Digital Identities for Networks and Convergence Joao Girao, Amardeo Sarma.

Slides:



Advertisements
Similar presentations
Click to edit Master title style HEALTH INFORMATION 1 Identity & Access Management Presenter: Mike Davis (760) January 09, 2007.
Advertisements

Identity Network Ideals – Heterogeneity & Co-existence
ITU-T 1 EU Commission Open Workshop – Identifying policy and regulatory issues of Next Generation Networks, Brussels 22 June 2005 Some comments on ITU-T.
S.1 Using a Global Validation Service to Unite Communities Jon Shamah EMEA Head of Sales, BBS eSecurity.
Secure Communication Architectures.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Managing Digital Identities: Challenges.
 Copyright 2005 Digital Enterprise Research Institute. All rights reserved. Semantic Web Services in the environment of Next Generation Network.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
1 Higgins 1: a species of Tasmanian long-tailed mouse 2: the name of an open source collaboration of IBM, Novell, Oracle, Parity…
Understanding Active Directory
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Geneva, Switzerland, 4 December 2014 ITU-T Study Group 17 activities in the context of digital financial services and inclusion: Security and Identity.
DOCUMENT #: GSC15-GTSC8-02 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.1 CONTACT(S): Wayne Zeuch ATIS:
EU cooperation, EU projects and their implications Simone Fischer-Hübner Karlstad University.
Metadata for the Cloud Telco Motivation presentation to ISO/IEC JTC1 SC32 WG2 Ewelina Szczekocka, Orange Labs Poland, Telekomunikacja Polska S.A. 25th.
Sierra Systems itSMF Development Days Presentation March 4 th, 2014 Colin James Assyst Implementation Specialist.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
COnvergence of fixed and Mobile BrOadband access/aggregation networks Work programme topic: ICT Future Networks Type of project: Large scale integrating.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Middleware challenges to service providers, the Nordic view TERENA, Ingrid Melve, UNINETT.
Identity Management Marco Casassa Mont Trusted E-Services Lab Hewlett-Packard Laboratories Bristol, UK June 2002.
DOCUMENT #:GSC15-PLEN-26 FOR:Presentation SOURCE: ATIS AGENDA ITEM: PLEN 6.4 CONTACT(S): James McEachern ATIS Identity Management.
Andrew Nash Senior Director of Identity Services Topics in Identity and Payments.
Mobile data. Introduction Wireless (cellular) communications has experienced a tremendous growth in this decade. Most of the wireless users also access.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Mechanism to support establishment of charging policies Group Name: WG2-ARC Source: InterDigital Meeting Date: TP8 Agenda Item:
Secure Management of Information across multiple Stakeholders SEMIRAMIS – CIP-ICT PSP SEMIRAMIS General Presentation.
1 Identity and Transparency ( Bridging the GAPS of Governance Bridging the GAPS of Governance in eGov Initiatives in eGov Initiatives )‏ Badri Sriraman.
Demonstration of the Software Prototypes PRIME PROJECT 17 December 2004.
Presentation Software as a Service Applications Software-as-a-Service Partner Enablement Program Enabling ‘Software as a Service’
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
Helsinki Institute of Physics (HIP) Liberty Alliance Overview of the Liberty Alliance Architecture Helsinki Institute of Physics (HIP), May 9 th.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
Integrating Federated Identity and Web services in the RHIO Environment John Richardson Vice-Chair, Liberty Alliance eHealth SIG Intel Corporation Digital.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Geneva, Switzerland, April 2012 Introduction to session 7 - “Advancing e-health standards: Roles and responsibilities of stakeholders” ​ Marco Carugi.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Shibboleth: An Introduction
Free Powerpoint Templates Page 1 Free Powerpoint Templates FP7 – Secure Enterprise Remote Banking System (SERBS) Small or medium scale focused research.
Semantic Annotation of Services and Processes in Business Alliances Karol Furdík 1,2 1 InterSoft, a.s., Floriánska 19, Košice, Slovakia
GRID Overview Internet2 Member Meeting Spring 2003 Sandra Redman Information Technology and Systems Center and Information Technology Research Center National.
All Rights Reserved 2014 © CMG Consulting LLC Federated Identity Management and Access Andres Carvallo Dwight Moore CMG Consulting, LLC October
Geneva, Switzerland, September 2014 ITU-T SG 17 Identity management (IdM) Progress Report Abbie Barbir Ph.D., ITU-T Study Group 17 Q10/17 (Identity.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Discussion - HITSC / HITPC Joint Meeting Transport & Security Standards Workgroup October 22, 2014.
Government and Industry IT: one vision, one community Vice Chairs April Meeting Agenda Welcome and Introductions GAPs welcome meeting with ACT Board (John.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
ATIS Identity Management Standards Development DOCUMENT #:GSC13-PLEN-37 FOR:Presentation SOURCE:ATIS AGENDA ITEM:Plenary; IdM and Identification Systems;
Fostering worldwide interoperabilityGeneva, July 2009 ATIS Identity Management Standards Development James McEachern, Manager – Application Enabler.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
DOCUMENT #:GSC15-PLEN-27 FOR:Presentation SOURCE:ETSI AGENDA ITEM:PLEN 6.4 CONTACT(S): Amardeo Sarma, ISG INS Chair Identity & Access Management activities.
Quarterly Customer Meeting Office 365 License Activation and Office 365 Cloud Services Assessment Status April 2014.
© 2016 TM Forum Live! 2016 | 1 E2E Service Orchestration for Smarter Health Real-World Business User Stories Draft.
The Future Digital Identity Landscape in Europe Timothée Mangenot, chairman 14th of December, 2015 ACSIEL partners day.
Data and Applications Security Developments and Directions
David P. Reed MIT CFP Draft May 2007
Federated IdM Across Heterogeneous Clouding Environment
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Done by:Thikra abdullah
Advancing the Next Generation Network
Presentation transcript:

Digital Identities for Networks and Convergence Joao Girao, Amardeo Sarma

FP7 SWIFT 2 Target: Identity Convergence for NGN+  Solve identity fragmentation of today:  Make a bridge between platforms introduction of multi-personas per user transcend layers from network to services / applications  Filter flow of identity info across the bridge minimization of identity info disclosure from user’s viewpoint making identity info obscure from operator’s viewpoint Identity Creation Home Operator’s NGN Platform ISP Platform Identity Federation 3 rd Party Platforms User’s persona Content Providers Enterprise Platform Partner Operator’s Platform Identity Exchange Source: NEC

FP7 SWIFT 3 Traditional Relation Customer – Provider me provider Fixed Operator: Customer ID Physical line Mobile Operator: Customer ID SIM Card ISP: Customer ID Name / Password Amazon etc.: Customer ID Name / Password Drawback: Customer needs separate contract for (most) services Reason: The provider is responsible not only for the service, but also for identification and billing

FP7 SWIFT 4 Target me ID & billing provider ID provider: Customer ID Credentials Service Provider: Offer / Price Trusted relation (contract) service provider Temporary relation (get service) Customer has few trusted relationships and contracts, but can nonetheless get services from 3rd parties Authorization & accounting

FP7 SWIFT 5 SWIFT for Convergence: Overview  Duration: January 2008 – June 2010  Consortium: 9 partners from Industry and Academia (see below)  Project Co-ordinator: FhG SIT, Technical Leader: NEC  Focus  Identity & privacy across layers  vertical approach  Develop Identity as a key enabling technology for convergence  Combined user / operator control on information exchange  Optimize user/service/network-centric IdM with network focus  Develop Identity Oriented Services  Build on R&D from Daidalos & other FCT projects University of Murcia University of Stuttgart

 Virtual Identities concept adapted from the EU Daidalos project supports privacy of the user  Many “faces” for transactions to separate roles or for privacy reasons  These “personalities” or “avatars” or Virtual Identities (VIDs) must be unlinkable even though some attributes may be shared between them  The user must control the data revealed Research approach, Methodology FP7 SWIFT

Axis of Identity Management FP7 SWIFT 7 Policy Management Privacy Billing Authentication Attribute Exchange Decision/ Enforcement Attribute Management Transparency

The Vertical Axis FP7 SWIFT

Triangle of TransactionsBinding Identity Model Technology and Business Drivers FP7 SWIFT

Identity Management Platform Discovery / Directory Name Resolution Anonimity AAA Context Mobility Security QoS Attribute Management & Access Devices Groups Building Blocks: Identity Architecture FP7 SWIFT

Goal 1: Enhance Ubiquity and Experience  Liberate user from device(s) by enabling use of several interchangeable devices  Ownership of the device should be independent of who uses it  hiring (embedded) devices becomes part of the model  Facilitate discovery and service usage respecting the user's privacy options  Network access is automatically made available based on service requested  Invisible co-ordination of network and resources Supported by the Identity Backbone

Goal 2: Enable Convergence  Identity can form the bridge between networks, services, content and arbitrary offerings  it becomes a convergence technology  Currently a vast range of solutions exist that need to be brought together  This includes SIM and USIM solutions  Central will be to also impact emerging NGN architectures  3GPP, ITU-T, ETSI  A key problem to solve will be to bridge the independently existing Identity solutions (SAML, OpenID, CardSpace,...)  SWIFT will develop solutions for this Identity as the convergence enabler

 Bringing Identity Management to the network  Enable access and reachability across domains  Make Identities of people, services, things, software modules a part of the future Internet architecture  The Future Internet will be the …. identiNET  Identity as the future end point of communication  whether user, service, thing, device or software module  Support access, (non-) reachability, ubiquity  Privacy can be dealt with vertically thus reducing the danger of conflicting policies & mechanisms  non-walled garden business is enabled Identity in the Future Internet FP7 SWIFT

 Kick off in 01/08 with Public Web Page in January  Work well progressed on  Scenario definition  Requirements  Initial architecture  Deliverables done and mid-term  Work Methods  Internal Report on Dissemmination  Scenarios  Gap Analysis and Architecture Requirements  Initial Architecture SWIFT results so far FP7 SWIFT

15 Conclusions SDOs (ETSI, ITU-T, OASIS LA, IETF) SDOs (ETSI, ITU-T, OASIS LA, IETF) Business Opportunities & Types EU Initiatives (PrimeLife, Daidalos, FIDIS) EU Initiatives (PrimeLife, Daidalos, FIDIS) SWIFT SWIFT will develop an EU identity architecture as a catalyst that opens new doors to IdM, focusing on the network and convergence

SWIFT Website

End Thank You