Download presentation
Presentation is loading. Please wait.
Published bySibyl Owens Modified over 8 years ago
1
User-Managed Access Eve Maler, UMA Work Group chair @xmlgrrl | @UMAWG | tinyurl.com/umawg 9 December 2012 1
2
The “data price” for online service is too high: typing… Provisioning by hand Provisioning by value Oversharing Lying! 2
3
The “data price” for online service is too high: connecting… Meaningless consent to unfavorable terms Painful, inconsistent, and messy access management Oversharing of lots of real information 3
4
The “data price” for online service is too high: private URLs… Handy but insecure Unsuitable for really sensitive data 4
5
Privacy is about context, control, choice and respect – so UMA enables a “digital footprint control console” Web 2.0 access control is inconsistent and unsophisticated To share with others, you have to list them literally You have to keep rebuilding your “circles” in new apps You can’t advertise content without giving it away You can’t get a global view of who accessed what You can unify access control under a single app Your access policies can test for claims like “over 18” You can reuse the same policies with multiple sites You can control access to stuff with public URLs You can manage and revoke access from one place 5
6
UMA turns online sharing into a privacy-by-design solution I want to share this stuff selectively! Among my own apps With family and friends With organizations I want to share this stuff selectively! Among my own apps With family and friends With organizations I want to protect this stuff from being seen by everyone in the world! Historical Municipal Financial Vocational Artistic Social Geolocation Computational Genealogical Biological Legal... Historical Municipal Financial Vocational Artistic Social Geolocation Computational Genealogical Biological Legal... 6
7
Problem scenario: student transcript sharing Bob 7
8
Improvements with UMA Bob 8
9
Use case: patient-centric health record access 9 Insurer-run AM and discovery service Laboratory (host) Primary care physician (host, requester) Wifi-enabled scale (host) Health vault (host, requester)
10
Use case: subscribing to information in a friend’s personal cloud 10
11
UMA status Web protocol is at near-complete “rough consensus and running code” phase –join us! Builds on OAuth and OpenID Connect Additional active liaisons with several NSTIC projects Several independent implementations, including 3+ open-source projects Beta deployment at Newcastle University imminently Wide variety of case studies being published 11
12
Questions? Thank you @xmlgrrl | @UMAWG | tinyurl.com/umawg 9 December 2012 12
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.