Identity & Profile Management - The Right Way - Dr. Stefan Brands June 11, 2002 Presented to:

Slides:



Advertisements
Similar presentations
© Copyright International Telecommunication Union (ITU). All Rights Reserved page - 1 Alexander NTOKO Project Manager, ITU Electronic Commerce.
Advertisements

Presentation to WTO/CTD Seminar on e-commerce Richard Bourassa Director, International Policy Director, International Policy Electronic Commerce Branch.
European Consumer Summit 2014 On-line and mobile payments Dr Florent Frederix Trust & Security Unit, DG CONNECT, European Commission 1 th of April 2014.
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Evolution of Data Use and Stewardship Recent University-wide Data Stewardship Enhancements Integrated System Data Stewardship Shirley C. Payne, CISSP,
Location Based Services and Privacy Issues
Meganet Corporation VME Office Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Red Flag Rules: What they are? & What you need to do
CcTLD Meetings Rome 2004 WHOIS & Data Privacy Jean-Christophe Vignes Registry Liaison Manager.
Lesson 1. Course Outline E-Commerce and its types, Internet and WWW Basics, Internet standards and protocols, IP addressing, Data communication on internet,
IP Communications Services Redefining Communications Teresa Hastings Director WorldCom SIP Services Conference – April 18-20, 2001.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics.
Identity Management Realities in Higher Education NET Quarterly Meeting January 12, 2005.
PKI versus Private Credentials1 Stefan Brands Zero-Knowledge Systems Inc. Montreal.
1 ARPA A regional infrastructure for secure role-based access to RTRT services Ing. Laura Castellani Tuscany Region.
Security Controls – What Works
Understanding Active Directory
02/12/00 E-Business Architecture
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
1 May 2006 … Identity management - Internet - Data controller - PKI - Vulnerabilities - Fingerprint - Critical Information Infrastructure - Privacy and.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Privacy Issues in Vehicular Ad Hoc Networks.
Joseph Ferracin Director IT Security Solutions Managing Security.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
CS CS 5150 Software Engineering Lecture 18 Security.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Security considerations for mobile devices in GoRTT
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Privacy Impact Assessments Iain Bourne, Group Manager, Policy Delivery Information Commissioner’s Office, UK Workshop on data protection and the internet:
FIDIS & PRIME Project Views SecurIST Inaugural Workshop Brussels, Kai Rannenberg Goethe University Frankfurt
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Brenda Watkins Director Policy and Business Strategies Information.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
IS3220 Information Technology Infrastructure Security
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
Unlinking Private Data
إدارة الأعمال الإلكترونية عمادة التعلم الإلكتروني والتعليم عن بعد
Grid Security.
Securing Information Systems
Security in Networking
BOMGAR REMOTE SUPPORT Karl Lankford
IS4550 Security Policies and Implementation
Red Flags Rule An Introduction County College of Morris
Overview of Zero-Knowledge Systems Inc
Identity Theft Prevention Program Training
How to Mitigate the Consequences What are the Countermeasures?
Introduction to Health Privacy
Colorado “Protections For Consumer Data Privacy” Law
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Identity & Profile Management - The Right Way - Dr. Stefan Brands June 11, 2002 Presented to:

Credentica Inc. Incorporated January 2002, based in Canada What we do: building an Identity & Profile Management system that removes fundamental security, privacy, and usability barriers Who we are: seasoned cryptographers, developers and security experts - lots of experience in designing secure systems

Market Trends t sensitivity Private networks Extranets Web Services Wireless internet Ad-Hoc Networking Digital ID spanning many administrative domains Steep acceleration of Digital Identity & Profile information bartering Internet “Bowling Alley” Chasm  “Tornado”  Main Street  Early Market  Trust & Collaboration Suspicion & Competition

Identity & Profile Management “Nearly 70% of consumers cite privacy concerns as one reason that could make them stop using e- government services.” —Gartner survey (May 2001) “meeting data protection standards is a key component [of e- government]. In the area of on-line authentication and identification in particular there is still much work to be done. [...] enhancing privacy should be a Government objective." —UK Information Commissioner Annual report (June 2001) Problem: Privacy intrusions (systematic identification, no control over data usage, linkability, conflicts with privacy laws, etc.)

Identity & Profile Management “The lack of trustworthy security services is a major obstacle to the use of information technology in private, in business as well as in public services.” —European Parliament, Directorate General for Research (March 2001) “Identification and authentication are becoming more important with the move towards e-government and the rising incidence of identity fraud.” —U.K. Cabinet Office, Performance and Innovation Unit, “Privacy and data- sharing: The way forward for public services” (April 2002) Problem: Inadequate security (system abuse, identity theft, data propagation, etc.)

Identity & Profile Management “A single authentication server / service equals a single point of failure.” —Information Security Magazine (September 1998) 54% of respondents were extremely concerned with the possibility of government employees misusing their personal information, and 64% were extremely concerned about the risk of hackers breaking into government computers. —Hart-Teeter, “E-GOVERNMENT: To Connect, Protect, and Serve Us” (November 2001) Problem: Heavy dependence on real-time connection to central servers

Identity & Profile Management GAO (US General Accounting Office) found that at the Department of Veterans Affairs, many employees were sharing passwords: "These types of weaknesses make the financial transaction data and personal information on veteran medical records and benefits stored on these systems vulnerable to misuse, improper disclosure and destruction", GAO said. —Government Executive Magazine (September 1998) “…a device like a card is likely to disappear if the carrying person does not feel that its presentation will be of benefit to him.” —European Committee For Standardization, “Health Informatics” (1998) Problem: Lending, copying, discarding of credentials (access rights, attributes, profile)

Privacy Dangers of traditional PKI

Lessons Learned Real world solutions must address security, privacy, and usability for all parties PKI & digital signatures not designed to offer multi-party security & privacy Solution must be built into architecture Policies & legislation must surround a multi- party secure architecture, not replace it

Credentica’s Identity & Profile Management Platform Name: “Credential Management Platform” Multi-party secure (holistic solution) Any mix of local & central profile data Platform independence (PCs, mobile phones, Bluetooth devices, 8-bit chipcards, etc.) Privacy slider: Identification & Pseudonymity & Role-Based & Anonymity & Selective Disclosure Security “slider”: Trust-only & Passwords & Kerberos & X.509 & Digital Credentials

Credential Management Platform

Digital Credentials Inherit all the strengths of PKI & digital signatures, but avoid their weaknesses Protocols described in open literature (350- page MIT Press book & 31 publications) Scrutinized by world's top cryptographers (Shamir, Rivest, Schnorr, …) Unanimous acclaim from security, legal, and privacy experts worldwide

Digital Credentials

Properties of Digital Credentials Privacy: – Untraceable & unlinkable authentication – Selective disclosure of attributes – Private reissuing & updating of credentials Security: – Information separation between instances – Limited-show credentials – Lending/discarding protection – Chip-card integration Flexibility: – Online/offline clearing for regulated credentials – Selective records – Server-assisted protocols – Integration with X.509-based PKI – Multi-purpose credentials

Selective Disclosure

Fraud Detection

Additional Information Contact Information: Credentica Inc St-Laurent Blvd, Suite #1 Montreal, Québec Canada H2X 2V4 Tel/fax: (514) Further Reading: