing link  Abbie Barbir, Ph.D  OASIS Board of Directors,

Slides:



Advertisements
Similar presentations
Trust Elevation through Contextual Authentication Regional Arab Forum on Cybersecurity Giza (Smart Village)-Egypt, December 2011 Abbie Barbir,
Advertisements

The Need for Trusted Credentials Information Assurance in Cyberspace Mary Mitchell Deputy Associate Administrator Office of Electronic Government & Technology.
Digital Identity Group May GIXEL  GIXEL is the professional association of electronic component and system industries in France. It brings together.
The Federation for Identity and Cross-Credentialing Systems (FiXs) FiXs ® - Federated and Secure Identity Management in Operation Implementing.
IDESG Goals & Work-plans for 2013 and beyond Brett McDowell IDESG Management Council Chair
Cross Sector Digital Identity Initiative March 12, 2014 Hearing on the National Strategy for Trusted Identities in Cyberspace (NSTIC) Cross Sector Digital.
U.S. Environmental Protection Agency Central Data Exchange EPA E-Authentication Pilot NOLA Network Node Workshop February 28, 2005.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Building Trusted Transactions Identity Authentication & Attribute Exchange In Public and Private Federations OASIS Conference September 2010 Joni Brennan,
EMayor Confidential ProprietaryIST Priority - No Venue:Bolzano Author(s): Nineta Polemi ( ) Organisations: University of Pireus.
Geneva, Switzerland, September 2014 Introduction of ISO/IEC Identity Proofing Patrick Curry Director, British Business Federation Authority.
Stork is an EU co-funded project INFSO-ICT-PSP STORK PRESENTATION STORK Presentation Lithuania March 2010.
OASIS Trust Elevation Elevate Trust in Electronic Identities Abbie Barbir, Ph.D Co-Chair OASIS Trust Elevation TC.
Introduction to OIX: A Market Solution to Online Identity Trust Don Thibeau.
CNRI Handle System and its Applications
Functional Model Workstream 1: Functional Element Development.
PRESENTATION OF ETSI © ETSI All rights reserved Sophia Antipolis, 22 May 2014 Luis Jorge Romero Director General, ETSI.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Federated Identity Management in New Zealand Sat Mandri Service Manager TNC15 REFEDs Meeting, 14 th June 2015.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Synthesis of the Eurosmart’ Technical Day on eID interoperability Bruno Rouchouze, ID SG Convenor Porvoo 12, Grosseto - Italy.
DOCUMENT #:GSC15-PLEN-26 FOR:Presentation SOURCE: ATIS AGENDA ITEM: PLEN 6.4 CONTACT(S): James McEachern ATIS Identity Management.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
TFTM TFTM Committee working call to discuss how to describe the “IDESG-Acknowledged Identity Ecosystem” in its interim or long term state November.
Cyber Authentication Renewal Project Executive Overview June – minute Brief.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
ITU-T X.1254 | ISO/IEC An Overview of the Entity Authentication Assurance Framework.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All SMART GRID ICT: SECURITY, INTEROPERABILITY & NEXT STEPS John O’Neill, Senior Project Manager CSA.
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Shibboleth: An Introduction
OASIS Organization for the Advancement of Structured Information Standards.
Overview of Issues and Interests in Standards and Interoperability Mary Saunders Chief, Standards Services Division NIST.
Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.
Identity Assurance Emory University Security Conference March 26, 2008.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
OASIS Cloud Authorization TC (CloudAuthZ) Rakesh Radhakrishnan, TC Member.
Don Thibeau, Executive Director, OpenID Foundation (OIDF) Drummond Reed, Executive Director, Information Card Foundation (ICF)
Creating a European entity Management Architecture for eGovernment Id GUIDE Keiron Salt
National Geospatial Enterprise Architecture N S D I National Spatial Data Infrastructure An Architectural Process Overview Presented by Eliot Christian.
19-20 October 2010 IT Directors’ Group meeting 1 Item 6 of the agenda ISA programme Pascal JACQUES Unit B2 - Methodology/Research Local Informatics Security.
Slide 1 Eurostat Unit B3 – Statistical Information Technology ITDG on October 2004 IDAbc Eurostat’s proposal for a statistical project in the European.
Fostering worldwide interoperabilityGeneva, July 2009 ATIS Identity Management Standards Development James McEachern, Manager – Application Enabler.
Stork is an EU co-funded project INFSO-ICT-PSP STORK PRESENTATION Frank LEYMAN Manager International Relations 04/06/2009.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
Presentation Title Presenter Session Document Name/Version Submission/Revision date: XX April 2016.
International Telecommunication Union ICT Security Role in National Trusted Identities Initiatives Abbie Barbir, PhD ITU-T Study Group 17 Identity Management.
Law Enforcement Information Sharing Program (LEISP) Federated Identity Management Pilot February 27, 2006.
Cross-sector and user-centric AAI
Update from the Faster Payments Task Force
Higher Education’s Role in the Identity Ecosystem
SPOCS : Simple Procedures Online for Crossborder Services
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
NAAS 2.0 Features and Enhancements
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
The E-Authentication Initiative
HIMSS National Conference New Orleans Convention Center
Introduction of ISO/IEC Identity Proofing
The e-government Conference main issues
Reinhard Scholl, GTSC-7 Chairman
Jeremy Grant Coordinator Better Identity Coalition
Presentation transcript:

Trust in Trust Frameworks, the missing link  Abbie Barbir, Ph.D  OASIS Board of Directors,

OASIS Overview  Organization for the Advancement of Structured Information Standards (OASIS) Mission is to promote and encourage the use of structured information standards such as XML  Development, convergence and adoption of e-business standards  Development of vertical industry applications, conformance tests, interoperability specifications  Lightweight, open process designed to promote consensus  Not-for-profit consortium  Founded in 1993 as SGML Open  Global representation  5,000+ participants representing  600+ organizations and individual members in 100+ countries

Current Board of Directors

Global Coverage Europe in OASIS  OASIS has become increasingly European  European Office established at AFNET OASIS Member Section Program  Offering a unique advantage for independent groups interested in advancing and promoting the intelligent use of open standards  maintain their own identities as distinct organizations while gaining access to OASIS infrastructure, resources, reputation, administrative support, and expertise  Current Member Sections

Current Member Sections 1/2  OASIS AMQP  Advances business messaging interoperability within middleware, mobile, and Cloud-based environments.  OASIS CGM  Web graphics standards  OASIS Blue  Open standards for smart energy grids  OASIS eGov  Focal point for discussions of governmental and public administration requirements for e-business standardization.  OASIS Emergency Interoperability  Accelerates development, adoption, application, and implementation of emergency interoperability and communications standards

Current Member Sections 2/2  OASIS Idtrust  Development and adoption of standards for identity and trusted infrastructure technologies, policies, and practices  OASIS LegalXML  Unites legal and technical experts in a common forum to create standards for the electronic exchange of legal data.  OASIS Open CSA  Advances open standards that simplify SOA application development via the Service Component Architecture (SCA) and Service Data Objects (SDO) families of specifications.  OASIS Web Services Interoperability (WS-I)  Advances Best Practices for selected groups of standards, across platforms, operating systems, and programming languages.

7 The threat: Cyber crime

Cyber crime losses are growing 8

Identity crime affects all sectors

Identity Management Drivers Financial Institutions Identity Theft Drivers

 Joint work with ISO JTC1/SC 27/WG5 and ITU-T SG 17/Q10  Standardizes four Levels of Assurance (LoAs)  to promote trust,  improve interoperability, and  facilitate identity federation across organizations and borders  Why Work on Authentication Assurance  Provides a consistent basis for trust and Promotes identity federation  Enables credential re-use in different contexts  Promotes efficiency and reduces costs  Enables cross-organization and cross-border services  Provides framework for further standardization  Establish foundation for liability and other legal aspects  Brings together existing work in this area and will not “re-invent the wheel”:  Kantara Initiative, ITU-T, NIST standards efforts, OASIS  New Zealand, Australian, U.S., European, and Canadian e-government efforts  EU research efforts (STORK, IDABC, etc Entity Authentication Assurance

Case Study The Problem  Most U.S. government agencies want to offer more online applications to citizens:  Research, grant proposals, taxes, benefits, data sharing  Authentication is a large barrier to deployment:  There is no universal citizen credential  Application-specific credentials are difficult and expensive:  Identity proofing  Forgotten passwords from infrequent usage  Help desks and other maintenance overhead  Multiple collections of personally identifiable information (PII) Possible Solutions  Government agencies can act as the Relying Party (RP) rather than the Identity Service Provider (IdSP) and accept credentials issued by “trusted” external organizations  X.eaa Standard can be used to develop trust framework and adoption process, that defines IdsP requirements for the LoAs  IdsP certification program based on a trust framework  In Canada BC government is doing pilot studies to use open standards credentials from several certified IdsPs

13 Current Model: 4 Levels of Assurance LevelDescription 1 - Low Little or no confidence in the asserted identity 2 - Medium Some confidence in the asserted identity 3 - High High confidence in the asserted identity 4 – Very High Very high confidence in the asserted identity

OASIS Trust Elevation TC  OASIS Electronic Identity Credential Trust Elevation Methods (Trust Elevation) TC   Works to define a set of standardized protocols that service providers may use to elevate the trust in an electronic identity credential presented to them for authentication  Respond to suggestions from the public sector, including the U.S. National Strategy for Trusted Identities in Cyberspace (NSTIC).  Promotes interoperability among multiple identity providers--and among multiple identity federations and frameworks--by facilitating clear communication about common and comparable operations to present, evaluate and apply identity [data/assertions] to sets of declared authorization levels

Towards Trust Frameworks Some Pain Points  Internet transactions are anonymous (low trust)  Value transactions are identity based o Anonymous  to identity enabled  Enable Identity based systems  while protecting privacy (PII)  Isolation of Issuer and target Identity  Enable the right to forget  Identity dashboard for user to keep control identity and related data (Data Ownership)  Consumer Protection  Identity Service Provider Liabilities  Audit, compliance and policy enforcement  Simple to use system

Current Basic “Trust Triangle”  User has direct trust relationship with IDSP and RP  How can the IDSP and RP trust each other? * Source OIX

Where trust Frameworks Fit Technology Interoperability (Identity Protocols) Usability (User Experience Ceremonies) Market Expansion & Adoption Hardware Devices (Security Capabilities) Internet Identity Layer Policy Interoperability (Trust Frameworks) * Source OIX

Should we have Trust in Trust Frameworks Key question how much do we trust the identity enrolment stage Do we Trust Breeder Documents and verification process? The Elephant in the room; The rise of Synthetic ID So what are Synthetic ID? Synthetic identity happens when a criminal steals bits and pieces of info from different people and creates a new identity with No Carbon Copy. A social security number is used with a different name and date of birth. Difficult to detect because of all the mismatched pieces of information. Criminals are getting bold Trend to claim ID Theft as opposed to account busting Need better means of validating breeder documents Not all breeder documents are Trustable

Standards are like parachutes. They work best when they're open. Q&A