Web Authentication and other security services

Slides:



Advertisements
Similar presentations
The GridSite Toolbar Shiv Kaushal The University of Manchester All Hands Meeting 2006.
Advertisements

Popular Web client and server programs This work is licensed under a Creative Commons Attribution-Noncommercial- Share Alike 3.0 License. Skills: none.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
© InLoox GmbH InLoox Web App product presentation The web client for project management on the Internet.
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
SECURITY OF OUTSOURCED IT WORK Offshore teams are taking IT development and management work out of the headquarters Cloud Computing is taking server management.
Popular Web client and server programs This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 License. Skills: none IT.
MWD1001 – Website Production Web Browsers Week 11.
Secure Element Access from a Web browser W3C Workshop on Authentication, Hardware Tokens and Beyond 11 September Oberthur Technologies – Identity.
Web Cryptography & Utilizing ARM TrustZone® based TEE for Authentication & Cryptography Ilhan Gurel September 10th & 11th, 2014.
魂▪創▪通魂▪創▪通 Digital Certificate and Beyond Sangrae Cho Authentication Research Team.
Kentico CMS 5.0 Full-featured Flexible Web Content Management System for All Your Needs.
WCL315. Emulate IE9Emulate IE8Emulate IE7IE5IE7IE8IE9/Edge Standards Quirks IE 5.5 Quirks.
©2012 Microsoft Corporation. All rights reserved. Content based on SharePoint 15 Technical Preview and published July Thierry Gasser TSP
Proposal for the support of connected and proximity crypto HW in browsers Philip Hoyer – Director Strategic Innovation January 2015 Presentation Title.
 Using Microsoft Expression Web you can: › Create Web pages and Web sites › Set what you site will look like as you design it › Add text, images, multimedia.
Automated Backup, Recovery, Inventory and Management for Security and Networking Devices.
Phish your victims in 5 quick steps. Phish yourself today In less than 5 minutes What is Phish5? Phish5 is a Security Awareness service With Phish5, a.
Web Components
Mobile App Support Jacob Poirier Geri Hengesbach Andrea Menke Erin Rossell.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Design Extensions to Google+ CS6204 Privacy and Security.
Computing on the Cloud Jason Detchevery March 4 th 2009.
HTML Structure & syntax
Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 7 TH EDITION Chapter 2 Key Concepts 1 Copyright © Terry Felke-Morris.
W3C Web Crypto WG 23/24 April 2013 San Jose (Ca, US)
Bao Nguyen. Invention of the Web Browser World Wide Web, : Tim Berners-Lee & Robert Cailliau. Not very popular. Netscape Browser, :
Cloud Computing Changing the way business computing is (will be) done.
HTML Structure & syntax. Introduction This presentation introduces the following: Doctype declaration HTML Tags, Elements and Attributes Sections of a.
Team C November 30, 2012 Major Document 5.  Create a document in a Microsoft Office.  You can create a document in either Microsoft Word, Microsoft.
Accessing Extras Portal February 9, Finding Link to Extras Portal -The Extras Portal is accessed via the Expedient Extranet -Via the “Manage Extras”
Development Process Agile/XP Planning + Issue Tracking Google Code provided efficient + effective project management Bug and defect reports Project planning.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
MTA EXAM HTML5 Application Development Fundamentals.
Browser Bugs & Validation SIPB Introduction to Web Design Wednesday, January 20th Jonté Craighead & Cathy Zhang.
The tools we need Learning & Development Team Telerik Software Academy.
Browser Wars (Click on the logo to see the performance)
FitnessGram® 2015 Student Information System (SIS) Extract Import Training for Georgia School Year.
CS2550 Dr. Brian Durney. SOURCES  JavaScript: The Definitive Guide, by David Flanagan  Dive into HTML5, by Mark Pilgrim
Google Web Toolkit Dynamic web on Java (Script) Jordan Jordanov 6 March 2008.
Staying Secure Online How do we buy and sell safely on the Internet?
SURVEYTRAX AN OPTIMIZED SOLUTION FOR YOUR REPORTING NEEDS Charles Gendron, Tavish Mizra, Viktor Eyjolffson, Will Smith, Kerrine Nelson.
Internet Searching the World Wide Web. The Internet and the World Wide Web The Internet is a worldwide collection of networks that allows people to communicate.
Flaps The technology and its variations across browsers.
Hardware-based secure services past and future Olivier POTONNIEE, Aurélien COUVERT, Virginie GALINDO April 2016.
Website Design and Construction Services and Standards.
CAESked Computer Aided Engineering Scheduler. Introduction Team Members: Chris Fruin & Jerry Grochowski What CAESked is: Web based class scheduling application.
Visit:- internet-explorer.htmlhttp:// internet-explorer.html.
How to Use Safe Money in Kaspersky? Help Desk Number.
Basic HTML Introduction to HTML.
John Border Hughes Network Systems, LLC
Location Intelligence at Stanford
SMART CARD ONLINE REGISTRATION PROCESS
Cloud Computing Cloud computing: (the Internet represents the Cloud).
MICROSOFT OUTLOOK and Outlook service Provider
Secure Element API An introduction.
Cayuse 424 Desktop Readiness.
Secure Elements and W3C L. Castillo 06/16/15.
Internet Basics.
Enhancing Web Application Security with Secure Hardware Tokens
Module 1 Desktop Readiness.
Public Key Infrastructure from the Most Trusted Name in e-Security
Openreach Application
Research Lesson 1 URLs & Hyperlinks How to access the World Wide Web.
Cloud Computing: Concepts
Certificate Revocation
Research Lesson 1 URLs & Hyperlinks How to access the World Wide Web.
Procedure for adding a Trusted Site
FitnessGram® 2015 Student Information System (SIS) Extract Import Training for Georgia School Year.
OpenID Connect Working Group
Presentation transcript:

Web Authentication and other security services 1st Oct 2014 – W3C TAG Virginie GALINDO

W3C Web Crypto status W3C Web Crypto WG is finalizing Web Crypto API Status : Last Call (exit scheduled on 13th of Oct) Implementations : Google: statement and corresponding issue by the Chromium team. Internet Explorer: Developer documentation for IE11 preview WebKit: Implementation is tracked as bug 122679, landed in Safari iOS 8 Firefox: Implementation is being tracked under bug 865789

W3C Web Crypto next steps Workshop was held in Mountain view on 10/11 Sept to discuss next steps 70 people, about 40 companies represented, with token security solution vendors (secure element, trusted execution environment and associated servers) , browser makers (mozilla, microsoft, google), service providers (paypal, square, government)

W3C Web Crypto next steps Topics for discussion Next steps of the Web Crypto API Dynamic discovery, certificate management, key storage definition, … Integration of SE and TEE technologies Which level ? Authentication Which service ?

W3C Web Crypto next steps Summary of what was discussed https://www.w3.org/Security/wiki/IG/webcryptonext_workshop Chartering of Web Crypto will happen on Public security interest group http://lists.w3.org/Archives/Public/public-web-security/

Other topics Web Security IG (zzzzz…) Web credential management (lost in 3 goups…)