Privacy with attribute-based credentials ABC4Trust Project. Fatbardh Veseli

Size: px
Start display at page:

Download "Privacy with attribute-based credentials ABC4Trust Project. Fatbardh Veseli"

Transcription

1 Privacy with attribute-based credentials ABC4Trust Project Fatbardh Veseli Deutsche Telekom Chair for Mobile Business and Multilateral Security Goethe University Frankfurt, Germany 1

2 Overview Motivation Identity Management Issues Privacy-ABCs - Architecture, Concepts and features ABC4Trust Project Overview Standardisation efforts 2

3 Identity Management (IdM) 2 sides of a medal with enormous economic potential ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies Organisations aim to sort out User Accounts in different IT systems Authentication Rights management Access control Unified identities help to ease administration manage customer relations Identity management systems ease single-sign-on by unify accounts solve the problems of multiple passwords People live their life in different roles (professional, private, volunteer) using different identities (pseudonyms): accounts, SIM cards, ebay trade names, chat names, Facebook names, ) Differentiated identities help to protect privacy, especially anonymity personal security/safety enable reputation building at the same time Identity management systems support users using role based identities help to present the right identity in the right context 3

4 Identity Management (IdM) 2 sides of a medal with enormous economic potential ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies People live their life in different roles (professional, private, volunteer) using different identities (pseudonyms): accounts, SIM cards, ebay trade names, chat names, Facebook names, ) Differentiated identities help to protect privacy, especially anonymity personal security/safety enable reputation building at the same time Identity management systems support users using role based identities help to present the right identity in the right context Organisations aim to sort out User Accounts in different IT systems Authentication Rights management Access control Unified identities help to ease administration manage customer relations Identity management systems ease single-sign-on by unify accounts solve the problems of multiple passwords 4

5 Identity Management (IdM) One of many definitions An integrated concept of processes, policies and technologies that enable organizations and individual entities to facilitate and control the use of identity information in their respective relations 5

6 Privacy (and security) issues of typical federated IdM architectures Identity Service Provider (IdSP) Relying Party (RP) trust 4. token response 3. token request 1. request access 2. policy 5. token User 6

7 Partial Identities needed Based on [Clauß, Köhntopp 2001] 7

8 Identity Definition in ISO/IEC to reduce the risk of over-identification Identity (partial identity): Set of attributes related to an entity From A Framework for Identity Management (ISO/IEC 24760) Part 1: Terminology and concepts (IS:2011) Part 2: Reference framework and requirements (CD) Part 3: Practice (WD) [standards.iso.org/ittf/publiclyavailablestandards/index.html, 8

9 Attribute Based Credentials (Privacy-ABCs) Certifying relevant attributes Token issuance and presentation unlinkable Rather coins (that cannot be distinguished) than bank notes (that have a serial number) Users can disclose (minimal) subsets of the encoded claims To respond to unanticipated requests of RPs Without invalidating the token integrity E.g. Certificate for birth date -> Claim for being over 21 Two major approaches and technologies U-Prove (Credentica -> Microsoft) Idemix (IBM) 9

10 Two approaches for Privacy- ABCs Blind Signatures Zero-Knowledge Proofs Issuer Issuer User Verifier User Verifier U-Prove Brands, Paquin et al. Discrete Logs, RSA,.. Idemix (Identity Mixer) Damgard, Camenisch & Lysyanskaya Strong RSA, pairings (LMRS, q-sdh) 10

11 ABC4Trust Objectives A common, unified architecture for ABC systems to enable Comparing their respective features Combining them on common platforms Lock-In free usage of ABC systems Open reference implementations of selected ABC systems Deployments in actual production enabling Minimal disclosure Provision of anonymous feedback to a community proving one is accredited as a member 11

12 ABC4Trust Partners Johann Wolfgang Goethe- Universität Frankfurt, DE Alexandra Institute AS, DK Computer Technology Institute & Press DIOPHANTUS, GR IBM Research - Zurich, CH Miracle A/S, DK Nokia Solutions and Networks, DE Technische Universität Darmstadt, DE Unabhängiges Landeszentrum für Datenschutz, DE Eurodocs AB, SE CryptoExperts SAS, FR Microsoft NV, BE Söderhamn Kommun, SE 12

13 Architecture, entities and features Issuer Revocation Authority Credential Revocation Credential Issuance Revocation info retrieval User Presentation Token Revocation info retrieval Token Inspection Inspector Verifier 13

14 ABC4Trust Pilot Söderhamn: Community Interaction School internal platform for communication among pupils, teachers, and personnel Provide trusted authentication while protecting anonymity Usability: make privacy technology understandable for non-technical users (e.g. pupils) Norrtullskolan School Söderhamn, Sweden 14

15 Söderhamn pilot - Student consultation name = Kari Johannson Grade= 5 Class = 5A Gender = F name =? Grade = 5 Class =? 15

16 ABC4Trust Pilot Patras: Course Rating Course ratings conducted anonymously without learning participants identities Conduct polls based on attendance Verify with anonymous proofs towards untrusted infrastructure Computer Technology Institute Patras, Greece 16

17 Course Evaluation Course = 536 Matriculation nr: 1295 Attendance units: 6 name = Maria Papadopoulou Department = CEI Type = Student Matriculation nr: 1295 name =? Department =? Student = Yes CourseID = 536 #Attendance units > 5 = Yes 17 17

18 Privacy-ABCs and eid eids can be considered as credentials with several attributes. Privacy-ABCs can be used to disclose only some of the attributes.

19 Standardisation relevant projects within ISO/IEC JTC 1/SC A framework for identity Management Anonymous digital signatures Access control framework WG 5 -Identity management and privacy technologies Privacy framework WG 2 Cryptography and security mechanisms Partially anonymous, partially unlinkable authentication Privacy architecture framework Anonymous Entity Authentication 19

20 Conclusions & Outlook ICT and related services are coming ever closer to people. A more privacy friendly Internet requires: Partial Identities and Identifiers Minimum Disclosure Privacy-respecting Attribute Based Credentials ABC4Trust Summit Event: , Brussels, Representation of the State of Hesse fatbardh.veseli@m-chair.de, coord-abc4trust@m-chair.de

21 Back-Up Attribute-based Credentials for Trust

22 Identity Theft (?) 22 22

23 ABC4Trust Project Facts Scheduled duration: November 2010 February 2015 Partners: 12 partners from industry, academia, research centres and data protection authorities Costs: Million ( 8.85 Million EU funded) Funding: The ABC4Trust project receives research funding from the European Union's Seventh Framework Programme under grant agreement n as part of the ICT Trust and Security Research theme. Web Page: Project coordination: Chair of Mobile Business & Multilateral Security Goethe University Frankfurt Frankfurt am Main, Germany contact@abc4trust.eu 23

Introduction and Overview

Introduction and Overview Attribute-based Credentials for Trust Introduction and Overview Reference Group 1st Meeting Rueschlikon, 2012-02-13/14 Kai Rannenberg (Kai.Rannenberg@m-chair.net) Deutsche Telekom Chair of Mobile Business

More information

... Mobile (Telco) Operators and Big Data How to avoid the Big Brother Problem using Partial Identities & Privacy-ABCs

... Mobile (Telco) Operators and Big Data How to avoid the Big Brother Problem using Partial Identities & Privacy-ABCs Mobile (Telco) Operators and Big Data How to avoid the Big Brother Problem using Partial Identities & Privacy-ABCs International conference on ISO standards for Information Technologies 2015-02-19 Faculty

More information

Attribute-based Credentials and Partial Identities for a more Privacy Friendly Internet

Attribute-based Credentials and Partial Identities for a more Privacy Friendly Internet Attribute-based Credentials and Partial Identities for a more Privacy Friendly Internet Ochrana dát a súkromia v cloudových službách (Normy & technológie pre riadenie a IT prevádzku) Bratislava Bratislava,

More information

Privacy-respecting Identity Management

Privacy-respecting Identity Management Privacy-respecting Identity Management Introduction to ABC4Trust Attribute-based Credentials for Trust Kai Rannenberg (Kai.Rannenberg@m-chair.de) Deutsche Telekom Chair of Mobile Business & Multilateral

More information

Identity Mixer: From papers to pilots and beyond. Gregory Neven, IBM Research Zurich IBM Corporation

Identity Mixer: From papers to pilots and beyond. Gregory Neven, IBM Research Zurich IBM Corporation Identity Mixer: From papers to pilots and beyond Gregory Neven, IBM Research Zurich Motivation Online security & trust today: SSL/TLS for encryption and server authentication Username/password for client

More information

D3.1 Scientific comparison of ABC protocols

D3.1 Scientific comparison of ABC protocols -Based Credentials for Trust D3.1 Scientific comparison of ABC protocols Part II: Practical comparison Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ahmad Sabouri, Michael Østergaard Pedersen, Jesus Luna

More information

D2.2 - Architecture for Attribute-based Credential Technologies - Final Version

D2.2 - Architecture for Attribute-based Credential Technologies - Final Version D2.2 - Architecture for Attribute-based Credential Technologies - Final Version Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann, Gregory

More information

Work and Projects in ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy technologies

Work and Projects in ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy technologies Work and Projects in ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy technologies 30th Plenary meeting of the Consultative Committee of the Convention for the Protection of Individuals with Regard

More information

... European R&D for privacy and identity solutions for the Information Society. High Level Conference eid and Public Registers

... European R&D for privacy and identity solutions for the Information Society. High Level Conference eid and Public Registers European R&D for privacy and identity solutions for the Information Society High Level Conference eid and Public Registers Hradec Králové, 2009-04-06/07 Prof. Dr. Kai Rannenberg Chair of Mobile Business

More information

Information technology Security techniques A framework for identity management

Information technology Security techniques A framework for identity management A framework for identity management (ISO/IEC 24760) Information technology Security techniques A framework for identity management Part 1: Terminology and concepts Part 2: Reference architecture and requirements

More information

D5.1 Scenario Definition for both Pilots

D5.1 Scenario Definition for both Pilots Attribute-Based Credentials for Trust D5.1 Scenario Definition for both Pilots Souheil Bcheri, Norbert Götze, Vasiliki Liagkou, Apostolis Pyrgelis, Christoforos Raptopoulos, Yannis Stamatiou, Katalin Storf,

More information

U-Prove Technology Overview

U-Prove Technology Overview U-Prove Technology Overview November 2010 TOC Introduction Community Technology Preview Additional Capabilities RSA Demo Conclusion 2 Introduction History U-Prove well established in academia Patent portfolio

More information

IRMA: I Reveal My Attributes

IRMA: I Reveal My Attributes IRMA: I Reveal My Attributes Roland van Rijswijk - Deij roland.vanrijswijk@surfnet.nl rijswijk@cs.ru.nl Project partners 2 What is an attribute? An attribute is a property of a person: Full name Date of

More information

H2.2 - ABC4Trust Architecture for Developers

H2.2 - ABC4Trust Architecture for Developers Attribute-Based Credentials for Trust H2.2 - ABC4Trust Architecture for Developers Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Ioannis Krontiris, Anja Lehmann, Gregory Neven,

More information

IBM Identity Mixer. Introduction Deployment Use Cases Blockchain More Features

IBM Identity Mixer. Introduction Deployment Use Cases Blockchain More Features Introduction Deployment Use Cases Blockchain More Features IBM Identity Mixer Privacy-preserving identity management and authentication for Blockchain and beyond Dr. Maria Dubovitskaya IBM Research Zurich

More information

Attribute-based Credentials on Smart Cards

Attribute-based Credentials on Smart Cards Attribute-based Credentials on Smart Cards ir. Pim Vullers p.vullers@cs.ru.nl Privacy & Identity Lab Institute for Computing and Information Sciences Digital Security SaToSS Research Meeting 28th February

More information

Prof. Christos Xenakis

Prof. Christos Xenakis From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis H2020 Clustering

More information

Prof. Christos Xenakis

Prof. Christos Xenakis From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis SAINT Workshop

More information

Privacy-ABC Technologies on Mobile Phones

Privacy-ABC Technologies on Mobile Phones Privacy-ABC Technologies on Mobile Phones Dr. Gert Læssøe Mikkelsen, Alexandra Institute A/S ABC4Trust Summit Event Brussels, January 20, 2015 A research project funded by the European Commission s 7th

More information

IBM Identity Mixer. Authentication without identification. Introduction Demo Use Cases Features Overview Deployment

IBM Identity Mixer. Authentication without identification. Introduction Demo Use Cases Features Overview Deployment Introduction Demo Use Cases Features Overview Deployment IBM Identity Mixer Authentication without identification Jan Camenisch, Maria Dubovitskaya, Peter Kalambet, Anja Lehmann, Gregory Neven, Franz-Stefan

More information

Identity Management Systems An Overview. IST Event 2004 /

Identity Management Systems An Overview. IST Event 2004 / IST Event 2004 / 15.11.2004 Marit Hansen / Henry Krasemann Unabhängiges Landeszentrum für Datenschutz // Independent Centre for Privacy Protection Schleswig-Holstein, Germany Overview Identity Management

More information

Climbing Towards Trust, Privacy and Identity Management in Emerging ICT-based Scenarios

Climbing Towards Trust, Privacy and Identity Management in Emerging ICT-based Scenarios Climbing Towards Trust, Privacy and Identity Management in Emerging ICT-based Scenarios First Endeavour: Requirements 26 November 2008 @ ICT 2008, Lyon Katja Liesebach Chair for Mobile Business & Multilateral

More information

A privacy-preserving authentication service using mobile devices

A privacy-preserving authentication service using mobile devices A privacy-preserving authentication service using mobile devices Mihai Togan Security Software Architect certsign Context Mobile devices Present everywhere What to consider High performance Computing power

More information

Cryptographic dimensions of Privacy

Cryptographic dimensions of Privacy PRIVACY SUMMIT 2016 The Alain Turing Institute Cryptographic dimensions of Privacy Dr. Jan Camenisch Principle RSM; Member, IBM Academy of Technology IBM Research Zurich @JanCamenisch ibm.biz/jancamenisch

More information

1. Publishable Summary

1. Publishable Summary 1. Publishable Summary 1.1Project objectives and context Identity management (IdM) has emerged as a promising technology to distribute identity information across security domains. In e-business scenarios,

More information

Panel Privacy Management and Data Protection Standardization

Panel Privacy Management and Data Protection Standardization Panel Privacy Management and Data Protection Standardization CEN-CENELEC - ENISA workshop Cybersecurity and Data Protection Standards in support of European policy 2017-09-19 Brussels, Belgium Prof. Dr.

More information

On the Revocation of U-Prove Tokens

On the Revocation of U-Prove Tokens On the Revocation of U-Prove Tokens Christian Paquin, Microsoft Research September nd 04 U-Prove tokens provide many security and privacy benefits over conventional credential technologies such as X.509

More information

Trusted Computing: Introduction & Applications

Trusted Computing: Introduction & Applications Trusted Computing: Introduction & Applications Lecture 5: Remote Attestation, Direct Anonymous Attestation Dr. Andreas U. Schmidt Fraunhofer Institute for Secure Information Technology SIT, Darmstadt,

More information

Federated Authentication for E-Infrastructures

Federated Authentication for E-Infrastructures Federated Authentication for E-Infrastructures A growing challenge for on-line e-infrastructures is to manage an increasing number of user accounts, ensuring that accounts are only used by their intended

More information

Privacy-Enhancing Technologies: Anonymous Credentials and Pseudonym Systems. Anja Lehmann IBM Research Zurich

Privacy-Enhancing Technologies: Anonymous Credentials and Pseudonym Systems. Anja Lehmann IBM Research Zurich Privacy-Enhancing Technologies: Anonymous Credentials and Pseudonym Systems Anja Lehmann IBM Research Zurich ROADMAP Anonymous Credentials privacy-preserving (user) authentication Pseudonym Systems privacy-preserving

More information

Trust Services for Electronic Transactions

Trust Services for Electronic Transactions Trust Services for Electronic Transactions ROUMEN TRIFONOV Faculty of Computer Systems and Control Technical University of Sofia 8 st. Kliment Ohridski bul., 1000 Sofia BULGARIA r_trifonov@tu-sofia.bg

More information

Privacy Privacy Preserving Authentication Schemes: Theory and Applications

Privacy Privacy Preserving Authentication Schemes: Theory and Applications Privacy Privacy Preserving Authentication Schemes: Theory and Applications 18 th Infocom World, Athens, Greece, 2016 Yannis C. Stamatiou Computer Technology Institute & Press Diophantus and Business Administration

More information

SWAMID Person-Proofed Multi-Factor Profile

SWAMID Person-Proofed Multi-Factor Profile Document SWAMID Person-Proofed Multi-Factor Profile Identifier http://www.swamid.se/policy/assurance/al2mfa Version V1.0 Last modified 2018-09-12 Pages 10 Status FINAL License Creative Commons BY-SA 3.0

More information

Privacy Statement for Use of the Certification Service of Swisscom (sales name: "All-in Signing Service")

Privacy Statement for Use of the Certification Service of Swisscom (sales name: All-in Signing Service) Swisscom (sales name: "All-in Signing Service") General Privacy is a matter of trust, and your trust is important to us. Handling personal data in a responsible and legally compliant manner is a top priority

More information

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure 1.0 INTRODUCTION 1.1 Overview The Federal Reserve Banks operate a public key infrastructure (PKI) that manages

More information

Federated authentication for e-infrastructures

Federated authentication for e-infrastructures Federated authentication for e-infrastructures 5 September 2014 Federated Authentication for E-Infrastructures Jisc Published under the CC BY 4.0 licence creativecommons.org/licenses/by/4.0/ Contents Introduction

More information

Covert Identity Information in Direct Anonymous Attestation (DAA)

Covert Identity Information in Direct Anonymous Attestation (DAA) Covert Identity Information in Direct Anonymous Attestation (DAA) Carsten Rudolph Fraunhofer Institute for Secure Information Technology - SIT, Rheinstrasse 75, Darmstadt, Germany, Carsten.Rudolph@sit.fraunhofer.de

More information

D5.5. Open Source Client Library and Server Tools for Delegations. Document Identification. Final UBISECURE, OIX

D5.5. Open Source Client Library and Server Tools for Delegations. Document Identification. Final UBISECURE, OIX D5.5 Open Source Client Library and Server Tools for Delegations Document Identification Date 27.08.2018 Status Final Version Version 1.0 Related WP WP 5 Related Deliverable(s) Lead Authors TUG Dissemination

More information

The epassport: What s Next?

The epassport: What s Next? The epassport: What s Next? Justin Ikura LDS2 Policy Sub-Group Co-chair Tom Kinneging Convenor of ISO/IEC JTC1 SC17 WG3 International Organization for Standardization (ISO) Strengthening Aviation Security

More information

Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions?

Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions? Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions? Jack Radzikowski,, Northrop Grumman & FiXs Smart Card Alliance Annual Meeting La Jolla, California

More information

CC withinthe Context of the EU Privacy Seal - EuroPriSe

CC withinthe Context of the EU Privacy Seal - EuroPriSe CC withinthe Context of the EU Privacy Seal - EuroPriSe TÜV Informationstechnik GmbH -TÜViT - Overview 1. Motivation 2. Data Privacy 3. European Privacy Seal EuroPriSe 4. CC and EuroPriSe 5. Conclusion

More information

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) Version 1.0 Author: Bharadwaj Pulugundla (Verizon) 25.10.2015 Table of content 1. Introduction... 3

More information

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Standardization of Entity Authentication Assurance 5th ETSI Security Workshop 20-2222 January 2010 ETSI, Sophia Antipolis, France Erika McCallister, Esq.,

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

Anonymous Credentials: How to show credentials without compromising privacy. Melissa Chase Microsoft Research

Anonymous Credentials: How to show credentials without compromising privacy. Melissa Chase Microsoft Research Anonymous Credentials: How to show credentials without compromising privacy Melissa Chase Microsoft Research Credentials: Motivation ID cards Sometimes used for other uses E.g. prove you re over 21, or

More information

Privacy-Enhancing Technologies & Applications to ehealth. Dr. Anja Lehmann IBM Research Zurich

Privacy-Enhancing Technologies & Applications to ehealth. Dr. Anja Lehmann IBM Research Zurich Privacy-Enhancing Technologies & Applications to ehealth Dr. Anja Lehmann IBM Research Zurich IBM Research Zurich IBM Research founded in 1945 employees: 3,000 12 research labs on six continents IBM Research

More information

DECISION OF THE EUROPEAN CENTRAL BANK

DECISION OF THE EUROPEAN CENTRAL BANK L 74/30 Official Journal of the European Union 16.3.2013 DECISIONS DECISION OF THE EUROPEAN CENTRAL BANK of 11 January 2013 laying down the framework for a public key infrastructure for the European System

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 11: Public Key Infrastructure Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Public key infrastructure Certificates Trust

More information

Way to new challenges

Way to new challenges Way to new challenges Yves Vandermeer MSC Computer Forensics and Cybercrime Investigations PhD researcher yves.vandermeer@ When? Since 2001, informal working group starting with a few members from EU Law

More information

Security Standardization

Security Standardization ISO-ITU ITU Cooperation on Security Standardization Dr. Walter Fumy Chairman ISO/IEC JTC 1/SC 27 Chief Scientist, Bundesdruckerei GmbH, Germany 7th ETSI Security Workshop - Sophia Antipolis, January 2012

More information

SAFE-BioPharma RAS Privacy Policy

SAFE-BioPharma RAS Privacy Policy SAFE-BioPharma RAS Privacy Policy This statement discloses the privacy practices for the SAFE-BioPharma Association ( SAFE- BioPharma ) Registration Authority System ( RAS ) web site and describes: what

More information

Privacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria

Privacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria Privacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria General Privacy is a matter of trust, and your trust is important to us. Handling personal data in a responsible

More information

Security and Privacy in the Internet of Things : Antonio F. Skarmeta

Security and Privacy in the Internet of Things : Antonio F. Skarmeta Security and Privacy in the Internet of Things : Antonio F. Skarmeta University of Murcia (UMU) SPAIN Motivation Security and privacy concerns were always there but we need to move from

More information

Direct Anonymous Attestation

Direct Anonymous Attestation Direct Anonymous Attestation Revisited Jan Camenisch IBM Research Zurich Joint work with Ernie Brickell, Liqun Chen, Manu Drivers, Anja Lehmann. jca@zurich.ibm.com, @JanCamenisch, ibm.biz/jancamenisch

More information

Trusted National Identity Schemes. Coralie MESNARD

Trusted National Identity Schemes. Coralie MESNARD Trusted National Identity Schemes Coralie MESNARD Worldwide digital transactions are booming Digitization The number of G2C digital transactions is said to grow 30% by 2020 Privacy - Convenience Citizens

More information

PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser. CSP2015 Brussels /

PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser. CSP2015 Brussels / PRISMACLOUD Privacy and Security Maintaining Services in the Cloud Thomas Loruenser CSP2015 Brussels / 29.04.2015 Challenges for future ICT Cloud computing will be at the heart of future ICT systems The

More information

ISO/IEC JTC 1/SC 27 N7769

ISO/IEC JTC 1/SC 27 N7769 ISO/IEC JTC 1/SC 27 N7769 REPLACES: N ISO/IEC JTC 1/SC 27 Information technology - Security techniques Secretariat: DIN, Germany DOC TYPE: officer's contribution TITLE: SC 27 Presentation to ITU-T Workshop

More information

Approved 10/15/2015. IDEF Baseline Functional Requirements v1.0

Approved 10/15/2015. IDEF Baseline Functional Requirements v1.0 Approved 10/15/2015 IDEF Baseline Functional Requirements v1.0 IDESG.org IDENTITY ECOSYSTEM STEERING GROUP IDEF Baseline Functional Requirements v1.0 NOTES: (A) The Requirements language is presented in

More information

SC27 WG4 Mission. Security controls and services

SC27 WG4 Mission. Security controls and services copyright ISO/IEC JTC 1/SC 27, 2012. This is an SC27 public document and is distributed as is for the sole purpose of awareness and promotion of SC 27 standards and so the text is not to be used for commercial

More information

esignature Infrastructure Marketing Model

esignature Infrastructure Marketing Model www.peppol.eu esignature Infrastructure Marketing Model esignature Long Demo Objectives of PEPPOL esignature The overall objective of PEPPOL esignature is to provide cross European interoperability of

More information

eidas Standardisation What are the Issues and Concerns? Overview from CEN TC 224 WG 16 ESIGN Gisela Meister

eidas Standardisation What are the Issues and Concerns? Overview from CEN TC 224 WG 16 ESIGN Gisela Meister eidas Standardisation What are the Issues and Concerns? Overview from CEN TC 224 WG 16 ESIGN Gisela Meister Table of contents 1 2 3 4 5 Status eidas Regulation and CEN TC 224 in the contect of the Cyber

More information

OneID An architectural overview

OneID An architectural overview OneID An architectural overview Jim Fenton November 1, 2012 Introduction OneID is an identity management technology that takes a fresh look at the way that users authenticate and manage their identities

More information

TELIA MOBILE ID CERTIFICATE

TELIA MOBILE ID CERTIFICATE Telia Mobile ID Certificate CPS v2.3 1 (56) TELIA MOBILE ID CERTIFICATE CERTIFICATION PRACTICE STATEMENT (Translation from official Finnish version) Version 2.3 Valid from June 30, 2017 Telia Mobile ID

More information

Digital Identity Management based on Digital Credentials. Credentica Inc. Version 1.0 of June 2002

Digital Identity Management based on Digital Credentials. Credentica Inc. Version 1.0 of June 2002 Digital Identity Management based on Digital Credentials Stefan Brands and Frédéric Légaré Credentica Inc. Version 1.0 of June 2002 fbrands,legareg@credentica.com Abstract: Today s commercial Digital Identity

More information

ING Public Key Infrastructure Technical Certificate Policy

ING Public Key Infrastructure Technical Certificate Policy ING Public Key Infrastructure Technical Certificate Policy Version 5.4 - November 2015 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Document version General Of this document

More information

eidas Regulation eid and assurance levels Outcome of eias study

eidas Regulation eid and assurance levels Outcome of eias study eidas Regulation eid and assurance levels Outcome of eias study Dr. Marijke De Soete Security4Biz (Belgium) ETSI eidas Workshop 24 June 2015 Sophia Antipolis eidas Regulation Regulation on electronic identification

More information

FiXs - Federated and Secure Identity Management in Operation

FiXs - Federated and Secure Identity Management in Operation FiXs - Federated and Secure Identity Management in Operation Implementing federated identity management and assurance in operational scenarios The Federation for Identity and Cross-Credentialing Systems

More information

Privacy Notice - Stora Enso s Supplier and Stakeholder Register. 1 Purpose

Privacy Notice - Stora Enso s Supplier and Stakeholder Register. 1 Purpose Privacy Notice - Stora Enso s Supplier and Stakeholder Register Date 29.1.2018 1 Purpose Purpose of this privacy notice is to provide the persons communicating with Stora Enso in the role of a supplier

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-8 Sixth edition 2008-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

De Montfort Students Union Student Data Privacy Statement

De Montfort Students Union Student Data Privacy Statement De Montfort Students Union Student Data Privacy Statement Introduction De Montfort Students Union (DSU) promises to respect any personal data you share with us, or that we get from other organisations

More information

SONERA MOBILE ID CERTIFICATE

SONERA MOBILE ID CERTIFICATE Sonera Mobile ID Certificate CPS v2.1 1 (56) SONERA MOBILE ID CERTIFICATE CERTIFICATION PRACTICE STATEMENT (Translation from official Finnish version) Version 2.1 Valid from, domicile: Helsinki, Teollisuuskatu

More information

Concepts and Languages for Privacy-Preserving Attribute-Based Authentication

Concepts and Languages for Privacy-Preserving Attribute-Based Authentication Concepts and Languages for Privacy-Preserving Attribute-Based Authentication Jan Camenisch 1, Maria Dubovitskaya 1, Anja Lehmann 1, Gregory Neven 1, Christian Paquin 2, and Franz-Stefan Preiss 1 1 IBM

More information

A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures

A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures W3C Workshop Ispra, Italy A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures Jan Camenisch Thomas Gross Dieter Sommer October 2006 Outline Scenario Protocols

More information

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008 Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal

More information

Establishing Trust Across International Communities

Establishing Trust Across International Communities Establishing Trust Across International Communities 6 Feb 2013 info@federatedbusiness.org www.federatedbusiness.org Proprietary - British Business Federation Authority 1 Strategic Drivers - Industry 1.

More information

Privacy Policy. MIPS Website Privacy Policy. Document Information. Contact Details. Version 1.0 Version date March 2018.

Privacy Policy. MIPS Website Privacy Policy. Document Information. Contact Details. Version 1.0 Version date March 2018. Privacy Policy MIPS Website Privacy Policy Version 1.0 Version date March 2018 Document Information Prepared for Users of MIPS websites Prepared by MIPS NV Date 27/02/2018 Contact Details Joffrey WILLEM

More information

Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy

Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy 14 February 2017 Amsterdam Gerhard Menzel European Commission - DG MOVE Scope:

More information

Electronic Commerce Working Group report

Electronic Commerce Working Group report RESTRICTED CEFACT/ECAWG/97N012 4 December 1997 Electronic Commerce Ad hoc Working Group (ECAWG) Electronic Commerce Working Group report SOURCE: 10 th ICT Standards Board, Sophia Antipolis, 4 th November

More information

Gateway Certification Authority pilot project

Gateway Certification Authority pilot project Results of the IDABC Bridge / Gateway Certification Authority pilot project Gzim Ocakoglu Commission Enterprise and Industry Directorate General ITAPA Congress Bratislava, 22 November 2005 1 Outline Introduction

More information

The challenges of (non-)openness:

The challenges of (non-)openness: The challenges of (non-)openness: Trust and Identity in Research and Education. DEI 2018, Zagreb, April 2018 Ann Harding, SWITCH/GEANT @hardingar Who am I? Why am I here? Medieval History, Computer Science

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-8 Fifth edition 2005-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information

More information

NIS Standardisation ENISA view

NIS Standardisation ENISA view NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number

More information

Birgit Morlion. DG Communications Networks, Content and Technology (DG CONNECT)

Birgit Morlion. DG Communications Networks, Content and Technology (DG CONNECT) Digital transformation of health and care in the Digital Single Market Harnessing the potential of data to empower citizens and build a healthier society DG Communications Networks, Content and Technology

More information

Identity Management: Setting Context

Identity Management: Setting Context Identity Management: Setting Context Joseph Pato Trusted Systems Lab Hewlett-Packard Laboratories One Cambridge Center Cambridge, MA 02412, USA joe.pato@hp.com Identity Management is the set of processes,

More information

INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD

INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD Jeffy Mwakalinga, Prof Louise Yngström Department of Computer and System Sciences Royal Institute of Technology / Stockholm University

More information

Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS)

Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) This document (IMPS) facilitates an organization to provide relevant information to describe how it fulfils the normative

More information

DAkkS Who we are. Attesting competence, Assuring quality, Creating confidence.

DAkkS Who we are. Attesting competence, Assuring quality, Creating confidence. DAkkS Who we are Attesting competence, Assuring quality, Creating confidence. What is accreditation? Reliability through conformity assessment The demands on the quality of goods and services are growing

More information

Registration and Authentication

Registration and Authentication Registration and Authentication e-government Strategy Framework Policy and Guidelines Version 3.0 September 2002 Registration and Authentication / Version 3.0 / September 2002 1 Contents 1. Introduction

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

Cryptography 4 Privacy

Cryptography 4 Privacy SuRI School of Computer and Communication Sciences EPFL Cryptography 4 Privacy Jan Camenisch Principle RSM; Member, IBM Academy of Technology IBM Research Zurich @JanCamenisch ibm.biz/jancamenisch Facts

More information

eduroam Managed IdP Product Presentation

eduroam Managed IdP Product Presentation eduroam Managed IdP Product Presentation Stefan Winter GeGC Technical Expert, Task Leader eduroam Development @GEANT R&D Engineer, RESTENA Foundation, Luxembourg Last updated: 13 June 2017 eduroam Managed

More information

Cryptography 4 People

Cryptography 4 People International Workshop on Inference & Privacy in a Hyperconnected World 2016 Cryptography 4 People Jan Camenisch Principle RSM; Member, IBM Academy of Technology IBM Research Zurich @JanCamenisch ibm.biz/jancamenisch

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

Digital Certificates Demystified

Digital Certificates Demystified Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 9594-8 Fourth edition 2001-08-01 Information technology Open Systems Interconnection The Directory: Public-key and attribute certificate frameworks Technologies de l'information

More information

PROVIDING COMMUNITY AND COLLABORATION SERVICES TO MMOG PLAYERS *

PROVIDING COMMUNITY AND COLLABORATION SERVICES TO MMOG PLAYERS * PROVIDING COMMUNITY AND COLLABORATION SERVICES TO MMOG PLAYERS * George Adam, Christos Bouras, Vaggelis Kapoulas, Andreas Papazois Computer Technology Institute & Press Diophantus N. Kazantzaki, Panepistimioupoli,

More information

Data security statement Volunteers

Data security statement Volunteers Data security statement Volunteers 1 Register controller 2 Contact information for matters pertaining to the handling of personal information 3 Personal data group 4 The purpose for processing personal

More information

Technical Trust Policy

Technical Trust Policy Technical Trust Policy Version 1.2 Last Updated: May 20, 2016 Introduction Carequality creates a community of trusted exchange partners who rely on each organization s adherence to the terms of the Carequality

More information