FIDIS & PRIME Project Views SecurIST Inaugural Workshop Brussels, 2005-01-18 Kai Rannenberg Goethe University Frankfurt www.fidis.net.

Slides:



Advertisements
Similar presentations
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Advertisements

Emerging Threats, RF-ID and eCrime issues. Pascal Chauvaud 28/06/2006.
Digital Agenda Unleashing the Potential of Cloud Computing in Europe Ken Ducatel Head of Unit Software and Services, Cloud European Commission (Directorate.
Secure Communication Architectures.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
PRIME – Privacy and Identity Management for Europe Project Overview Version 1.6 – Feb
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy and Trust Frameworks/Systems Presented by Zalia Shams Usable Security –
PRIME – Privacy and Identity Management for Europe Vision – Objectives – First Results.
Digital Identities for Networks and Convergence Joao Girao, Amardeo Sarma.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Managing Digital Identities: Challenges.
Authentication. Most technical security safeguards have authentication as a precondition How to authenticate: LocationSomewhere you are BiometrieSomething.
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
Page16/2/2015 Sirlan Usage and usability considerations for SIRLAN solution success.
BioSec Biometrics & Security IST © 2005 BIOSEC Consortium 1February 2005 BioSec Biometrics & Security Orestes SanchezBioSec Coordinator Telefónica.
Policy Research and Innovation Research and Innovation A perspective Transport Research & Innovation - through collaboration to tomorrow.
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
FIT3105 Smart card based authentication and identity management Lecture 4.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
Trust, Privacy, and Security Moderator: Bharat Bhargava Purdue University.
Trust, Privacy, and Security Moderator: Bharat Bhargava 1 Coordinators: Bharat Bhargava 1, Csilla Farkas 2, and Leszek Lilien 1 1 Purdue University and.
Securing Information Transfer in Distributed Computing Environments AbdulRahman A. Namankani.
Geneva, Switzerland, September 2014 Introduction of ISO/IEC Identity Proofing Patrick Curry Director, British Business Federation Authority.
Certificate and Key Storage Tokens and Software
Key Action II - Objectives Support the development and adoption of novel IST solutions for eCommerce & eWork aimed at enhancing: Support the development.
EU cooperation, EU projects and their implications Simone Fischer-Hübner Karlstad University.
1 JRC – IPTS Seville e-Government Europe 2004 Noordwijk aan Zee, NL, 1-3 March Institute for Prospective Technological Studies (IPTS) Seville, Spain
……... An Economic Valuation Approach for (Privacy Enhancing) Identity Management Services Session: The economics of privacy FIA - Future Internet Assembly.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Horizon 2020 Secure Societies Security Research and Industry DG Enterprise and Industry 2013.
Mobile Identity Defined, Derived, Managed and Applied FIDIS – WP2 Kick Off Meeting Brussels, 2nd December 2003 Stefan Figge Johann Wolfgang Goethe- Universität.
1 Common Challenges Across Scientific Disciplines Laurence Field CERN 18 th November 2013.
Secure Management of Information across multiple Stakeholders SEMIRAMIS – CIP-ICT PSP SEMIRAMIS General Presentation.
Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.
Open Data from Reliable Records Anne Thurston. The Open Data movement, a key aspect of Open Government, is now a top development interest across the world.
Climate Sciences: Use Case and Vision Summary Philip Kershaw CEDA, RAL Space, STFC.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
1 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Identity in the Ambient Intelligence Environment Sabine Delaitre.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
TripCom: Development of a patient summary at European level E. Della Valle, D. Cerizza, D. Foxvog, R. Krummenacher, L. J. B. Nixon, E.
© Synergetics Portfolio Security Aspecten.
Privacy-Enhancing Identity Management – An Overview – Marit Hansen Independent Centre for Privacy Protection Schleswig-Holstein,
TRUST & SECURITY ISSUES IN FP6: Towards a global dependability and security framework Aniyan VARGHESE European Commission DG Information Society - Unit.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
Introduction: Identity Management – Our Perspective Henry Krasemann, Marit Hansen Unabhängiges Landeszentrum für Datenschutz // Independent Centre for.
, Josef NollNISnet NISnet meeting Mobile Applied Trusted Computing Josef Noll,
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Cellular Device – Versatile personal identification Joint workshop on mobile web privacy W3C presentation, Dec
NETWORKED EUROPEAN SOFTWARE & SERVICES INITIATIVE Future research challenges in dependability - an industrial perspective from NESSI Aljosa Pasic Atos.
1 Analysis of Consumer Issues and Paths for Concrete Approaches Dr. Carsten Orwat Forschungszentrum Karlsruhe in the Helmholtz Association, Institute for.
Future ICT Landscapes – Security and Privacy Challenges & Requirements Simone Fischer-Hübner IVA Workshop, Stockholm 24th May 2012.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Digital Agenda Unleashing the Potential of Cloud Computing in Europe Ken Ducatel Head of Unit DG Connect, Software and Services, Cloud 05 December 2012.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 ICT and E-Business Strategies For Development Geneva, October.
FIA Standardisation Working Group Alain-G. Vouffo Feudjio Fraunhofer FOKUS
CS 6v Privacy The end of Privacy ?? Dr.Murat Kantarcioglu.
1 X.509-style PKI Revolves around the distribution and management of digital identity certificates Invented in 1978 to facilitate message encryption In.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
Strong Authentication Infrastructure Requirement: Trusted Input Devices National ID Workshop Carnegie Mellon University November 28, 2001 Lark M. Allen.
Mobile Systems Availability Integrity and Confidentiality MoSAIC M.O.Killijian, D.Powell, M.Banâtre, P.Couderc, Y.Roudier LAAS-CNRS - IRISA- Eurécom.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
Creating a European entity Management Architecture for eGovernment Id GUIDE Keiron Salt
Identity Protection and Pseudonymisation White Paper Proposal for 2008/09 A. Estelrich (GIP-DMP) S. Bittins (Fraunhofer ISST)
Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.
DIGITIZING OUR WALLETS Digital Wallets for E-Commerce Development.
IoT R&I on IoT integration and platforms INTERNET OF THINGS
The Future Digital Identity Landscape in Europe Timothée Mangenot, chairman 14th of December, 2015 ACSIEL partners day.
The Future Digital Identity Landscape in Europe Stefane Mouille/Detlef Houdeau World eID Congress, 27th of Sep. 2017, Marseille, France.
PLUG-N-HARVEST ID: H2020-EU
E-identities (and e-signatures)
Presentation transcript:

FIDIS & PRIME Project Views SecurIST Inaugural Workshop Brussels, Kai Rannenberg Goethe University Frankfurt

2  FIDIS  Future of Identity in the Information Society (  PRIME  Privacy and Identity Management for Europe (

3 Identity Management in the Information Society  IT puts more HighTech on ID cards Biometrics to bind them closer to a human being Chips to add services (such as a PKI)  Profiles may make the „traditional“ ID concept obsolete People are represented not by numbers or ID keys any more but by data sets. Identities become “a fuzzy thing”.  New IDs and ID management systems are coming up Mobile communication (GSM) has introduced a globally interoperable „ID token“: the Subscriber Identity Module eBay lets people trade using Pseudonyms.  Europe (the EU) consider joint IDs and ID management systems European countries have different traditions on identity card use. Compatibility of ID systems is not trivial.  …

4 Joint Research Topics/Activities  „Identity of Identity“ State of things, taxonomy  Profiling  Interoperability of IDs and ID management systems  Forensic Implications  De-Identification  The HighTechID  Mobility and Identity

5 Database IMS

6 First Results of IMS Comparison Main goal: usefulness Deficiencies concerning privacy and security functionality, and if realised: usability problems Digital evidence is not addressed (lack of liability / no non-repudiation), no support for law enforcement Identity theft is not prevented Little functionality, limited purposes No general solutions, no standards Trustworthy computer systems and infrastructure are still missing  no trustworthy and secure IMS possible Business models: Service and software mostly free for users Today’s IMS: Playground for users & service providers

Page 7 PRIME Vision In the Information Society, users can act and interact in a safe and secure way while retaining control of their private sphere.

Page 8 PRIME Solution Approaches User focused identity management –Anonymous Credentials & Strong Pseudonyms –Obligation Management –New trust concepts (Trusted Computing, Assurance) –Attribute based access control –Support for Location Based Services and other application scenarios

9 Challenges and potential for FP 7 1/2  User policy-driven (determined) and privacy friendly access control Users are put in a trade-off  Privacy vs.  Gimmicks … and make them “feel” the results of their actions quickly.  Graceful integration Interoperability of heterogeneous systems Standardisation within a developing field Respect for separations of domains that had been natural before  A secure identity carrier beyond the chip card or SIM: TPM phones or PDAs?  Careful evaluation of biometric patterns and mechanisms

10 Challenges and potential for FP 7 2/2  Security and Protection in applications along the value chain considering the views of the respective stakeholders (Multilateral Security)  Take care of the “If the data is used for providing the service, we want them too”-Paradigm/Challenge/