Security and Data Sharing Interaction SDSC Auditorium Friday 830a-1000am.

Slides:



Advertisements
Similar presentations
INFN CA1 active since July manager: –Roberto Cecchini types of certificates released: –personal –server –object signing.
Advertisements

Presentation on 3CD welcomes you to a Winman Software Pvt. Ltd.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Installation & User Guide
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Tax Professional (CA) - Registration and Services.
EAuthentication Before accessing the Delphi eInvoicing System, you must be an authenticated user. This authentication process is called eAuthentication.
Digital Certificate Installation & User Guide For Class-2 Certificates.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
APNIC Member Services George Kuo. MyAPNIC 2 What is MyAPNIC A secure Member services website Internet resources management, for example: –Whois updates.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
1 1 September 22, 2011 EDI X12 Batch File Testing Instructions.
Report on Attribute Certificates By Ganesh Godavari.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
SPOT Registration and Log in Quick Guide The SPOT quick guide is targeted to provide the three main community users, Contractor Company, Government Organization,
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Summer School Certificates Diego Romano & Gilda Team.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Moving Your Paperwork Online Western Washington University E-Sign Web Forms Copyright Western Washington University, This work is the intellectual.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
GeMS Grant Applicant Information Registering Initiating an application.
The electronic submission of Form C. New role in the identity and access management  New role in the identity and access management: persons authorised.
1 PKI Update September 2002 CSG Meeting Jim Jokl
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
CILogon OSG CA Mine Altunay Jim Basney TAGPMA Meeting Pittsburgh May 27, 2015.
RPKI Tutorial Andy Newton Chief Engineer, ARIN. Agenda Resource Public Key Infrastructure(RPKI) Route Origin Authorizations (ROAs) Certificate Authorities.
1 Personal Digital Certificates at Virginia Tech: Who Are You? Mary Dunker Internet-2 December 4, 2006
1. The applicant, as an alternative to submitting applications in the usual manner in the concerned office, can submit the application to a CHO i CE Agent.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
IRB Electronic Submission. IRB Definition Committee formally designated to approve, monitor, and review biomedical and behavioral research involving human.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Module 9: Fundamentals of Securing Network Communication.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
John A. Coates, P.E., Administrator Wastewater Compliance Evaluation Section, Office of Wastewater Management Florida Department of Environmental Protection.
Komen Grants eManagement System GeMS. Why Online Grants  Reduce the amount of administrative paperwork being completed by applicants and grantees. 
Moving Your Paperwork Online Western Washington University E-Sign Web Forms.
Electronic signature Validity Model 1. Shell model Certificate 1 Certificate 2 Certificate 3 Signed document Generate valid signature validCheck invalidCheck.
Virginia State Military Electronic Absentee Voting.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
1 NJ Dept. of Health Decision Tree for eIRB Submission Revised: 01/25/2016 Is this research defined as: A systematic investigation which includes research.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
Adviser Panel. Go to All DD Track Advisers: Click “Advisor Login”
E-Filing of IT Returns - salaried Employees An Overview of the Process of e-Filing of Returns.
Trusted Organizations In the grid world one single CA usually covers a predefined geographic region or administrative domain: – Organization – Country.
1 BSO Welcome. 2 General Login Attestation 3 BSO Login.
Academia Sinica Grid Computing Certification Authority F2F interview (Malaysia )
Component 9 – Networking and Health Information Exchange Unit 9-1 Privacy, Confidentiality, and Security Issues and Standards This material was developed.
FIRE1000S - Self-Paced FIREBIRD Training Training on the Federal Investigator Registry of Biomedical Informatics Research Data (FIREBIRD) for Clinical.
Registration form workflow. New registration Visitors should be directed to the following URL:
CAISO Public Key Infrastructure: Supporting Secure ICCP Leslie DeAnda Senior Information Security Analyst, Information Security, CAISO EMS Users Group.
company registration, india trademark registration, trademark attorneys india, patent attorneys india, patent registration india company registration,
visit : – Existing User Login
NATIONAL ACADEMIC DEPOSITORY
Decision Tree for eIRB Submission Revised: 01/25/2016
Decision Tree for eIRB Submission Revised: 01/12/2016
NATIONAL ACADEMIC DEPOSITORY
Overview of the New Online CA-TP
Creating a Work term record in the myCareer system
Decision Tree for eIRB Submission Revised: 01/25/2016
جايگاه گواهی ديجيتالی در ايران
Installation & User Guide
September 2002 CSG Meeting Jim Jokl
SCS REGISTRATION GUIDANCE FOR LABORATORIES (TEST CMDP)
Central IRB Components of ARCADIA
Presentation transcript:

Security and Data Sharing Interaction SDSC Auditorium Friday 830a-1000am

Stuff User IP Access Control Audit Trail IRB

User’s Local IRB BIRN Web/Portal 1. User gets instructions on how to become an authorized user and template forms for user’s local IRB 2. User submits paperwork to local IRB Becoming an Authorized BIRN User 3. Local IRB can verify BIRN policies independently of user’s statements 4. User get local IRB approval (User cannot proceed without local IRB approval) 5. User begins new user process through online interface. User submits all required BIRN paperwork and local IRB information to BIRN Registration Authority coordinator. Who is BIRN RA coordinator? Can paperwork be submitted electronically via digital signature? BIRN RA Coordinator 7. BIRN RA Coordinator receives information on new user. User’s Local Lab 8b. BIRN RA coordinator verifies the location, position and affiliation of user with user’ local institution/lab. Can this be done electronically for groups/labs that BIRN already interacts with? 8a. BIRN RA coordinator verifies identity of user. Can this be done electronically via VTC? What measures need to be taken to assure that verification meets certificate authority policies? 8c. BIRN RA coordinator verifies user’s IRB approvals with user’s local IRB. Can this be done electronically? BIRN Registration Authority 10. BIRN RA Coordinator informs user of account verification status. 11. User validates his account by providing private key. How do we do this securely? How does user get information for “logging in” to system - a phone call, over VTC? 9. BIRN RA Coordinator validates new user. 6. BIRN RA receives user information. BIRN Certificate Authority 12. BIRN RA contacts CA to obtain user credentials (i.e. X.509 certificate) BIRN Secure LDAP (Certificate Escrow) 13a. User credentials placed in escrow so that proxy certificates can be generated for user as required. 13b. User information deposited to LDAP.

Data Sharing Task Force Meeting schedule and venue List of tasks Milestones

Tasks Generate forms to be completed by new BIRN user (guest + sponsor) (Jessica) Determine if BIRN-CC can be the holder of the IRB for the BIRN distributed data resources (Ellisman), if not, then who (Randy) Create detailed IRB protocol to support submission Complete IRB/IACUC template language for BIRN data upload including consent Complete IRB template language for BIRN data download (IP?) Generate policy for classes of users (Maryanne, Kelvin) Generate policy for classes of data sharing (individual, partial testbed, testbed, other) Generate policy for setting access control on data (IRB, IP)