Read Me Intent of the work The Periodic Table – Rows - Clusters - Colors – Cautions on dynamic nature of table About trust marks and trust frameworks Use.

Slides:



Advertisements
Similar presentations
doi> Digital Object Identifier: overview
Advertisements

Theme 3: Architecture. Q1: Who houses stuff, both records and identifiers All useful services and repositories are centralized (latency, etc.) … but centralizing.
EMS Checklist (ISO model)
Configuration Management
“Service Framework” workgroup
TFTM Interim Trust Mark/Listing Approach Paper Discussion Deck TFTM Committee IDESG Plenary Meeting January 14, IDESG TFTM Committee1.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
Spatial Data Infrastructure: Concepts and Components Geog 458: Map Sources and Errors March 6, 2006.
Office of the Auditor General of Canada CANADA’S ADOPTION OF INTERNATIONAL STANDARDS ON AUDITING 20 FACTS PREPARERS of FINANCIAL STATEMENTS SHOULD KNOW.
Enhancing Data Quality of Distributive Trade Statistics Workshop for African countries on the Implementation of International Recommendations for Distributive.
TFTM Sub-Committee What do we need for the IDESG Trust Mark Program Discussion Deck TFTM Committee April 16, IDESG TFTM Committee1.
Systems Engineering in a System of Systems Context
2/7/2001 Presentation at the University of Kansas Digital Libraries – Meeting the Challenges Beth Forrest Warner.
Standardization of Data A Pragmatic View for a Complex Process Forum on e-Business Interoperability and Standardization May 14, 2004 C.K. Wong iASPEC Technologies.
HITSP – enabling healthcare interoperability 1 enabling healthcare interoperability 1 Standards Harmonization HITSP’s efforts to address HIT-related provisions.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
Design Plans CSCI102 - Systems ITCS905 - Systems MCS Systems.
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
Introduction to UDDI From: OASIS, Introduction to UDDI: Important Features and Functional Concepts.
National Smartcard Project Work Package 8 – Security Issues Report.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
SWITCHaai Team Federated Identity Management.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
TFTM Interim Trust Mark/Listing Approach Paper Accreditation, Certification, and Trust Mark Program Key Administrative and Operational Responsibilities.
Systems analysis and design, 6th edition Dennis, wixom, and roth
-Nikhil Bhatia 28 th October What is RUP? Central Elements of RUP Project Lifecycle Phases Six Engineering Disciplines Three Supporting Disciplines.
An Interactive Multimedia Database of U.S. Courthouses 1 CourtsWeb, is a website that evaluates and documents recent federal courthouses. It is a decision.
CIM and UML Overview Terry Saxton Xtensible Solutions
NDSA Update: TRAC Review Project and DPOE Nancy Y McGovern, MIT Libraries 1 st NDSR-NE on May 10, 2013.
Federal XML Naming and Design Rules and Guidelines Paul Macias.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
A DESCRIPTION OF CONCEPTS AND PLANS MAY 14, 2014 A. HUGHES FOR TFTM The Identity Ecosystem DISCUSSION DRAFT 1.
1st Workshop on Intelligent and Knowledge oriented Technologies Universal Semantic Knowledge Middleware Marek Paralič,
Belnet Federation Belnet – Loriau Nicolas Brussels – 12 th of June 2014.
Stuff, including interfederation stuff Dr Ken Klingenstein, Director, Middleware and Security, Internet2.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
95-843: Service Oriented Architecture 1 Master of Information System Management Service Oriented Architecture Lecture 3: SOA Reference Model OASIS 2006.
Applications Through a PrivacyLens: Overview Deck “what you release is who you are”
Illustrations and Answers for TDT4252 exam, June
IS 325 Notes for Wednesday August 28, Data is the Core of the Enterprise.
R R R CSE870: UML Component Diagrams Implementation Diagrams.
CMPS 435 F08 These slides are designed to accompany Web Engineering: A Practitioner’s Approach (McGraw-Hill 2008) by Roger Pressman and David Lowe, copyright.
INTRODUCTION: THE FIRST TRY InCommon eduGAIN Policy and Community Working Group.
Health Delivery Services May 29, Eastern Massachusetts Healthcare Initiative Policy Work Group Session 2 May 29, 2009.
Metadata By N.Gopinath AP/CSE Metadata and it’s role in the lifecycle. The collection, maintenance, and deployment of metadata Metadata and tool integration.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
X.509 Proxy Certificates for Dynamic Delegation Ian Foster, Jarek Gawor, Carl Kesselman, Sam Meder, Olle Mulmo, Laura Perlman, Frank Siebenlist, Steven.
Discussion - HITSC / HITPC Joint Meeting Transport & Security Standards Workgroup October 22, 2014.
ISO CONCEPTS Is a management standard, it is not performance or product standard. The underlying purpose of ISO 1400 is that companies will improve.
Achieving Semantic Interoperability at the World Bank Designing the Information Architecture and Programmatically Processing Information Denise Bedford.
Attribute Release and Scalable Consent \. Part of the original vision for federated identity and necessary for it to succeed Federated identity is less.
Implementing the FEA DRM Michael C. Daconta Metadata Program Manager March 15, 2004.
Growth. Interfederation PKI is globally scalable Unfortunately, its not locally deployable… Federation is locally deployable Can it.
INTRODUCTION: THE FIRST TRY InCommon eduGAIN Policy and Community Working Group.
Understanding deployment issues on the Supply Chain Ann Harding, SWITCH, Nicole Harris, TERENA Cambridge July 2014.
1 SOA Seminar Seminar on Service Oriented Architecture SOA Reference Model OASIS 2006.
INTRODUCTION TO IDENTITY FEDERATIONS Heather Flanagan, NSRC.
Progress Report on the U.S. NSTIC Efforts Jack Suess – Delegate for Research, Development, Education & Innovation
Internet identity: Forward in All Directions Dr Ken Klingenstein, Director, Middleware, Internet2.
Draft-howlett-abfab-trust-router-ps ABFAB, IETF83 Josh Howlett & Margaret Wasserman.
CHAPTER 3 Architectures for Distributed Systems
GSAF Grid Storage Access Framework
Project proposal for ISO 27001:2013 implementation
Chapter 2 Database Environment.
Context, Gaps and Challenges
Database Systems Instructor Name: Lecture-3.
Appropriate Access InCommon Identity Assurance Profiles
Image Metadata Summary of 4/18/99 NISO/DLF Image Metadata Meeting
Presentation transcript:

Read Me Intent of the work The Periodic Table – Rows - Clusters - Colors – Cautions on dynamic nature of table About trust marks and trust frameworks Use of the table to illustrate marks and frameworks Next steps

Trust frameworks and trust marks are ambiguous and misconstrued terms. What we have some understanding of is many of the trust elements that can be used, in concert, to build frameworks and marks. The elements fit well into a periodic table showing the issues (e.g. legal, privacy, operational) that they address and indicating the layers that deal with them It is a concept map of federated trust issues; it is not a reference of all issues, marks, etc nor does it have an atomic weight type of scale The long term intent is a specific context for comparing marks and frameworks and a constructionist approach to building and evolving trust Intent of the work

Aspects of the Periodic Table Most current version of the periodic table is athttps://spaces.internet2.edu/display/scalepriv/ Rows represent scale, from the relatively few federated operators at the top to the thousands of organizations and millions of users at the bottom Colors represents business functional areas, including technical, operational, policy, legal, etc. Clusters of elements represent related sets of issues, such as the technical requirements needed to trust attribute authorities within a federation

Dynamic nature of the table Changing the row of an element is a policy architectural decision, reflecting the nature of specific COI circumstances; hub and spoke federations address many elemental issues at the operator row rather than as member of the COI decisions. Changing the color of an element is arbitrary and only affects in which tabs of various documents those elements will be addressed The density of elements at the top is only a reflections of the authors’ experience and awareness; over time many elements will be discerned at the lower layers It is also likely that as elements are explored, they will in turn be distinguished into separate and important elements There are new elements still be discovered

The specific rows of the table Federated operators elements – Policy and financial – Technical Operator to members elements Member to member elements (the community of interests, aka COI) Attribute authority elements End-user elements

The colors of the table Policy and governance Technical Operational Legal Privacy

Notes The perspective, as reflected in this layers of table, is one of a multilateral full-mesh community of interest federation; hub and spoke architectures, or bi-lateral relationships may have different layering or placement of elements in layers. While the long-term path may be dynamic trust instead of federations, getting there requires the normalization of base-line behaviors that federations create.

A Possible Taxonomy Trust elements – specific issues, as identified in the periodic table, that could affect the overall trustworthiness of an interaction Trust marks – a focused set of sets of elements/values and perhaps other marks intended to certify behaviors of actors on a specific set of ecosystem concerns, e.g. accessibility, privacy, COPPA compliance, etc. Trust frameworks – a broad trust infrastructure, using an evolving collection of marks and elements/values, supporting general ecosystem transactions.

Trust Marks Trust marks – a selection of elements, and values/processes/procedures assigned to the elements, that focus on a specific thematic issue – Different ecosystem actors may use varying parts of the mark Trust marks may include elements from many layers of the periodic table, but with a specific certification in mind Trust marks may reference other trust marks as well as assigning required values to elements Marks have certain metadata: issuing authority, revocation, a logo, etc. Marks do not evolve much over time; their value lies in the stability.

Trust Mark Examples In the R&E space, several exist or are under active discussion: – Research and Scholarship, Service by Affiliation, Library certified service Work under way on an accessibility mark, a minor’s mark. E.g. “fair trade organic coffee”, UL, certified ISO compliance, certified MS field engineer, energystar, etc. Created and managed by TDO’s – trustmark development organizations, either public or private

Trust frameworks Trust frameworks – a comprehensive set of elements, and associated values, and marks, intended to provide a general, multi-purpose basis for trust for a COI – Typically more comprehensive than marks – Trust frameworks will use some trust marks operationally and transport many more marks as payloads in metadata, etc Trust frameworks are evolutionary, currently silent on some elements, awaiting community need for opertoinal standards –.

Trust frameworks Two primary parts – A set of elements and trustmarks applying largely to the federated operator – A set of elements and trustmarks applying to the actors within the COI May take a MUST/SHOULD/MAY format As the needs of the COI evolve, so will this part – Marks/elements may transition from SHOULD to MUST – New marks and elements may be embraced in order to do new business E.g. Kantara, Safe-BioPharma, InCommon, SurfConext, etc

Research and Scholarship mark (R&S) Overarching requirements: – None (other than supporting InCommon base level eduperson) For the IdP – Release a specific set of attributes (unique palatable name, display name, affiliation) For the SP – Use the attributes in a minimal way and dispose afterwards For the mark issuer (InCommon right now, soon an auditor) – Determine that the “purpose” of the application is R&S – Determine that the application needs all the attributes in R&S (and not some lesser bundle, e.g. Library) – Reaffirm mark each year

Accessibility Mark Overarching requirements: – Support of mark specific schema (e.g. ISO/IEC JTC ) – Proper use of the mark For the IdP – Provide users with mechanisms to store schema values – Provide users with tool to selectively and with informed consent release schema values – Provide attribute authorities (e.g. medical practitioners) with mechanisms to load values into an individual’s schema store For the SP – Be able to effectively use received attributes and make content display modifications accordingly For an attribute authority – Offer patients the option of providing ISO schema settings.

Mark metadata Who issued and availability of audit Duration Revocation mechanism Icon/Logo Several other characteristics – Xml

Trust frameworks A collection of marks and elements/values that evolves over time as the COI business needs grow. Can follow the IETF RFC keywords with MUST/SHOULD/MAY, Dynamic – – some of those keywords changing over time (e.g. from SHOULD to MUST) – New marks being added to the framework – Operational changes to support scale and interoperability

InCommon Trust Framework today (refactored) InCommon operations runs according to the international R&E fed ops guidelines InCommon governance (description of elements) Members MUST op at basic and SHOULD run bronze; they MAY run silver) Members SHOULD support R&S mark Lots of other stuff

InCommon Trust Framework tomorrow InCommon operations runs according to the IDESG fed ops guidelines (taken from another standards org) InCommon governance (description of elements) Members MUST op at basic and MUST run bronze; they SHOULD run silver) Members MUST support R&S mark and SHOULD support the accessibility mark and SHOULD support the end-user privacy management mark, etc. Lots of other stuff

Contributors And other elemental folks... – Ken Klingenstein, Leif Johanssen, John Bradley, Lucy Lynch, Steve Olshansky, Jack Seuss, Art Friedman, Heather Flanagan, Alan Foster, John Wandelt, your name welcome here