Using Digital Credentials On The World-Wide Web M. Winslett.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

The Challenges of CORBA Security It is important to understand that [CORBAsecurity] is only a (powerful) security toolbox and not the solution to all security.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Identity Management In A Federated Environment Identity Protection and Management Conference Presented by Samuel P. Jenkins, Director Defense Privacy and.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Lecture 23 Internet Authentication Applications
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
1 Trust and Privacy in Authorization Bharat Bhargava Yuhui Zhong Leszek Lilien CERIAS Security Center CWSA Wireless Center Department of CS and ECE Purdue.
Trust, Privacy, and Security Moderator: Bharat Bhargava Purdue University.
X.509 at the University of Michigan CIC-RPG Meeting June 7, 1999 Kevin Coffman Bill Doster
The Traust Authorization Service A. Lee, M. Winslett, J. Basney, and V. Welch University of Illinois at Urbana-Champaign Goal: A scalable.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Masud Hasan Secue VS Hushmail Project 2.
Identity Management Report By Jean Carreon and Marlon Gonzales.
File-Mate 1500 Design Review II
TRUST NEGOTIATION IN ONLINE BUSINESS TRANSACTIONS BY CHANDRAKANTH REDDY.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Distributed systems – Part 2  Bluetooth 4 Anila Mjeda.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Chapter 21 Distributed System Security Copyright © 2008.
Lecture 10 Single Sign-On systems. What is Single Sign-on? Lets users authenticate themselves once and access different applications without re-authentication.
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
The FIDO Approach to Privacy Hannes Tschofenig, ARM Limited 1.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
TOPIC: AUTHENTICITY CREATED BY SWAPNIL SAHOO AuthenticityAuthorisation Access Control Basic Authentication Apache BASIC AUTHENTICATIONDIGEST ACCESS AUTHENTICATIONDHCP.
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
E-Authentication October Objectives Provide a flexible, easy to implement authentication system that meets the needs of AES and its clients. Ensure.
Supports the development & implementation of a IPPC Global ePhyto Hub to: Utilize modern Cloud technology. Ensure there is a secure folder for each countries’
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
Trust Profiling for Adaptive Trust Negotiation
World Wide Web policy.
Kent Seamons Brigham Young University Marianne Winslett, Ting Yu
Cryptography and Network Security
Module 8: Securing Network Traffic by Using IPSec and Certificates
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
CS691 M2009 Semester Project PHILIP HUYNH
CS691 M2009 Semester Project PHILIP HUYNH
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Pooja programmer,cse department
Ting Yu and Marianne Winslett Presented by Korporn Panyim
Module 8: Securing Network Traffic by Using IPSec and Certificates
Appropriate Access InCommon Identity Assurance Profiles
Protecting Privacy During On-line Trust Negotiation
Electronic Payment Security Technologies
Presentation transcript:

Using Digital Credentials On The World-Wide Web M. Winslett

Introduction Problem Statement –Traditional approaches for authenticating users is not enough to determine different types of users and their authorization to use services. –Internet is an open environment, identity does not give enough information about the authorization of users –Users may not want to reveal their identity if the service does not necessarily relevant with the identity.

Example Case Access to ACM SIGMOD web site? –A shared username-password pair for all users Little protection: How to prevent former users? What happens if the users spread password to others? –A username-password pair for each user Administrative overhead Hard to control authorization Strong relation with user identity: Privacy lose –SSL authentication facilities SSL specific identity. Not a portable ID with the user (smartcard?) Revealing browser identity which is irrelevant with access control decisions

Digital Credentials Give each ACM SIGMOD member a digital credential issued (signed) by ACM or a trusted party (Verisign). However, server and client software should agree on digital credentials and how they will be handled (authorization?).

Personal Security Assistant Obtain, store digital credentials and policies Negotiates with the server to decide which credentials are necessary Attaches credentials to service requests according to client/server policies May archive the credentials (including old ones)

Server Security Assistant Store digital credentials and policies Send server policy information and credentials to the client Handle client credentials and credential acceptance policies Assign roles to the users according to credentials Cache credentials if necessary

Credentials A digital credential does not need to store information about user’s real life identity –Example: ACM SIGMOD digital credential does not need to store the name of user. Issuer can use local names or public keys of users in digital credentials

Credentials Server can challenge the user to verify that he is the user that he is claiming (using PKCS) To reduce the risk of disclosure of the information in digital credentials by the server, the client may request some credentials from server.

Policies Server presents a policy to the client to explain what it needs for authorization Client may present own policy that explains what and how it can disclose credentials to the server. Server and Client may not want to reveal whole policy information in one step (step-by-step verification)

Trust Negotiation Interactions to setup a trust relationship between client and server is called as trust negotiation. –Client and Server policies, credentials –Client and Server’s agreement on the contents of credentials –Need for a common language for policies and credentials –Authorization and role assignments

Trust Negotiation –Categorizing services (to avoid unnecessary amount of policy creation) –Handling complex situations in credentials and policies (e.g. expiry dates, situations that may not be enforceable) –Scalability

Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation M. Winslett

Ideas Strategy: An ordering of credential disclosures to access a resource (or a service). Between client and server, different strategies may be used. However, the strategies should implement a common basic protocol (TrustBuilder protocol).

Private and Trusted Interactions Bharat Bhargava

Ideas Formulate trust gain with respect to privacy loss Self descriptiveness Apoptosis (Clean self-destruction) Proximity-based evaporation

Summary The language to define policies and credentials is very important in trust negotiation A common protocol for trust negotiation is necessary, but different strategies can be used. Scalability, manageability of the protocols are important. Less human interaction is very important. Privacy loss should be a major concern during trust negotiation.