Privacy with attribute-based credentials ABC4Trust Project. Fatbardh Veseli
|
|
- Kristopher Brown
- 5 years ago
- Views:
Transcription
1 Privacy with attribute-based credentials ABC4Trust Project Fatbardh Veseli Deutsche Telekom Chair for Mobile Business and Multilateral Security Goethe University Frankfurt, Germany 1
2 Overview Motivation Identity Management Issues Privacy-ABCs - Architecture, Concepts and features ABC4Trust Project Overview Standardisation efforts 2
3 Identity Management (IdM) 2 sides of a medal with enormous economic potential ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies Organisations aim to sort out User Accounts in different IT systems Authentication Rights management Access control Unified identities help to ease administration manage customer relations Identity management systems ease single-sign-on by unify accounts solve the problems of multiple passwords People live their life in different roles (professional, private, volunteer) using different identities (pseudonyms): accounts, SIM cards, ebay trade names, chat names, Facebook names, ) Differentiated identities help to protect privacy, especially anonymity personal security/safety enable reputation building at the same time Identity management systems support users using role based identities help to present the right identity in the right context 3
4 Identity Management (IdM) 2 sides of a medal with enormous economic potential ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies People live their life in different roles (professional, private, volunteer) using different identities (pseudonyms): accounts, SIM cards, ebay trade names, chat names, Facebook names, ) Differentiated identities help to protect privacy, especially anonymity personal security/safety enable reputation building at the same time Identity management systems support users using role based identities help to present the right identity in the right context Organisations aim to sort out User Accounts in different IT systems Authentication Rights management Access control Unified identities help to ease administration manage customer relations Identity management systems ease single-sign-on by unify accounts solve the problems of multiple passwords 4
5 Identity Management (IdM) One of many definitions An integrated concept of processes, policies and technologies that enable organizations and individual entities to facilitate and control the use of identity information in their respective relations 5
6 Privacy (and security) issues of typical federated IdM architectures Identity Service Provider (IdSP) Relying Party (RP) trust 4. token response 3. token request 1. request access 2. policy 5. token User 6
7 Partial Identities needed Based on [Clauß, Köhntopp 2001] 7
8 Identity Definition in ISO/IEC to reduce the risk of over-identification Identity (partial identity): Set of attributes related to an entity From A Framework for Identity Management (ISO/IEC 24760) Part 1: Terminology and concepts (IS:2011) Part 2: Reference framework and requirements (CD) Part 3: Practice (WD) [standards.iso.org/ittf/publiclyavailablestandards/index.html, 8
9 Attribute Based Credentials (Privacy-ABCs) Certifying relevant attributes Token issuance and presentation unlinkable Rather coins (that cannot be distinguished) than bank notes (that have a serial number) Users can disclose (minimal) subsets of the encoded claims To respond to unanticipated requests of RPs Without invalidating the token integrity E.g. Certificate for birth date -> Claim for being over 21 Two major approaches and technologies U-Prove (Credentica -> Microsoft) Idemix (IBM) 9
10 Two approaches for Privacy- ABCs Blind Signatures Zero-Knowledge Proofs Issuer Issuer User Verifier User Verifier U-Prove Brands, Paquin et al. Discrete Logs, RSA,.. Idemix (Identity Mixer) Damgard, Camenisch & Lysyanskaya Strong RSA, pairings (LMRS, q-sdh) 10
11 ABC4Trust Objectives A common, unified architecture for ABC systems to enable Comparing their respective features Combining them on common platforms Lock-In free usage of ABC systems Open reference implementations of selected ABC systems Deployments in actual production enabling Minimal disclosure Provision of anonymous feedback to a community proving one is accredited as a member 11
12 ABC4Trust Partners Johann Wolfgang Goethe- Universität Frankfurt, DE Alexandra Institute AS, DK Computer Technology Institute & Press DIOPHANTUS, GR IBM Research - Zurich, CH Miracle A/S, DK Nokia Solutions and Networks, DE Technische Universität Darmstadt, DE Unabhängiges Landeszentrum für Datenschutz, DE Eurodocs AB, SE CryptoExperts SAS, FR Microsoft NV, BE Söderhamn Kommun, SE 12
13 Architecture, entities and features Issuer Revocation Authority Credential Revocation Credential Issuance Revocation info retrieval User Presentation Token Revocation info retrieval Token Inspection Inspector Verifier 13
14 ABC4Trust Pilot Söderhamn: Community Interaction School internal platform for communication among pupils, teachers, and personnel Provide trusted authentication while protecting anonymity Usability: make privacy technology understandable for non-technical users (e.g. pupils) Norrtullskolan School Söderhamn, Sweden 14
15 Söderhamn pilot - Student consultation name = Kari Johannson Grade= 5 Class = 5A Gender = F name =? Grade = 5 Class =? 15
16 ABC4Trust Pilot Patras: Course Rating Course ratings conducted anonymously without learning participants identities Conduct polls based on attendance Verify with anonymous proofs towards untrusted infrastructure Computer Technology Institute Patras, Greece 16
17 Course Evaluation Course = 536 Matriculation nr: 1295 Attendance units: 6 name = Maria Papadopoulou Department = CEI Type = Student Matriculation nr: 1295 name =? Department =? Student = Yes CourseID = 536 #Attendance units > 5 = Yes 17 17
18 Privacy-ABCs and eid eids can be considered as credentials with several attributes. Privacy-ABCs can be used to disclose only some of the attributes.
19 Standardisation relevant projects within ISO/IEC JTC 1/SC A framework for identity Management Anonymous digital signatures Access control framework WG 5 -Identity management and privacy technologies Privacy framework WG 2 Cryptography and security mechanisms Partially anonymous, partially unlinkable authentication Privacy architecture framework Anonymous Entity Authentication 19
20 Conclusions & Outlook ICT and related services are coming ever closer to people. A more privacy friendly Internet requires: Partial Identities and Identifiers Minimum Disclosure Privacy-respecting Attribute Based Credentials ABC4Trust Summit Event: , Brussels, Representation of the State of Hesse fatbardh.veseli@m-chair.de, coord-abc4trust@m-chair.de
21 Back-Up Attribute-based Credentials for Trust
22 Identity Theft (?) 22 22
23 ABC4Trust Project Facts Scheduled duration: November 2010 February 2015 Partners: 12 partners from industry, academia, research centres and data protection authorities Costs: Million ( 8.85 Million EU funded) Funding: The ABC4Trust project receives research funding from the European Union's Seventh Framework Programme under grant agreement n as part of the ICT Trust and Security Research theme. Web Page: Project coordination: Chair of Mobile Business & Multilateral Security Goethe University Frankfurt Frankfurt am Main, Germany contact@abc4trust.eu 23
Introduction and Overview
Attribute-based Credentials for Trust Introduction and Overview Reference Group 1st Meeting Rueschlikon, 2012-02-13/14 Kai Rannenberg (Kai.Rannenberg@m-chair.net) Deutsche Telekom Chair of Mobile Business
More information... Mobile (Telco) Operators and Big Data How to avoid the Big Brother Problem using Partial Identities & Privacy-ABCs
Mobile (Telco) Operators and Big Data How to avoid the Big Brother Problem using Partial Identities & Privacy-ABCs International conference on ISO standards for Information Technologies 2015-02-19 Faculty
More informationAttribute-based Credentials and Partial Identities for a more Privacy Friendly Internet
Attribute-based Credentials and Partial Identities for a more Privacy Friendly Internet Ochrana dát a súkromia v cloudových službách (Normy & technológie pre riadenie a IT prevádzku) Bratislava Bratislava,
More informationPrivacy-respecting Identity Management
Privacy-respecting Identity Management Introduction to ABC4Trust Attribute-based Credentials for Trust Kai Rannenberg (Kai.Rannenberg@m-chair.de) Deutsche Telekom Chair of Mobile Business & Multilateral
More informationIdentity Mixer: From papers to pilots and beyond. Gregory Neven, IBM Research Zurich IBM Corporation
Identity Mixer: From papers to pilots and beyond Gregory Neven, IBM Research Zurich Motivation Online security & trust today: SSL/TLS for encryption and server authentication Username/password for client
More informationD3.1 Scientific comparison of ABC protocols
-Based Credentials for Trust D3.1 Scientific comparison of ABC protocols Part II: Practical comparison Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ahmad Sabouri, Michael Østergaard Pedersen, Jesus Luna
More informationD2.2 - Architecture for Attribute-based Credential Technologies - Final Version
D2.2 - Architecture for Attribute-based Credential Technologies - Final Version Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann, Gregory
More informationWork and Projects in ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy technologies
Work and Projects in ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy technologies 30th Plenary meeting of the Consultative Committee of the Convention for the Protection of Individuals with Regard
More information... European R&D for privacy and identity solutions for the Information Society. High Level Conference eid and Public Registers
European R&D for privacy and identity solutions for the Information Society High Level Conference eid and Public Registers Hradec Králové, 2009-04-06/07 Prof. Dr. Kai Rannenberg Chair of Mobile Business
More informationInformation technology Security techniques A framework for identity management
A framework for identity management (ISO/IEC 24760) Information technology Security techniques A framework for identity management Part 1: Terminology and concepts Part 2: Reference architecture and requirements
More informationD5.1 Scenario Definition for both Pilots
Attribute-Based Credentials for Trust D5.1 Scenario Definition for both Pilots Souheil Bcheri, Norbert Götze, Vasiliki Liagkou, Apostolis Pyrgelis, Christoforos Raptopoulos, Yannis Stamatiou, Katalin Storf,
More informationU-Prove Technology Overview
U-Prove Technology Overview November 2010 TOC Introduction Community Technology Preview Additional Capabilities RSA Demo Conclusion 2 Introduction History U-Prove well established in academia Patent portfolio
More informationIRMA: I Reveal My Attributes
IRMA: I Reveal My Attributes Roland van Rijswijk - Deij roland.vanrijswijk@surfnet.nl rijswijk@cs.ru.nl Project partners 2 What is an attribute? An attribute is a property of a person: Full name Date of
More informationH2.2 - ABC4Trust Architecture for Developers
Attribute-Based Credentials for Trust H2.2 - ABC4Trust Architecture for Developers Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Ioannis Krontiris, Anja Lehmann, Gregory Neven,
More informationIBM Identity Mixer. Introduction Deployment Use Cases Blockchain More Features
Introduction Deployment Use Cases Blockchain More Features IBM Identity Mixer Privacy-preserving identity management and authentication for Blockchain and beyond Dr. Maria Dubovitskaya IBM Research Zurich
More informationAttribute-based Credentials on Smart Cards
Attribute-based Credentials on Smart Cards ir. Pim Vullers p.vullers@cs.ru.nl Privacy & Identity Lab Institute for Computing and Information Sciences Digital Security SaToSS Research Meeting 28th February
More informationProf. Christos Xenakis
From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis H2020 Clustering
More informationProf. Christos Xenakis
From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis SAINT Workshop
More informationPrivacy-ABC Technologies on Mobile Phones
Privacy-ABC Technologies on Mobile Phones Dr. Gert Læssøe Mikkelsen, Alexandra Institute A/S ABC4Trust Summit Event Brussels, January 20, 2015 A research project funded by the European Commission s 7th
More informationIBM Identity Mixer. Authentication without identification. Introduction Demo Use Cases Features Overview Deployment
Introduction Demo Use Cases Features Overview Deployment IBM Identity Mixer Authentication without identification Jan Camenisch, Maria Dubovitskaya, Peter Kalambet, Anja Lehmann, Gregory Neven, Franz-Stefan
More informationIdentity Management Systems An Overview. IST Event 2004 /
IST Event 2004 / 15.11.2004 Marit Hansen / Henry Krasemann Unabhängiges Landeszentrum für Datenschutz // Independent Centre for Privacy Protection Schleswig-Holstein, Germany Overview Identity Management
More informationClimbing Towards Trust, Privacy and Identity Management in Emerging ICT-based Scenarios
Climbing Towards Trust, Privacy and Identity Management in Emerging ICT-based Scenarios First Endeavour: Requirements 26 November 2008 @ ICT 2008, Lyon Katja Liesebach Chair for Mobile Business & Multilateral
More informationA privacy-preserving authentication service using mobile devices
A privacy-preserving authentication service using mobile devices Mihai Togan Security Software Architect certsign Context Mobile devices Present everywhere What to consider High performance Computing power
More informationCryptographic dimensions of Privacy
PRIVACY SUMMIT 2016 The Alain Turing Institute Cryptographic dimensions of Privacy Dr. Jan Camenisch Principle RSM; Member, IBM Academy of Technology IBM Research Zurich @JanCamenisch ibm.biz/jancamenisch
More information1. Publishable Summary
1. Publishable Summary 1.1Project objectives and context Identity management (IdM) has emerged as a promising technology to distribute identity information across security domains. In e-business scenarios,
More informationPanel Privacy Management and Data Protection Standardization
Panel Privacy Management and Data Protection Standardization CEN-CENELEC - ENISA workshop Cybersecurity and Data Protection Standards in support of European policy 2017-09-19 Brussels, Belgium Prof. Dr.
More informationOn the Revocation of U-Prove Tokens
On the Revocation of U-Prove Tokens Christian Paquin, Microsoft Research September nd 04 U-Prove tokens provide many security and privacy benefits over conventional credential technologies such as X.509
More informationTrusted Computing: Introduction & Applications
Trusted Computing: Introduction & Applications Lecture 5: Remote Attestation, Direct Anonymous Attestation Dr. Andreas U. Schmidt Fraunhofer Institute for Secure Information Technology SIT, Darmstadt,
More informationFederated Authentication for E-Infrastructures
Federated Authentication for E-Infrastructures A growing challenge for on-line e-infrastructures is to manage an increasing number of user accounts, ensuring that accounts are only used by their intended
More informationPrivacy-Enhancing Technologies: Anonymous Credentials and Pseudonym Systems. Anja Lehmann IBM Research Zurich
Privacy-Enhancing Technologies: Anonymous Credentials and Pseudonym Systems Anja Lehmann IBM Research Zurich ROADMAP Anonymous Credentials privacy-preserving (user) authentication Pseudonym Systems privacy-preserving
More informationTrust Services for Electronic Transactions
Trust Services for Electronic Transactions ROUMEN TRIFONOV Faculty of Computer Systems and Control Technical University of Sofia 8 st. Kliment Ohridski bul., 1000 Sofia BULGARIA r_trifonov@tu-sofia.bg
More informationPrivacy Privacy Preserving Authentication Schemes: Theory and Applications
Privacy Privacy Preserving Authentication Schemes: Theory and Applications 18 th Infocom World, Athens, Greece, 2016 Yannis C. Stamatiou Computer Technology Institute & Press Diophantus and Business Administration
More informationSWAMID Person-Proofed Multi-Factor Profile
Document SWAMID Person-Proofed Multi-Factor Profile Identifier http://www.swamid.se/policy/assurance/al2mfa Version V1.0 Last modified 2018-09-12 Pages 10 Status FINAL License Creative Commons BY-SA 3.0
More informationPrivacy Statement for Use of the Certification Service of Swisscom (sales name: "All-in Signing Service")
Swisscom (sales name: "All-in Signing Service") General Privacy is a matter of trust, and your trust is important to us. Handling personal data in a responsible and legally compliant manner is a top priority
More informationCertification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure
Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure 1.0 INTRODUCTION 1.1 Overview The Federal Reserve Banks operate a public key infrastructure (PKI) that manages
More informationFederated authentication for e-infrastructures
Federated authentication for e-infrastructures 5 September 2014 Federated Authentication for E-Infrastructures Jisc Published under the CC BY 4.0 licence creativecommons.org/licenses/by/4.0/ Contents Introduction
More informationCovert Identity Information in Direct Anonymous Attestation (DAA)
Covert Identity Information in Direct Anonymous Attestation (DAA) Carsten Rudolph Fraunhofer Institute for Secure Information Technology - SIT, Rheinstrasse 75, Darmstadt, Germany, Carsten.Rudolph@sit.fraunhofer.de
More informationD5.5. Open Source Client Library and Server Tools for Delegations. Document Identification. Final UBISECURE, OIX
D5.5 Open Source Client Library and Server Tools for Delegations Document Identification Date 27.08.2018 Status Final Version Version 1.0 Related WP WP 5 Related Deliverable(s) Lead Authors TUG Dissemination
More informationThe epassport: What s Next?
The epassport: What s Next? Justin Ikura LDS2 Policy Sub-Group Co-chair Tom Kinneging Convenor of ISO/IEC JTC1 SC17 WG3 International Organization for Standardization (ISO) Strengthening Aviation Security
More informationWill Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions?
Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions? Jack Radzikowski,, Northrop Grumman & FiXs Smart Card Alliance Annual Meeting La Jolla, California
More informationCC withinthe Context of the EU Privacy Seal - EuroPriSe
CC withinthe Context of the EU Privacy Seal - EuroPriSe TÜV Informationstechnik GmbH -TÜViT - Overview 1. Motivation 2. Data Privacy 3. European Privacy Seal EuroPriSe 4. CC and EuroPriSe 5. Conclusion
More informationDeliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift
Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) Version 1.0 Author: Bharadwaj Pulugundla (Verizon) 25.10.2015 Table of content 1. Introduction... 3
More informationNATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Standardization of Entity Authentication Assurance 5th ETSI Security Workshop 20-2222 January 2010 ETSI, Sophia Antipolis, France Erika McCallister, Esq.,
More informationBlockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric
Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems
More informationAnonymous Credentials: How to show credentials without compromising privacy. Melissa Chase Microsoft Research
Anonymous Credentials: How to show credentials without compromising privacy Melissa Chase Microsoft Research Credentials: Motivation ID cards Sometimes used for other uses E.g. prove you re over 21, or
More informationPrivacy-Enhancing Technologies & Applications to ehealth. Dr. Anja Lehmann IBM Research Zurich
Privacy-Enhancing Technologies & Applications to ehealth Dr. Anja Lehmann IBM Research Zurich IBM Research Zurich IBM Research founded in 1945 employees: 3,000 12 research labs on six continents IBM Research
More informationDECISION OF THE EUROPEAN CENTRAL BANK
L 74/30 Official Journal of the European Union 16.3.2013 DECISIONS DECISION OF THE EUROPEAN CENTRAL BANK of 11 January 2013 laying down the framework for a public key infrastructure for the European System
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 11: Public Key Infrastructure Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Public key infrastructure Certificates Trust
More informationWay to new challenges
Way to new challenges Yves Vandermeer MSC Computer Forensics and Cybercrime Investigations PhD researcher yves.vandermeer@ When? Since 2001, informal working group starting with a few members from EU Law
More informationSecurity Standardization
ISO-ITU ITU Cooperation on Security Standardization Dr. Walter Fumy Chairman ISO/IEC JTC 1/SC 27 Chief Scientist, Bundesdruckerei GmbH, Germany 7th ETSI Security Workshop - Sophia Antipolis, January 2012
More informationSAFE-BioPharma RAS Privacy Policy
SAFE-BioPharma RAS Privacy Policy This statement discloses the privacy practices for the SAFE-BioPharma Association ( SAFE- BioPharma ) Registration Authority System ( RAS ) web site and describes: what
More informationPrivacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria
Privacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria General Privacy is a matter of trust, and your trust is important to us. Handling personal data in a responsible
More informationSecurity and Privacy in the Internet of Things : Antonio F. Skarmeta
Security and Privacy in the Internet of Things : Antonio F. Skarmeta University of Murcia (UMU) SPAIN Motivation Security and privacy concerns were always there but we need to move from
More informationDirect Anonymous Attestation
Direct Anonymous Attestation Revisited Jan Camenisch IBM Research Zurich Joint work with Ernie Brickell, Liqun Chen, Manu Drivers, Anja Lehmann. jca@zurich.ibm.com, @JanCamenisch, ibm.biz/jancamenisch
More informationTrusted National Identity Schemes. Coralie MESNARD
Trusted National Identity Schemes Coralie MESNARD Worldwide digital transactions are booming Digitization The number of G2C digital transactions is said to grow 30% by 2020 Privacy - Convenience Citizens
More informationPRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser. CSP2015 Brussels /
PRISMACLOUD Privacy and Security Maintaining Services in the Cloud Thomas Loruenser CSP2015 Brussels / 29.04.2015 Challenges for future ICT Cloud computing will be at the heart of future ICT systems The
More informationISO/IEC JTC 1/SC 27 N7769
ISO/IEC JTC 1/SC 27 N7769 REPLACES: N ISO/IEC JTC 1/SC 27 Information technology - Security techniques Secretariat: DIN, Germany DOC TYPE: officer's contribution TITLE: SC 27 Presentation to ITU-T Workshop
More informationApproved 10/15/2015. IDEF Baseline Functional Requirements v1.0
Approved 10/15/2015 IDEF Baseline Functional Requirements v1.0 IDESG.org IDENTITY ECOSYSTEM STEERING GROUP IDEF Baseline Functional Requirements v1.0 NOTES: (A) The Requirements language is presented in
More informationSC27 WG4 Mission. Security controls and services
copyright ISO/IEC JTC 1/SC 27, 2012. This is an SC27 public document and is distributed as is for the sole purpose of awareness and promotion of SC 27 standards and so the text is not to be used for commercial
More informationesignature Infrastructure Marketing Model
www.peppol.eu esignature Infrastructure Marketing Model esignature Long Demo Objectives of PEPPOL esignature The overall objective of PEPPOL esignature is to provide cross European interoperability of
More informationeidas Standardisation What are the Issues and Concerns? Overview from CEN TC 224 WG 16 ESIGN Gisela Meister
eidas Standardisation What are the Issues and Concerns? Overview from CEN TC 224 WG 16 ESIGN Gisela Meister Table of contents 1 2 3 4 5 Status eidas Regulation and CEN TC 224 in the contect of the Cyber
More informationOneID An architectural overview
OneID An architectural overview Jim Fenton November 1, 2012 Introduction OneID is an identity management technology that takes a fresh look at the way that users authenticate and manage their identities
More informationTELIA MOBILE ID CERTIFICATE
Telia Mobile ID Certificate CPS v2.3 1 (56) TELIA MOBILE ID CERTIFICATE CERTIFICATION PRACTICE STATEMENT (Translation from official Finnish version) Version 2.3 Valid from June 30, 2017 Telia Mobile ID
More informationDigital Identity Management based on Digital Credentials. Credentica Inc. Version 1.0 of June 2002
Digital Identity Management based on Digital Credentials Stefan Brands and Frédéric Légaré Credentica Inc. Version 1.0 of June 2002 fbrands,legareg@credentica.com Abstract: Today s commercial Digital Identity
More informationING Public Key Infrastructure Technical Certificate Policy
ING Public Key Infrastructure Technical Certificate Policy Version 5.4 - November 2015 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Document version General Of this document
More informationeidas Regulation eid and assurance levels Outcome of eias study
eidas Regulation eid and assurance levels Outcome of eias study Dr. Marijke De Soete Security4Biz (Belgium) ETSI eidas Workshop 24 June 2015 Sophia Antipolis eidas Regulation Regulation on electronic identification
More informationFiXs - Federated and Secure Identity Management in Operation
FiXs - Federated and Secure Identity Management in Operation Implementing federated identity management and assurance in operational scenarios The Federation for Identity and Cross-Credentialing Systems
More informationPrivacy Notice - Stora Enso s Supplier and Stakeholder Register. 1 Purpose
Privacy Notice - Stora Enso s Supplier and Stakeholder Register Date 29.1.2018 1 Purpose Purpose of this privacy notice is to provide the persons communicating with Stora Enso in the role of a supplier
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 9594-8 Sixth edition 2008-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information
More informationPublic Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman
Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National
More informationDe Montfort Students Union Student Data Privacy Statement
De Montfort Students Union Student Data Privacy Statement Introduction De Montfort Students Union (DSU) promises to respect any personal data you share with us, or that we get from other organisations
More informationSONERA MOBILE ID CERTIFICATE
Sonera Mobile ID Certificate CPS v2.1 1 (56) SONERA MOBILE ID CERTIFICATE CERTIFICATION PRACTICE STATEMENT (Translation from official Finnish version) Version 2.1 Valid from, domicile: Helsinki, Teollisuuskatu
More informationConcepts and Languages for Privacy-Preserving Attribute-Based Authentication
Concepts and Languages for Privacy-Preserving Attribute-Based Authentication Jan Camenisch 1, Maria Dubovitskaya 1, Anja Lehmann 1, Gregory Neven 1, Christian Paquin 2, and Franz-Stefan Preiss 1 1 IBM
More informationA General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures
W3C Workshop Ispra, Italy A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures Jan Camenisch Thomas Gross Dieter Sommer October 2006 Outline Scenario Protocols
More informationInteragency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008
Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal
More informationEstablishing Trust Across International Communities
Establishing Trust Across International Communities 6 Feb 2013 info@federatedbusiness.org www.federatedbusiness.org Proprietary - British Business Federation Authority 1 Strategic Drivers - Industry 1.
More informationPrivacy Policy. MIPS Website Privacy Policy. Document Information. Contact Details. Version 1.0 Version date March 2018.
Privacy Policy MIPS Website Privacy Policy Version 1.0 Version date March 2018 Document Information Prepared for Users of MIPS websites Prepared by MIPS NV Date 27/02/2018 Contact Details Joffrey WILLEM
More informationThird public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy
Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy 14 February 2017 Amsterdam Gerhard Menzel European Commission - DG MOVE Scope:
More informationElectronic Commerce Working Group report
RESTRICTED CEFACT/ECAWG/97N012 4 December 1997 Electronic Commerce Ad hoc Working Group (ECAWG) Electronic Commerce Working Group report SOURCE: 10 th ICT Standards Board, Sophia Antipolis, 4 th November
More informationGateway Certification Authority pilot project
Results of the IDABC Bridge / Gateway Certification Authority pilot project Gzim Ocakoglu Commission Enterprise and Industry Directorate General ITAPA Congress Bratislava, 22 November 2005 1 Outline Introduction
More informationThe challenges of (non-)openness:
The challenges of (non-)openness: Trust and Identity in Research and Education. DEI 2018, Zagreb, April 2018 Ann Harding, SWITCH/GEANT @hardingar Who am I? Why am I here? Medieval History, Computer Science
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 9594-8 Fifth edition 2005-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information
More informationNIS Standardisation ENISA view
NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number
More informationBirgit Morlion. DG Communications Networks, Content and Technology (DG CONNECT)
Digital transformation of health and care in the Digital Single Market Harnessing the potential of data to empower citizens and build a healthier society DG Communications Networks, Content and Technology
More informationIdentity Management: Setting Context
Identity Management: Setting Context Joseph Pato Trusted Systems Lab Hewlett-Packard Laboratories One Cambridge Center Cambridge, MA 02412, USA joe.pato@hp.com Identity Management is the set of processes,
More informationINTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD
INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD Jeffy Mwakalinga, Prof Louise Yngström Department of Computer and System Sciences Royal Institute of Technology / Stockholm University
More informationHong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS)
Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) This document (IMPS) facilitates an organization to provide relevant information to describe how it fulfils the normative
More informationDAkkS Who we are. Attesting competence, Assuring quality, Creating confidence.
DAkkS Who we are Attesting competence, Assuring quality, Creating confidence. What is accreditation? Reliability through conformity assessment The demands on the quality of goods and services are growing
More informationRegistration and Authentication
Registration and Authentication e-government Strategy Framework Policy and Guidelines Version 3.0 September 2002 Registration and Authentication / Version 3.0 / September 2002 1 Contents 1. Introduction
More informationGoogle Cloud & the General Data Protection Regulation (GDPR)
Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to
More informationVirginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval
More informationCryptography 4 Privacy
SuRI School of Computer and Communication Sciences EPFL Cryptography 4 Privacy Jan Camenisch Principle RSM; Member, IBM Academy of Technology IBM Research Zurich @JanCamenisch ibm.biz/jancamenisch Facts
More informationeduroam Managed IdP Product Presentation
eduroam Managed IdP Product Presentation Stefan Winter GeGC Technical Expert, Task Leader eduroam Development @GEANT R&D Engineer, RESTENA Foundation, Luxembourg Last updated: 13 June 2017 eduroam Managed
More informationCryptography 4 People
International Workshop on Inference & Privacy in a Hyperconnected World 2016 Cryptography 4 People Jan Camenisch Principle RSM; Member, IBM Academy of Technology IBM Research Zurich @JanCamenisch ibm.biz/jancamenisch
More informationECA Trusted Agent Handbook
Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for
More informationDigital Certificates Demystified
Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 9594-8 Fourth edition 2001-08-01 Information technology Open Systems Interconnection The Directory: Public-key and attribute certificate frameworks Technologies de l'information
More informationPROVIDING COMMUNITY AND COLLABORATION SERVICES TO MMOG PLAYERS *
PROVIDING COMMUNITY AND COLLABORATION SERVICES TO MMOG PLAYERS * George Adam, Christos Bouras, Vaggelis Kapoulas, Andreas Papazois Computer Technology Institute & Press Diophantus N. Kazantzaki, Panepistimioupoli,
More informationData security statement Volunteers
Data security statement Volunteers 1 Register controller 2 Contact information for matters pertaining to the handling of personal information 3 Personal data group 4 The purpose for processing personal
More informationTechnical Trust Policy
Technical Trust Policy Version 1.2 Last Updated: May 20, 2016 Introduction Carequality creates a community of trusted exchange partners who rely on each organization s adherence to the terms of the Carequality
More information