FIA Madrid Trust & Identity Session Panel 1: Trust.

Slides:



Advertisements
Similar presentations
Socioeconomics knowledge cafe Wrap-up. Agreed the list of socioeconomic themes/issues that have dependencies with RWI research priorities Standardization.
Advertisements

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Trust Management of Services in Cloud Environments:
European Cloud Computing Conference Panel 1: What should be the legal framework to help create a market for Cloud services? Dalibor Baskovc Member Executive.
CS 443 Advanced OS Fabián E. Bustamante, Spring 2005 Resource Containers: A new Facility for Resource Management in Server Systems G. Banga, P. Druschel,
Hampshire Children’s Services Personalisation and Personal Budgets Pilot A Parent and Carer Guide.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
4/27/2015Slide 1 Rethinking the design of the Internet: The end to end arguments vs. the brave new world Marjory S. Blumenthal Computer Science and Telecomms.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Digital Identities for Networks and Convergence Joao Girao, Amardeo Sarma.
Identity Federation: Some Challenges and Thoughts OGF 19 Jan 30, 2007 Von Welch
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Update on Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
Users Are Not The Enemy A. Adams and M. A. Sasse Presenter: Jonathan McCune Security Reading Group February 6, 2004.
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Applied Software Project Management 1 Introduction Dr. Mengxia Zhu Computer Science Department Southern Illinois University Carbondale.
©Ian Sommerville 2006Critical Systems Slide 1 Critical Systems Engineering l Processes and techniques for developing critical systems.
EU Commission Task Force for Smart Grids Expert Group 3: Roles and Responsibilities of Actors involved in the Smart Grids Deployment Samia Benrachi-Maassam.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Web Policy Zeitgeist Panel SWPW 2005 – Galway, Ireland Piero Bonatti, November 7th, 2005.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Update on Interoperability Roadmap Comments Sections G, F and E Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
University of Murcia 8 June 2011 IPv6 in Europe Jacques Babot European Commission - DG INFSO Directorate, Emerging Technologies and Infrastructures.
IST 2006 – 22/11/2006 Aljosa Pasic Atos Origin Security, Dependability and Trust in Service Infrastructures.
 Dr. Syed Noman Hasany.  Review of known methodologies  Analysis of software requirements  Real-time software  Software cost, quality, testing and.
Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
1 Introduction to Middleware. 2 Outline What is middleware? Purpose and origin Why use it? What Middleware does? Technical details Middleware services.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
COMP1321 Networks in Organisations Richard Henson March 2014.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
1 Analysis of Consumer Issues and Paths for Concrete Approaches Dr. Carsten Orwat Forschungszentrum Karlsruhe in the Helmholtz Association, Institute for.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Globalization and the Digital Divide
FIDIS & PRIME Project Views SecurIST Inaugural Workshop Brussels, Kai Rannenberg Goethe University Frankfurt
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Trust & Identity in the Future Internet Madrid, December 9 th, :00 – 16:00.
Security Vulnerabilities in A Virtual Environment
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
“ ID Management, including routing and addressing in the Future Internet ” session Format 1,5 hours time slot: Nov. 23 rd, 11:00 – 12:30 facilitate multi-disciplinary.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
E-Science Security Roadmap Grid Security Task Force From original presentation by Howard Chivers, University of York Brief content:  Seek feedback on.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
“ ID Management, including routing and addressing in the Future Internet ” session Format 1,5 hours time slot: Nov. 23 rd, 11:00 – 12:30 facilitate multi-disciplinary.
Redmond Protocols Plugfest 2016 Neil B Martin Windows Protocol & Privacy ECG Security & Privacy June 2016.
1 ST Market Engagement Session 3 rd October 2014 RE-PROCUREMENT OF CUSTODIAL TENANT DEPOSIT PROTECTION SCHEME Presentation by Ruth Hayes.
Cloud Security for eHealth – Study Validation
Trust & Identity in the Future Internet FIA Madrid, 9th December, :00-16:00 Overall session Chair – Jim Clarke, WIT.
Full Page Watermarking
Introduction to Networking
Standards for success in city IT and construction projects
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Presentation transcript:

FIA Madrid Trust & Identity Session Panel 1: Trust

Introduction by Jim Clarke High-level introduction to the position paper the concept of lanes session focuses on lane 1 (Trust) and 2 (Identity and Privacy)

Keynote Sachar Paulus Trust definition close to “business trust”: – willingness to take risk – necessary prerequisite: “get back or blame” – trust vs. faith achieve trust by providing recovery options (“contract”) accountability

Keynote Sachar Paulus (2) Trust into the FI for businesses – Measurability Trust into the FI for individuals – right to be left alone – right to time and memory loss – but legal environment needed in consumer role –  multi-party security requirements

Keynote Sachar Paulus (3) Trust in the FI – trust cannot be outsourced – but: trust management can be outsourced (cf. PKI) Scenario: Cloud Computing – Business: where is data located? who runs the services? who runs the servers?  accountability – Individuals: privacy, roll-back option, etc.  transparency, multi-party security Security, Privacy and Trust are essential non-functional design properties – no way to outsource them

Position Paper Syed Naqvi (Services) how to establish trust in Services trust: A believes that B behaves exactly as expected and required can services be modeled as generic entity many concepts that are difficult to converge introduces convergence areas of trust – e.g., resilient services: possible to restore the level of trust? RESERVOIR overview: grid, virtualisation, services

Position Paper Syed Naqvi (Services) (2) RESERVOIR security requirements – separation of services running in the same virtual environment – trust: interoperation of service vendors – protect the management interfaces – policies upon migration: only allow migration to domains with same policy

Position Paper Theodore Zahariadis (Content) “Prosumer” relation to – identity, authentication trust – usage – business (payment) – social context (children) – etc. Requirements scale to network issues (cf. slides) Identity requirements

Position Paper Mirko Presser (RWI) there is no single representative scenario billions of nodes meet billions of consumers behaviour changes in real-time Trust starts at the elementary point, i.e., the node authentication, authorisation, payment, accuracy, quality of service

Discussion (1) Peter S(?) Eurescom: need for an trustworthy entity (was government, banks etc. before) – Sachar: there will never be one single entity  spread across different entities. Who will be the entities? – Michel: real-time trust necessary, important to design and measure trust in real-time, build up trust scenarios – Theodore: different application layers will have different means for establishing trust (cf. payment vs. sensor network usage), we need different methods

Discussion (2) real-time trust: – Michel: based on recommendation – or the availability of history (we will need to have logs  immediately raises privacy issues) – Sachar: not a new concept, but the context has changed in the FI – Theodore: trust without history based on reputation metrics

Discussion (3) ? (Uni Vienna): importance of different means, compartementalisation, how to manage this? – Michel: big difference between trust and security – Syed: trust is a multilateral notion in the FI, – trust based on certification, assurance – Jacques: chained services, liability of software and service providers, one partner for the customer: the provider of the service consumed by the end user, how does trust propagate through the chain? It will just happen, no way to discuss away the complexity – Caspar: pointer to InfoCard, usability of trust, privacy, people have different aptitudes, motivation for response (cf. response time of banks for phishing attacks), systematic response only when critical situation occur

Discussion (4) activities of GT 2009

Discussion (5) ? end-point trust (t-shirt example: we have means to evaluate and impose trust based on the evaluation), need for new models for building reputation, responsibility at multiple levels – Sachar: to which extent do we need to regulate? regulations can be helpful, but don’t over-regulate

Discussion (6) Nick: individuals will likely not be willing to take risk, how to tell them – Michel: depends on the respective trust model, model trust in terms of behaviour – Theodore: example of reading terms and conditions when entering a web site, they are never read – Jacques: normally no absolute freedom in offers and service to customers  consumer protection law that provides some trust, need for similar regulation in the FI – Mirko: ignorance (of the detailed conditions) is a blessing, need only if things go wrong – is there a higher percentage of bad guys in the FI than in the real world – Caspar: it will be impossible to provide complete transparency

After Lunch, Volkmar Lotz Volkmar Lotz, SAP Labs Presentation of Position Paper What is an identity? Considerations – Privacy-friendly identity – Usability and flexibility – Usage Control Enforcement

Caspar Bowden Caspar Bowden, Chief Privacy Advisor Microsoft EMEA An Example of a Strategic Privacy Technology and Implications for Policy – Privacy V Security – The trouble with PKI, “Minimum Disclosure Tokens” – Authentication ≠ Identification, Privacy Friendly revocation – Aligning Technology with Policy – Strategic PETs in a Legal Framework

Phil Jansen Phil Jansen, Manager Security ad Cryptography, IBM Security Lab, Zurich. – Problem: Digital world never forgets. – Challenges: Controlling Access (security), Accuracy and Usage (privacy) – Privacy V. Accountability, Anonymity V Traceability – Role of Identity Provider – Research Directions

Discussion (7) Panel Discussion – Joao Girao, NEC (SWIFT, Daidalos) Virtual ID defined in Daidalos. Separation of one person’s different IDs (Joao Girao from work and Joao Girao from home want a different ID. One should not be traceable to the other.) – Kajetan Dolinar, Privacy Protection Cycle, A concept for a systemic privacy protection (PERSIST) Peer-to-Peer security backed-up with the infrastructure defined in PERSIST. PERSIST Privacy Protection Cycle.

Discussion (8) Panel Discussion Neeli Prasad, Aalbourg University (ASPIRE) Real world scenarios Tracking your children. Who else can see? How to validate the correct user? Tracking the food you eat. Where does it come from? How long did it take to get to me? Am I paying my bill to the right person? What does identity really mean?

Discussion (9) Chair – What are user expectations?, Management of Identity. – What are the gaps? Use these to driver our research roadmap? Caspar “Blinding” developed 19 years ago but not seen as a priority. Now we have a problem. Phishing attacks were predicted by some but ignored. Currently have a unique window of opportunity. Identity V. Anonymity. Prediction rise of traffic analysis attacks by attaacking the router.

Discussion (10) Caspar “Onion Routing” (?) where packets are bounced off multiple router randomly to avoid traffic analysis so web server doesn’t know where packets are coming from. Interface between transport layer and application layer not well understood by most. Phil Janson Gaps are: – Key players need to get together (like IBM and MS). Need to be able to use either technology interchangeability. Requires Standards – Deliberate decision by key stakeholders to start deploying. Firstly in s/w eventually in chips.

Discussion (11) Chair What’s the delay implementing this? Kajetan Dolinar Legislation Joao Girao Need to rewrite some code already out there. The current Internet is not optimal. Neeli Prasad Maybe the pieces are not yet ready. Have to understand what we need. We have nice solutions, now these protocols should be modified for what we need.

Discussion (12) Caspar Economics is the issue. Most professional don’t even know the problem exists, never mind a typical user. Market has failed to take care of this issue. Legal situation is confusion with a clutter of many laws, forcing companies to keep data. Phil Privacy is user-centric. Only the user cares. Stakeholders have to push service providers. Users are not prepared to pay for security/privacy so no business case. Floor Openness and privacy. User awareness is missing. Technology cannot catch up with law. Also need for international laws.

Discussion (13) Floor 2. Reiterate previous speaker. Floor 3. German Awareness initiative for raising awareness among users of security. “What is missing from security learning?” Q to IT students. Their only concern was the availability of their computer. People will always choose comfort over privacy.

Discussion (14) Floor Public Sector procurement policies, panel to discuss. Phil – Switzerland is working on this for citizens’ interaction with the govt. Caspar – Lobbyist shooting down ideas. “Most liberal environment is best for the market” is the thinking. Neeli – Denmark is quite a safe environment. Danish people typically put a lot of information on-line. Jacques (Commission) – Some initiatives already exist like health card in UK. Still societal discussions to take place. Some projects like STORK leading to the possibility for EU govts to come to a policy definition to allow them to start thinking about procurement. Kajetan – Each service provider should be forced to use a Hypocratic database.

Discussion (15) Jacques (Commission) – Standardisation will be introduced. Chair – summary -Some pieces are available and can be deployed. -Lawyers are 20 years behind -Kids don’t care -Users won’t pay.

Martin Potts Martin Pots – Martel (FEDERICA) FEDERICA is a FIRE project. A large open test bed that can be used for many things. Federica similar to GENI. Based on GEANT network. Onelab is European part of PlanetLab. Federica is looking into becoming part of OneLab. Federica can be used by anyone but not for commercial purposes. Usually a timeframe limit of about 3 months but open for all ideas. Jacques – Who pays for access Martin – Federica funded under FP7, only expense is to get connected.

Martin Pots Latif Ladid - Which ideas are of particular interest. Martin – Virtualisation, Security. Federica is IPv6-ready. Floor – Security testing usually involves negative testing. Martin – Mechanisms will be in place to stop people going outside the slice allocated to them. Floor (PII project) – Panlabs network can be used for security testing also. Apply through PII office.

Discussion (16) (New Panel) Jim Clarke – Moving from Trust and Identity/Privacy to Security. Panel member (France) – not talked enough about governance of the process. Identity of things and virtual services. How to design the management framework. Volkmar – Lots of dependencies. How to break it into manageable pieces. Chair (UK) – Need to think about pilots. What kind of pilots should we be deploying. Panel member (France) – Hard to simulate what we need to test – need a real user. Floor – a lot of discussion today on privacy, assuming one overall authority. Not as much discussion on user-management of identity. Panel member (France) – Identity is a vague term (e.g. RFID) treat IP address in different ways in different cases – it is just a pointer.

Discussion (17) Panel member (France) – Need to monitor P2P communications. How to measure all activity on the network. Floor – Hard to test across multiple networks. Jim – Should be taken into consideration.

Conclusion Trust Panel Real-time compartementalisation, different means in place, multiple levels of responsibility multi-lateral transitivity of trust, liability usability motivation for response the proper level of regulation