Task Force CoRD Meeting / 11.5.05 1 XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (4) Information Security.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 23: Internet Authentication Applications.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Core Web Service Security Patterns
Web Services Security Multimedia Information Engineering Lab. Yoon-Sik Yoo.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Securing Web Services Using Semantic Web Technologies Brian Shields PhD Candidate, Department of Information Technology, National University of Ireland,
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Information Security. Information Security Requirements Confidentiality: Protection from disclosure to unauthorised persons Access control: Unauthorised.
Web services security I
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Electronic Mail Security
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Cryptography, Authentication and Digital Signatures
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Web - based business and XML security. Dagmar Brechlerova.
Secure Systems Research Group - FAU Patterns for Web Services Security Standards Presented by Keiko Hashizume.
W3C Web Services Architecture Security Discussion Kick-Off Abbie Barbir, Ph.D. Nortel Networks.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
SWEB SWEB Security and Privacy Technologies – Implementation Aspects Venue:SWEB Day in APV, Novi Sad Author(s):Dr. Milan Marković Organisations:MISANU.
Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012.
DIGITAL SIGNATURE.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Fundamentals of Network Security Ravi Mukkamala SCI 101 October 6, 2003.
Key management issues in PGP
An Analysis of XKMS Yamini Ghadge Shanky Subramanian.
Pooja programmer,cse department
Lecture 4 - Cryptography
Chapter 4 Cryptography / Encryption
Presentation transcript:

Task Force CoRD Meeting / XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA

Task Force CoRD Meeting / Data Exchange Organisational Requirements  The deployment of a data exchange scenario extends beyond the standardisation of an XML Schema: XML documents must be signed to allow the receiving party to validate document integrity and ensure non-repudiation; Sensitive information within XML documents must be encrypted to prevent disclosure to unauthorised third parties, without preventing access to data necessary for document handling and routing by intermediary mechanisms; Document submission must be authenticated and authorised, especially when it triggers automatic processing; Keys for signatures, encryption, authentication etc must be certified by Trusted Third Parties (TTP).

Task Force CoRD Meeting / Example Scenario  Upon arrival of an Intrastat/XML declaration the receiving application (e.g. a web service) has to automatically: Validate the certificate of the signature to ensure the declarant identity; Use the signature to validate the integrity of the document; Access non-encrypted information to identify the nature of the submission without decrypting sensitive information; Authenticate the declarant (i.e. check that he is known); Authorise the submission (i.e. check that the declarant has the right to make this particular submission); Route the document to the application or user authorised to decrypt, validate and further process the submission.

Task Force CoRD Meeting / XML Security Standards  XML technology provides a set of supporting standards, which can be integrated to achieve a fully automated deployment: XML Digital Signature for integrity and signatures; XML Encryption for confidentiality; XML Key Management (XKMS) for key management; Security Assertion Mark-up Language (SAML) for making authentication and authorization assertions; and XML Access Control Mark-up Language (XACML) for stating authorization rules.

Task Force CoRD Meeting / XML Digital Signature  The XML Digital signature recommendation defines mechanisms to support the full range of digital signature creation and verification.  It provides the versatility to sign and verify: Entire XML documents as well as element and even element content portions of XML documents; Arbitrary documents, including binary documents; Compound documents including multiple documents and/or XML elements and element contents; Properties to be included with a signature; Counter-signatures (signatures that include other signatures).

Task Force CoRD Meeting / XML Encryption  The XML Encryption recommendation defines the framework, vocabulary and processing rules for XML encryption and decryption. Supports a variety of encryption algorithms Encapsulates all the information needed to process encrypted content, such as encryption algorithm and parameters, information about keys. Confidentiality may be applied at any level of granularity to XML content (XML elements, XML element content as well as entire XML documents) to secure only portions of XML documents routed through intermediary processors. Allows combined use of asymmetric (for keys) and symmetric (for content) encryption to optimise performance.

Task Force CoRD Meeting / XML Key Management Specification  XKMS complements XML Digital Signature and XML Encryption by providing mechanisms to leverage public- key infrastructure (PKI). Shields XML application developers and users from the complexity of traditional PKI implementation Provides mechanisms that allow the receiver to use the services of a TTP to locate the required public key and retrieve information about the sender (i.e. holder of the corresponding private key). Is compatible with traditional standards such as X.509v3, SPKI, and PGP. XML Key Information Service Specification (X-KISS) XML Key Registration Service Specification (X-KRSS)

Task Force CoRD Meeting / X-KMS Example Scenario  The declarant uses a registration web service of a TTP to Register, revoke or recover their public key. Subsequently used the key to sign Intrastat declarations.  Upon arrival of a signed Intrastat declaration the receiving application (e.g. a web service) may: Obtain the key information from the document (keyInfo element); Send this keyInfo element to an X-KISS web service operated by a TTP; The TTP undertakes all complex certificate validation logic; The TTP returns signature certification results as well as additional information – metadata on the declarant. The receiving application uses the signature and the metadata to verify document integrity, authenticate and authorise the declarant.

Task Force CoRD Meeting / Standardisation Issues  Roadmap for amendments to existing data exchange standard documents: Amend the business model part (use cases and sequence diagrams) to include information security related processes (i.e. signature, encryption, authentication, authorisation, certification) Amend the models (class diagrams) to provide for digital signatures of declarant and counter-signatures of collecting centres. Identify sensitive message parts that require encryption Identify message parts which must be excluded from encryption (e.g. for routing and intermediate processing) Include security related response codes in corresponding response XML messages.

Task Force CoRD Meeting / Organisational Issues  Scope of application: Mandatory or not Among organisations only or also involving declarants.  Public key infrastructure issues have to be resolved: Decide if a party acting as a TTP will be included in the system to undertake public key registration, information and certification services (e.g. an existing certification authority) Alternative: establish a light-weight, PGP like system, without third party certification (i.e. based on a direct exchange of public keys among parties) The second alternative is suitable for organisations (NCA’s, Eurostat etc.) but not feasible for declarants (enterprises).