Security for Future Networks: a Prospective Study of Aais
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Trusted Computing Or Distributed Trust Management?
Trusted computing or distributed trust management? Michele Tomaiuolo Dipartimento di Ingegneria dell’Informazione Università di Parma Via Usberti, 181/A – 43100 Parma – Italy [email protected] Abstract Nowadays, in contrast with centralized or hierarchical certification authorities and directory of names, other solutions are gaining momentum. Federation of already deployed security systems is considered the key to build global security infrastructures. In this field, trust management systems can play an important role, being based on a totally distributed architecture. The idea of distributed trust management can be confronted with the concept of trusted computing. Though having a confusingly similar denomination, the different interpretation of trust in these systems drives to divergent consequences with respect to system architectures and access policies, but also to law, ethics, politics. While trusted computing systems assure copyright holders and media producers that the hosting system will respect the access restrictions they defined, trust management systems, instead, allow users to grant trust to other users or software agents for accessing local resources. Keywords Data security, Security Management, Authentication, Authorization, Intellectual Property Rights, Information Access, Digital Books, Multimedia, Web Technologies Introduction A number of architectures and systems are being proposed as a ground for improved interoperability among diverse systems, mainly exploiting the idea of service-oriented architecture. Yet, some issues remain open. In fact, composition of services requires some delegation of goals and duties among partners. But these delegations cannot come into effect, if they’re not associated with a corresponding delegation of privileges, needed to access some resources and complete delegated tasks, or achieve desired goals. -
Gs Ins 006 V1.1.1 (2011-11)
ETSI GS INS 006 V1.1.1 (2011-11) Group Specification Identity and access management for Networks and Services; Study to Identify the need for a Global, Distributed Discovery Mechanism Disclaimer This document has been produced and approved by the Identity and access management for Networks and Services (INS) ETSI Industry Specification Group (ISG) and represents the views of those members who participated in this ISG. It does not necessarily represent the views of the entire ETSI membership. 2 ETSI GS INS 006 V1.1.1 (2011-11) Reference DGS/INS-006 Keywords access, control, ID, management, network, service ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. -
Extensible Resource Identifier (XRI) Resolution Version 2.0 Committee Draft 02 25 November 2007
Extensible Resource Identifier (XRI) Resolution Version 2.0 Committee Draft 02 25 November 2007 Specification URIs: This Version: http://docs.oasis-open.org/xri/2.0/specs/cd02/xri-resolution-V2.0-cd-02.html http://docs.oasis-open.org/xri/2.0/specs/cd02/xri-resolution-V2.0-cd-02.pdf http://docs.oasis-open.org/xri/2.0/specs/cd02/xri-resolution-V2.0-cd-02.doc Previous Version: N/A Latest Version: http://docs.oasis-open.org/xri/2.0/specs/xri-resolution-V2.0.html http://docs.oasis-open.org/xri/2.0/specs/xri-resolution-V2.0.pdf http://docs.oasis-open.org/xri/2.0/specs/xri-resolution-V2.0.doc Technical Committee: OASIS eXtensible Resource Identifier (XRI) TC Chairs: Gabe Wachob, AmSoft <[email protected]> Drummond Reed, Cordance <[email protected]> Editors: Gabe Wachob, AmSoft <[email protected]> Drummond Reed, Cordance <[email protected]> Les Chasen, NeuStar <[email protected]> William Tan, NeuStar <[email protected]> Steve Churchill, XDI.org <[email protected]> Related Work: This specification replaces or supercedes: • Extensible Resource Identifier (XRI) Resolution Version 2.0, Committee Draft 01, March 2005 • Extensible Resource Identifier (XRI) Version 1.0, Committee Draft 01, January 2004 This specification is related to: • Extensible Resource Identifier (XRI) Syntax Version 2.0, Committee Specification, December 2005 • Extensible Resource Identifier (XRI) Metadata Version 2.0, Committee Draft 01, March 2005 Declared XML Namespace(s) xri://$res xri://$xrds xri://$xrd XRI Resolution 2.0 Committee Draft 02 25 November 2007 Copyright © OASIS® 1993–2007. -
OSCRE Industry Alliance Organizations Synopsis
OSCRE Connecting the Real Estate Industry ALLIANCE ORGANIZATION SYNOPSIS OSCRE is the trading name of OSCRE Americas Inc., part of the OSCRE International global network supporting the Americas. OSCRE Americas Inc. is registered in Washington, District of Columbia. E-mail: [email protected] Web: www.oscre.org © 2003, 2004 OSCRE International. All Rights Reserved. Version History 1.0 Andy Fuhrman March 29, 2004 Document Creation 1.1 Andy Fuhrman April 4, 2004 Incorporated feedback from OSCRE International Executive Board 1.2 Chris Lees May 26, 2004 Section 2: Verbiage Modification OSCRE International OSCRE Americas PISCES Limited 2020 Pennsylvania Avenue, NW 7-8 Greenland Place Box #1024 LONDON, NW1 0AP Washington, DC 20006 www.pisces.co.uk www.oscre.org ALLIANCE ORGANIZATION SYNOPSIS © 2003-2004 OSCRE International. All Rights Reserved. 2 of 46 Contents 1 Mission ................................................................................................... 4 2 Industry Focus ......................................................................................... 4 3 Methodology ............................................................................................ 4 4 Document Purpose ................................................................................... 5 5 About OSCRE........................................................................................... 5 5.1 OSCRE International Executive Board Members ..................................... 6 5.2 Projected OSCRE Timeline ................................................................. -
Extensible Resource Identifier (XRI) Resolution V2.0
1 2 Extensible Resource Identifier (XRI) 3 Resolution V2.0 4 Working Draft 10, 18 March 2006 5 Document identifier: 6 xri-resolution-V2.0-wd-10 7 Location: 8 http://docs.oasis-open.org/xri/xri/V2.0 9 Editors: 10 Gabe Wachob, Visa International <[email protected]> 11 Drummond Reed, Cordance <[email protected]> 12 Les Chasen, NeuStar <[email protected]> 13 William Tan, NeuStar <[email protected]> 14 Steve Churchill, XDI.ORG <[email protected]> 15 Contributors: 16 Dave McAlpin, Epok <[email protected]> 17 Chetan Sabnis, Epok <[email protected]> 18 Peter Davis, Neustar <[email protected]> 19 Victor Grey, PlaNetwork <[email protected]> 20 Mike Lindelsee, Visa International <[email protected]> 21 Abstract: 22 This document defines both generic and trusted HTTP(S)-based resolution protocols for 23 Extensible Resource Identifiers (XRIs) as defined by Extensible Resource Identifier (XRI) 24 Syntax V2.0 [XRISyntax] or higher. For the set of XRIs defined to provide identifier 25 metadata, see Extensible Resource Identifier (XRI) Metadata V2.0 [XRIMetadata]. For a 26 basic introduction to XRIs, see the XRI 2.0 FAQ [XRIFAQ]. 27 Status: 28 This document was last revised or approved by the XRI Technical Committee on the 29 above date. The level of approval is also listed above. Check the current location noted 30 above for possible later revisions of this document. This document is updated periodically 31 on no particular schedule. 32 Technical Committee members should send comments on this specification to the 33 Technical Committee's email list. -
Member of Security Technical Committees Spanning Federated Identity, Key Management, Health Care Privacy
Security Standardization . Oasis Standards Consortium Geneva, 6-7 December Addressing security challenges on a global scale 2010 2 Speaker Anil Saldhana Co-Chair, Oasis Identity In The Cloud TC Member, Oasis IDTrust Steering Committee . Member of Security Technical Committees spanning Federated Identity, Key Management, Health Care Privacy . [email protected] Geneva, 6-7 December Addressing security challenges on a global scale 2010 3 About Oasis “Organization for the Advancement of Structured Information Standards” – Founded in 1993 as SGML Open – Not for profit consortium – Global Representation • 5000+ Participants. • 600+ Organizations/Individual Members. • 100+ Countries. Geneva, 6-7 December Addressing security challenges on a global scale 2010 4 Oasis Member Sections Member Sections include – IDTrust – Egov – Blue (SmartGrids/Intelligent Buildings) – WS-I etc. Geneva, 6-7 December Addressing security challenges on a global scale 2010 5 Oasis IDTrust Member Section Promotes greater understanding and adoption of standards for Identity and Trusted Infrastructure . Technologies, Policies and Practices Geneva, 6-7 December Addressing security challenges on a global scale 2010 6 Oasis IDTrust Member Section Technical Committees Identity Metasystems/Internet Identity . Identity In The Cloud (IDCloud) . Identity Metasystem Interoperability (IMI) . Extensible Resource Identifier(XRI) . XRI Data Interchange (XDI) Geneva, 6-7 December Addressing security challenges on a global scale 2010 7 Oasis IDTrust Member Section Technical Committees Encryption/Key Management . Key Mgmt. Interoperability Protocol (KMIP) . Enterprise Key Mgmt. Infrastructure (EKMI) Geneva, 6-7 December Addressing security challenges on a global scale 2010 8 Oasis IDTrust Member Section Technical Committees Trust/Privacy . Open Reputation Mgmt. Systems (ORMS) . Privacy Mgmt. Reference Model (PMRM) . Digital Signature Services Extended (DSS-X) . -
Liberty Alliance Project
Identity Management Liberty Alliance Project • Rise of electronic networks: • Need stronger or relevant (business related) use of Setting the Standard identity verification and authorization for Federated Network Identity • Company extranets • Online trading • Identity fraud (#1 consumer complaint): Privacy, Identity Management and Services • Worldwide monetary losses from identity theft were using Liberty technologies in Mobile approximately $8.75 billion in 2002, and are expected to triple to roughly $24 billion in 2003* Environment. • Importance of Identity Management crosses Timo Skyttä industries and sections: • It is required in any B2C, B2B or B2E transaction whether Nokia Mobile Software the entities are private businesses or governmental Strategic Architecture organizations 1 * Aberdeen research 2 Federated Identity & Identity What is the Liberty Alliance ? Management • Federation reflects how relationships are kept in • A business alliance, formed in Sept 2001 with the the real-world goal of establishing an open standard for federated identity management • Not all identity information is held in one place • Global membership consists of consumer-facing • No centralized single point of failure companies and technology vendors as well as policy and government organizations • Opportunity for any trusted business to become a trusted identity provider • The only open organization working to address the • More than single sign-on technology and business issues of federated identity management • It’s how personal information is authenticated, -
Analysis of Windows Cardspace Identity Management System Thomas Hanrahan Regis University
Regis University ePublications at Regis University All Regis University Theses Spring 2011 Analysis of Windows Cardspace Identity Management System Thomas Hanrahan Regis University Follow this and additional works at: https://epublications.regis.edu/theses Part of the Computer Sciences Commons Recommended Citation Hanrahan, Thomas, "Analysis of Windows Cardspace Identity Management System" (2011). All Regis University Theses. 469. https://epublications.regis.edu/theses/469 This Thesis - Open Access is brought to you for free and open access by ePublications at Regis University. It has been accepted for inclusion in All Regis University Theses by an authorized administrator of ePublications at Regis University. For more information, please contact [email protected]. Regis University College for Professional Studies Graduate Programs Final Project/Thesis Disclaimer Use of the materials available in the Regis University Thesis Collection (“Collection”) is limited and restricted to those users who agree to comply with the following terms of use. Regis University reserves the right to deny access to the Collection to any person who violates these terms of use or who seeks to or does alter, avoid or supersede the functional conditions, restrictions and limitations of the Collection. The site may be used only for lawful purposes. The user is solely responsible for knowing and adhering to any and all applicable laws, rules, and regulations relating or pertaining to use of the Collection. All content in this Collection is owned by and subject to the exclusive control of Regis University and the authors of the materials. It is available only for research purposes and may not be used in violation of copyright laws or for unlawful purposes. -
An Introduction to XDI a White Paper for the OASIS XDI Technical Committee V2, April 12, 2004
The Dataweb: An Introduction to XDI A White Paper for the OASIS XDI Technical Committee v2, April 12, 2004 Drummond Reed, Cordance Geoffrey Strongin, AMD Abstract XDI (XRI Data Interchange) is a new service for generalized distributed data sharing and mediation using XRIs (Extensible Resource Identifiers), a URI-compatible abstract identifier scheme developed by the OASIS XRI Technical Committee. The goal of XDI is to enable data from any data source to be identified, exchanged, linked, and synchronized into a machine-readable dataweb using XML documents just as content from any content source can linked into the human-readable Web using HTML documents today. Because the controls needed to mediate access and usage of shared data can be built right into every XDI link, the emergence of a global Dataweb has the potential to do for trusted data interchange what the Web did for open content exchange. This white paper presents several examples of classic cross-domain data sharing problems, explains how the Dataweb model can provide a generalized solution, and describes the key objectives of the newly formed OASIS XDI Technical Committee (http://www.oasis-open.org/committees/xdi). HTML HTML XML/ XML/ XDI XDI XDI link contract HTML HTML HTML HTML XML/ XML/ XML/ XML/ XDI XDI XDI XDI HTML HTML HTML HTML XML/ XML/ XML/ XML/ XDI XDI XDI XDI Website A Website B Dataweb Site A Dataweb Site B The Dataweb: An Introduction to XDI April 12, 2004 Page 2 Table of Contents INTRODUCTION.......................................................................................................................................3 -
FIDIS D3.12 – FIM What's in for the End-User
FIDIS Future of Identity in the Information Society Title: “D3.12: Federated Identity Management – what’s in it for the citizen/customer?” Author: WP3 Stefanie Poetzsch (TUD) Martin Meints (ICPP) Bart Priem, Ronald Leenes (TILT) Rani Husseiki (SIRRIX) Editors: Ronald Leenes (TILT) Reviewers: Seyit Ahmet Camtepe (TUB) Identifier: D3.12 Type: Deliverable Version: 1.0 Date: Wednesday, 10 June 2009 Status: Final Class: Public File: 20090506_fidis_D3.12 final 1.0.odt Summary This deliverable ventures into the federated identity management (FIM) landscape from the perspective of the individual end user. It provides an overview of features and requirements for FIMs and analyses four FIM frameworks (Liberty Aliance, Shibboleth, PRIME, and Microsoft Cardspace) on the basis of these user inspired requirements. Copyright © 2004-08 by the FIDIS consortium - EC Contract No. 507512 The FIDIS NoE receives research funding from the Community’s Sixth Framework Program Copyright Notice: This document may not be copied, reproduced, or modified in whole or in part for any purpose without written permission from the FIDIS Consortium. In addition to such written permission to copy, reproduce, or modify this document in whole or part, an acknowledgement of the authors of the document and all applicable portions of the copyright notice must be clearly referenced. The circulation of this document is restricted to the staff of the FIDIS partner organisations and the European Commission. All information contained in this document is strictly confidential and may not be divulged to third parties without the express permission of the partners. All rights reserved. PLEASE NOTE: This document may change without notice – Updated versions of this document can be found at the FIDIS NoE website at www.fidis.net. -
Achieving Privacy in a Federated Identity Management System
Achieving Privacy in a Federated Identity Management System Susan Landau1, Hubert Le Van Gong1, Robin Wilton2 {[email protected], [email protected], [email protected]} 1 Sun Microsystems 2 Future Identity Abstract. Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domains blurs security boundaries and potentially creates privacy risks. We examine privacy risks and fundamental privacy protections of federated identity-management systems. The protections include minimal disclosure and providing PII only on a “need-to-know” basis. We then look at the Liberty Alliance system and analyze previous privacy critiques of that system. We show how law and policy provide privacy protections in federated identity- management systems, and that privacy threats are best handled using a combination of technology and law/policy tools. Keywords: federated identity management, privacy, law, policy. 1 Introduction In solving one problem, federated identity management raises others. For in- stance, federated identity management can simplify a user’s experience through the use of single sign on (SSO) at multiple websites, thus enabling multiple ser- vices to be accessed as a unified whole and simplifying the complex process of managing user accounts after systems merge [16, pp. 16-17]. But by enabling the dynamic use of distributed identity information, federated identity manage- ment systems blur the divide between security domains, apparently creating a potential risk to privacy. We believe that separating the different contexts of a user’s identity through federation creates privacy in depth and can substantially enhance user privacy. -
Oracle Identity Management 11G
An Oracle White Paper July 2010 Oracle Identity Management 11g Oracle White Paper—Oracle Identity Management 11g Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. Oracle White Paper—Oracle Identity Management 11g Introduction to Oracle Fusion Middleware 11g.................................... 1 Purpose and Scope......................................................................... 2 Oracle Identity Management Overview............................................... 4 Oracle Identity Management Business Benefits ............................. 4 Introducing Oracle Identity Management 11g ..................................... 6 Service-Oriented Security ............................................................... 6 Oracle Identity Managementʼs Key Services .................................. 7 Oracle Identity Management Components........................................ 12 Platform Security Services ............................................................ 12 Directory Services ......................................................................... 23 Access Management .................................................................... 29