Fundamentals of Federated Iden0ty Infrastructure
|
|
- Colin Evans
- 5 years ago
- Views:
Transcription
1 Fundamentals of Federated Iden0ty Infrastructure Sal D Agos0no IDmachines LLC
2 Federate fed er ate Verb past tense: federated; past participle: federated ˈfedəәˌrāt/ 1. (with reference to a number of states or organizations) form or be formed into a single centralized unit, within which each state or organization keeps some internal autonomy. "In 1901 the six colonies federated to form the Commonwealth of Australia" synonyms: confederate, combine, unite, unify, merge, amalgamate, integrate, join (up), band together, team up "several tribes federated in an alempt to stem the 0de of white colonial expansionism" October 2013 IDmachines - Smart Card
3 Federa0on [ˌfɛdəˈreɪʃən]n 1. the act of federa0ng 2. (Government, Poli0cs & Diplomacy) the union of several provinces, states, etc., to form a federal union 3. (Government, Poli0cs & Diplomacy) a poli0cal unit formed in such a way 4. (Government, Poli0cs & Diplomacy) any league, alliance, or confederacy 5. a union of several par0es, groups, etc. 6. any associa0on or union for common ac0on October 2013 IDmachines - Smart Card
4 La0n and Indo- European roots Foederre, foedert-, to ra'fy an agreement, from foedus, foeder-, league, treaty; see bheidh- in Indo- European roots. The words descended from bheidh- include verbs meaning to bide, abide, expect, confide, await, trust, have confidence in, request, compel, expect, endure, promise, and so on, and also in nega0ve forms to distrust, challenge, dare someone, trouble, hurt, prevent, oppress, cause pain, and so on. As adjec0ves, the meanings of the derived words include guilty, distrusaul, unbelieving, faithful, faithless, pagan. As nouns, the derived words mean abode, delay, confidence, fidelity, treachery, disloyalty, expecta0on, faithfulness, perfidy, trouble, misfortune, misery, hardship, necessity, confederate, oath, damage, injury, faith. hlp://wri0ng- arts- blog.northwestern.edu/tag/indo- european/
5 Federated Governments and Networks
6 Network Federa0on A Federa2on is mul0ple compu0ng and/or network providers agreeing upon standards of opera0on in a collec0ve fashion. The term may be used when describing the inter- opera0on of two dis0nct, formally disconnected, telecommunica0ons networks that may have different internal structures. [1] The term may also be used when groups alempt to delegate collec0ve authority of development to prevent fragmenta0on. In a telecommunica0on inter- connec0on, the internal modus operandi of the different systems is irrelevant to the existence of a federa0on hlp://en.wikipedia.org/wiki/federa0on_ %28informa0on_technology%29
7 More than..
8 Windows 2012 Windows Server 2012 Federated Single Sign On hlp://technet.microsok.com/en- us/library/dd aspx
9 Evolve in many shapes and stages hlp://evan.prodromou.name/files/sxsw2012/sxsw2012.html
10 Federal Bridge
11 Again
12 Levels of Assurance hlp:// to- rest- assured/
13 Levels of Assurance hlps:// Week- in- Iden0ty- - Killing- IAM- in- Order- to- Save- It.html
14 Lifecycle Assurance and Federa0on October 2013 IDmachines Smart Card Alliance 12th Conference Workshop
15 Kantara IAF Overview Kantara IAF Glossary Kantara IAF Levels of Assurance Kantara IAF Assurance Assessment Scheme Kantara IAF Service Assessment Criteria Kantara IAF Assessor Qualifica0ons and Requirements Kantara IAF Rules Governing Assurance Assessments Trust Framework Provider to Accredit Assessors and Approve CSPs at Levels 1, 2 & non- crypto Level 3 under the Open Iden0ty Solu0ons for Open Government program. The Iden0ty Assurance Framework (IAF) was developed with input from members of the global financial services, government, healthcare, IT and telecom sectors. The Iden0ty Assurance Framework describes the 4 Assurance Levels and Service Assessment Criteria which a Creden0al Service Provider (CSP or IdP) would be assessed against to become Kantara Ini0a0ve Service Approved.
16 InCommon, operated by Internet2, provides a secure and privacy- preserving trust fabric for research and higher educa0on, and their partners, in the United States. InCommon operates an iden0ty management federa0on, a related assurance program, and offers cer0ficate and mul0factor authen0ca0on services. 258 subscribers to the InCommon Cert Service hlps://incommon.org/
17 The mission of REFEDS is to be the voice that ar0culates the mutual needs of research and educa0on iden0ty federa0ons worldwide. The group represents the requirements of research and educa0on in the ever- growing space of access and iden0ty management, working with and influencing the direc0on of organisa0ons such as Kantara, OIX and Iden0ty Commons on behalf of our par0cipants. hlps://refeds.org/about.html
18 The Open Iden2ty Exchange (OIX) is a non- profit trade organiza0on focused on internet iden0ty solu0ons. OIX is a "team of rivals", with a membership of industry players represen0ng a cross- sec0on of private and public sectors e.g. the internet (Google, PayPal, etc.), data aggrega0on (Equifax, Experian, etc.), telecommunica0ons (AT&T, Verizon, etc.) and government (UK Cabinet Office). The OIX's goal is to enable the expansion of online services and adop0on of new online products through the development and registra0on of trust frameworks and sharing of domain exper0se, joint research and pilot projects to test real- world use cases. OIX is building OIXnet, an authorita0ve registry for online iden0ty trust to enable global interoperability among iden0ty federa0ons. openiden0tyexchange.org
19 Trust Frameworks Enable Federa0on
20 Federa0on BLT Business Have to have a reason Legal Need a common legal understanding and recourse Technology Needs to address usability and security (maybe) Can leverage standards to achieve network effect
21 Standards to help
22 Ques0ons
An introduc/on to Sir0i
Authen4ca4on and Authorisa4on for Research and Collabora4on An introduc/on to Sir0i Addressing Federated Security Incident Response Hannah Short CERN hannah.short@cern.ch TF-CSIRT May, 2016 Agenda Federated
More informationRaising Security and Trust in our Inter-Federated World
Authen4ca4on and Authorisa4on for Research and Collabora4on Raising Security and Trust in our Inter-Federated World Hannah Short IT-DI-CSO CERN ISGC, Taipei 12-18 March, 2016 Agenda The federated landscape
More informationA Market Solution to Online Identity Trust. Trust Frameworks 101: An Introduction
A Market Solution to Online Identity Trust Background OIX is an Internet scale solution to the problem of how identity credentials can be trusted online. Background "OIX is the organization where different
More informationOIX OIDF IDESG WC3 OASIS CROWDED & NOISY LANDSCAPE. Kantara SGIP ISO EEMA ITU-T FIDO EEMA IETF. InCommon. Kerberos TSCP WEF EFF NSTIC TDL
OVERVIEW & UPDATE CROWDED & NOISY LANDSCAPE UMA FICAM WC3 TSCP SGIP OpenID Japan IDAP ABA Task Force on Identity GSMA Smart Card Alliance ISO BankID ITU-T EFF UPU IdentityNorth EEMA TERENA IDESG DIAC OIX
More informationAARC Assurance Profiles
Authen4ca4on and Authorisa4on for Research and Collabora4on AARC Assurance Profiles Addressing Federated Security Incident Response Hannah Short CERN hannah.short@cern.ch Kantara April 7 th, 2016 Agenda
More informationCAREER PATH FOR THE NEXT GENERATION RECORDS MANAGER
CAREER PATH FOR THE NEXT GENERATION RECORDS MANAGER San Jose State University October 1,2014 Presented by: Jim Merrifield, IGP, CIP, ERMs Jim Merrifield, IGP, CIP, ERMs Director of Informa.on Governance
More informationIntroduction of the Identity Assurance Framework. Defining the framework and its goals
Introduction of the Identity Assurance Framework Defining the framework and its goals 1 IAEG Charter Formed in August of 07 to develop a global standard framework and necessary support programs for validating
More informationEstablishing Trust Across International Communities
Establishing Trust Across International Communities 6 Feb 2013 info@federatedbusiness.org www.federatedbusiness.org Proprietary - British Business Federation Authority 1 Strategic Drivers - Industry 1.
More informationNOW IS THE TIME. to secure our future
NOW IS THE TIME to secure our future A FRAMEWORK FOR UNITING THE CANADIAN ACCOUNTING PROFESSION VISION FOR THE PROFESSION To be the pre-eminent, internationally recognized Canadian accounting designation
More informationCrea%ng a SARNET Alliance by applying the Service Provider Group Framework and by using the Ciena/GENI testbed
Crea%ng a SARNET Alliance by applying the Service Provider Group Framework and by using the Ciena/GENI testbed April 29 th 2015 Leon Gommans: leon.gommans@klm.com Content - Introduc@on - Security Autonomous
More informationUser Community Driven Development in Trust and Identity Services
User Community Driven Development in Trust and Identity Services Ann Harding, SWITCH Internet2 Global Summit 27 April 2015 Washington DCs Agenda Trust and Iden.ty Landscape GÉANT Research Community Engagement
More informationPRESENTATION OVERVIEW
ITU Regional Seminar for the Africa Region on Conformance and Interoperability Testing Centre(s) Accra (Ghana), 4-6 July 2011 Accreditation Bodies Presented by Andrew Kwan ITU Consultant 1 PRESENTATION
More informationCloud Security Alliance Quantum-safe Security Working Group
Don Hayford 3rd ETSI/IQC Workshop on Quantum-Safe Cryptography Seoul, Korea October 5, 2015 Session 3: Joint Global Efforts Cloud Security Alliance Quantum-safe Security Working Group 1 Cloud Security
More informationTRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model
TRUST. assured reliance on the character, ability, strength, or truth of someone or something - Merriam-Webster TRUST AND IDENTITY July 2017 Trusted Relationships for Access Management: The InCommon Model
More informationCloud Standards Coordina.on
Cloud Standards Coordina.on A collabora.ve snapshot on Cloud Standards E. Darmois CSC Workshop, 11 December 2013 ETSI 2013. All rights reserved The Context EC Cloud Strategy (09/2012) Faster adopdon of
More informationPKI and FICAM Overview and Outlook
PKI and FICAM Overview and Outlook Stepping Stones 2001 FPKIPA Established Federal Bridge CA established 2003 E-Authentication Program Established M-04-04 E-Authentication Guidance for Federal Agencies
More informationCyber Partnership Blueprint: An Outline
Approved for Public Release; Distribution Unlimited. 13-3851 The MITRE Corporation Cyber Partnership Blueprint: An Outline October 26, 2013 Copyright 1997-2013, The MITRE Corporation. All rights reserved.
More informationMobile Payment Security
Mobile Payment Security What it means and how to implement it Macroeconomics of Mobile Money Columbia University Apr. 2, 2010 Hadi Nahari Principal Security & Mobile Architect PayPal, Inc. an ebay Company
More informationΟnline privacy tools for the general public. European Union Agency for Network and Information Security 1
Οnline privacy tools for the general public European Union Agency for Network and Information Security www.enisa.europa.eu 1 Background Increasing need for preservation of online & mobile privacy. Numerous
More informationPriority Communications Workshop Bratislava, Slovakia 23 September 2008
Introduction to Priority Communications Workshop Bratislava, Slovakia 23 September 2008 Karl Rauscher Chair Emeritus, IEEE COMSOC Technical Committee on Communications Quality & Reliability (CQR) Executive
More informationThe International Laboratory Accreditation Cooperation (ILAC) & The International Accreditation Forum (IAF)
The International Laboratory Accreditation Cooperation (ILAC) & The International Accreditation Forum (IAF) Perspectives on ILAC & IAF Multilateral Mutual Recognition Arrangements Peter Unger, ILAC Chair
More informationAssociation for International PMOs. Expert. Practitioner. Foundation PMO. Learning.
AIPM Association for International PMOs Expert Practitioner Foundation www.pmolearning.co.uk PMO The Leading Standard and Certification for PMO Professionals Today Understand the Value of High-Performing
More informationNext Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop
Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual
More informationNATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Standardization of Entity Authentication Assurance 5th ETSI Security Workshop 20-2222 January 2010 ETSI, Sophia Antipolis, France Erika McCallister, Esq.,
More informationAssuring Identity. The Identity Assurance Framework CTST Conference, New Orleans, May-09
Assuring Identity The Identity Assurance Framework CTST Conference, New Orleans, May-09 Brett McDowell, Executive Director, Liberty Alliance email@brettmcdowell +1-413-652-1248 1 150+ Liberty Alliance
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationIdentity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition
Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition Sept. 8, 2008 Liberty Alliance 1 Welcome! Introduction of speakers Introduction of attendees Your organization
More informationGDPR ESSENTIALS END-USER COMPLIANCE TRAINING. Copyright 2018 Logical Operations, Inc. All rights reserved.
GDPR ESSENTIALS END-USER COMPLIANCE TRAINING 1 POTENTIAL MAXIMUM GDPR PENALTY 2 WHAT IS DATA PRIVACY? MOST NOTABLE US/CA PRIVACY LAWS Federal Trade Commission Act, Sec4on 5 California Online Privacy Protec4on
More informationITU and IPv6. ARIN October, Los Angeles by Richard Hill
ITU and IPv6 ARIN 26-28 October, Los Angeles by Richard Hill Telecommunication Standardization Bureau () International Telecommunication Union, Geneva Place des Nations - CH-1211 Geneva 20 Switzerland
More informationAWS Iden)ty And Access Management (IAM) Manohar Rapolu
AWS Iden)ty And Access Management (IAM) Manohar Rapolu Topics Introduc5on Principals Authen5ca5on Authoriza5on Other Key Feature -> Mul5 Factor Authen5ca5on -> Rota5ng Keys -> Resolving Mul5ple Permissions
More informationPARTNERING WITH THE REGULATORS: The Role for 3rd Party Accreditation in Food Safety
PARTNERING WITH THE REGULATORS: The Role for 3rd Party Accreditation in Food Safety Roger Brauninger American Association for Laboratory Accreditation (A2LA), Frederick, Maryland Topics Role of Accreditation
More informationACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS
ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS Accreditation is continuously gaining recognition as an important technical tool in the delivery of objectives across an increasing range of policy
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access
More informationKantara Identity Assurance Framework Catalyzing an Identity Services Marketplace
Kantara Identity Assurance Framework Catalyzing an Identity Services Marketplace Matthew Gardiner President, Kantara Initiative Director, CA Technologies Agenda What is the Kantara Initiative Kantara Identity
More information05/31/2010. Smart OpenID
05/31/2010 Smart OpenID Smart OpenID Smartcard Webserver Enabled SSO for Web 2.0 using OpenID Andreas Leicher, Andreas U. Schmidt (Novalyst IT), Inhyok Cha, Yogendra Shah (InterDigital Communications)
More informationConnected Health Principles
Version 2.1 Table of Contents 1 INTRODUCTION... 1 2 TERMINOLOGY... 1 3 CONNECTED HEALTH PRINCIPLES... 4 3.1 CONNECTED HEALTH FOUNDATION PRINCIPLES...5 3.2 CONNECTED HEALTH ARCHITECTURAL PRINCIPLES... 6
More informationHow does industry drive forward. SAFE-BioPharma Association
How does industry drive forward SAFE-BioPharma Association Topics! Topic C: Assurance levels, frameworks, interparty liability! Topic D: Device-specific methods: mobile; smartcards; browser DNT, etc. PKI,
More informationThe NIS Directive and Cybersecurity in
The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security
More informationDataONE Cyberinfrastructure. Ma# Jones Dave Vieglais Bruce Wilson
DataONE Cyberinfrastructure Ma# Jones Dave Vieglais Bruce Wilson Foremost a Federa9on Member Nodes (MNs) Heart of the federa9on Harness the power of local cura9on Coordina9ng Nodes (CNs) Services to link
More informationBuilding an Assurance Foundation for 21 st Century Information Systems and Networks
Building an Assurance Foundation for 21 st Century Information Systems and Networks The Role of IT Security Standards, Metrics, and Assessment Programs Dr. Ron Ross National Information Assurance Partnership
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationSecurity as a Service (Implementation Guides) Research Sponsorship
Security as a Service (Implementation Guides) Research Sponsorship Overview The purpose of the Security as a Service (SecaaS) Working Group will be to identify consensus definitions of what Security as
More informationSecuring Europe's Information Society
Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU
More informationDAkkS Who we are. Attesting competence, Assuring quality, Creating confidence.
DAkkS Who we are Attesting competence, Assuring quality, Creating confidence. What is accreditation? Reliability through conformity assessment The demands on the quality of goods and services are growing
More informationHigher Education PKI Initiatives
Higher Education PKI Initiatives (Scott Rea) Securing the ecampus - Hanover NH July 28, 2009 Overview What are the drivers for PKI in Higher Education? Stronger authentication to resources and services
More informationFederated Authentication for E-Infrastructures
Federated Authentication for E-Infrastructures A growing challenge for on-line e-infrastructures is to manage an increasing number of user accounts, ensuring that accounts are only used by their intended
More informationImproving Discoverability with Unique Identifiers: ORCID, ISNI, and Implementation
Improving Discoverability with Unique Identifiers: ORCID, ISNI, and Implementation NFAIS, 23 July 2014 Laura Dawson Product Manager, Identifier Services, Bowker Laura.Dawson@bowker.com ISNI 0000 0004 1029
More informationInCommon Federation: Participant Operational Practices
InCommon Federation: Participant Operational Practices Participation in the InCommon Federation ( Federation ) enables a federation participating organization ( Participant ) to use Shibboleth identity
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access
More informationMul$factor Iden$ty Verifica$on without Prior Rela$onship
The work reported here was sponsored by a SBIR Phase I grant from the US Department of Homeland Security. It does not necessarily reflect the posi$on or policy of the US Government. Mul$factor Iden$ty
More informationDeliverable D8.4 Certificate Transparency Log v2.0 Production Service
16-11-2017 Certificate Transparency Log v2.0 Production Contractual Date: 31-10-2017 Actual Date: 16-11-2017 Grant Agreement No.: 731122 Work Package/Activity: 8/JRA2 Task Item: Task 6 Nature of Deliverable:
More informationIntro to Federated Iden2ty with eduroam and edugain
Intro to Federated Iden2ty with eduroam and edugain Brook Schofield edugain Product Manager GÉANT Virtually @ Eko- Konnect, Lagos, Nigeria 7 th October 2015 The computer lab Image URL: hqp://www.fox.temple.edu/cms_about-
More informationREFEDS Minutes, 22 April 2012
DOC VERSION:0.1 DATE: 24/04/12 PAGE 1/6 title / reference:refeds-minutes-120422 REFEDS Minutes, 22 April 2012 Licia Florio and Nicole Harris Abstract: Minutes of the REFEDS BOF held in conjunction with
More informationCERT Symposium: Cyber Security Incident Management for Health Information Exchanges
Pennsylvania ehealth Partnership Authority Pennsylvania s Journey for Health Information Exchange CERT Symposium: Cyber Security Incident Management for Health Information Exchanges June 26, 2013 Pittsburgh,
More informationLevel 3 is the largest competitive local exchange carrier (CLEC) operating in the US. Volume 1, Section 1.0 Page 1-1 April 19, 2007
1.0 Level 3 s WITS 3 Offer Level 3 Communications, LLC (Level 3) is committed to a future where Government agencies can conduct their business cost effectively by leveraging converged multi-media IP applications.
More informationCreating a Digital Preservation Network with Shared Stewardship and Cost
Creating a Digital Preservation Network with Shared Stewardship and Cost The National Digital Information Infrastructure and Preservation Program Experience NDIIPP Investments Preservation Network Partnerships
More informationCEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''
CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''
More informationIECEE. IEC-ILAC-IAF Tripartite MoU CB-FCS Scheme and Market Control INTERNATIONAL ELECTROTECHNICAL COMMISSION
INTERNATIONAL ELECTROTECHNICAL COMMISSION WORLDWIDE SYSTEM FOR CONFORMITY TESTING AND CERTIFICATION OF ELECTRICAL EQUIPMENT AND COMPONENTS IECEE IEC-ILAC-IAF Tripartite MoU CB-FCS Scheme and Market Control
More informationCopyright 2011 EMC Corporation. All rights reserved.
1 2 How risky is the Cloud? 3 Is Cloud worth it? YES! 4 Cloud adds the concept of Supply Chain 5 Cloud Computing Definition National Institute of Standards and Technology (NIST Special Publication 800-145
More informationFederated authentication for e-infrastructures
Federated authentication for e-infrastructures 5 September 2014 Federated Authentication for E-Infrastructures Jisc Published under the CC BY 4.0 licence creativecommons.org/licenses/by/4.0/ Contents Introduction
More informationProtocol on the Mutual Acceptance of the Results of Conformity Assessment
Protocol on the Mutual Acceptance of the Results of Conformity Assessment 1 Presentation Overview Overview of the Conformity Assessment (CA) Protocol Implementation and Next Steps Cooperation Agreement
More informationCreating a Global Network
International Personnel Certification Association: Creating a Global Network Dr. George Anastasopoulos IPC Chairman a short history... interested parties came together late 1993 formally establishing IATCA
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationFuture-Proof Security & Privacy in IoT
All rights reserved, Arthur s Legal B.V. Future-Proof Security & Privacy in IoT From State of Play, To State of The Art Arthur van der Wees, LLM Managing Director Arthur s Legal, the global tech-by-design
More informationStakeholder and community feedback. Trusted Digital Identity Framework (Component 2)
Stakeholder and community feedback Trusted Digital Identity Framework (Component 2) Digital Transformation Agency This work is copyright. Apart from any use as permitted under the Copyright Act 1968 and
More informationGain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services
Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs
More informationWhat do you see as GSMA s
GSMA: Connecting everyone and everything to a better future Mats Granryd, Director General of GSMA, shares his thoughts on the development of 5G, the Internet of Things, and why mobile is so important
More informationRead Me. Intent of the work The Periodic Table. About trust marks and trust frameworks Use of the table to illustrate marks and frameworks Next steps
Read Me Intent of the work The Periodic Table Rows - Clusters - Colors Cau:ons on dynamic nature of table About trust marks and trust frameworks Use of the table to illustrate marks and frameworks Next
More informationCybersecurity in the EU Steve Purser Head of Operational Departments, ENISA Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European
Cybersecurity in the EU Steve Purser Head of Operational Departments, ENISA Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency for Network and Information Security Positioning
More informationIntroduction to the Federal Risk and Authorization Management Program (FedRAMP)
Introduction to the Federal Risk and Authorization Management Program (FedRAMP) 8/2/2015 Presented by: FedRAMP PMO 1 Today s Training Welcome! This training session is part one of the FedRAMP Training
More informationDMR Interoperability Process DMR Association
DMR Interoperability Process DMR Association Introduction This white paper gives the background to the development of the DMR Interoperability Process by the DMR Association, explains the value of the
More informationISO 9001 Auditing Practices Group Guidance on:
International Organization for Standardization International Accreditation Forum Date: 13 January 2016 ISO 9001 Auditing Practices Group Guidance on: Expected Outcomes The expected outcomes documents (given
More informationMutual Recognition Agreement/Arrangement: General Introduction, Framework and Benefits
Conformity and Interoperability Training for SADC Region on Type Approval testing for Mobile Terminals, Homologation Procedures and Market Surveillance Mutual Recognition Agreement/Arrangement: General
More informationFrequently Asked Questions
December 2001 Introduction International Standard ISO/IEC 17799:2000 Information Security Management, Code of Practice for Information Security Management Frequently Asked Questions The National Institute
More informationWorkday s Robust Privacy Program
Workday s Robust Privacy Program Workday s Robust Privacy Program Introduction Workday is a leading provider of enterprise cloud applications for human resources and finance. Founded in 2005 by Dave Duffield
More informationInteragency Advisory Board Meeting Agenda, August 25, 2009
Interagency Advisory Board Meeting Agenda, August 25, 2009 1. Opening Remarks 2. Policy, process, regulations, technology, and infrastructure to employ HSPD-12 in USDA (Owen Unangst, USDA) 3. Policy and
More informationPRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser. CSP2015 Brussels /
PRISMACLOUD Privacy and Security Maintaining Services in the Cloud Thomas Loruenser CSP2015 Brussels / 29.04.2015 Challenges for future ICT Cloud computing will be at the heart of future ICT systems The
More informationFederated Access. Identity & Privacy Protection
Federated Access Identity & Privacy Protection Presented at: Information Systems Security Association-Northern Virginia (ISSA-NOVA) Chapter Meeting Presented by: Daniel E. Turissini Board Member, Federation
More informationNew International Health and Safety Standard ISO 45001
New International Health and Safety Standard ISO 45001 By Mr. Coleman Tse, Sales & Marketing Director, BSI Hong Kong 4/24/2015 Who is BSI? Royal Charter Status focused on the development of standards,
More informationehealth in the implementa,on of the cross border direc,ve: role of the ehealth Network 26th February 2012
ehealth in the implementa,on of the cross border direc,ve: role of the ehealth Network 26th February 2012 Agenda EU in health Ehealth in the EU ehealth Network ehealth High- Level Governance Ini,a,ve Goals
More informationSingapore s vcargo Cloud signs Cooperation Agreement with Russia s RSTradehouse to expand trade opportunities between Russia and Singapore companies
Singapore s vcargo Cloud signs Cooperation Agreement with Russia s RSTradehouse to expand trade opportunities between Russia and Singapore companies Dr Sergey Pronin, CEO of RSTradehouse (front left),
More informationETSI European CA DAY TRUST SERVICE PROVIDER (TSP) CONFORMITY ASSESSMENT FRAMEWORK. Presented by Nick Pope, ETSI STF 427 Leader
ETSI European CA DAY TRUST SERVICE PROVIDER (TSP) CONFORMITY ASSESSMENT FRAMEWORK Presented by Nick Pope, ETSI STF 427 Leader ETSI 2012 All rights reserved Topics Background ETSI Activities / Link to Mandate
More informationEmerging Risks in Emerging Payments
CTIA- The Wireless Association Presentation for Federal Reserve Bank Emerging Risks in Emerging Payments November, 15, 2010 Atlanta, GA Kate Kingberger Director, Wireless Internet Development CTIA- The
More informationIssues in Assessing Commercial Certification Service Trust
The Open Group Security Program Group Building Trust on the Net ---- San Diego -- April 30, 1998 Issues in Assessing Commercial Certification Service Trust Michael S. Baum, J.D., M.B.A. VP, Practices &
More informationNew cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017
in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017 European Union Agency for Network and Information Security Positioning ENISA activities CAPACITY Hands on activities POLICY Support MS & COM
More informationDirect, DirectTrust, and FHIR: A Value Proposition
Direct, DirectTrust, and FHIR: A Value Proposition August 10, 2017 Authors: Grahame Grieve, HL7 Product Director for FHIR; David Kibbe, Luis Maas, Greg Meyer, and Bruce Schreiber, members of the DirectTrust
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationInteragency Advisory Board Meeting Agenda, Wednesday, December 5, 2012
Interagency Advisory Board Meeting Agenda, Wednesday, December 5, 2012 1. Opening Remarks 2. The State Identity Credential and Access Management Guidance and Roadmap (SICAM) (Chad Grant, NASCIO) 3. PIV
More informationOracle Buys Corente. Extends Oracle s Virtualization Capabilities with Leading Software-Defined Networking Technology to Deliver Cloud Services
Oracle Buys Corente Extends Oracle s Virtualization Capabilities with Leading Software-Defined Networking Technology to Deliver Cloud Services March 5, 2014 Oracle is currently reviewing the existing Corente
More informationScaling Interoperable Trust through a Trustmark Marketplace
Scaling Interoperable Trust through a Marketplace John Wandelt Georgia Tech Research Institute This work was performed under the following financial assistance award 70NANB13H189 from the U.S. Department
More informationAccreditation Process. Trusted Digital Identity Framework February 2018, version 1.0
Accreditation Process Trusted Digital Identity Framework February 2018, version 1.0 Digital Transformation Agency This work is copyright. Apart from any use as permitted under the Copyright Act 1968 and
More informationCon$nuous Audi$ng and Risk Management in Cloud Compu$ng
Con$nuous Audi$ng and Risk Management in Cloud Compu$ng Marcus Spies Chair of Knowledge Management LMU University of Munich Scien$fic / Technical Director of EU Integrated Research Project MUSING Cloud
More informationGovernment support for Industry Consortia and why it matters. IIS/O5 hosted by DIACC, Ottawa November 2, 2016
Government support for Industry Consortia and why it matters IIS/O5 hosted by DIACC, Ottawa November 2, 2016 Setting the scene Canada has competitive advantage in digital identity (but let s not talk about
More informationThursday, May 15. Track D Security & Access Control
Thursday, May 15 Track D Security & Access Control Session: PKI Logical Access Technology & Applications Time: 10:15 AM 12:00 PM Room: W204 D Moderator: Steve Howard VP, Business Development, Identity
More informationHow to return control over user data back to the user The rethink framework
How to return control over user data back to the user The rethink framework Anastasius Gavras Eurescom GmbH Online Webinar 21. June 2017 This project has received funding from the European Union s Horizon
More informationThe AAF - Supporting Greener Collaboration
SPUSC 2008 SOUTH PACIFIC USER SERVICES CONFERENCE The AAF - Supporting Greener Collaboration Stuart Allen MAMS MELCOE Macquarie University sallen@melcoe.mq.edu.au What is the AAF? The Australian Access
More informationThe Role of SANAS in Support of South African Regulatory Objectives. Mr. Mpho Phaloane South African National Accreditation System
The Role of SANAS in Support of South African Regulatory Objectives Mr. Mpho Phaloane South African National Accreditation System Outline of Presentation INTRODUCTION STATUS OF SANAS TECHNICAL INFRASTRUCTURE
More informationSmart Card Alliance Update. Update to the Interagency Advisor Board (IAB) June 27, 2012
Smart Card Alliance Update Update to the Interagency Advisor Board (IAB) June 27, 2012 Industry s Access Control Payments (NEW) Mobile & NFC Identity Industry s Healthcare Transportation Access Control
More informationDeliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift
Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) Version 1.0 Author: Bharadwaj Pulugundla (Verizon) 25.10.2015 Table of content 1. Introduction... 3
More informationWay to new challenges
Way to new challenges Yves Vandermeer MSC Computer Forensics and Cybercrime Investigations PhD researcher yves.vandermeer@ When? Since 2001, informal working group starting with a few members from EU Law
More information