Fundamentals of Federated Iden0ty Infrastructure

Size: px
Start display at page:

Download "Fundamentals of Federated Iden0ty Infrastructure"

Transcription

1 Fundamentals of Federated Iden0ty Infrastructure Sal D Agos0no IDmachines LLC

2 Federate fed er ate Verb past tense: federated; past participle: federated ˈfedəәˌrāt/ 1. (with reference to a number of states or organizations) form or be formed into a single centralized unit, within which each state or organization keeps some internal autonomy. "In 1901 the six colonies federated to form the Commonwealth of Australia" synonyms: confederate, combine, unite, unify, merge, amalgamate, integrate, join (up), band together, team up "several tribes federated in an alempt to stem the 0de of white colonial expansionism" October 2013 IDmachines - Smart Card

3 Federa0on [ˌfɛdəˈreɪʃən]n 1. the act of federa0ng 2. (Government, Poli0cs & Diplomacy) the union of several provinces, states, etc., to form a federal union 3. (Government, Poli0cs & Diplomacy) a poli0cal unit formed in such a way 4. (Government, Poli0cs & Diplomacy) any league, alliance, or confederacy 5. a union of several par0es, groups, etc. 6. any associa0on or union for common ac0on October 2013 IDmachines - Smart Card

4 La0n and Indo- European roots Foederre, foedert-, to ra'fy an agreement, from foedus, foeder-, league, treaty; see bheidh- in Indo- European roots. The words descended from bheidh- include verbs meaning to bide, abide, expect, confide, await, trust, have confidence in, request, compel, expect, endure, promise, and so on, and also in nega0ve forms to distrust, challenge, dare someone, trouble, hurt, prevent, oppress, cause pain, and so on. As adjec0ves, the meanings of the derived words include guilty, distrusaul, unbelieving, faithful, faithless, pagan. As nouns, the derived words mean abode, delay, confidence, fidelity, treachery, disloyalty, expecta0on, faithfulness, perfidy, trouble, misfortune, misery, hardship, necessity, confederate, oath, damage, injury, faith. hlp://wri0ng- arts- blog.northwestern.edu/tag/indo- european/

5 Federated Governments and Networks

6 Network Federa0on A Federa2on is mul0ple compu0ng and/or network providers agreeing upon standards of opera0on in a collec0ve fashion. The term may be used when describing the inter- opera0on of two dis0nct, formally disconnected, telecommunica0ons networks that may have different internal structures. [1] The term may also be used when groups alempt to delegate collec0ve authority of development to prevent fragmenta0on. In a telecommunica0on inter- connec0on, the internal modus operandi of the different systems is irrelevant to the existence of a federa0on hlp://en.wikipedia.org/wiki/federa0on_ %28informa0on_technology%29

7 More than..

8 Windows 2012 Windows Server 2012 Federated Single Sign On hlp://technet.microsok.com/en- us/library/dd aspx

9 Evolve in many shapes and stages hlp://evan.prodromou.name/files/sxsw2012/sxsw2012.html

10 Federal Bridge

11 Again

12 Levels of Assurance hlp:// to- rest- assured/

13 Levels of Assurance hlps:// Week- in- Iden0ty- - Killing- IAM- in- Order- to- Save- It.html

14 Lifecycle Assurance and Federa0on October 2013 IDmachines Smart Card Alliance 12th Conference Workshop

15 Kantara IAF Overview Kantara IAF Glossary Kantara IAF Levels of Assurance Kantara IAF Assurance Assessment Scheme Kantara IAF Service Assessment Criteria Kantara IAF Assessor Qualifica0ons and Requirements Kantara IAF Rules Governing Assurance Assessments Trust Framework Provider to Accredit Assessors and Approve CSPs at Levels 1, 2 & non- crypto Level 3 under the Open Iden0ty Solu0ons for Open Government program. The Iden0ty Assurance Framework (IAF) was developed with input from members of the global financial services, government, healthcare, IT and telecom sectors. The Iden0ty Assurance Framework describes the 4 Assurance Levels and Service Assessment Criteria which a Creden0al Service Provider (CSP or IdP) would be assessed against to become Kantara Ini0a0ve Service Approved.

16 InCommon, operated by Internet2, provides a secure and privacy- preserving trust fabric for research and higher educa0on, and their partners, in the United States. InCommon operates an iden0ty management federa0on, a related assurance program, and offers cer0ficate and mul0factor authen0ca0on services. 258 subscribers to the InCommon Cert Service hlps://incommon.org/

17 The mission of REFEDS is to be the voice that ar0culates the mutual needs of research and educa0on iden0ty federa0ons worldwide. The group represents the requirements of research and educa0on in the ever- growing space of access and iden0ty management, working with and influencing the direc0on of organisa0ons such as Kantara, OIX and Iden0ty Commons on behalf of our par0cipants. hlps://refeds.org/about.html

18 The Open Iden2ty Exchange (OIX) is a non- profit trade organiza0on focused on internet iden0ty solu0ons. OIX is a "team of rivals", with a membership of industry players represen0ng a cross- sec0on of private and public sectors e.g. the internet (Google, PayPal, etc.), data aggrega0on (Equifax, Experian, etc.), telecommunica0ons (AT&T, Verizon, etc.) and government (UK Cabinet Office). The OIX's goal is to enable the expansion of online services and adop0on of new online products through the development and registra0on of trust frameworks and sharing of domain exper0se, joint research and pilot projects to test real- world use cases. OIX is building OIXnet, an authorita0ve registry for online iden0ty trust to enable global interoperability among iden0ty federa0ons. openiden0tyexchange.org

19 Trust Frameworks Enable Federa0on

20 Federa0on BLT Business Have to have a reason Legal Need a common legal understanding and recourse Technology Needs to address usability and security (maybe) Can leverage standards to achieve network effect

21 Standards to help

22 Ques0ons

An introduc/on to Sir0i

An introduc/on to Sir0i Authen4ca4on and Authorisa4on for Research and Collabora4on An introduc/on to Sir0i Addressing Federated Security Incident Response Hannah Short CERN hannah.short@cern.ch TF-CSIRT May, 2016 Agenda Federated

More information

Raising Security and Trust in our Inter-Federated World

Raising Security and Trust in our Inter-Federated World Authen4ca4on and Authorisa4on for Research and Collabora4on Raising Security and Trust in our Inter-Federated World Hannah Short IT-DI-CSO CERN ISGC, Taipei 12-18 March, 2016 Agenda The federated landscape

More information

A Market Solution to Online Identity Trust. Trust Frameworks 101: An Introduction

A Market Solution to Online Identity Trust. Trust Frameworks 101: An Introduction A Market Solution to Online Identity Trust Background OIX is an Internet scale solution to the problem of how identity credentials can be trusted online. Background "OIX is the organization where different

More information

OIX OIDF IDESG WC3 OASIS CROWDED & NOISY LANDSCAPE. Kantara SGIP ISO EEMA ITU-T FIDO EEMA IETF. InCommon. Kerberos TSCP WEF EFF NSTIC TDL

OIX OIDF IDESG WC3 OASIS CROWDED & NOISY LANDSCAPE. Kantara SGIP ISO EEMA ITU-T FIDO EEMA IETF. InCommon. Kerberos TSCP WEF EFF NSTIC TDL OVERVIEW & UPDATE CROWDED & NOISY LANDSCAPE UMA FICAM WC3 TSCP SGIP OpenID Japan IDAP ABA Task Force on Identity GSMA Smart Card Alliance ISO BankID ITU-T EFF UPU IdentityNorth EEMA TERENA IDESG DIAC OIX

More information

AARC Assurance Profiles

AARC Assurance Profiles Authen4ca4on and Authorisa4on for Research and Collabora4on AARC Assurance Profiles Addressing Federated Security Incident Response Hannah Short CERN hannah.short@cern.ch Kantara April 7 th, 2016 Agenda

More information

CAREER PATH FOR THE NEXT GENERATION RECORDS MANAGER

CAREER PATH FOR THE NEXT GENERATION RECORDS MANAGER CAREER PATH FOR THE NEXT GENERATION RECORDS MANAGER San Jose State University October 1,2014 Presented by: Jim Merrifield, IGP, CIP, ERMs Jim Merrifield, IGP, CIP, ERMs Director of Informa.on Governance

More information

Introduction of the Identity Assurance Framework. Defining the framework and its goals

Introduction of the Identity Assurance Framework. Defining the framework and its goals Introduction of the Identity Assurance Framework Defining the framework and its goals 1 IAEG Charter Formed in August of 07 to develop a global standard framework and necessary support programs for validating

More information

Establishing Trust Across International Communities

Establishing Trust Across International Communities Establishing Trust Across International Communities 6 Feb 2013 info@federatedbusiness.org www.federatedbusiness.org Proprietary - British Business Federation Authority 1 Strategic Drivers - Industry 1.

More information

NOW IS THE TIME. to secure our future

NOW IS THE TIME. to secure our future NOW IS THE TIME to secure our future A FRAMEWORK FOR UNITING THE CANADIAN ACCOUNTING PROFESSION VISION FOR THE PROFESSION To be the pre-eminent, internationally recognized Canadian accounting designation

More information

Crea%ng a SARNET Alliance by applying the Service Provider Group Framework and by using the Ciena/GENI testbed

Crea%ng a SARNET Alliance by applying the Service Provider Group Framework and by using the Ciena/GENI testbed Crea%ng a SARNET Alliance by applying the Service Provider Group Framework and by using the Ciena/GENI testbed April 29 th 2015 Leon Gommans: leon.gommans@klm.com Content - Introduc@on - Security Autonomous

More information

User Community Driven Development in Trust and Identity Services

User Community Driven Development in Trust and Identity Services User Community Driven Development in Trust and Identity Services Ann Harding, SWITCH Internet2 Global Summit 27 April 2015 Washington DCs Agenda Trust and Iden.ty Landscape GÉANT Research Community Engagement

More information

PRESENTATION OVERVIEW

PRESENTATION OVERVIEW ITU Regional Seminar for the Africa Region on Conformance and Interoperability Testing Centre(s) Accra (Ghana), 4-6 July 2011 Accreditation Bodies Presented by Andrew Kwan ITU Consultant 1 PRESENTATION

More information

Cloud Security Alliance Quantum-safe Security Working Group

Cloud Security Alliance Quantum-safe Security Working Group Don Hayford 3rd ETSI/IQC Workshop on Quantum-Safe Cryptography Seoul, Korea October 5, 2015 Session 3: Joint Global Efforts Cloud Security Alliance Quantum-safe Security Working Group 1 Cloud Security

More information

TRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model

TRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model TRUST. assured reliance on the character, ability, strength, or truth of someone or something - Merriam-Webster TRUST AND IDENTITY July 2017 Trusted Relationships for Access Management: The InCommon Model

More information

Cloud Standards Coordina.on

Cloud Standards Coordina.on Cloud Standards Coordina.on A collabora.ve snapshot on Cloud Standards E. Darmois CSC Workshop, 11 December 2013 ETSI 2013. All rights reserved The Context EC Cloud Strategy (09/2012) Faster adopdon of

More information

PKI and FICAM Overview and Outlook

PKI and FICAM Overview and Outlook PKI and FICAM Overview and Outlook Stepping Stones 2001 FPKIPA Established Federal Bridge CA established 2003 E-Authentication Program Established M-04-04 E-Authentication Guidance for Federal Agencies

More information

Cyber Partnership Blueprint: An Outline

Cyber Partnership Blueprint: An Outline Approved for Public Release; Distribution Unlimited. 13-3851 The MITRE Corporation Cyber Partnership Blueprint: An Outline October 26, 2013 Copyright 1997-2013, The MITRE Corporation. All rights reserved.

More information

Mobile Payment Security

Mobile Payment Security Mobile Payment Security What it means and how to implement it Macroeconomics of Mobile Money Columbia University Apr. 2, 2010 Hadi Nahari Principal Security & Mobile Architect PayPal, Inc. an ebay Company

More information

Οnline privacy tools for the general public. European Union Agency for Network and Information Security 1

Οnline privacy tools for the general public. European Union Agency for Network and Information Security  1 Οnline privacy tools for the general public European Union Agency for Network and Information Security www.enisa.europa.eu 1 Background Increasing need for preservation of online & mobile privacy. Numerous

More information

Priority Communications Workshop Bratislava, Slovakia 23 September 2008

Priority Communications Workshop Bratislava, Slovakia 23 September 2008 Introduction to Priority Communications Workshop Bratislava, Slovakia 23 September 2008 Karl Rauscher Chair Emeritus, IEEE COMSOC Technical Committee on Communications Quality & Reliability (CQR) Executive

More information

The International Laboratory Accreditation Cooperation (ILAC) & The International Accreditation Forum (IAF)

The International Laboratory Accreditation Cooperation (ILAC) & The International Accreditation Forum (IAF) The International Laboratory Accreditation Cooperation (ILAC) & The International Accreditation Forum (IAF) Perspectives on ILAC & IAF Multilateral Mutual Recognition Arrangements Peter Unger, ILAC Chair

More information

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning.

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning. AIPM Association for International PMOs Expert Practitioner Foundation www.pmolearning.co.uk PMO The Leading Standard and Certification for PMO Professionals Today Understand the Value of High-Performing

More information

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual

More information

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Standardization of Entity Authentication Assurance 5th ETSI Security Workshop 20-2222 January 2010 ETSI, Sophia Antipolis, France Erika McCallister, Esq.,

More information

Assuring Identity. The Identity Assurance Framework CTST Conference, New Orleans, May-09

Assuring Identity. The Identity Assurance Framework CTST Conference, New Orleans, May-09 Assuring Identity The Identity Assurance Framework CTST Conference, New Orleans, May-09 Brett McDowell, Executive Director, Liberty Alliance email@brettmcdowell +1-413-652-1248 1 150+ Liberty Alliance

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition

Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition Sept. 8, 2008 Liberty Alliance 1 Welcome! Introduction of speakers Introduction of attendees Your organization

More information

GDPR ESSENTIALS END-USER COMPLIANCE TRAINING. Copyright 2018 Logical Operations, Inc. All rights reserved.

GDPR ESSENTIALS END-USER COMPLIANCE TRAINING. Copyright 2018 Logical Operations, Inc. All rights reserved. GDPR ESSENTIALS END-USER COMPLIANCE TRAINING 1 POTENTIAL MAXIMUM GDPR PENALTY 2 WHAT IS DATA PRIVACY? MOST NOTABLE US/CA PRIVACY LAWS Federal Trade Commission Act, Sec4on 5 California Online Privacy Protec4on

More information

ITU and IPv6. ARIN October, Los Angeles by Richard Hill

ITU and IPv6. ARIN October, Los Angeles by Richard Hill ITU and IPv6 ARIN 26-28 October, Los Angeles by Richard Hill Telecommunication Standardization Bureau () International Telecommunication Union, Geneva Place des Nations - CH-1211 Geneva 20 Switzerland

More information

AWS Iden)ty And Access Management (IAM) Manohar Rapolu

AWS Iden)ty And Access Management (IAM) Manohar Rapolu AWS Iden)ty And Access Management (IAM) Manohar Rapolu Topics Introduc5on Principals Authen5ca5on Authoriza5on Other Key Feature -> Mul5 Factor Authen5ca5on -> Rota5ng Keys -> Resolving Mul5ple Permissions

More information

PARTNERING WITH THE REGULATORS: The Role for 3rd Party Accreditation in Food Safety

PARTNERING WITH THE REGULATORS: The Role for 3rd Party Accreditation in Food Safety PARTNERING WITH THE REGULATORS: The Role for 3rd Party Accreditation in Food Safety Roger Brauninger American Association for Laboratory Accreditation (A2LA), Frederick, Maryland Topics Role of Accreditation

More information

ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS

ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS Accreditation is continuously gaining recognition as an important technical tool in the delivery of objectives across an increasing range of policy

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

Kantara Identity Assurance Framework Catalyzing an Identity Services Marketplace

Kantara Identity Assurance Framework Catalyzing an Identity Services Marketplace Kantara Identity Assurance Framework Catalyzing an Identity Services Marketplace Matthew Gardiner President, Kantara Initiative Director, CA Technologies Agenda What is the Kantara Initiative Kantara Identity

More information

05/31/2010. Smart OpenID

05/31/2010. Smart OpenID 05/31/2010 Smart OpenID Smart OpenID Smartcard Webserver Enabled SSO for Web 2.0 using OpenID Andreas Leicher, Andreas U. Schmidt (Novalyst IT), Inhyok Cha, Yogendra Shah (InterDigital Communications)

More information

Connected Health Principles

Connected Health Principles Version 2.1 Table of Contents 1 INTRODUCTION... 1 2 TERMINOLOGY... 1 3 CONNECTED HEALTH PRINCIPLES... 4 3.1 CONNECTED HEALTH FOUNDATION PRINCIPLES...5 3.2 CONNECTED HEALTH ARCHITECTURAL PRINCIPLES... 6

More information

How does industry drive forward. SAFE-BioPharma Association

How does industry drive forward. SAFE-BioPharma Association How does industry drive forward SAFE-BioPharma Association Topics! Topic C: Assurance levels, frameworks, interparty liability! Topic D: Device-specific methods: mobile; smartcards; browser DNT, etc. PKI,

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

DataONE Cyberinfrastructure. Ma# Jones Dave Vieglais Bruce Wilson

DataONE Cyberinfrastructure. Ma# Jones Dave Vieglais Bruce Wilson DataONE Cyberinfrastructure Ma# Jones Dave Vieglais Bruce Wilson Foremost a Federa9on Member Nodes (MNs) Heart of the federa9on Harness the power of local cura9on Coordina9ng Nodes (CNs) Services to link

More information

Building an Assurance Foundation for 21 st Century Information Systems and Networks

Building an Assurance Foundation for 21 st Century Information Systems and Networks Building an Assurance Foundation for 21 st Century Information Systems and Networks The Role of IT Security Standards, Metrics, and Assessment Programs Dr. Ron Ross National Information Assurance Partnership

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Security as a Service (Implementation Guides) Research Sponsorship

Security as a Service (Implementation Guides) Research Sponsorship Security as a Service (Implementation Guides) Research Sponsorship Overview The purpose of the Security as a Service (SecaaS) Working Group will be to identify consensus definitions of what Security as

More information

Securing Europe's Information Society

Securing Europe's Information Society Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU

More information

DAkkS Who we are. Attesting competence, Assuring quality, Creating confidence.

DAkkS Who we are. Attesting competence, Assuring quality, Creating confidence. DAkkS Who we are Attesting competence, Assuring quality, Creating confidence. What is accreditation? Reliability through conformity assessment The demands on the quality of goods and services are growing

More information

Higher Education PKI Initiatives

Higher Education PKI Initiatives Higher Education PKI Initiatives (Scott Rea) Securing the ecampus - Hanover NH July 28, 2009 Overview What are the drivers for PKI in Higher Education? Stronger authentication to resources and services

More information

Federated Authentication for E-Infrastructures

Federated Authentication for E-Infrastructures Federated Authentication for E-Infrastructures A growing challenge for on-line e-infrastructures is to manage an increasing number of user accounts, ensuring that accounts are only used by their intended

More information

Improving Discoverability with Unique Identifiers: ORCID, ISNI, and Implementation

Improving Discoverability with Unique Identifiers: ORCID, ISNI, and Implementation Improving Discoverability with Unique Identifiers: ORCID, ISNI, and Implementation NFAIS, 23 July 2014 Laura Dawson Product Manager, Identifier Services, Bowker Laura.Dawson@bowker.com ISNI 0000 0004 1029

More information

InCommon Federation: Participant Operational Practices

InCommon Federation: Participant Operational Practices InCommon Federation: Participant Operational Practices Participation in the InCommon Federation ( Federation ) enables a federation participating organization ( Participant ) to use Shibboleth identity

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

Mul$factor Iden$ty Verifica$on without Prior Rela$onship

Mul$factor Iden$ty Verifica$on without Prior Rela$onship The work reported here was sponsored by a SBIR Phase I grant from the US Department of Homeland Security. It does not necessarily reflect the posi$on or policy of the US Government. Mul$factor Iden$ty

More information

Deliverable D8.4 Certificate Transparency Log v2.0 Production Service

Deliverable D8.4 Certificate Transparency Log v2.0 Production Service 16-11-2017 Certificate Transparency Log v2.0 Production Contractual Date: 31-10-2017 Actual Date: 16-11-2017 Grant Agreement No.: 731122 Work Package/Activity: 8/JRA2 Task Item: Task 6 Nature of Deliverable:

More information

Intro to Federated Iden2ty with eduroam and edugain

Intro to Federated Iden2ty with eduroam and edugain Intro to Federated Iden2ty with eduroam and edugain Brook Schofield edugain Product Manager GÉANT Virtually @ Eko- Konnect, Lagos, Nigeria 7 th October 2015 The computer lab Image URL: hqp://www.fox.temple.edu/cms_about-

More information

REFEDS Minutes, 22 April 2012

REFEDS Minutes, 22 April 2012 DOC VERSION:0.1 DATE: 24/04/12 PAGE 1/6 title / reference:refeds-minutes-120422 REFEDS Minutes, 22 April 2012 Licia Florio and Nicole Harris Abstract: Minutes of the REFEDS BOF held in conjunction with

More information

CERT Symposium: Cyber Security Incident Management for Health Information Exchanges

CERT Symposium: Cyber Security Incident Management for Health Information Exchanges Pennsylvania ehealth Partnership Authority Pennsylvania s Journey for Health Information Exchange CERT Symposium: Cyber Security Incident Management for Health Information Exchanges June 26, 2013 Pittsburgh,

More information

Level 3 is the largest competitive local exchange carrier (CLEC) operating in the US. Volume 1, Section 1.0 Page 1-1 April 19, 2007

Level 3 is the largest competitive local exchange carrier (CLEC) operating in the US. Volume 1, Section 1.0 Page 1-1 April 19, 2007 1.0 Level 3 s WITS 3 Offer Level 3 Communications, LLC (Level 3) is committed to a future where Government agencies can conduct their business cost effectively by leveraging converged multi-media IP applications.

More information

Creating a Digital Preservation Network with Shared Stewardship and Cost

Creating a Digital Preservation Network with Shared Stewardship and Cost Creating a Digital Preservation Network with Shared Stewardship and Cost The National Digital Information Infrastructure and Preservation Program Experience NDIIPP Investments Preservation Network Partnerships

More information

CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''

CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act'' CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''

More information

IECEE. IEC-ILAC-IAF Tripartite MoU CB-FCS Scheme and Market Control INTERNATIONAL ELECTROTECHNICAL COMMISSION

IECEE. IEC-ILAC-IAF Tripartite MoU CB-FCS Scheme and Market Control INTERNATIONAL ELECTROTECHNICAL COMMISSION INTERNATIONAL ELECTROTECHNICAL COMMISSION WORLDWIDE SYSTEM FOR CONFORMITY TESTING AND CERTIFICATION OF ELECTRICAL EQUIPMENT AND COMPONENTS IECEE IEC-ILAC-IAF Tripartite MoU CB-FCS Scheme and Market Control

More information

Copyright 2011 EMC Corporation. All rights reserved.

Copyright 2011 EMC Corporation. All rights reserved. 1 2 How risky is the Cloud? 3 Is Cloud worth it? YES! 4 Cloud adds the concept of Supply Chain 5 Cloud Computing Definition National Institute of Standards and Technology (NIST Special Publication 800-145

More information

Federated authentication for e-infrastructures

Federated authentication for e-infrastructures Federated authentication for e-infrastructures 5 September 2014 Federated Authentication for E-Infrastructures Jisc Published under the CC BY 4.0 licence creativecommons.org/licenses/by/4.0/ Contents Introduction

More information

Protocol on the Mutual Acceptance of the Results of Conformity Assessment

Protocol on the Mutual Acceptance of the Results of Conformity Assessment Protocol on the Mutual Acceptance of the Results of Conformity Assessment 1 Presentation Overview Overview of the Conformity Assessment (CA) Protocol Implementation and Next Steps Cooperation Agreement

More information

Creating a Global Network

Creating a Global Network International Personnel Certification Association: Creating a Global Network Dr. George Anastasopoulos IPC Chairman a short history... interested parties came together late 1993 formally establishing IATCA

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Future-Proof Security & Privacy in IoT

Future-Proof Security & Privacy in IoT All rights reserved, Arthur s Legal B.V. Future-Proof Security & Privacy in IoT From State of Play, To State of The Art Arthur van der Wees, LLM Managing Director Arthur s Legal, the global tech-by-design

More information

Stakeholder and community feedback. Trusted Digital Identity Framework (Component 2)

Stakeholder and community feedback. Trusted Digital Identity Framework (Component 2) Stakeholder and community feedback Trusted Digital Identity Framework (Component 2) Digital Transformation Agency This work is copyright. Apart from any use as permitted under the Copyright Act 1968 and

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

What do you see as GSMA s

What do you see as GSMA s GSMA: Connecting everyone and everything to a better future Mats Granryd, Director General of GSMA, shares his thoughts on the development of 5G, the Internet of Things, and why mobile is so important

More information

Read Me. Intent of the work The Periodic Table. About trust marks and trust frameworks Use of the table to illustrate marks and frameworks Next steps

Read Me. Intent of the work The Periodic Table. About trust marks and trust frameworks Use of the table to illustrate marks and frameworks Next steps Read Me Intent of the work The Periodic Table Rows - Clusters - Colors Cau:ons on dynamic nature of table About trust marks and trust frameworks Use of the table to illustrate marks and frameworks Next

More information

Cybersecurity in the EU Steve Purser Head of Operational Departments, ENISA Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European

Cybersecurity in the EU Steve Purser Head of Operational Departments, ENISA Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Cybersecurity in the EU Steve Purser Head of Operational Departments, ENISA Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency for Network and Information Security Positioning

More information

Introduction to the Federal Risk and Authorization Management Program (FedRAMP)

Introduction to the Federal Risk and Authorization Management Program (FedRAMP) Introduction to the Federal Risk and Authorization Management Program (FedRAMP) 8/2/2015 Presented by: FedRAMP PMO 1 Today s Training Welcome! This training session is part one of the FedRAMP Training

More information

DMR Interoperability Process DMR Association

DMR Interoperability Process DMR Association DMR Interoperability Process DMR Association Introduction This white paper gives the background to the development of the DMR Interoperability Process by the DMR Association, explains the value of the

More information

ISO 9001 Auditing Practices Group Guidance on:

ISO 9001 Auditing Practices Group Guidance on: International Organization for Standardization International Accreditation Forum Date: 13 January 2016 ISO 9001 Auditing Practices Group Guidance on: Expected Outcomes The expected outcomes documents (given

More information

Mutual Recognition Agreement/Arrangement: General Introduction, Framework and Benefits

Mutual Recognition Agreement/Arrangement: General Introduction, Framework and Benefits Conformity and Interoperability Training for SADC Region on Type Approval testing for Mobile Terminals, Homologation Procedures and Market Surveillance Mutual Recognition Agreement/Arrangement: General

More information

Frequently Asked Questions

Frequently Asked Questions December 2001 Introduction International Standard ISO/IEC 17799:2000 Information Security Management, Code of Practice for Information Security Management Frequently Asked Questions The National Institute

More information

Workday s Robust Privacy Program

Workday s Robust Privacy Program Workday s Robust Privacy Program Workday s Robust Privacy Program Introduction Workday is a leading provider of enterprise cloud applications for human resources and finance. Founded in 2005 by Dave Duffield

More information

Interagency Advisory Board Meeting Agenda, August 25, 2009

Interagency Advisory Board Meeting Agenda, August 25, 2009 Interagency Advisory Board Meeting Agenda, August 25, 2009 1. Opening Remarks 2. Policy, process, regulations, technology, and infrastructure to employ HSPD-12 in USDA (Owen Unangst, USDA) 3. Policy and

More information

PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser. CSP2015 Brussels /

PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser. CSP2015 Brussels / PRISMACLOUD Privacy and Security Maintaining Services in the Cloud Thomas Loruenser CSP2015 Brussels / 29.04.2015 Challenges for future ICT Cloud computing will be at the heart of future ICT systems The

More information

Federated Access. Identity & Privacy Protection

Federated Access. Identity & Privacy Protection Federated Access Identity & Privacy Protection Presented at: Information Systems Security Association-Northern Virginia (ISSA-NOVA) Chapter Meeting Presented by: Daniel E. Turissini Board Member, Federation

More information

New International Health and Safety Standard ISO 45001

New International Health and Safety Standard ISO 45001 New International Health and Safety Standard ISO 45001 By Mr. Coleman Tse, Sales & Marketing Director, BSI Hong Kong 4/24/2015 Who is BSI? Royal Charter Status focused on the development of standards,

More information

ehealth in the implementa,on of the cross border direc,ve: role of the ehealth Network 26th February 2012

ehealth in the implementa,on of the cross border direc,ve: role of the ehealth Network 26th February 2012 ehealth in the implementa,on of the cross border direc,ve: role of the ehealth Network 26th February 2012 Agenda EU in health Ehealth in the EU ehealth Network ehealth High- Level Governance Ini,a,ve Goals

More information

Singapore s vcargo Cloud signs Cooperation Agreement with Russia s RSTradehouse to expand trade opportunities between Russia and Singapore companies

Singapore s vcargo Cloud signs Cooperation Agreement with Russia s RSTradehouse to expand trade opportunities between Russia and Singapore companies Singapore s vcargo Cloud signs Cooperation Agreement with Russia s RSTradehouse to expand trade opportunities between Russia and Singapore companies Dr Sergey Pronin, CEO of RSTradehouse (front left),

More information

ETSI European CA DAY TRUST SERVICE PROVIDER (TSP) CONFORMITY ASSESSMENT FRAMEWORK. Presented by Nick Pope, ETSI STF 427 Leader

ETSI European CA DAY TRUST SERVICE PROVIDER (TSP) CONFORMITY ASSESSMENT FRAMEWORK. Presented by Nick Pope, ETSI STF 427 Leader ETSI European CA DAY TRUST SERVICE PROVIDER (TSP) CONFORMITY ASSESSMENT FRAMEWORK Presented by Nick Pope, ETSI STF 427 Leader ETSI 2012 All rights reserved Topics Background ETSI Activities / Link to Mandate

More information

Emerging Risks in Emerging Payments

Emerging Risks in Emerging Payments CTIA- The Wireless Association Presentation for Federal Reserve Bank Emerging Risks in Emerging Payments November, 15, 2010 Atlanta, GA Kate Kingberger Director, Wireless Internet Development CTIA- The

More information

Issues in Assessing Commercial Certification Service Trust

Issues in Assessing Commercial Certification Service Trust The Open Group Security Program Group Building Trust on the Net ---- San Diego -- April 30, 1998 Issues in Assessing Commercial Certification Service Trust Michael S. Baum, J.D., M.B.A. VP, Practices &

More information

New cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017

New cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017 in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017 European Union Agency for Network and Information Security Positioning ENISA activities CAPACITY Hands on activities POLICY Support MS & COM

More information

Direct, DirectTrust, and FHIR: A Value Proposition

Direct, DirectTrust, and FHIR: A Value Proposition Direct, DirectTrust, and FHIR: A Value Proposition August 10, 2017 Authors: Grahame Grieve, HL7 Product Director for FHIR; David Kibbe, Luis Maas, Greg Meyer, and Bruce Schreiber, members of the DirectTrust

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Interagency Advisory Board Meeting Agenda, Wednesday, December 5, 2012

Interagency Advisory Board Meeting Agenda, Wednesday, December 5, 2012 Interagency Advisory Board Meeting Agenda, Wednesday, December 5, 2012 1. Opening Remarks 2. The State Identity Credential and Access Management Guidance and Roadmap (SICAM) (Chad Grant, NASCIO) 3. PIV

More information

Oracle Buys Corente. Extends Oracle s Virtualization Capabilities with Leading Software-Defined Networking Technology to Deliver Cloud Services

Oracle Buys Corente. Extends Oracle s Virtualization Capabilities with Leading Software-Defined Networking Technology to Deliver Cloud Services Oracle Buys Corente Extends Oracle s Virtualization Capabilities with Leading Software-Defined Networking Technology to Deliver Cloud Services March 5, 2014 Oracle is currently reviewing the existing Corente

More information

Scaling Interoperable Trust through a Trustmark Marketplace

Scaling Interoperable Trust through a Trustmark Marketplace Scaling Interoperable Trust through a Marketplace John Wandelt Georgia Tech Research Institute This work was performed under the following financial assistance award 70NANB13H189 from the U.S. Department

More information

Accreditation Process. Trusted Digital Identity Framework February 2018, version 1.0

Accreditation Process. Trusted Digital Identity Framework February 2018, version 1.0 Accreditation Process Trusted Digital Identity Framework February 2018, version 1.0 Digital Transformation Agency This work is copyright. Apart from any use as permitted under the Copyright Act 1968 and

More information

Con$nuous Audi$ng and Risk Management in Cloud Compu$ng

Con$nuous Audi$ng and Risk Management in Cloud Compu$ng Con$nuous Audi$ng and Risk Management in Cloud Compu$ng Marcus Spies Chair of Knowledge Management LMU University of Munich Scien$fic / Technical Director of EU Integrated Research Project MUSING Cloud

More information

Government support for Industry Consortia and why it matters. IIS/O5 hosted by DIACC, Ottawa November 2, 2016

Government support for Industry Consortia and why it matters. IIS/O5 hosted by DIACC, Ottawa November 2, 2016 Government support for Industry Consortia and why it matters IIS/O5 hosted by DIACC, Ottawa November 2, 2016 Setting the scene Canada has competitive advantage in digital identity (but let s not talk about

More information

Thursday, May 15. Track D Security & Access Control

Thursday, May 15. Track D Security & Access Control Thursday, May 15 Track D Security & Access Control Session: PKI Logical Access Technology & Applications Time: 10:15 AM 12:00 PM Room: W204 D Moderator: Steve Howard VP, Business Development, Identity

More information

How to return control over user data back to the user The rethink framework

How to return control over user data back to the user The rethink framework How to return control over user data back to the user The rethink framework Anastasius Gavras Eurescom GmbH Online Webinar 21. June 2017 This project has received funding from the European Union s Horizon

More information

The AAF - Supporting Greener Collaboration

The AAF - Supporting Greener Collaboration SPUSC 2008 SOUTH PACIFIC USER SERVICES CONFERENCE The AAF - Supporting Greener Collaboration Stuart Allen MAMS MELCOE Macquarie University sallen@melcoe.mq.edu.au What is the AAF? The Australian Access

More information

The Role of SANAS in Support of South African Regulatory Objectives. Mr. Mpho Phaloane South African National Accreditation System

The Role of SANAS in Support of South African Regulatory Objectives. Mr. Mpho Phaloane South African National Accreditation System The Role of SANAS in Support of South African Regulatory Objectives Mr. Mpho Phaloane South African National Accreditation System Outline of Presentation INTRODUCTION STATUS OF SANAS TECHNICAL INFRASTRUCTURE

More information

Smart Card Alliance Update. Update to the Interagency Advisor Board (IAB) June 27, 2012

Smart Card Alliance Update. Update to the Interagency Advisor Board (IAB) June 27, 2012 Smart Card Alliance Update Update to the Interagency Advisor Board (IAB) June 27, 2012 Industry s Access Control Payments (NEW) Mobile & NFC Identity Industry s Healthcare Transportation Access Control

More information

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) Version 1.0 Author: Bharadwaj Pulugundla (Verizon) 25.10.2015 Table of content 1. Introduction... 3

More information

Way to new challenges

Way to new challenges Way to new challenges Yves Vandermeer MSC Computer Forensics and Cybercrime Investigations PhD researcher yves.vandermeer@ When? Since 2001, informal working group starting with a few members from EU Law

More information