ALT-C2010 7/09/2010 14:50 Giving you back control of your data: An e-Qualification system for e-Portfolios Learning Societies Laboratory, School of Electronic.

Slides:



Advertisements
Similar presentations
Not a case of rocket science: Electronic registers under the Apostille Convention Richard J. Hansberger, Director of eNotarization National Notary Association.
Advertisements

3SKey 3SKey.
Chapter 14 – Authentication Applications
The eCert Project Project director: Dr David Argles Project manager: Lisha Chen-Wilson Project assistant: Dr Tao Guan Learning Societies Lab, School of.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DIGITAL SIGNATURE AND ELECTRONIC DOCUMENTS IN ITALY Prof. Pierluigi Ridolfi AIPA Authority for Information Technology in the Public Administration V. Solferino,
SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind.
EUropean Best Information through Regional Outcomes in Diabetes Privacy and Disease Registries Technical Aspects Peter Beck JOANNEUM RESEARCH, Austria.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
A USER-CENTRIC APPROACH TO ECERTIFICATE FOR ELECTRONIC IDENTITIES (EIDS) MANAGEMENT IN MOBILE ENVIRONMENT MICHELE SCHIANO DI ZENISE, ANDREA VITALETTI,
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Slide 1 of 6 David Argles and Lisha Chen-Wilson The eCert Project Presented by:
Anonymity and Security in Public Internet Forums Ho-fung LEUNG Senior Member, IEEE Dept. of Computer Science & Engineering The Chinese University of Hong.
ALT-C2010 7/09/ :50 Giving you back control of your data: E-qualification system for E-portfolios Learning Societies Laboratory, School of Electronic.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Chapter 31 Network Security
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
1 Card Scanning Solutions SigniShell CSSN – Card Scanning Solutions THE ULTIMATE SIGNATURE CAPTURE & AUTHENTICATION SOLUTION.
June 2008Fiona Mylchreest1 e-Portfolios Research and experiences so far….
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Chapter 21 Distributed System Security Copyright © 2008.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Federal Acquisition Service U.S. General Services Administration eOffer/eMod Training eOffer/eMod Training Keonia Cobbins Systems Development Office of.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
DIGITAL SIGNATURE.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Using Public Key Cryptography Key management and public key infrastructures.
1 Session 4 Module 6: Digital signatures. Digital Signatures / Session4 / 2 of 18 Module 4, 5 - Review (1)  Java 2 security model provides a consistent.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
E-Authentication October Objectives Provide a flexible, easy to implement authentication system that meets the needs of AES and its clients. Ensure.
E-Commerce & Bank Security By: Mark Reed COSC 480.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Training for developers of X-Road interfaces
NATIONAL ACADEMIC DEPOSITORY
ESign Aashutosh.
Computer Communication & Networks
e-Health Platform End 2 End encryption
NATIONAL ACADEMIC DEPOSITORY
S/MIME T ANANDHAN.
Digital Signature.
Applying Robust Solutions
Using eSignature for Signing IBM Contracts
Pooja programmer,cse department
X-Road as a Platform to Exchange MyData
PKI (Public Key Infrastructure)
National Trust Platform
Presentation transcript:

ALT-C2010 7/09/ :50 Giving you back control of your data: An e-Qualification system for e-Portfolios Learning Societies Laboratory, School of Electronic and Computer Science, University of Southampton, UK

The Changing World of Security The “fortress” view of security But it was only last year that… The implications of peer to peer, linked data and our modern networked world

The Linked Data Problem It's amazing what data exists “out there” Modern systems (my 'phone!) can access it, link it... and lose it or abuse it The “club” entry scenario It would be great if I could regain control of my data

What the eCert project is all about We began with the problem of certificates in ePortfolios Computer scientists know about transaction processing But “eCertificates” are different We are investigating a good solution for ePortfolios and the broader scenarios

eCertificate Problems and Issues Three stakeholder trust Security requirements for satisfying the trust: Confidentiality, Privacy, Integrity, Authentication, Identity, Lifetime Validation. The technical problems: Content validation of digitally signed document Auto request of validation The structural issues when applying digital signing

eCertificate System Goals Maintain information privacy, ensure owner can have control over the usage of their eCertificates; Prevent unauthorized modification, able to be verified in a legal context; Lifetime validation, independent from issuing body. Allow for verification nationwide; Easy to use while maintaining security controls, suit users with low IT skills, both students and reviewers; Can be accessed through the issuing organizations, or any owner-preferred ePortfolio, or be used as a standalone application

How the eCert project works - 1 An eCertificate: Contains three sections, digitally signed, encrypted, With built-in functions to allow usage control settings while maintaining the integrity of the digital signature The status of the award, the signer and the signing key, expiry time, access time, and content modification, will all be validated

How the eCert project works - 2 The three stakeholders & the three subsystems Educational organization – create & issue Learner – manage & distribute Reviewer – view & verify

How the eCert project works - 3 The issuing subsystem is for registered educational organizations only An eCert central system Provides management and verification services No stored eCertificates – save storage, avoid attacks Convenient access Lifetime validation

Example use cases CV with attached Maths A-Level certificate from Edexcel Evidence of work for a portfolio Sharing work with tutors, but securing access (i.e. for non-disclosure agreements) Many more….

eCert~~~~~ ~~~~~ password

eCert~~~~~ ~~~~~ ~~~~~ ~~~~~ CV eCert ~~~~~~ ~~~~ eCert ~~~~~~ ~~~~ password + Owner controlled access values zip

CV password eCert~~~~ ~~~~

An example Educational organization → issuing subsystemissuing subsystem Issuing and sending the eCert to an eCert owner. Owner→ management subsystemmanagement subsystem Verifying the eCert, setting the access control to the eCert and sending it to a reviewer. Reviewer → verification subsystemverification subsystem Verifying the eCert of an owner.

Thank you for coming Questions?