Identity Management Marco Casassa Mont Trusted E-Services Lab Hewlett-Packard Laboratories Bristol, UK June 2002.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Xavier Verhaeghe Vice President Oracle Security Solutions
Page 1 Policy-Driven Systems for Enterprise-Wide Security Using PKI and Policies to build Trusted Distributed Authorization Systems Joe Pato Marco Casassa.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Identity Management In A Federated Environment Identity Protection and Management Conference Presented by Samuel P. Jenkins, Director Defense Privacy and.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Creating a Winning E-Business Second Edition
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Negotiated Revealing of Trader’s Credentials in e-Marketplaces: Dealing with Trust and Privacy Issues Marco Casassa Mont, Mike Yearworth
Marco Casassa Mont – TESL - Hewlett-Packard Laboratories, Bristol, UK 8 th IEEE Workshop FTDCS 2001 – Bologna - 31/10/ /11/2001 A Distributed P2P.
Digital Identities for Networks and Convergence Joao Girao, Amardeo Sarma.
1 Issues in federated identity management Sandy Shaw EDINA IASSIST May 2005, Edinburgh.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Managing Digital Identities: Challenges.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
On Privacy-aware Information Lifecycle Management (ILM) in Enterprises: Setting the Context Marco Casassa Mont Hewlett-Packard.
Identity Management: Enterprise, E-Commerce and Government applications and their implications for privacy Joe Pato, Principal Scientist Trust, Security.
1 Pertemuan 10 Network Security and E-Commerce Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
July 25, 2005 PEP Workshop, UM A Single Sign-On Identity Management System Without a Trusted Third Party Brian Richardson and Jim Greer ARIES Lab.
Web Security Infrastructure Study Topics Current State Concerns Recommendations Presentation by Kankan Roy For a Multinational Life Insurance Company.
Cloud Computing Cloud Security– an overview Keke Chen.
Copyright 2006 Archistry Limited. All Rights Reserved. SOA Federated Identity Management How much do you really need? Andrew S. Townley Founder and Managing.
Credit unions use social media in a variety of ways, including marketing, providing incentives, facilitating applications for new accounts, inviting feedback.
Andrew Nash Senior Director of Identity Services Topics in Identity and Payments.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Applying FI-WARE Generic Enablers to Smart Grid Management: Electric Car Charging Scenario Dr. Steven Davy Mobile, Middleware, TSSG Mas2tering.
Trusted Systems Laboratory Hewlett-Packard Laboratories Bristol, UK InfraSec 2002 InfraSec 2002 Bristol, October 2002 Marco Casassa Mont Richard.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
© Synergetics Portfolio Security Aspecten.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
Designing an E-Government Solution Jon Colombo In collaboration with Client or Partner logo.
Helsinki Institute of Physics (HIP) Liberty Alliance Overview of the Liberty Alliance Architecture Helsinki Institute of Physics (HIP), May 9 th.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
1 The World Bank Internet Services Program Rajan Bhardvaj
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Cross-Enterprise User Authentication John F. Moehrke GE Healthcare IT Infrastructure Technical Committee.
What is the Liberty Alliance ? A business alliance, formed in Sept 2001, with the goal of establishing an open standard for federated identity management.
Identity Assurance Emory University Security Conference March 26, 2008.
Get Safe Online Expert advice for everyone In association with.
Identity Management and Enterprise Single Sign-On (ESSO)
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
PKI Policy Determination Process Input from PKI Decision Process PKI Policy Determination Process Application(s) Workflows Players.
Federated Identity Management
Illinois Health Network The 14th Global Grid Forum Chicago, Illinois June 27, 2005.
DOCUMENT #:GSC15-PLEN-27 FOR:Presentation SOURCE:ETSI AGENDA ITEM:PLEN 6.4 CONTACT(S): Amardeo Sarma, ISG INS Chair Identity & Access Management activities.
10/08/20041 © 2004 Pete Palmer Federated Identity Management and Regional Health Information Organizations Pete Palmer, Principal Security Analyst, Guidant.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Identity and Access Management
E-commerce Presented by- JOHN.
Shibboleth Architecture
Data and Applications Security Developments and Directions
Federated IdM Across Heterogeneous Clouding Environment
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Building A Community of Trust to Transform Medicines Development
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
NextGen Access Control Platform
Marco Casassa Mont Trusted Systems Laboratory
Marco Casassa Mont Trusted Systems Laboratory
Marco Casassa Mont Pete Bramhall Keith Harrison
EPAL and Management of Privacy Obligations
Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services Marco.
Trusted Systems Laboratory
Towards Accountable Management of Privacy and Identity Information
Session 1 – Introduction to Information Security
Presentation transcript:

Identity Management Marco Casassa Mont Trusted E-Services Lab Hewlett-Packard Laboratories Bristol, UK June 2002

Enterprise 1 Enterprise 2 E-Commerce 1E-Commerce 2 Home Government Services Service Tax Home Office Driving Licence Health B2B P2P B2G C2G B2C Contexts

Enterprise 1 Enterprise 2 E-Commerce 1E-Commerce 2 Home Telecom ISP 1 ISPs Identity Providers Service Government Services Tax Home Office Driving Licence Health TTPs Identity Management

Views of Identity Foo.com view of me “Me me” “The Aggregated me” Enterprise view of me Government view Credit Rating

Identity Aspects Authenticity Dynamism Longevity Trustworthiness Accountability Privacy Simplicity

Identity Management Issues Ownership & Control Identity Thefts & Frauds Protection (Mobile Appliances)

Identity Management Activities

Liberty Alliance Project “Liberty Alliance Project is an alliance formed to deliver and support a federated network identity solution for the Internet that enables single sign-on for consumers as well as business users in an open, federated way …”

Liberty Alliance Project User Browser E-Commerce Sites Identity Providers SSO Modules Authentication SSO Modules SSO Modules Internet Exchange of Identity and Profile Information Trusted Third Parties, Trust Services,...

Research Accountable Management of Identities Personal Identity Assistant Virtual Private Identity Networks

Logging & Audit Notification/ Authorization Tracing Module User Identity Provider/Enterprise Identity Providers/ Enterprises Negotiation of Privacy Policy Provision of Identity & Profile Data Plug-in Identity/ Profile Disclosure Notifications/ Requests of Authorization Transaction / Interaction Tracing, Fraud Detection, Forensic Analysis Accountable Management of Identities Policies

Personal Identity Assistant Home Work Pub

Virtual Private Identity Networks Mall School Work Environment … Dynamic Groups of Interest Personal Identity Assistant Discover/Hide from other People Selective Disclosure of Identity Information Secure PDA Tracing and Auditing Mechanisms