OASIS Standards Development Supporting Identity Management, Privacy and Trust in Cloud Computing Services

Size: px
Start display at page:

Download "OASIS Standards Development Supporting Identity Management, Privacy and Trust in Cloud Computing Services"

Transcription

1 OASIS Standards Development Supporting Identity Management, Privacy and Trust in Cloud Computing Services John Sabo Director, Global Government Relations Chair, OASIS IDtrust Member Section Steering Committee

2 Background OASIS - Not-for-profit consortium Founded in 1993 as SGML Open Global representation 5,000+ participants including: 600+ organizations & individual members In 100+ countries IDtrust Member Section

3 Cloud Computing: Trust Challenges: Cloud Computing Networked Health IT Smart Grid

4 World Economic Forum 2010 Study on Global Cloud Computing..Deployment Economic Benefits Entrepreneurship; create new businesses, jobs Platform for innovation; accelerate innovation Increase IT efficiency and IT flexibility Business/technology leapfrogging opportunities in developing countries But Major Barriers Privacy (63%) Data governance (e.g. data ownership, cross-border data transfer, etc. (56%) Security (50%) Source: The World Economic Forum - Used with Permission

5 Health IT - Health Information Exchange Functional and Roles Diagram Business Intelligence

6 Smart Grid - NIST Smart Grid Conceptual Model Source: 27 NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0

7 Trust in the Cloud OASIS Standards as Building Blocks

8 Identity Management 2010 Key Management Interoperability Protocol (KMIP) Chairs: Robert Griffin, RSA Subhash Sankuratripati, NetApp

9 KMIP: Single Protocol Supporting Enterprise Cryptographic Environments and Expandable to Cloud Environments Enterprise Cryptographic Environments Production Database Portals Collaboration & Content Mgmt Systems LAN VPN File Server WAN Disk Arrays Backup System Replica CRM Enterprise Applications ecommerce Applications Backup Disk Staging Business Analytics Dev/Test Obfuscation Backup Tape Key Management Interoperability Protocol Enterprise Key Management

10 Infrastructure Entity Identification in Cloud Infrastructures KMIP to low-end Residential Meter KMIP to Commercial Meter KMIP to Industrial Meter Utility

11 OASIS Digital Signature Services extended Chairs: Juan Carlos Cruellas, Departamento de Arquitectura de Computadores, Univ Politecnica de Cataluna Stefan Drees, Individual Member

12 DSS-X overview Profile for requesting generation and/or verification of visible signatures Profile for generation of a multi-signature verification report providing detailed information on the signature verification process Profile for handling of signature and service policy Profile for supporting centralized encryption and decryption services ebxml Messaging Transport Binding for DSS Guidance: cross-matrix for existing profiles joint usage

13 Current status of specifications DSS-X would like to complete the production of current work during 2011 Contacts between OASIS and ETSI to jointly organize a formal remote interoperability event. DSS-X TC members are completing a the first version of the test suite. ETSI would provide a portal supporting the remote interoperability events Initial plans: aiming for the first half of 2011

14 Extensible Resource Identifier(XRI) Chairs: Peter Davis, NeuStar Drummond Reed, XDI.org

15 The Problem Space The XRI TC addresses the need for: URI-compatible structured identifiers on the Web Standard formats for metadata discovery XRI structured identifiers provide the ability to share semantics across domains, applications, schemas, and ontologies XRD (Extensible Resource Descriptor) documents address the problem of simple, standard resource discovery across the Web

16 Status XRI 3.0 is currently a stable Working Draft XRD 1.0 became an OASIS Standard on November 1 Milestones Advance XRI 3.0 To Committee Draft in Q To Committee Specification in Q 2011 Publish JRD 1.0 (JSON version of XRD 1.0) in 2011

17 XRI Data Interchange (XDI) Chairs: Bill Barnhill, Booz Allen Hamilton Drummond Reed, XDI.org

18 The Problem Space XDI addresses the need for a generalized semantic data interchange protocol Such a protocol requires: A standard discovery mechanism for endpoints A standard addressable Resource Description Framework (RDF) graph format for data A standard format for bi-directional linking of this data A standard format for authorization and fine-grained data sharing controls A standard set of mechanisms for maintaining trust

19 Status We have working experimental XDI serialization formats and messaging implementations (XDI4J) First drafts of XDI Addressing and Graph Model and XDI Serialization expected by mid-january 2011 Milestones Near Term Working Drafts of core specs by Q Start holding interop tests by mid-year Finalized base 1.0 specs by end of 2011 Longer Term XDI Context Discovery XDI Queries XDI Dictionaries And more For full list see

20 Identity in the Cloud Technical Committee (IDCloud TC) Chairs: Anil Saldhana, Red Hat Anthony Nadalin, Microsoft

21 Cloud Identity Standardization Oasis IDCloud TC Charter Three Stages 1: Use Cases Formalization 2: Gap Analysis - current IDM standards 3: Profiles of use cases Oasis IDCloud TC Charter Secondary Objectives Don't reinvent the wheel (or new standards) Strong Liaison relationship with other standards groups Feed gaps back to working groups Geneva, 6-7 December 2010 Addressing security challenges on a global scale 21

22 Cloud Identity Standardization Oasis IDCloud Use Case Categories Infrastructure Trust Establishment Infrastructure Identity Management Federated Identity Management Authentication (SSO etc) Authorization Account/Attribute Management Security Tokens Audit and Compliance 22

23 Open Reputation Management Systems Technical Committee (ORMS TC) Chairs: Mahalingam Mani, Avaya Nat Sakimura, Nomura Research Institute (NRI)

24 ORMS Overview Users are placing new emphasis for developing reputation mechanisms for electronics based communities. The use of reputation systems has been proposed for various applications such as validating the trustworthiness of web sites, blogs, events, products, companies, etc. Reputation reflects the opinions about an entity, from others and is one of the factors upon which trust can be based through the use of verifiable claims. Reputation changes with time and is used within a context. Trust and reputation are related to a context. Focus on details about how it is obtained, calculated, in what context - Interoperability and expression (e.g., score normalization, distribution notation etc.) and protocol

25 Privacy Management Reference Model Technical Committee (PMRM TC) Chairs: John Sabo, CA Technologies Dr. Michael Willett, ISTPA

26 PMRM Technical Committee OASIS PMRM TC formally announced June 27 first meeting September 8 Face to Face Informal Meeting September 29 ISTPA contributed its PMRM v2.0 to the TC Deliverables include the Reference Model one or more use cases utilizing the PMRM one or more formal methodologies for expressing use cases profiles of the PMRM applied to selected specific environments (such as Cloud Computing, Health IT, e-gov, and/or the Smart Grid)

27 Reference Model Components Set of 10 privacy services requirements derived from privacy principles/practices/policies Service definitions Set of unique functions for each service Syntax for invoking services Generic use case Linkages to security services

28 Where the Reference Model Fits 2

29 In Summary. OASIS standards development contributing to security, privacy and trust in cloud computing environments

Making Privacy Operational

Making Privacy Operational Making Privacy Operational Introduction to the Privacy Management Reference Model John Sabo Director, Global Government relations CA, Inc. and President, ISTPA john.t.sabo@ca.com Michael Willett President,

More information

Key Management Interoperability Protocol (KMIP)

Key Management Interoperability Protocol (KMIP) www.oasis-open.org Management Interoperability Protocol (KMIP) April 2 nd, 2009 1 Agenda The Need for Interoperable Management KMIP Overview KMIP Specification KMIP Use Cases 2 The Need for Interoperable

More information

Identity in the Cloud PaaS Profile Version 1.0

Identity in the Cloud PaaS Profile Version 1.0 Identity in the Cloud PaaS Profile Version 1.0 Committee Note Draft 02 / Public Review Draft 02 16 September 2013 Work Product URIs This is a Non-Standards Track Work Product. The patent provisions of

More information

Identity in the Cloud PaaS Profile Version 1.0

Identity in the Cloud PaaS Profile Version 1.0 Identity in the Cloud PaaS Profile Version 1.0 Committee Note Draft 01 / Public Review Draft 01 29 April 2013 Work Product URIs This is a Non-Standards Track Work Product. The patent provisions of the

More information

Identity in the Cloud Outsourcing Profile Version 1.0

Identity in the Cloud Outsourcing Profile Version 1.0 Identity in the Cloud Outsourcing Profile Version 1.0 Committee Note 01 05 August 2013 Specification URIs This version: http://docs.oasis-open.org/id-cloud/idcloudoutsourcing/v1.0/cn01/idcloud-outsourcing-v1.0-cn01.doc

More information

Privacy By Design: Privacy smart from the start. Agenda. 1. About Deloitte. 2. Privacy Incidents Around the World. 3. Privacy Smart from the Start

Privacy By Design: Privacy smart from the start. Agenda. 1. About Deloitte. 2. Privacy Incidents Around the World. 3. Privacy Smart from the Start Privacy By Design: Privacy smart from the start. 13 June 2012 Peter Koo Partner, Enterprise Risk Services Deloitte Touche Tohmatsu Agenda 1. About Deloitte 2. Privacy Incidents Around the World 3. Privacy

More information

The Identity Web An Overview of XNS and the OASIS XRI TC

The Identity Web An Overview of XNS and the OASIS XRI TC The Identity Web An Overview of XNS and the OASIS XRI TC XML WG December 17, 2002 Marc LeMaitre VP Technology Strategy OneName Corporation Goals of this presentation Introduce the idea of the Identity

More information

United States Government Cloud Standards Perspectives

United States Government Cloud Standards Perspectives United States Government Cloud Standards Perspectives in the context of the NIST initiative to collaboratively build a USG Cloud Computing Technology Roadmap NIST Mission: To promote U.S. innovation and

More information

Multi-Vendor Key Management with KMIP

Multi-Vendor Key Management with KMIP Multi-Vendor Key Management with KMIP Tim Hudson CTO & Technical Director tjh@cryptsoft.com 1 Abstract Practical experience from implementing KMIP and from deploying and interoperability testing multiple

More information

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW Decentralized platform for coordination and administration of healthcare and benefits ENABLING TECHNOLOGIES Blockchain Distributed ledgers Smart Contracts Relationship

More information

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure Change Control Date Version Description of changes 15-December- 2016 1-December- 2016 17-March- 2016 4-February- 2016 3-February-

More information

Who s Protecting Your Keys? August 2018

Who s Protecting Your Keys? August 2018 Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and

More information

Enterprise Key Management Infrastructure: Understanding them before auditing them. Arshad Noor CTO, StrongAuth, Inc. Chair, OASIS EKMI-TC

Enterprise Key Management Infrastructure: Understanding them before auditing them. Arshad Noor CTO, StrongAuth, Inc. Chair, OASIS EKMI-TC Enterprise Key Management Infrastructure: Understanding them before auditing them Arshad Noor CTO, StrongAuth, Inc. Chair, OASIS EI-TC Agenda What is an EI? Components of an EI Auditing an EI ISACA members

More information

Mobile and Secure Healthcare: Encrypted Objects and Access Control Delegation

Mobile and Secure Healthcare: Encrypted Objects and Access Control Delegation Mobile and Secure Healthcare: Encrypted Objects and Access Control Delegation PRESENTATION TITLE GOES HERE January 28, 206 SNIA Presenters Alex McDonald Chair - SNIA Cloud Storage NetApp Martin Rosner

More information

ONEM2M INDUSTRY DAY ALAN SOLOWAY, QUALCOMM. 12 July 2017

ONEM2M INDUSTRY DAY ALAN SOLOWAY, QUALCOMM. 12 July 2017 ONEM2M INDUSTRY DAY ALAN SOLOWAY, QUALCOMM 12 July 2017 Time Isolated Aggregated Massively Connected Cloud / Data Centres Rich Devices / Gateways Constrained Devices The architecture will need to achieve

More information

Key Management Interoperability Protocol Crypto Profile Version 1.0

Key Management Interoperability Protocol Crypto Profile Version 1.0 Key Management Interoperability Protocol Crypto Profile Version 1.0 Working Draft 0708 25 7 NovemberOctober 2012 Technical Committee: OASIS Key Management Interoperability Protocol (KMIP) TC Chairs: Robert

More information

Introduction of the Industrial Internet Consortium. May 2016

Introduction of the Industrial Internet Consortium. May 2016 Introduction of the Industrial Internet Consortium May 2016 An Open Membership Consortium now 250 companies strong May 26, 2016 2 IIC Founders, Contributing Members, & Large Industry Members IIC Founding

More information

einfrastructures Concertation Event

einfrastructures Concertation Event einfrastructures Concertation Event Steve Crumb, Executive Director December 5, 2007 OGF Vision & Mission Our Vision: The Open Grid Forum accelerates grid adoption to enable scientific discovery and business

More information

Security Assertions Markup Language (SAML)

Security Assertions Markup Language (SAML) Security Assertions Markup Language (SAML) The standard XML framework for secure information exchange Netegrity White Paper PUBLISHED: MAY 20, 2001 Copyright 2001 Netegrity, Inc. All Rights Reserved. Netegrity

More information

OSIS Open Source Identity Systems

OSIS Open Source Identity Systems OSIS Open Source Identity Systems Overview, Purposes, Directions RSA Pre-conference Workshop Harnessing the Power of Digital Identity: 2009 Dale Olds Steward of OSIS Distinguished Engineer at Novell Road

More information

Key Management Death Match?

Key Management Death Match? t Death Match? Marc Massar, CISSP, NSA-IAM DEEPSEC IDSC2009 Competing KM Standards Technical Deep Dive Introduction 2 The Problem Why So Many t Products? More Problems Interoperability The Contenders Details

More information

National Identity Exchange Federation. Terminology Reference. Version 1.0

National Identity Exchange Federation. Terminology Reference. Version 1.0 National Identity Exchange Federation Terminology Reference Version 1.0 August 18, 2014 Table of Contents 1. INTRODUCTION AND PURPOSE... 2 2. REFERENCES... 2 3. BASIC NIEF TERMS AND DEFINITIONS... 5 4.

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques

More information

Fujitsu World Tour 2018

Fujitsu World Tour 2018 Fujitsu World Tour 2018 May 30, 2018 #FujitsuWorldTour 1 Copyright 2018 FUJITSU Security and Privacy of Big Data A NIST Perspective Arnab Roy Fujitsu Laboratories of America Co-Chair, NIST Big Data WG:

More information

National Institute of Standards and Technology

National Institute of Standards and Technology National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through

More information

The current status of Esi TC and the future of electronic signatures

The current status of Esi TC and the future of electronic signatures SG&A ETSI FUTURE WORKSHOP Sophia Antipolis, 16th January 2006 The current status of Esi TC and the future of electronic signatures Riccardo Genghini, Chairman of Etsi Esi TC riccardo.genghini@sng.it The

More information

Introduction to OASIS

Introduction to OASIS Introduction to OASIS November 2002 Karl Best OASIS Director of Technical Operations Overview OASIS is a member-led consortium dedicated to building systems interoperability specifications Member-elected

More information

This is the Next Industrial Revolution: The Industrial Internet. 8 February 2017

This is the Next Industrial Revolution: The Industrial Internet. 8 February 2017 This is the Next Industrial Revolution: The Industrial Internet 8 February 2017 A fundamental new rule for business is that the Internet changes everything. -Bill Gates, 1999 Or has it? February 13, 2017

More information

LXI Technical Committee Overview

LXI Technical Committee Overview LXI Technical Committee Overview David Owen Technical Committee Chair Technical Committee (TC) Responsible for the creation and maintenance of the LXI standard Managed by the TC Chair reporting to the

More information

PKI and FICAM Overview and Outlook

PKI and FICAM Overview and Outlook PKI and FICAM Overview and Outlook Stepping Stones 2001 FPKIPA Established Federal Bridge CA established 2003 E-Authentication Program Established M-04-04 E-Authentication Guidance for Federal Agencies

More information

On the Leading Edge: The National Electrical Infrastructure and Smart Grid

On the Leading Edge: The National Electrical Infrastructure and Smart Grid On the Leading Edge: The National Electrical Infrastructure and Smart Grid Paul A. Molitor Director, Smart Grid National Electrical Manufacturers Association (NEMA) Agenda Smart Grid in the United States

More information

Robert Brammer. Senior Advisor to the Internet2 CEO Internet2 NET+ Security Assessment Forum. 8 April 2014

Robert Brammer. Senior Advisor to the Internet2 CEO Internet2 NET+ Security Assessment Forum. 8 April 2014 Robert Brammer Senior Advisor to the Internet2 CEO rfbtech@internet2.edu Internet2 NET+ Security Assessment Forum 8 April 2014 INTERNET2 NET+ Security Initiative Primary objective -- develop guidance to

More information

OASIS Organization for the Advancement of Structured Information Standards Emergency Management Technical Committee (EMTC)

OASIS Organization for the Advancement of Structured Information Standards Emergency Management Technical Committee (EMTC) OASIS Organization for the Advancement of Structured Information Standards Emergency Management Technical Committee (EMTC) Emergency Interoperability Consortium January 2016 1. CAP Workshop 2015: Rome,

More information

Electronic Commerce Working Group report

Electronic Commerce Working Group report RESTRICTED CEFACT/ECAWG/97N012 4 December 1997 Electronic Commerce Ad hoc Working Group (ECAWG) Electronic Commerce Working Group report SOURCE: 10 th ICT Standards Board, Sophia Antipolis, 4 th November

More information

Welcome to the Industrial Internet Forum

Welcome to the Industrial Internet Forum Welcome to the Industrial Internet Forum Dr. Richard Soley, Executive Director Industrial Internet Consortium Keio University June 3, 2016 The Industrial Internet is leading the next economic revolution

More information

Security Standardization

Security Standardization ISO-ITU ITU Cooperation on Security Standardization Dr. Walter Fumy Chairman ISO/IEC JTC 1/SC 27 Chief Scientist, Bundesdruckerei GmbH, Germany 7th ETSI Security Workshop - Sophia Antipolis, January 2012

More information

Direct, DirectTrust, and FHIR: A Value Proposition

Direct, DirectTrust, and FHIR: A Value Proposition Direct, DirectTrust, and FHIR: A Value Proposition August 10, 2017 Authors: Grahame Grieve, HL7 Product Director for FHIR; David Kibbe, Luis Maas, Greg Meyer, and Bruce Schreiber, members of the DirectTrust

More information

HEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT

HEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT HEALTH INFORMATION INFRASTRUCTURE PROJECT: PROGRESS REPORT HCQI Expert Group Meeting 7-8 November 2013 Agenda to improve health information infrastructure» In 2010, health ministers called for improvement

More information

Quick Guide to CAM Dictionaries

Quick Guide to CAM Dictionaries Quick Guide to CAM Dictionaries Building and using canonical XML components dictionaries for CAM Author: David RR Webber Chair OASIS CAM TC April, 2010 http://www.oasis-open.org/committees/cam 1 June,

More information

Abstract Code-Signing Profile of the OASIS Digital Signature Services

Abstract Code-Signing Profile of the OASIS Digital Signature Services 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 Abstract Code-Signing Profile of the OASIS Digital Signature Services OASIS Standard 11 April 2007 Specification

More information

INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD

INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD Jeffy Mwakalinga, Prof Louise Yngström Department of Computer and System Sciences Royal Institute of Technology / Stockholm University

More information

W3C Web of Things. Mohammed Dadas - Orange

W3C Web of Things. Mohammed Dadas - Orange W3C Web of Things Mohammed Dadas - Orange ETSI M2M Workshop -December 10 th, 2014 Agenda Orange today What is W3C Web of Things Interest Group overview Conclusion Orange today Orange in figures Orange

More information

ITU-T SG 17 Q10/17. Trust Elevation Frameworks

ITU-T SG 17 Q10/17. Trust Elevation Frameworks ITU-T SG 17 Q10/17 Trust Elevation Frameworks Abbie Barbir, Ph.D. ITU-T SG 17 Q10 Rapporteur Martin Euchner SG 17 Advisor ITU Workshop on "Future Trust and Knowledge Infrastructure July 1 2016 Contents

More information

Roles and Responsibilities in the context of Ontario s Smart Grid. Ontario Smart Grid Forum Monday, February 22 nd 2010

Roles and Responsibilities in the context of Ontario s Smart Grid. Ontario Smart Grid Forum Monday, February 22 nd 2010 Roles and Responsibilities in the context of Ontario s Smart Grid Ontario Smart Grid Forum Monday, February 22 nd 2010 About This Presentation This presentation is intended to foster a discussion about

More information

Leveraging the LincPass in USDA

Leveraging the LincPass in USDA Leveraging the LincPass in USDA Two Factor Authentication, Digital Signature, Enterprise VPN, eauth Single Sign On February 2010 USDA Takes Advantage of the LincPass USDA is taking advantage of the LincPass

More information

Privacy and Security in Smart Grids

Privacy and Security in Smart Grids Faculty of Computer Science, Institute of Systems Architecture, Chair for Privacy and Data Security Privacy and Security in Smart Grids The German Approach Sebastian Clauß, Stefan Köpsell Dresden, 19.10.2012

More information

IEC TC100. Presenting Ecma & a Collaboration work with IEC TC100. Kei Yamashita, TC31 Vice Chair Brussels, Belgium, 22 May 2018

IEC TC100. Presenting Ecma & a Collaboration work with IEC TC100. Kei Yamashita, TC31 Vice Chair Brussels, Belgium, 22 May 2018 IEC TC100 Presenting Ecma & a Collaboration work with IEC TC100 Kei Yamashita, TC31 Vice Chair Brussels, Belgium, 22 May 2018 Rue du Rhône 114- CH-1204 Geneva - T: +41 22 849 6000 - F: +41 22 849 6001

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Multimedia framework (MPEG-21) Part 21: Media Contract Ontology

ISO/IEC INTERNATIONAL STANDARD. Information technology Multimedia framework (MPEG-21) Part 21: Media Contract Ontology INTERNATIONAL STANDARD ISO/IEC 21000-21 First edition 2013-07-01 Information technology Multimedia framework (MPEG-21) Part 21: Media Contract Ontology Technologies de l'information Cadre multimédia (MPEG-21)

More information

Technologies for Securing the Networked Supply Chain. Alex Deacon Advanced Products and Research Group VeriSign, Inc.

Technologies for Securing the Networked Supply Chain. Alex Deacon Advanced Products and Research Group VeriSign, Inc. Technologies for Securing the Networked Supply Chain Alex Deacon Advanced Products and Research Group VeriSign, Inc. Agenda Introduction Security challenges Security technologies in use today Applying

More information

Data Governance for the Connected Enterprise

Data Governance for the Connected Enterprise Data Governance for the Connected Enterprise Irene Polikoff and Jack Spivak, TopQuadrant Inc. November 3, 2016 Copyright 2016 TopQuadrant Inc. Slide 1 Data Governance for the Connected Enterprise Today

More information

Séminaire sur la Certification Electronique

Séminaire sur la Certification Electronique Séminaire sur la Certification Electronique Algiers Algeria, 8-9 December, 2009 International Telecommunication Arab Regional Office Assisting Governments in Developing e-commerce Ecosystems: A Synthesis

More information

Securing the Cloud Today: How do we get there?

Securing the Cloud Today: How do we get there? Samson Tai, Chief Technologist, IBM Innovation Network Securing the Cloud Today: How do we get there 9/15/2009 What is Cloud Computing Cloud is a new consumption and delivery model for many IT-based services,

More information

ETSI Electronic Signatures and Infrastructures (ESI) TC

ETSI Electronic Signatures and Infrastructures (ESI) TC ETSI Electronic Signatures and Infrastructures (ESI) TC Presented by Andrea Caccia, ETSI/ESI liaison to ISO SC27 ( a.caccia @ kworks.it ) ETSI 2011. All rights reserved ETSI TC ESI - Electronic Signatures

More information

NIEM Update. Mike Hulme, NIEM Technical Architecture Committee Co-chair and Unisys Solution Architect. Nlets Implementers Workshop

NIEM Update. Mike Hulme, NIEM Technical Architecture Committee Co-chair and Unisys Solution Architect. Nlets Implementers Workshop NIEM Update Mike Hulme, NIEM Technical Architecture Committee Co-chair and Unisys Solution Architect Nlets Implementers Workshop 8/31/2016 Topics NIEM 3.2 NIEM 4.0 niem.github.io Enhanced code list capabilities

More information

DMTF Technologies and Alliances Update Hemal Shah, DMTF Senior VP of Technology & TC Chair Broadcom Limited John Leung, DMTF VP of Alliances Intel

DMTF Technologies and Alliances Update Hemal Shah, DMTF Senior VP of Technology & TC Chair Broadcom Limited John Leung, DMTF VP of Alliances Intel DMTF Technologies and Alliances Update Hemal Shah, DMTF Senior VP of Technology & TC Chair Broadcom Limited John Leung, DMTF VP of Alliances Intel Corporation July 26, 2017 Executive Summary WHO WHAT WHY

More information

Semantic Interoperability of Basic Data in the Italian Public Sector Giorgia Lodi

Semantic Interoperability of Basic Data in the Italian Public Sector Giorgia Lodi Semantic Interoperability of Basic Data in the Italian Public Sector Giorgia Lodi SEMIC conference 2013 21 June 2013 Dublin (AgID) Created last year, AgID is a public body that merged three different existing

More information

Introduction of ISO/IEC JTC1 SC 38 & its standard work on cloud computing. Junfeng ZHAO

Introduction of ISO/IEC JTC1 SC 38 & its standard work on cloud computing. Junfeng ZHAO Introduction of ISO/IEC JTC1 SC 38 & its standard work on cloud computing Junfeng ZHAO 2011.3.23 Agenda Introduction of ISO/IEC JTC1 /SC 38 Introduction of ISO/IEC JTC1 /SC 38 SG1 Introduction of On-going

More information

OpenFog Reference Architecture. Presented by Dr. Maria Gorlatova OpenFog Consortium Communications Working Group Co-chair, Technical Committee Member

OpenFog Reference Architecture. Presented by Dr. Maria Gorlatova OpenFog Consortium Communications Working Group Co-chair, Technical Committee Member OpenFog Reference Architecture Presented by Dr. Maria Gorlatova OpenFog Consortium Communications Working Group Co-chair, Technical Committee Member My background Associate Research Scholar at Princeton

More information

eid Applications Cross Border Authentication

eid Applications Cross Border Authentication eid Applications Cross Border Authentication 07 November 2017 Mr. Gary Yeung, MH Hon Secretary Chairman, eid Committee Smart City Consortium Smart City Consortium Background What is Smart City Consortium?

More information

SAML V2.0 Profile for Token Correlation

SAML V2.0 Profile for Token Correlation SAML V2.0 Profile for Token Correlation Committee Draft 01 28 June 2010 Specification URIs: This Version: 0.1 Previous Version: 0 Latest Version: Technical Committee: OASIS Security Services TC Chair(s):

More information

INSPIRE status report

INSPIRE status report INSPIRE Team INSPIRE Status report 29/10/2010 Page 1 of 7 INSPIRE status report Table of contents 1 INTRODUCTION... 1 2 INSPIRE STATUS... 2 2.1 BACKGROUND AND RATIONAL... 2 2.2 STAKEHOLDER PARTICIPATION...

More information

Industry 4.0 and the importance of norms and standards within collaborative, digitized process networks

Industry 4.0 and the importance of norms and standards within collaborative, digitized process networks ProStep ivip Symposium 2017 Industry 4.0 and the importance of norms and standards within collaborative, digitized process networks DIN e. V., Dr. Michael Stephan, Dr. Stefan Weisgerber Essen, 2017-05-17,

More information

ETSI TC ESI WORK ON ELECTRONIC REGISTERED DELIVERY SERVICES AND REGISTERED ELECTRONIC MAIL

ETSI TC ESI WORK ON ELECTRONIC REGISTERED DELIVERY SERVICES AND REGISTERED ELECTRONIC MAIL ETSI TC ESI WORK ON ELECTRONIC REGISTERED DELIVERY SERVICES AND REGISTERED ELECTRONIC MAIL Luca Boldrin, Juan Carlos Cruellas, Santino Foti, Paloma Llaneza, Kornél Réti Agenda STF 523 concept and context

More information

HIPAA Compliance Checklist

HIPAA Compliance Checklist HIPAA Compliance Checklist Hospitals, clinics, and any other health care providers that manage private health information today must adhere to strict policies for ensuring that data is secure at all times.

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-8 Fifth edition 2005-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

eidas Regulation eid and assurance levels Outcome of eias study

eidas Regulation eid and assurance levels Outcome of eias study eidas Regulation eid and assurance levels Outcome of eias study Dr. Marijke De Soete Security4Biz (Belgium) ETSI eidas Workshop 24 June 2015 Sophia Antipolis eidas Regulation Regulation on electronic identification

More information

SG-CG/SGIS SG-CG/SGIS. ETSI Cyber Security Workshop Sophia Antipolis, France, January the 16th, 2013 Jean-Pierre Mennella, Alstom Grid

SG-CG/SGIS SG-CG/SGIS. ETSI Cyber Security Workshop Sophia Antipolis, France, January the 16th, 2013 Jean-Pierre Mennella, Alstom Grid SG-CG/SGIS ETSI Cyber Security Workshop Sophia Antipolis, France, January the 16th, 2013 Jean-Pierre Mennella, Alstom Grid Page 1 CEN/CENELEC/ETSI Smart Grid Co-ordination Group CEN-CENELEC-ETSI 2011 European

More information

Data Security Overview

Data Security Overview Data Security Overview GTUG May 2018 Darren Burkey, Senior PreSales Consultant Atalla darren.burkey@microfocus.com The New Combined Company: built on stability, acquisition and innovation COBOL Network

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-8 Sixth edition 2008-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information

More information

Dictionary Driven Exchange Content Assembly Blueprints

Dictionary Driven Exchange Content Assembly Blueprints Dictionary Driven Exchange Content Assembly Blueprints Concepts, Procedures and Techniques (CAM Content Assembly Mechanism Specification) Author: David RR Webber Chair OASIS CAM TC January, 2010 http://www.oasis-open.org/committees/cam

More information

2 - onem2m Common Architecture for IoT

2 - onem2m Common Architecture for IoT 2 - onem2m Common Architecture for IoT Dr. Mahdi Ben Alaya Founder & CEO, Sensinov benalaya@sensinov.com www.sensinov.com November 14, 2016 M2M world of connected services 2 Introduction Communication

More information

ehealth Architecture (eha) - Ethiopia Experience

ehealth Architecture (eha) - Ethiopia Experience ehealth Architecture (eha) - Ethiopia Experience ETHIOPIA DATA USE PARTNERSHIP (DUP) 23 rd April 2018 Area Administrative units Total Population Ethiopia has its own calendar and alphabet (i.e. it is 2010

More information

Microsoft Azure Security, Privacy, & Compliance

Microsoft Azure Security, Privacy, & Compliance Security, Privacy, & Compliance Andreas Grigull Geschäftsentwicklung Assekuranz Installation von 2000 Servern in 3 Stunden Technology trends: driving cloud adoption BENEFITS Speed Scale Economics Cloud

More information

BACnet Future Directions

BACnet Future Directions Frankfurt 14. - 18.03.2016 BACnet Future Directions H. Michael Newman, Chair BACnet Committee 1987-2000 Logo des Redners Major Areas for Future BACnet Development Improved Integration/Convergence with

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Document Schema Definition Languages (DSDL) Part 3: Rule-based validation Schematron

ISO/IEC INTERNATIONAL STANDARD. Information technology Document Schema Definition Languages (DSDL) Part 3: Rule-based validation Schematron INTERNATIONAL STANDARD ISO/IEC 19757-3 First edition 2006-06-01 Information technology Document Schema Definition Languages (DSDL) Part 3: Rule-based validation Schematron Technologies de l'information

More information

Managing Trust in e-health with Federated Identity Management

Managing Trust in e-health with Federated Identity Management ehealth Workshop Konolfingen (CH) Dec 4--5, 2007 Managing Trust in e-health with Federated Identity Management Dr. rer. nat. Hellmuth Broda Distinguished Director and CTO, Global Government Strategy, Sun

More information

The Business of Identity: Business Drivers and Use Cases of Identity Web Services

The Business of Identity: Business Drivers and Use Cases of Identity Web Services The Business of Identity: Business Drivers and Use Cases of Identity Web Services Roger Sullivan, Vice President, Liberty Alliance Vice President, Oracle Corporation Liberty s Architecture Liberty Identity

More information

Key Management in a System z Enterprise

Key Management in a System z Enterprise IBM Systems IBM z Systems Security Conference Business Security for today and tomorrow > 27-30 September Montpellier Key Management in a System z Enterprise Leo Moesgaard (lemo@dk.ibm.com) Manager of IBM

More information

Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA)

Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA) ขอแค ประมาณ ร ปน นะโม Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA) 1 Government agencies need to develop the Digital Government Master

More information

HITPC Stage 3 Request for Comments Smart Card Alliance Comments January, 14, 2013

HITPC Stage 3 Request for Comments Smart Card Alliance Comments January, 14, 2013 HITPC Stage 3 Request for Comments Smart Card Alliance Comments January, 14, 2013 The Smart Card Alliance hereby submits the following comments regarding the Health Information Technology Policy Committee

More information

The 5G Infrastructure Association

The 5G Infrastructure Association The 5G Infrastructure Association 5G Pan-European Trials Roadmap Dr. Didier Bourse 5G Global Event, 24-25 May 2017, Tokyo 01/06/2017 1 Context and Objectives 5G Pan-European Trials Roadmap Version 1.0

More information

NIEM. National. Information. Exchange Model. NIEM and Information Exchanges. <Insert Picture Here> Deploy. Requirements. Model Data.

NIEM. National. Information. Exchange Model. NIEM and Information Exchanges. <Insert Picture Here> Deploy. Requirements. Model Data. Deploy Requirements National Test NIEM Model Data Information Build Exchange Generate Dictionary Exchange Model XML Exchange Development NIEM and Information Exchanges Overview Public

More information

International Standards and Guidelines Implementation Framework

International Standards and Guidelines Implementation Framework International Standards and Guidelines Implementation Framework (Draft as of February 2017) The draft International Standards and Guidelines Implementation Framework (ISGIF) is prepared to support implementation

More information

Strategies for the Implementation of PIV I Secure Identity Credentials

Strategies for the Implementation of PIV I Secure Identity Credentials Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual

More information

The NIH Collaboratory Distributed Research Network: A Privacy Protecting Method for Sharing Research Data Sets

The NIH Collaboratory Distributed Research Network: A Privacy Protecting Method for Sharing Research Data Sets The NIH Collaboratory Distributed Research Network: A Privacy Protecting Method for Sharing Research Data Sets Jeffrey Brown, Lesley Curtis, and Rich Platt June 13, 2014 Previously The NIH Collaboratory:

More information

NIST Smart Grid Interoperability Framework

NIST Smart Grid Interoperability Framework NIST Smart Grid Interoperability Framework Jerry FitzPatrick National Institute of Standards and Technology (NIST) Gaithersburg, MD 20899 fitzpa@nist.gov 2010 IEEE Power & Energy Society General Meeting

More information

Liferay Security Features Overview. How Liferay Approaches Security

Liferay Security Features Overview. How Liferay Approaches Security Liferay Security Features Overview How Liferay Approaches Security Table of Contents Executive Summary.......................................... 1 Transport Security............................................

More information

Cloud Standards: Vincent Franceschini CTO Intelligent Data Fabrics, Hitachi Data Systems Chairman Emeritus, SNIA

Cloud Standards: Vincent Franceschini CTO Intelligent Data Fabrics, Hitachi Data Systems Chairman Emeritus, SNIA Cloud Standards: Raising PRESENTATION the bar TITLE of completeness GOES HERE Vincent Franceschini CTO Intelligent Data Fabrics, Hitachi Data Systems Chairman Emeritus, SNIA Opening Thoughts Cloud s no

More information

National Identity Exchange Federation. Web Services System- to- System Profile. Version 1.1

National Identity Exchange Federation. Web Services System- to- System Profile. Version 1.1 National Identity Exchange Federation Web Services System- to- System Profile Version 1.1 July 24, 2015 Table of Contents TABLE OF CONTENTS I 1. TARGET AUDIENCE AND PURPOSE 1 2. NIEF IDENTITY TRUST FRAMEWORK

More information

Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS)

Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) This document (IMPS) facilitates an organization to provide relevant information to describe how it fulfils the normative

More information

KMIP Opaque Managed Object Store Profile Version 1.0

KMIP Opaque Managed Object Store Profile Version 1.0 KMIP Opaque Managed Object Store Profile Version 1.0 Committee Specification Draft 01 / Public Review Draft 01 09 January 2014 Specification URIs This version: http://docs.oasis-open.org/kmip/kmip-opaque-obj-profile/v1.0/csprd01/kmip-opaque-obj-profilev1.0-csprd01.doc

More information

Kantara Identity Assurance Framework Catalyzing an Identity Services Marketplace

Kantara Identity Assurance Framework Catalyzing an Identity Services Marketplace Kantara Identity Assurance Framework Catalyzing an Identity Services Marketplace Matthew Gardiner President, Kantara Initiative Director, CA Technologies Agenda What is the Kantara Initiative Kantara Identity

More information

ITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchains risk or mitigation?

ITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchains risk or mitigation? ITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchains risk or mitigation? Patrick Curry OBE CEng Director, BBFA: patrick.curry@bbfa.info Director, Kyckr; patrick.curry@kyckr.com

More information

US Federal PKI Bridge. Ram Banerjee VP Vertical Markets

US Federal PKI Bridge. Ram Banerjee VP Vertical Markets US Federal PKI Bridge Ram Banerjee VP Vertical Markets e-gov and PKI Drivers Government Paperwork Elimination and ESIGN Acts Public Expectations Long-term Cost Savings The Need for Privacy and Security

More information

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

Managing Your Privileged Identities: The Choke Point of Advanced Attacks Managing Your Privileged Identities: The Choke Point of Advanced Attacks Shirief Nosseir EMEA Alliances Director Identity & API Management Tuesday, 16 May 2017 Agenda Why Privileged Access Management Why

More information

Business Technology Briefing: Fear of Flying, And How You Can Overcome It

Business Technology Briefing: Fear of Flying, And How You Can Overcome It Business Technology Briefing: Fear of Flying, And How You Can Overcome It Joseph Tobloski Senior Director for Data & Platforms R&D Accenture Technology Labs Fear of Flying And How You Can Overcome It May

More information

Getting to Grips with Public Key Infrastructure (PKI)

Getting to Grips with Public Key Infrastructure (PKI) Getting to Grips with Public Key Infrastructure (PKI) What is a PKI? A Public Key Infrastructure (PKI) is a combination of policies, procedures and technology that forms a trust infrastructure to issue

More information

Topics of Discussion

Topics of Discussion CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture on NIST Cloud Computing Definition, Standards & Roadmap, Security & Privacy Guidelines Spring 2013 A Specialty Course for Purdue

More information

Input to ORMS TC Definitions and reference model proposals, Use cases. Daniela Bourges Waldegg

Input to ORMS TC Definitions and reference model proposals, Use cases. Daniela Bourges Waldegg Input to ORMS TC Definitions and reference model proposals, Use cases Daniela Bourges Waldegg dbw@zurich.ibm.com Reputation definitions Reputation definitions Reputation is a collective evaluation of an

More information