Download presentation
Presentation is loading. Please wait.
Published byMarylou Wiggins Modified over 9 years ago
1
Demonstration of the Software Prototypes PRIME PROJECT 17 December 2004
2
Overview Software Prototypes D7.1.a: Ontology early prototype D8.1.a: Authorization early prototype D9.1.a: Cryptography early prototype D10.1.a: Communication early prototype D11.1.a: User-side IDM early prototype D12.1a: Services-side IDM early prototype
3
Relationship Software Prototypes D11: User-side IDMD12: Services-side IDM D7: Ontology D8: Authorization D9: Cryptography D10: Communication
4
Goal: –Prototype solution to enable the user to manage the disclosure of personal data under numerous circumstances. Deliverable 11.1a User-side IDM Prototype
5
User-side IDM Anonymous Pseudonym Fully detailed Data Disclosure Data tracking Client Roles Software agent Disclosure Conditions Third Party
6
Deliverable 11.1a User-side IDM Prototype Demonstration: Web shop use case
7
Software agent for managing data disclosure –User can assume different roles : anonymous, pseudonym, full identification –Selectively release personal data to third parties –Keep track of personal data disclosed –Update and/or delete data on the Web-shop server Deliverable 11.1a User-side IDM Prototype
8
Deliverable 12.1a Services-side IDM Prototype Prototype consists of 3 core concepts –XML Credential Mechanism –Obligation Management System. –Authorization Service
9
Deliverable 12.1a Services-side IDM Prototype Users control disclosure of PII (personal identifiable information). Management, enforcement and monitoring of privacy obligations. Flexible, policy-driven authorization.
10
Deliverable 12.1a Services-side IDM Prototype Airline scenario: –Client side: customer books flight ticket and is able to check flight and PII handling –Services side: check XML credentials, obligation management and access control to database
11
Deliverable 12.1a Services-side IDM Prototype
12
Demonstration: Airline scenario
13
Deliverable 7.1a Ontology Early Prototype Ontology: specification of a conceptualization. Two parties achieving agreement on ruleset (P3P). Goal: demonstrate how formal ontologies can fit into the context of the PRIME architecture.
16
Features: –Automated reasoning –Derivations –Extensional knowledge sharing –Generic rules Deliverable 7.1a Ontology Early Prototype
17
Deliverable 8.1a Authorization early prototype Goal: devise and implement privacy-aware access control solution covering both aspects, namely, data collection and access control.
18
Deliverable 8.1a Authorization early prototype Demonstration
19
Access Control component: ‘Access control is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied.’ Deliverable 8.1a Authorization early prototype
20
Access control without requiring authentication of the client. Managing privacy policies Maintaining anonimity, pseudonimity, unlinkability and unobservability Deliverable 8.1a Authorization early prototype
21
Features –Specification of the ontologies/profiles of subjects and resources. –Specification of the access control rules for protecting resources. Deliverable 8.1a Authorization early prototype
22
Anonymous Credential System: IDEMIX –Use different pseudonyms with different organizations, through the issue of credentials the user is still able to complete transactions –Maintenance of anonimity Deliverable 9.1a Cryptography Early Prototype
23
Demonstration
24
Features: –Consistency of credentials. –Optional anonymity revocation. –Encoding of attributes. –Revocation of credential. –One-show credentials. Deliverable 9.1a Cryptography Early Prototype
25
How is anonymity maintained? –Use of cryptographic techniques Trusted third parties are used for revocation of anonymity in case of misuse All credentials and pseudonyms are interleaved together. Deliverable 9.1a Cryptography Early Prototype
26
Deliverable 10.1a Communication Early Prototype IP-based privacy in the internet. Ability to surf the net anonymously. TOR Anonymizer changes the IP-adress received by the website on every visit.
28
End of Presentation Questions??
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.