10.20.2007, Josef NollNISnet NISnet meeting 10.10.2007 Mobile Applied Trusted Computing Josef Noll,

Slides:



Advertisements
Similar presentations
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Advertisements

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
1 Cypak core technology New convenient security solutions for online gaming Combat fraud and keep your customer happy.
Secure Communication Architectures.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
PKI Implementation in the Real World
1 ARPA A regional infrastructure for secure role-based access to RTRT services Ing. Laura Castellani Tuscany Region.
Network Identity Kai Kang 27 th October Outline Introduction –Definition –Five drivers –Basic services –Roadmap Network Identity management approaches.
Principles of Information Security, 2nd edition1 Cryptography.
FIT3105 Smart card based authentication and identity management Lecture 4.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
MOVATION - Contributions and Expectations to NISnet October 2007 MOVATION - Contributions and Expectations to NISnet October 2007 Truls Berg, Josef Noll,
IPhone SDK and Enterprise Peter Wood. Enterprise Upcoming iPhone support for Microsoft Exchange ActiveSync and industry-standard corporate security measures.
Secure Element Access from a Web browser W3C Workshop on Authentication, Hardware Tokens and Beyond 11 September Oberthur Technologies – Identity.
Identity and Access Management
SIM205. (On-Premises) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service)
Certificate and Key Storage Tokens and Software
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Security for Managers (Master MIS)
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Information Assurance... Smart Card Interoperability Steve Haynes Phone
(Josef Noll) -> MasterThesis Masteroppgaver 2008 Josef Noll, Prof. stip. Mohammad M. R. Chowdhury, PhD student.
Account Authority Digital Signature AADS Lynn Wheeler First Data Corporation
Internet Security for Small & Medium Business Week 6
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Josef Noll, The role of the Mobile1 Mobile based Admittance and Access to Information Josef Noll 1, Juan Carlos Lopez Calvet, Telenor R&D,, N-1331.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
An Investigation into E-Commerce Frauds and their Security Implications By Kevin Boardman Supervisor: John Ebden 29 July 2004.
Gregorio Martínez Pérez University of Murcia PROVIDING SECURITY TO UNIVERSITY ENVIRONMENT COMMUNICATIONS.
Draft-qi-i2nsf-access-network- usecase-00 Author: Minpeng Qi, Xiaojun Zhuang.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
Identity-based Service Interaction Mohammad M. R. Chowdhury Ph.D. candidate UniK-University Graduate Center / University of Oslo SWACOM meeting, Stavanger,
Geneva, Switzerland, September 2014 Identity Based Attestation and Open Exchange Protocol (IBOPS) Scott Streit Chief Scientist.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Telenor R&DMobile Terminals Group 1 Four-in-one: Your mobile integrates them all Security Requirement Nice to know Need to know Have to know Examples:
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Mobile Payments: Key IT Law Issues Sony Gokhale October 26, 2015
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
(Josef Noll) -> MasterThesis Masteroppgaver 2006 Josef Noll, Prof. stip. Univ. Graduate Center.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
Josef Noll Payment and Access 1 Payment and Access through the Mobile Phone Josef Noll 1,2, Erzsébet Somogyi 3, Gyorgy Kalman 1, Ola Høiby 1 1.
Module 7 – SET SET predecessors iKP, STT, SEPP. iKP Developed by IBM Three parties are involved - Customer, Merchant, and Acquirer Uses public key cryptography,
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
Jason Kuo APSCA October 29, 2010 Convergence and cross usage of secure elements for mobile PKI and secure mobile contactless services.
Electronic Banking & Security Electronic Banking & Security.
Joe Knight’s Company VPN Policy. What is VPN? Virtual Private Network (VPN) will allow you all as users to remote into the network from home or anywhere.
Enabling Access Control and Privacy through Ontology Mohammad M. R. Chowdhury Dr. Josef Noll UniK - University Graduate Center, Norway Dr. Juan Miguel.
Identification (User Authentication). Model Alice wishes to prove to Bob her identity in order to access a resource, obtain a service etc. Bob may ask.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Secure Connected Infrastructure
Federated IdM Across Heterogeneous Clouding Environment
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Auth0 Is Identity Made Simple for Developers, Built by Developers and Supported by the High Availability and Performance of Microsoft Azure MICROSOFT AZURE.
Security in mobile technologies
Presentation transcript:

, Josef NollNISnet NISnet meeting Mobile Applied Trusted Computing Josef Noll,

, Josef NollNISnet Security and authentication: Leading questions What do I fear? – That somebody steals my identity and I can't do anything about it. – That biometrics takes it all – and privacy disappears What can I use to make life more comfortable? – Reduce number of “secure devices” I have to carry (BankID, Telenor access card, keys, money, credit card, …) – Have a device which is secure (enough). Why is my phone the security infrastructure? – Because I can ask my operator to block it, if it gets stolen. – Because it is not an insecure Microsoft device.

, Josef NollNISnet Summary: Identity in the virtual world Real world: see and/or talk Voice Face Virtual world: , web Username, passwd SIM, PKI Security, privacy Service world (between providers) Identity management Service level agreement (SLA) Trust relation

, Josef NollNISnet Introduction: Identity Identity is attributes of your persona – Social, Corporate and Private IDs Internet was built without an identity layer – Identity 2.0 stems from Web 2.0 – People, information and software – More user-oriented (wikis, comments, tags) – More seamless web services (AJAX) Service related security – Provide just the information which is necessary Mobile challenges

, Josef NollNISnet Summary: Identity 2.0 – The goal User centric – More like real life ID’s (passport, license) – Multiple ID’s (PID, SID, CID) – Certificates and preferences – Choose attributes ~more privacy ID providers – Multiple providers – Own certificates Mobile, and de-centralized Personal (PID) Corporate (CID) Social (SID) Identity

, Josef NollNISnet Challenge: Role based service access Next Generation Applications: – Customized services – Remote services – Proximity services – High flexibility – Telecom-IT integration Challenges – Privacy – Trust – Application security App x App y App z Identity provider Corporate - CID VPNadmittance Public Authority … Bank Application providers Certificate Social - SID sportsorigin Private - PID Mastercard, Visa Soc. sec. number Certificate Telecom JosefRole based service access My identities

, Josef NollNISnet New role: Identity provider Certificate Josefine Remote servicesProximity services Who provides? – ID provider Where to store? – Network – Phone How to store/backup? – long term, short term

, Josef NollNISnet Summary: Security Challenges Mobile based access and payment – Next generation SIM cards – Virtualization of SIM credentials – Contactless access through NFC – (out-of-band) key distribution in heterogeneous networks User privacy enhancing technologies – service specific authentication methods – role-based access mechanisms Semantic Web and Web Services – Policies and rules support in ontologies – Trust distribution in distributed ontologies – Privacy protection in social networks