Antje Hünerkoch (con terra)

Slides:



Advertisements
Similar presentations
SDI Business Phases and derived INSPIRE Horizontal Services Relates to INSPIRE DT Network Services, DT Sharing Relates to OGC GeoDRM WG, Price & Order.
Advertisements

Rüdiger Gartmann, on behalf of Andreas Wytzisk con terra GmbH, Münster, Germany Monetising SDIs... eLicensing and ePayment for Spatial Services.
Chinese-European Workshop on Digital Preservation, Beijing July 14 – Network of Expertise in Digital Preservation 1 National and International.
Spatial Data Infrastructure: Concepts and Components Geog 458: Map Sources and Errors March 6, 2006.
A Public Web Services Security Framework Based on Current and Future Usage Scenarios J.Thelin, Chief Architect PJ.Murray, Product Manager Cape Clear Software.
Product and Technology News Georg Bommer, Inter-Networking AG (Switzerland)
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Conception of a Geospatial Data Infrastructure in Northrhine- Westphalia, Germany (GDI) Institute for Geoinformatics (IfGI), University of Muenster Robert-Koch-Str.
Social Economic and Legal Issues in Digital Libraries Group 7: Graham Hill Bianna Ine Matthew McGovern Francine Pfeffer.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
1 Enabling Secure Internet Access with ISA Server.
Fine-grained Access Control for Spatial Services...e nforcing the Need-to-Know Principle Rüdiger Gartmann con terra GmbH, Münster, Germany.
Portal … from the trenches! Deployment Patterns
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
1 / x Spatial Data Infrastructure Feedback on exercise data.
GDI NRW and GEOBASIS.NRW: Common Manifesto for Interoperability Northrhine-Westfalia is building together with its communities, the GIS industry and the.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
52°North Simon Jirka – VGIrisk Workshop - April 2011.
ANVIL – A Rough Idea Martin Ford – ISLinkup (for GEOBASE + OGCE Team)
Privacy Codes of Conduct as a self- regulatory approach to cope with restrictions on transborder data flow Dr. Anja Miedbrodt Exemplified with the help.
WPS Application Patterns at the Workshop “Models For Scientific Exploitation Of EO Data” ESRIN, October 2012 Albert Remke & Daniel Nüst 52°North Initiative.
Szekesfehervar 2012 Korkyt Ata Kyzylorda State University Korkyt Ata Kyzylorda State University Application of GIS for processing of soil data Yeleuova.
User Perspective in Nature Conservation Co-funded by the Community Programme eContentplus ECP-2007-GEO
INSPIRE/GINIE Workshop Objectives To discuss directions for the construction of a European Spatial Data Infrastructure (ESDI) Share the current State of.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Introduction to Secure Messaging Issues Russ Chung, American Eagle Group The Open Group Messaging Forum July 24, 2003.
Copyright © 2004 Pearson Education, Inc. Slide 5-1 Securing Channels of Communication Secure Sockets Layer (SSL): Most common form of securing channels.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Arnold Bregt From GIS-application to geo- knowledge infrastructure.
Sep , 2006 v FME Worldwide User Conference - Vancouver SpatialDirect in a European Cross Border Project Mark Doering & Christian Heisig, con terra,
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Geoportal and Web Map Server of the Estonian Land Board 17th Conference of the LIBER Groupe des Cartothécaires, Estonia June 2010 Kristian Teiter.
From FAUST to VOYAGER efforts to maintain map and geodata stocks 17th Conference of the LIBER Groupe des Cartothécaires TALLINN, Estonia June 2010.
CLARIN work packages. Conference Place yyyy-mm-dd
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
Arnold Bregt From GIS-application to geo- knowledge infrastructure.
UNIVERSITY OF ZAGREB FACULTY OF GEODESY V. Cetl, M. Lapaine NSDI in Croatia (NUTS level 1)
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
The Benefits of Indigo SMS Aumne, Inc. Tel: Fax: Commerce Ct Suite 200, Lisle, IL USA.
NSDI: State of Play NSDI is considered to be an issue of all players – Foundation BEV NMA since 1925, AGEO 1998, plattform for GI, discussion forum for.
On the Road towards Arts and Humanities e-Infrastructure in Germany Dr. Heike Neuroth Göttingen State & University Library Max Planck Digital Library Berlin.
ACGT Architecture and Grid Infrastructure Juliusz Pukacki ‏ EGEE Conference Budapest, 4 October 2007.
Contextual Layers – existing and near-term Boundaries  Country – host  State – host  County – host  MSA – access Bureau of Census TIGER WMS  Tribal.
OPENGIS for Water Management OPENGIS for Water Management in Developing Countries JRC Activities on Water Knowledge Management In Developing Countries.
1 /16 1 Arnulf Christl, WhereGroup Bonn Case Study: PRTR Pollutant Release and Transfer Registry Germany Copyright: WhereGroup GmbH & Co. KG.WhereGroup.
ArcGIS for Server Security: Advanced
The Global Soil Information System
Components People Technology Policies Standards Spatial Data.
Spatial Data Infrastructure
GvSIG Online What is it? Comprehensive platform for the implementation of Spatial Data Infrastructures (SDIs) Fast and powerful solution for setting up.
System Overview Training on the use of the new countrystat
Geo Rights Management (GeoRM) Hats and Doors?
Tomas Kliment Junior Researcher Italian National Research Council
System Overview Training on the use of the new countrystat
18th Annual World Bank Conference 2017, Land and Poverty :
CHAPTER 2 CREATING AN ARCHITECTURAL DESIGN.
6.6 Firewalls Packet Filter (=filtering router)
IS4550 Security Policies and Implementation
Yukon Geomatics: Delivering Yukon’s SDI & Enabling Citizens
Geospatial Data Use and sharing Concepts
The e-government and the OPAC
SAMANVITHA RAMAYANAM 18TH FEBRUARY 2010 CPE 691
National geodata policies and Statistics Norway
Geographical Information Systems for Statistics Luxembourg March 2008
SDI from a technological perspective: Standards
The WISE public website First protoype WISE viewer Stefan Jensen EEA project manager on WISE WISE end user workshop Brussels The access.
Presentation transcript:

Antje Hünerkoch (con terra) Management of Users and Access Constraints in Spatial Data Infrastructures Antje Hünerkoch (con terra)

con terra Founded in 1993 Spin-off of the University of Muenster, Institute of Geoinformatics Company of the ESRI group since 2006 85 employees Main expertise: Design and implementation of GIS-based solutions Enterprise GIS, spatial data infrastructures, metadata, Web2.0, Spatial ETL

Open Source Initiative 52°North Principal Cooperation Partners Institute of Geoinformatics (University of Münster, Germany) con terra GmbH (Münster, Germany) ITC (Enschede, Netherlands) ESRI Inc. (Redlands, USA) 52°North Communities Security & GeoRM Sensor Web Geoprocessing Integrated Land and Water Information System (ILWIS) Semantics Metadata Management ILWIS - Remote Sensing and GIS software Integrated Land and Water Information System (ILWIS) Text

Why control access in SDIs? Not every resource should be used by anyone Sensitive or private content may need to be restricted to certain users Protection of Intellectual Property Rights, GeoDRM Establishment of a legal frame for usage (e.g. agreement to terms-of-use) Payment for service usage Gather knowledge about who is using your resources  For some content access control is necessary in order to get published SDI‘s are all about sharing – why control and constrain access?

How to control access in SDIs? Access control should not interfere with interoperability „Embedding without touching“  Use a proxy pattern to tunnel service usage sdi.suite securityManager with Open Source based core (52°north security modules: Web Authentication Service und Web Security Service) Authentication through: HTTP Basic Authentication for use in standard clients SAML for integration scenarios

How does this work? Proxy acts as a “Gatekeeper” Policy Enforcement Point (Web Security Service) Proxy handles Enforcement of policies to requests/responses Different types of conditions to check Different types of obligations to perform (filtering, draw copyright,…) Service Client GetMap (boundaries, roads, soil pollution) Proxy (“Gatekeeper”) Service Client GetMap (boundaries, roads, soil pollution) Filter out layer „soil pollution“ roads)

Example: add Copyright-Text to WMS Project: INSPIRE@EC (internal Geoportal of the European Commission) In search results users will have options to view service only if they have sufficient rights to view the service

Thank you for your attention! Gesellschaft für Angewandte Informationstechnologie mbH Martin-Luther-King-Weg 24 48155 Münster, Germany Tel: +49-251-74745.2368 Fax: +49-251-74745.2111 e-mail: a.. h uenerkoch @ conterra.de www.conterra.de Antje Hünerkoch Project Manager