OpenID RP Reputation in Trusted Exchange NRI 2008/06/10.

Slides:



Advertisements
Similar presentations
1 SensorWebs and Security Experiences Dan Mandl Presented at WGISS Meeting in Toulouse, France May 11, 2009.
Advertisements

Chapter 14 – Authentication Applications
CSCE 815 Network Security Lecture 10 KerberosX.509 February 13, 2003.
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Extended Validation Models in PKI Alternatives and Implications Marc Branchaud John Linn
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Report on Attribute Certificates By Ganesh Godavari.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
1 Security Assertion Markup Language (SAML). 2 SAML Goals Create trusted security statements –Example: Bill’s address is and he was authenticated.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Sponsored by the National Science Foundation GENI Clearinghouse Panel GEC 12 Nov. 2, 2011 INSERT PROJECT REVIEW DATE.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
A Third Party Service for Providing Trust on the Internet Work done in 2001 at HP Labs by Michael VanHilst and Ski Ilnicki.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Summer School Certificates Diego Romano & Gilda Team.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Applied Cryptography Week 13 SAML Applied Cryptography SAML and XACML Mike McCarthy Week 13.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
OpenID And the Future of Digital Identity Alicia Bozyk April 1, 2008.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
CORDRA Philip V.W. Dodds March The “Problem Space” The SCORM framework specifies how to develop and deploy content objects that can be shared and.
TLS/SSL Review. Transport Layer Security A 30-second history Secure Sockets Layer was developed by Netscape in 1994 as a protocol which permitted persistent.
Troubleshooting Federation, AD FS 2.0, and More…
SIM402. Kerberos, NTLM, Basic, Digest, Forms?
IDENTITY MANAGEMENT Hoang Huu Hanh (PhD), OST – Hue University hanh-at-hueuni.edu.vn.
Secure Electronic Transaction (SET)
Troubleshooting Federation, AD FS 2.0, and More…
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
EService Process Descriptions. COSCA/NACM Standards for Electronic Filing Processes Technical and Business Approaches Section 1.2A Court rules may provide.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
ArcGIS Server and Portal for ArcGIS An Introduction to Security
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
HIT Policy Committee Information Exchange Workgroup NwHIN Conditions for Trusted Exchange Request For Information (RFI) May 15,
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Secure Socket Layer (SSL) and Secure Electronic Transactions (SET) Network Security Fall Dr. Faisal Kakar
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Task Force CoRD Meeting / XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA.
Click to edit Master title style © by Nat Sakimura. Coping with Information Asymmetry SESSION G: Managing Risk & Reducing Online Fraud Using New.
Authentication Presenter Meteor Advisory Team Member Version 1.1.
Using PIV Cards with NIH Login Chris Leggett NIH Login Technical Lead CIT/NIH.
OpenID Connect Working Group May 10, 2016 Mike Jones Identity Standards Architect – Microsoft.
Trusted Organizations In the grid world one single CA usually covers a predefined geographic region or administrative domain: – Organization – Country.
1 Authentication Celia Li Computer Science and Engineering York University.
Access Policy - Federation March 23, 2016
Chapter 7 - Secure Socket Layer (SSL)
Setting and Upload Products
Public Key Infrastructure (PKI)
Cryptography and Network Security
Authentication Applications
X-Road as a Platform to Exchange MyData
Genotyping Data Request Process
Presentation transcript:

OpenID RP Reputation in Trusted Exchange NRI 2008/06/10

Trusted Exchange (in a Nutshell)

Trusted Exchange (Sequences) 1.A User submits a user Identifier (OpenID) to a RP 2.The RP resolves the OP’s location with the OpenID 3.Association process begins between the OP and the RP 4.The RP requests authentication to the OP with openid.tx.policy_url, openid.realm, and optionally AX data request. 5.The OP makes a reputation request for the RP with openid.realm to a RS 6.The OP gets reputation score and a public key of the RP from the RS for the realm. 7.The OP requests the RP a policy that includes Contract proposal incl. what data, purpose, expiry, etc. 8.The RP return the signed proposed policy. 9.The OP checks the signature with the public key obtained from the RS. 10.The OP prompts the user agent whether to accept the policy with the reputation score and the criteria etc. for the users consideration. 11.The User responds with Yes or No. If Yes, it will be signed. 12.The OP returns a authentication response with openid.tx.contract_handle (and ax data if there were any.) 13.The RP requests the data with the contract_handle. 14.The OP (in this example... could be other attribute authorities) returns data (which includes contract handle and signed by the authority) encrypted with the session key which is encrypted by the public key and sent with the data.

RP Reputation in TX (Actors) 1.OP(OpenID Provider): OP requests a reputation score of RP that OP authenticates for. 2.RP(Relying Party): RP belongs to a realm that is organaized by RS. RP must register to a realm with its public key in order to be discovered by OP at user authentication. 3.RS/RA(Reputation Service or Reputation Authority): RS manages RP’s reputation information in a context of a realm and its public keys for link contract processes that later occur. It also provides a reputation score to OP based upon OP’s request.

RP Reputation in TX (Sequences) 1.There is a realm that defines a domain of a Reputation context managed by a Reputation Authority or Service such as a Financial Institute Reputation Service. Information about a realm(a reputation service provider) contains URLs for the service discovery used by OPs. 2.RPs must pre-register to join a realm with its public keys such as a RSA key or a X509 certificate. 3.When RP requests user authentication to OP, pass openid.realm parameter to OP. 4.OP resolves Reputation Service(RS) in the realm where RP belongs with a url in openid.realm. 5.OP request RS the reputation score of the RP. 6.RS response the reputation score to OP.

Scores calculation model in RS Auditing and Certification This is a time tested method of establishing a reputation for the parties and the services involved. Prime example is the company audit to establish the trustability of the financial statements of the company in question, but others include such things like stock rating, ISO9001, SAS70, Zagat and Michelin rating for restaurants, etc. In a more technical world, web server certificats (e.g. EV Certs) has been there for over a decade. Obvious limitation of this method is that it is only periodically conducted. Thus, it will not be detect eve if the quality of the services may radically dropped between the audit timings. Collective Intelligence is a complimentally method to fill this gap. Collective Intelligence Prime example of the Collective Intelligence are such things like eBay reputation, digg, etc. In a more traditional world, "Word of Mouth" has served such purpose. There can be many methods for doing this. A party that has conducted a transaction with the other party may be eligible for casting a vote for the rating of the party. Also, there can be a reputation aggregator. These are the subject of the interest of the Open Reputation Management Systems TC which is being formed at OASIS Open.