Evaluation and Testbed Development Bhavani Thuraisingham The University of Texas at Dallas Jim Massaro and Ravi Sandhu.

Slides:



Advertisements
Similar presentations
0 McLean, VA August 8, 2006 SOA, Semantics and Security.
Advertisements

Identity Network Ideals – Heterogeneity & Co-existence
Microsoft ® System Center Configuration Manager 2007 R3 and Forefront ® Endpoint Protection Infrastructure Planning and Design Published: October 2008.
Keeping the War Fighter Informed
5/17/ SUPPORT THE WARFIGHTER DoD CIO 1 (U) FOUO DoD Transformation for Data and Information Sharing Version 1.0 DoD Net-Centric Data Strategy (DS)
SmartER Semantic Cloud Sevices Karuna P Joshi University of Maryland, Baltimore County Advisors: Dr. Tim Finin, Dr. Yelena Yesha.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Connecting People With Information Conclusions DoD Net-Centric Data Strategy (DS) and Community of Interest (COI) Training For further information .
Web Services and the Semantic Web: Open Discussion Session Diana Geangalau Ryan Layfield.
SOA Architecture Delivery Process by Dr. Robert Marcus SRI International 1100 Wilson Boulevard Arlington, VA
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Systems Analysis and Design in a Changing World, Fourth Edition
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
© Prentice Hall, © Prentice Hall, ObjectivesObjectives 1.An understanding of the relationship between data and information 2.Insights.
Chapter 4: Beginning the Analysis: Investigating System Requirements
1 July 2005© 2005 University of Kent1 Seamless Integration of PERMIS and Shibboleth – Development of a Flexible PERMIS Authorisation Module for Shibboleth.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
CORDRA Philip V.W. Dodds March The “Problem Space” The SCORM framework specifies how to develop and deploy content objects that can be shared and.
Scottish Information Landscape An overview from SLIC Elaine Fulton Director Scottish Library and Information Council
Enterprise Architecture
1 Data Strategy Overview Keith Wilson Session 15.
Extended Role Based Access Control – Based Design and Implementation for a Secure Data Warehouse Dr. Bhavani Thuraisingham Srinivasan Iyer.
A Combat Support Agency Defense Information Systems Agency UNCLASSIFIED Program Executive Office GIG Enterprise Services (PEO-GES) 101 Briefing As of October.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
9/11/ SUPPORT THE WARFIGHTER DoD CIO 1 Sample Template Community of Interest (COI) Steering Committee Kick-off Date: POC: V1.0.
Connecting People With Information DoD Transformation to Net-Centric Operations via Net-Centric Strategies For further information OSD at:
9/15/ SUPPORT THE WARFIGHTER DoD CIO 1 (U) FOUO Conclusions Version 1.2 DoD Net-Centric Data Strategy (DS) and Community of Interest (COI) Training.
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
Deploying Trust Policies on the Semantic Web Brian Matthews and Theo Dimitrakos.
Enterprise User Enabling Warfighter Capability
44 Montgomery Street Suite 960 San Francisco, CA USA Tel Cell
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Page 1 Informatics Pilot Project EDRN Knowledge System Working Group San Antonio, Texas January 21, 2001 Steve Hughes Thuy Tran Dan Crichton Jet Propulsion.
Data and Applications Security Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security August.
SWIM-SUIT Information Models & Services
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
W3C Web Services Architecture Security Discussion Kick-Off Abbie Barbir, Ph.D. Nortel Networks.
Semantic Web Technologies Research Topics and Projects discussion Brief Readings Discussion Research Presentations.
Assured Information Sharing Lifecycle A Framework for Managing the Assured Information Sharing Lifecycle Tim Finin Joint MURI Meeting 12 September 2008.
Data Strategy  Status Update  SSIM  RID  Technology Strategies.
A Net-Centric DoD NII/CIO 1 Sample Template Community of Interest (COI) Steering Committee Kick-off Date: POC:
Infrastructure Service Approach to Handling Security in Service-Oriented Architecture Business Applications Doina Iepuras.
Status Update on Other GFIPM Activity Threads GFIPM Delivery Team Meeting November 2011.
Connecting People With Information Transforming the Way the DoD Manages Data M. David Allen OASD(NII)/DoD CIO May 23, 2006 “The.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Security for Distributed Data Management.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Project Discovery – Monday Holyoke 561 Most updates will only have 30 minutes maximum for their presentations. At least 10 minutes should be left for Q&A.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
4 Chapter 4: Beginning the Analysis: Investigating System Requirements Systems Analysis and Design in a Changing World, 3 rd Edition.
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security
Universal Core Task Force Connecting People With Information
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security
Presentation transcript:

Evaluation and Testbed Development Bhavani Thuraisingham The University of Texas at Dallas Jim Massaro and Ravi Sandhu The University of Texas at San Antonio Tim Finin University of Maryland, Baltimore County

2 Outline Project Tasks Accomplishments NCES/GIG Security AIS Questionaire Next Steps

3 Project Tasks Year 1: Determine Base-line, Gather requirements from AIS Community, Develop scenarios Year 2: Testbed architecture design and preliminary prototype addressing subset of the requirements Year 3: Enhanced prototype for evaluation by interested organizations Optional years: Continue with the development

4 Accomplishments Base-Line: NCES and GIG Security/Information Assurance Questionaire to be distributed to the Services to gather requirements Will work with Dr. Herklotz to identify people to send the questionaire to Two courses taught at AFCEA (Armed Forces Communications and Electronics Association) May 2008 with units on Assured Information Sharing

5 NCES Security: WS-* Security Standards framework

6 What is NCES? NCES enables information sharing by connecting people/systems who have information* with people/ systems who need information For people who have information, NCES provides global information advertising and delivery services For people who need information, NCES provides global services to find and receive information rview_ ppt * Information – data and services (web services)

7 What is the Global Information Grid (GIG)?* The GIG represents a globally interconnected, end-to-end set of information capabilities and processes for collecting, processing, and managing information on demand to warfighters, policymakers, and support personnel. The GIG provides a critical foundation for the DoD’s Network-Centric vision by: (1) supporting the posting of data to shared spaces as early as possible; (2) providing users with an enhanced capability to pull required data from wherever they are, whenever they need it; and (3) ensuring information assurance measures are applied effectively and across the enterprise. The enterprise services component of the GIG consists of a suite of reusable core enterprise services such as (1) discovery of potential new users or data sources, (2) mediation between various data formats, (3) discovery of data and applications to solve problems, and (4) provisioning of the appropriate security services and keys to allow access to the data required. *Source:

8 Portal Application Service Consumer Service Consumer Attribute ServicePolicy Decision Service Policy Admin Service Policy Retrieval Service Provider Certificate Validation Service Policy Enforcement Point Policy Enforcement Point Request / Response NCES Security Services NameProtocolFormatStandards Body Service Request / ResponseHTTP / SOAPSOAP, WS-Security, XML- DSIG, SAML, WS- Addressing OASIS / W3C Attribute ServiceSAML-PSAMLOASIS Policy Decision ServiceSAML-PSAMLOASIS Certificate Validation ServiceXKMSXKMS /W3C Policy Retrieval ServiceNCES-defined*XACMLOASIS Policy Administration ServiceNCES-defined*XACMLOASIS Security Services: Detail View User

9 Logical Component Overview Application Service Consumer Authentication NCES Service Security Attribute Service Policy Decision Service Policy Admin Service Policy Retrieval Service DOD PKI & LDAP Service Provider Certificate Validation Service Policy Store Identity Store Policy Enforcement Point Attribute Store User

10 Questionaire The purpose of the (Web-based) Questionaire is to gather requirementds from DoD and its partners for Assured Information Sharing to guide our research For each question, if you answer “yes”, please elaborate on your answer. For each question you answer “no”, please state your future plans with respect to that question

11 Questionaire: Basic questions Is your organization adopting DoD’s Information Sharing Strategy? If no, what information sharing strategy is your organization following? If there is no strategy, then are you planning to have one in the future? Is yes, are you planing to implement all five implementation strategies proposed by the DoD?

12 Questionaire: Policies What policies are important to your organization for AIS Confidentiality, Privacy, Trust, Integrity, Other Explain each type of policy Is multilevel security important to your organization for AIS? If so, how do you handle information flow from High to Low? Are you utilizing a trusted guard/filter for information sharing across security levels?

13 Questionaire: Partners and Trust Do you have to share information with partners at different trust levels? How do you handle partners of different trust levels? How are trust levels assigned in your environment? Are the trust levels changing with time for a partner?

14 Questionaire: Standards Is you organization adopting NCES and GIG strategies? What standards is your organization adopting? E.g., Web 2.0, SOA? Are you using XACML, SAML for policies? Are you preparing for Web 3.0? Is your organization adopting DODAF?

15 Questionaire: Technologies Do you belong to a federated environment? What knowledge management practices do you enforce? Will you adopot the DoD KM strategy (e.g., AKM)? Are their incentives for you to share data? Describe how social networking is gaining importance in your organization and what are the tools you are using? What information management strategies do you follow? Describe any other activities/scenarios related to AIS

16 Next Steps Send questionaire to government agencies; work with AFRL and other DoD Labs Present our research results to DoD agencies and get feedback Work with our partners (e.g., Raytheon) and discuss opportunities for technology transfer Scenario development