Page 1 Policy-Driven Systems for Enterprise-Wide Security Using PKI and Policies to build Trusted Distributed Authorization Systems Joe Pato Marco Casassa.

Slides:



Advertisements
Similar presentations
HCQ P MEDICARES HEALTH CARE QUALITY IMPROVEMENT PROGRAM QualityNet Exchange Dennis Stricker Director, Information Systems Group Office of Clinical Standards.
Advertisements

0 McLean, VA August 8, 2006 SOA, Semantics and Security.
© 2012 Open Grid Forum Simplifying Inter-Clouds October 10, 2012 Hyatt Regency Hotel Chicago, Illinois, USA.
Internet Protocol Security (IP Sec)
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Web Service Security CS409 Application Services Even Semester 2007.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
Connecticut Ave NW, Washington, DC Direct Exchange from Provider to Patient/Consumer ….and Back! David C. Kibbe, MD MBA.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Negotiated Revealing of Trader’s Credentials in e-Marketplaces: Dealing with Trust and Privacy Issues Marco Casassa Mont, Mike Yearworth
Marco Casassa Mont – TESL - Hewlett-Packard Laboratories, Bristol, UK 8 th IEEE Workshop FTDCS 2001 – Bologna - 31/10/ /11/2001 A Distributed P2P.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Information Security Policies and Standards
On Privacy-aware Information Lifecycle Management (ILM) in Enterprises: Setting the Context Marco Casassa Mont Hewlett-Packard.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Panel: Business Impact of Research.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
Applied Cryptography Week 13 SAML Applied Cryptography SAML and XACML Mike McCarthy Week 13.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
Public Key Infrastructure Ammar Hasayen ….
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
Identity Management Marco Casassa Mont Trusted E-Services Lab Hewlett-Packard Laboratories Bristol, UK June 2002.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Trusted Systems Laboratory Hewlett-Packard Laboratories Bristol, UK InfraSec 2002 InfraSec 2002 Bristol, October 2002 Marco Casassa Mont Richard.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Module 9: Fundamentals of Securing Network Communication.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
February 8, 2005IHE Europe Educational Event 1 Integrating the Healthcare Enterprise Basic Security Robert Horn Agfa Healthcare.
Harshavardhan Achrekar - Grad Student Umass Lowell presents 1 Scenarios Authentication Patterns Direct Authentication v/s Brokered Authentication Kerberos.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
SAML: An XML Framework for Exchanging Authentication and Authorization Information + SPML, XCBF Prateek Mishra August 2002.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
Reputation Systems Thomas Choi COMP 5104 March 5, 2008.
DIGITAL SIGNATURE.
19 December 1998EMGnet meeting INRIA Rhône-Alpes1 An Overview of Security Issues in the Web José KAHAN OBLATT W3C/INRIA 19 December 1998.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Web Services Security Patterns Alex Mackman CM Group Ltd
© Drexel University Software Engineering Research Group (SERG) 1 The OASIS SOA Reference Model Brian Mitchell.
PKI Policy Determination Process Input from PKI Decision Process PKI Policy Determination Process Application(s) Workflows Players.
Policy-Based Dynamic Negotiation for Grid Services Authorization Ionut Constandache, Daniel Olmedilla, Wolfgang Nejdl Semantic Web Policy Workshop, ISWC’05.
Adding Distributed Trust Management to Shibboleth Srinivasan Iyer Sai Chaitanya.
Basic Security Cor Loef Philips Medical Systems Co-Chair IHE Radiology Technical Committee.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
Trusted CoordinationTAPAS Workshop, 25-26/09/031 Building Blocks for Trusted Coordination Nick Cook University of Newcastle.
Identity and Access Management
The Demand for Audit and Other Assurance Services
Unit 3 Section 6.4: Internet Security
Module 8: Securing Network Traffic by Using IPSec and Certificates
Usecases and Requirements for OGSA-Security
Public Key Infrastructure (PKI)
Adding Distributed Trust Management to Shibboleth
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Security & .NET 12/1/2018.
جايگاه گواهی ديجيتالی در ايران
Module 8: Securing Network Traffic by Using IPSec and Certificates
Install AD Certificate Services
EPAL and Management of Privacy Obligations
Trusted Systems Laboratory
Towards Accountable Management of Privacy and Identity Information
Presentation transcript:

Page 1 Policy-Driven Systems for Enterprise-Wide Security Using PKI and Policies to build Trusted Distributed Authorization Systems Joe Pato Marco Casassa Mont Hewlett-Packard Labs Sep 18, 2000

Page 2 Business Model Business-to- Business Relationships between Service Providers and Enterprises on the Internet Internet B-2-B E-Services Service Provider EnterpriseUser

Page 3 Requirements Trust Management Establishment –Sustained Relationship Privacy –Enterprise Population –Individual’s Roles Customization –Local Policies –Enterprise Enforcement

Page 4 Requirements Performance Distributed Processing –Services –Policy Enforcement –Authorization Bandwidth Consumption –Reduced –Amortized

Page 5 Current Business Model User Enterprise Service Provider Internet B-2-B AuthorizationService Service Provider Policies Service Provider Policies Business Constraints Business Constraints Local Configuration Local Configuration Service Provider Policies Service Provider Policies Business Constraints Business Constraints Local Configuration Local Configuration PolicyEnforcement Point (PEP) PolicyEnforcement Operation E-Services Operation Operation Operation Operation

Page 6 Moving Towards High Level Symmetric Business Model Enterprise Service Provider User Internet PolicyDistribution Point (PDP) AuthorizationService OperationE-ServicesOperation Operation Operation Operation Service Provider Policies Service Provider Policies Business Constraints Business Constraints Local Configuration Local Configuration Service Provider Policies Service Provider Policies Business Constraints Business Constraints Local Configuration Local Configuration PolicyEnforcement Point (PEP) PolicyEnforcement AuthorizationService PolicyDistribution Point (PDP) Enterprise Policies Enterprise Policies PolicyEnforcement Point (PEP) B-2-B Policies

Page 7 Distributed Authorization Policy Driven Authorization (A)Symmetric Authorization Operation at both parties Policy Distribution Points Distribute across enterprises Policy Enforcement Points Both local and remote policies

Page 8 Business Model Simplifications Sustained Relationships Contracts Auditing and Monitoring Dispute Resolution

Page 9 Technology Problems Trust Establishment Tamper Resistant Policy Enforcement Point Verifiability of Identity of Involved Parties Verifiability of Policies sent across Enterprise Boundaries Instrumentation to Gather Evidence Archival of Evidence

Page 10 Role of PKI Verifiability for Business Relationships Digital certificates Certificate management “Tamper Proof” exchange of messages and policies Signed XML

Page 11 Policies Statements describing expected behavior for Systems Services People Formal Modeling High Level Specification Refined to programmatically enforceable data Abstraction suitable for sharing across enterprises

Page 12 Role of Policies Policies Describe authorization constraints Drive authorization decisions Are exchanged between Enterprises in a Distributed Authorization Framework

Page 13 Conclusion Distributed Authorization enhances privacy and performance for B2B interactions