User-Managed Access Eve Maler, UMA Work Group | tinyurl.com/umawg 9 December 2012 1.

Slides:



Advertisements
Similar presentations
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Advertisements

Legal Work Group Developing a Uniform EHR/HIE Patient Consent Form.
Bob German Principal Architect Introduction to Cloud Hosted Apps Your apps here!
User-Managed Access UMA Work tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May
Safety SAFETY. Protecting Privacy  Don’t broadcast your location.  You Tube settings  Read privacy policies  Real names?  Revealing your status.
System Center 2012 R2 Overview
User-Managed Access UMA Work tinyurl.com/umawg | tinyurl.com/umafaq 28 Aug
Access Control Enforcement Delegation for Information-Centric Networking Architectures N. Fotiou, G.F. Marias, G.C Polyzos.
Katrina Lopes. Every time you log onto a website, you leave a mark saying “I was here”
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
Joseph Smarr Opening up the Social Web Joseph Smarr Chief Platform Architect, Plaxo 11/28/2007.
Lots of sites care about “who you know”… Lots of talk about “opening up the social web”…
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
Microsoft Office 4/16/2017 © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
CMU Usable Privacy and Security Laboratory Power Strips, Prophylactics, and Privacy, Oh My! Julia Gideon, Serge Egelman, Lorrie.
Deep Application Management with Microsoft System Center 2012 Configuration Manager Adwait Joshi Senior Product Marketing Manager Microsoft Corporation.
Fraser Technical Solutions, LLC
Basic SharePoint 2013 App Development start-up for New Developers
UMA Could I Manage My Own Data. Please?. Agenda Business Trends & Technical Solutions Distributed Business (Decentralisation) Mobility & Automation Delegation.
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
Protecting “Personal Clouds” with UMA and OpenID #UMApcloud for questions 19 June 2014 tinyurl.com/umawg for slides, recording, and more.
The protection of digital identities in the context of big data analytics Harry Halpin OECD Technology Foresight Forum 23 October
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction Davina Pruitt-Mentle, Ph.D. Ed Tech Policy, Research and Outreach.
Single Sign-On Multiple Benefits via Alaska K20 Identity Federation 20 May 2011 BTOP Partner Meeting Anchorage, Alaska 20 May 2011 BTOP Partner Meeting.
ADVANCE CARE PLANNING ON FACEBOOK: REACHING THE NON- ACTIVATED Michael K. Kersten.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
Integrated Financial Applications using Intuit’s PaaS Solution George Chiramattel, Intuit.
Enforcement mechanisms for distributed authorization across domains in UMA – aka “UMA trust” Eve Maler | 22 Aug 2012 draft.
Educational solutions for the NHS pharmacy workforce Consultation skills for pharmacy practice  Where did it start ?  Why’s it important ? Educational.
1 Networked PHR, a framework for personal health applications & services Anne Chapman, Senior Program Manager Personal Health Records, Intel.
Promoting Good Practices in Domain Name Registration Supported by.
“A teacher is fired because there’s a picture of this teacher holding alcohol drinks on her MySpace page” Skylar, Will Y., Steven.
DNER Architecture Andy Powell 6 March 2001 UKOLN, University of Bath UKOLN is funded by Resource: The Council for.
20 Oct 2014.
Agenda Business Challenges Diverse Global Needs & Requirements Collaboration Within LCA, with our clients and with outside counsel Driving Adoption.
Internet Architecture and Governance
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
OWL Representing Information Using the Web Ontology Language.
Access Management 2.0: UMA for the #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 1.
Computer Issues Acceptable Use Policy Online Safety Photo Permission Forms Rachel Gorsuch Stephanie Herbin Natalie Wu Acceptable Use Policy Online Safety.
ON YOUR TERMS Business needs * Enhanced by upcoming Azure IAAS features GoodBetterBest * * GoodBetterBestGoodBetterBestGoodBetterBestGoodBetterBestGoodBetterBest.
Afresco Overview Document management and share
Session A305 Findability: Information Not Location Mike Creech Web Content Manager Ken Varnum Web Systems Manager University.
L L L L The safest place to go online is at HOME.
Joseph Smarr A Practical Vision for Friends-List Portability Joseph Smarr IIW 2007b, 12/5/2007.
Justin Richer The MITRE Corporation October 8, 2014 Overview of OAuth 2.0 and Blue Button + REST.
Panopto UMKC’s New Lecture Capture Solution. A Quick Rundown…  What is lecture capture?  The state of lecture capture at UMKC  Why did UMKC choose.
Family Connection Collaborative Webs A Tool for Creating and Managing Web sites.
PRESENTATION ON URL & BLOGS By : Renisha Daley & Shalawah Barnes.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Co-funded by European Commission eContentplus Sharing Practices and Experiences on the Authoring and Adaptation of Open Educational Resources Alexander.
Place image here INFORMATION MANAGEMENT Cloud Computing and Enterprise Information Management March 2010 Jim Cuff VP Strategy, Iron Mountain Digital.
Christian Citizenship in a Digital World Lesson 1: Online Privacy.
BUILD SECURE PRODUCTS AND SERVICES
National data opt-out - Implementation approach
Azure Active Directory - Business 2 Consumer
SaaS Application Deep Dive
The API economy will bring data-sharing power to the people
Instantaneous Messaging Helps Physicians Provide Optimal Patient Care, Thanks to Azure “revelationMD uses Microsoft Azure to expedite the process of physician.
Internet Safety By Ruby.
STOP. THINK. CONNECT. Online Safety Quiz.
Replace with Application Image
Puzzle A Puzzle B.
Distributed Peer-to-peer Name Resolution
SharePoint Online Authentication Patterns
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Web site mechanics Winners and losers Computers in Libraries 2019
The National Data Guardian review & Government response
Presentation transcript:

User-Managed Access Eve Maler, UMA Work Group | tinyurl.com/umawg 9 December

The “data price” for online service is too high: typing… Provisioning by hand Provisioning by value Oversharing Lying! 2

The “data price” for online service is too high: connecting… Meaningless consent to unfavorable terms Painful, inconsistent, and messy access management Oversharing of lots of real information 3

The “data price” for online service is too high: private URLs… Handy but insecure Unsuitable for really sensitive data 4

Privacy is about context, control, choice and respect – so UMA enables a “digital footprint control console” Web 2.0 access control is inconsistent and unsophisticated To share with others, you have to list them literally You have to keep rebuilding your “circles” in new apps You can’t advertise content without giving it away You can’t get a global view of who accessed what You can unify access control under a single app Your access policies can test for claims like “over 18” You can reuse the same policies with multiple sites You can control access to stuff with public URLs You can manage and revoke access from one place 5

UMA turns online sharing into a privacy-by-design solution I want to share this stuff selectively! Among my own apps With family and friends With organizations I want to share this stuff selectively! Among my own apps With family and friends With organizations I want to protect this stuff from being seen by everyone in the world! Historical Municipal Financial Vocational Artistic Social Geolocation Computational Genealogical Biological Legal... Historical Municipal Financial Vocational Artistic Social Geolocation Computational Genealogical Biological Legal... 6

Problem scenario: student transcript sharing Bob 7

Improvements with UMA Bob 8

Use case: patient-centric health record access 9 Insurer-run AM and discovery service Laboratory (host) Primary care physician (host, requester) Wifi-enabled scale (host) Health vault (host, requester)

Use case: subscribing to information in a friend’s personal cloud 10

UMA status Web protocol is at near-complete “rough consensus and running code” phase –join us! Builds on OAuth and OpenID Connect Additional active liaisons with several NSTIC projects Several independent implementations, including 3+ open-source projects Beta deployment at Newcastle University imminently Wide variety of case studies being published 11

Questions? Thank | tinyurl.com/umawg 9 December