Information Sharing Puzzle: Next Steps Chris Rogers California Department of Justice April 28, 2005.

Slides:



Advertisements
Similar presentations
National HIT Agenda and HIE John W. Loonsk, M.D. Director of Interoperability and Standards Office of the National Coordinator Department of Health.
Advertisements

Data Model (Global JXDM) Executive Briefing The International Justice and Public Safety Information Sharing Network …A GJXDM Success Story.
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
1 eAuthentication in Higher Education Tim Bornholtz Session #47.
All Rights Reserved: JusticeExperts.com Enterprise? What Enterprise? Enterprise Development.
S.R.F.E.R.S. State, Regional, and Federal Enterprise Retrieval System Inter-Agency & Inter-State Integration Using GJXML.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
OHIO OFFICE OF INFORMATION TECHNOLOGY. Even the agents are suffering…
1 Overview of Other Global Networks Exchange Network User Group Meeting April 2006.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
United States Department of Justice U.S. DOJ’s Global Justice Information Sharing Initiative Robert Boehmer Chairman, Global Advisory.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Global Federated Identity & Privilege Management GFIPM John Ruegg, Director LA County ISAB United States Department of Justice.
Understanding the Value of Identity in Government Social Networking A Framework of Identity Trust in Government Social Networking September 4, 2015.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
TechRISS RISS. RISSTech Global Justice Information Sharing Initiative Global Advisory Committee RISS / RISSNET Trusted Credential Project Washington,
Wisconsin Digital Summit Monona Terrace November 15, 2004 Justice and Public Safety Interoperability: Wisconsin’s Justice Information Sharing (WIJIS) Initiative.
The InCommon Federation The U.S. Access and Identity Management Federation
PROJECT NAME: DHS Watch List Integration (WLI) Information Sharing Environment (ISE) MANAGER: Michael Borden PHONE: (703) extension 105.
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
1 Identity and Transparency ( Bridging the GAPS of Governance Bridging the GAPS of Governance in eGov Initiatives in eGov Initiatives )‏ Badri Sriraman.
Tom Clarke VP, Research & Technology National Center for State Courts.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
Disaster Management eGov Initiative (DM) Program Overview December 2004.
Introduction to the Data Exchange Hub (DEH) Project July 15, 2005.
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
TUESDAY, 4:00 – 4:20PM WEDNESDAY, 4:00 – 4:20PM Douglas Hill, NHIN Implementation Lead (Contractor), Office of the National Coordinator for Health IT Vanessa.
11 Aeronautical Information Exchange Model (AIXM) / Weather Information Exchange Model (WXXM) Conference Addressing the NextGen Challenge Charles A. Leader.
...From Collaboration to Integration... Page: 1 November 2, 2006 Welcome and Introduction James Dyche Systems Manager 5 Technology Park Harrisburg, PA.
Who is TIJIS? What is NIEM? What is the Texas Path to NIEM? What does it mean to me?
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
National Information Exchange Model Presented by : Mini Kanwal June, 09.
United States Department of Justice Implementing Privacy Policy in Justice Information Sharing: A Technical Framework John Ruegg,
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
Enterprise Architecture, Enterprise Data Management, and Data Standardization Efforts at the U.S. Department of Education May 2006 Joe Rose, Chief Architect.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
United States Department of Justice Global Security Working Group Update Global Advisory Committee November 2, 2006 Washington, D.C.
Shibboleth: An Introduction
W HAT IS I NTEROPERABILITY ? ( AND HOW DO WE MEASURE IT ?) INSPIRE Conference 2011 Edinburgh, UK.
United States Department of Justice Achieving Information Interoperability and Business Agility The Justice Reference Architecture:
State of e-Authentication in Higher Education August 20, 2004.
E-Authentication in Higher Education April 23, 2007.
National Information Exchange Model (NIEM) Executive Introduction November 29, 2006 Thomas O’Reilly NIEM Program Management Office.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Interoperable Trust Networks Chris Rogers California Dept of Justice February 16, 2005.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Globus and PlanetLab Resource Management Solutions Compared M. Ripeanu, M. Bowman, J. Chase, I. Foster, M. Milenkovic Presented by Dionysis Logothetis.
Decoding the Alphabet Soup: Global JIS Standards 101.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
CaGrid 1.0 Security Infrastructure Stephen Langella, Scott Oster, Shannon Hastings, David Ervin, Joshua Phillips, Vinay Kumar, Tahsin Kurc, Joel Saltz.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
DOCUMENT #:GSC15-PLEN-27 FOR:Presentation SOURCE:ETSI AGENDA ITEM:PLEN 6.4 CONTACT(S): Amardeo Sarma, ISG INS Chair Identity & Access Management activities.
A Study of Certification Authority Integration Model in a PKI Trust Federation on Distributed Infrastructures for Academic Research Eisaku SAKANE, Takeshi.
1 CDC Health Information Exchange (HIE) Accelerating State-wide Public Health Situational Awareness in New York Through Health Information Exchanges August.
Pennsylvania Health Information Exchange NJHIMSS - DVHIMSS Enabling Healthcare Transformation Through Information Technology September, 2010.
Bob Jones EGEE Technical Director
Law Enforcement Information Sharing Program (LEISP) Federated Identity Management Pilot February 27, 2006.
Data and Applications Security Developments and Directions
HIMSS National Conference New Orleans Convention Center
A GJXDM-Based Approach for Federated Information Sharing
WS Standards – WS-* Specifications
Presentation transcript:

Information Sharing Puzzle: Next Steps Chris Rogers California Department of Justice April 28, 2005

Tactical Approaches VPN / Trusted Certificates/Credentials Customized Gateways Vetted and agreed upon policies and procedures Information exchange model (IEM) – XML credentials System-to-System use case IVE appliance integrated with infrastructure – Identities propagated throughout network – Tools that delegate the assignment of privileges – Certificate Policy/Practice Statement User-to-Application use case

Acute Awareness Primary Impediments to Information Sharing – Incompatible technologies – Identity, authentication, & authorization policies Factors Affecting Interoperability – Numerous autonomous agencies – Multiple trust domains – Heterogeneous environments – Varied governance structures – Significant investment in legacy environments – Inconsistent or non-existent security policies & procedures – Disparate and incompatible security mechanisms

Fundamentals of Success Identity Management – Addresses the inter-domain security problem with trust and standards – Agreements, standards, technologies make identity and entitlements portable across autonomous domains – Authenticated users can be easily recognized and consume services offered by other “federation” service providers Privilege Management

Addressing the Problem Nat’l Criminal Intelligence Sharing Plan (NCISP) Global Justice Information Sharing Initiative – Advisory Committee Membership/Leadership – Advisory Committee Executive Steering Committee – Global Working Groups Infrastructure Standards Security –Global Security Architecture Committee Intelligence Privacy and Information Quality

Committee Composition Criminal Information Sharing Alliance Network (CISAnet) Regional Information Sharing Systems Network (RISSNET) Justice Network (JNET) DHS Homeland Security Information Network (HSIN)/ Joint Regional Information Exchange System (JRIES) Automated Regional Justice Information System (ARJIS) California Department of Justice Wisconsin Department of Justice

Business Problem – Recognized networks and information systems exist that involve substantial investments in technology, governance structures, and trust relationships – Failure to enable interoperability between the available information systems continues impede law enforcement and government officials’ ability to take effective actions when they are not aware of other information that may be known about a person or event Global Security Architecture Committee (GSAC)

Committee Scope National Criminal Intelligence Sharing Plan (NCISP) – In response to the implementation of the National Criminal Intelligence Sharing Plan (NCISP) to develop an “overall” NCISP Interoperability Framework – To define of a set of “jointly agreed-upon and standards-based security mechanisms, communications protocols, and message formats”

Initiatives Federated Identity and Privilege Management Security Interoperability Demonstration (GSAC participants) Trusted Credential Project (RISS) DHS Service Oriented Architecture – Security and Identity Management (IdM) Component (DHS)

Demonstration Federated Identity and Privilege Management Security Interoperability

Goal/Objective A multi-directional electronic exchange of criminal intelligence information, achieved through secure systems interoperability between networks and information systems currently not capable of doing so

Scope Develop and prove an identity and privilege management service that can be used to apply authentication and access controls by disparate systems and networks desiring to make their resources “sharable”

Scope (cont’d) What’s IN What’s OUT Policies Process definition Established baseline of vetting requirements User-to-application use case Web-based applications only Use open source, non- commercial software to keep licensing costs to a minimum

Deliverable Demonstrate a universal mechanism, implementation-independent and non- vendor specific, designed to share trusted assertions (agreed set of attributes) that can be used to apply authentication and access controls

Use Case A valid subscriber of System “A” can access applications of System “B” (a federation participant) A valid subscriber of System “B” can access applications of System “A”; (a federation participant) A subscriber is “registered” locally and is not required to re-register to another federation participant’s system or application

Use Case (cont’d) A subscriber authenticates locally and is not required to re-authenticate to another federation application – even if that subscriber has traversed multiple applications within the federation Subscriber information is passed to the federation system or application – access control decisions can be made without local provisioning

Participation Premise Participants retain control over their resources (dissemination & access control decisions made locally) Participants register & administer their subscriber base Participants can implement local technologies Participants agree to a minimal set of policies, procedures, and standards allowing for subscriber authentication and privilege information to be passed between participants Participation does not preclude independent, out-of- band, bilateral agreements between participants

Progress Cooperative Agreements Funding Data Requirements Survey – Industry Specs – Recommendations/Common Usage Profile Concept Demo – Coming soon…

For more information… Christina Rogers California Department of Justice (916)