IRMA: I Reveal My Attributes
|
|
- Francine Douglas
- 6 years ago
- Views:
Transcription
1 IRMA: I Reveal My Attributes Roland van Rijswijk - Deij roland.vanrijswijk@surfnet.nl rijswijk@cs.ru.nl
2 Project partners 2
3 What is an attribute? An attribute is a property of a person: Full name Date of birth Social Security Number address Over 18 Younger than 65 Student Enrolled curriculum Home institution (university, college,...)... 3
4 We are already using attributes The identity federations used in academia rely heavily on the use CONEXT of attributes (e.g. SURFconext or InCommon) Most identity federations rely on the SAML2 protocol Authentication in SAML2 relies on release of attributes about a user by an IdP to an SP 4
5 Attribute-based Authentication Issuer In a federation: Identity Provider (IdP) ➊ ➋ In a federation: Service Provider (SP) User ➍ ➌ Relying Party 5
6 Privacy and Attributes There are two kinds of attributes: Non-identifying attributes (e.g. over 18 ) Identifying attributes (e.g. name, SSN, address,...) Users traditionally have little control over their privacy In some federations this situation is improving with the introduction of user consent 6
7 Technology under the hood of IRMA IRMA is based on the Idemix technology, developed by J. Camenisch and A. Lysyanskaya at IBM Research in Zürich Idemix is an extremely privacy-friendly attributebased authentication technology Idemix gives the user full control over her attributes 7
8 Key properties of IRMA Key properties of the technology behind IRMA: Non-transferability Attributes are protected against copying Issuer unlinkability Issuers of attributes cannot trace use of these attributes Multi-show unlinkability Colluding service providers cannot retrace use of attributes to an identifiable user These properties rely on novel cryptographic techniques like zero-knowledge proofs and blind signatures 8
9 Zero-knowledge Proofs A Peggy Victor B 9
10 Zero-knowledge Proofs Victor A B 10
11 Zero-knowledge Proofs Victor A B 10
12 Zero-knowledge Proofs Victor A B 10
13 Zero-knowledge Proofs A B 11
14 Zero-knowledge Proofs A B B 11
15 Zero-knowledge Proofs A B 12
16 Zero-knowledge Proofs A OK! B 12
17 Zero-knowledge Proofs A Peggy Victor B 13
18 Zero-knowledge Proofs Victor A B 14
19 Zero-knowledge Proofs Victor A B 14
20 Zero-knowledge Proofs A B 15
21 Zero-knowledge Proofs A A B 15
22 Zero-knowledge Proofs A B 16
23 Zero-knowledge Proofs After 20 iterations the probability that Peggy correctly guesses the exit path chosen by Victor is less than 1 in 1.05 million A OK! B 16
24 Structure of Credentials secret key attributes issuer's digital signature Credentials consist of: A secret key A number of attributes that can be revealed independently (called selective disclosure) A digital signature by the credential issuer 17
25 Examples of Credentials Minimum age 12 years 16 years 18 years 21 years Seniority 50 years 60 years 65 years 75 years Anonymous (Partially) identifying Address Country City Street + number ZIP ID SSN Date-of-birth Place-of-birth Sex 18
26 IRMA smart card Front Back MULTOS smart card with Idemix implementation Only identifying information is a photo 19
27 Demonstration DEMONSTRATION 20
28 Point-of-Sales terminal demo 21
29 Pilot Project We have recently started with a pilot project Participants are students and staff of the Kerckhoffs institute about 100 students some 20 people in the staff Goal of this project is to trial the IRMA card in practice, with real users 22
30 Use cases Online: Reduced price for software purchased online ( SURFspot ) Access to course-related materials (e.g. grading of teachers)... (suggestions welcome) Offline: Reduced price coffee at several teaching locations Free printing for students at one teaching location... (suggestions welcome) 23
31 External Interest Over the course of the project we have organised (and will organise) public meetings There is a broad interest from business and government E.g. Ministry of Internal Affairs, Tax Office, DMV Ministry of IA has funded additional work 24
32 Future Work Revocation of credentials is an open problem and subject to extensive research Interaction with the user is another open issue Which attributes are to be revealed is now listed on a webpage owned by the relying party We want to perform a user study after the pilot 25
33 Conclusions IRMA shows that privacy and strong authentication are not mutually exclusive Authentication does not require identification Attributes have the future, also outside of identity federations The technology is promising but more research is required to lift it to production ready status 26
34 Questions? Remarks?
Privacy with attribute-based credentials ABC4Trust Project. Fatbardh Veseli
Privacy with attribute-based credentials ABC4Trust Project Fatbardh Veseli Deutsche Telekom Chair for Mobile Business and Multilateral Security Goethe University Frankfurt, Germany fatbardh.veseli@m-chair.de
More informationU-Prove Technology Overview
U-Prove Technology Overview November 2010 TOC Introduction Community Technology Preview Additional Capabilities RSA Demo Conclusion 2 Introduction History U-Prove well established in academia Patent portfolio
More informationIdentity Mixer: From papers to pilots and beyond. Gregory Neven, IBM Research Zurich IBM Corporation
Identity Mixer: From papers to pilots and beyond Gregory Neven, IBM Research Zurich Motivation Online security & trust today: SSL/TLS for encryption and server authentication Username/password for client
More informationAttribute-based Credentials on Smart Cards
Attribute-based Credentials on Smart Cards ir. Pim Vullers p.vullers@cs.ru.nl Privacy & Identity Lab Institute for Computing and Information Sciences Digital Security SaToSS Research Meeting 28th February
More informationProf. Christos Xenakis
From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis H2020 Clustering
More informationProf. Christos Xenakis
From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis SAINT Workshop
More informationSWAMID Person-Proofed Multi-Factor Profile
Document SWAMID Person-Proofed Multi-Factor Profile Identifier http://www.swamid.se/policy/assurance/al2mfa Version V1.0 Last modified 2018-09-12 Pages 10 Status FINAL License Creative Commons BY-SA 3.0
More informationIBM Identity Mixer. Introduction Deployment Use Cases Blockchain More Features
Introduction Deployment Use Cases Blockchain More Features IBM Identity Mixer Privacy-preserving identity management and authentication for Blockchain and beyond Dr. Maria Dubovitskaya IBM Research Zurich
More informationGenesis Credit Portal Reference Guide
Genesis Credit Portal Reference Guide (Pre-Screen esign ) https://partners.mygenesiscredit.com Click the Pre-Screen navigation box. Have the applicant sign and date the Customer Information Authorization
More informationPrivacy-Enhancing Technologies & Applications to ehealth. Dr. Anja Lehmann IBM Research Zurich
Privacy-Enhancing Technologies & Applications to ehealth Dr. Anja Lehmann IBM Research Zurich IBM Research Zurich IBM Research founded in 1945 employees: 3,000 12 research labs on six continents IBM Research
More informationCryptographic dimensions of Privacy
PRIVACY SUMMIT 2016 The Alain Turing Institute Cryptographic dimensions of Privacy Dr. Jan Camenisch Principle RSM; Member, IBM Academy of Technology IBM Research Zurich @JanCamenisch ibm.biz/jancamenisch
More informationVerifiable Anonymous Identities and Access Control in Permissioned Blockchains
Verifiable Anonymous Identities and Access Control in Permissioned Blockchains Thomas Hardjono MIT Internet Trust Consortium Massachusetts Institute of Technology Cambridge, MA 02139, USA Email: hardjono@mit.edu
More informationAnonymous Credentials: How to show credentials without compromising privacy. Melissa Chase Microsoft Research
Anonymous Credentials: How to show credentials without compromising privacy Melissa Chase Microsoft Research Credentials: Motivation ID cards Sometimes used for other uses E.g. prove you re over 21, or
More informationCovert Identity Information in Direct Anonymous Attestation (DAA)
Covert Identity Information in Direct Anonymous Attestation (DAA) Carsten Rudolph Fraunhofer Institute for Secure Information Technology - SIT, Rheinstrasse 75, Darmstadt, Germany, Carsten.Rudolph@sit.fraunhofer.de
More informationCONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014
CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 1. Welcome 1.1 Welcome to the Connect Transit Card Program. The Connect Card Program makes using public transit easier
More informationFederated Authentication for E-Infrastructures
Federated Authentication for E-Infrastructures A growing challenge for on-line e-infrastructures is to manage an increasing number of user accounts, ensuring that accounts are only used by their intended
More informationECA Trusted Agent Handbook
Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name:_Gale_Cengage Learning Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert
More informationEfficient, broad-based solution for a Swiss digital ID
Press release November 21, 2017 Government and private sector produce joint solution Efficient, broad-based solution for a Swiss digital ID The people of this country should have a simple, secure and unambiguous
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: Royal Society of Chemistry Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they
More informationINTERNET BASICS 1. Introduction to the Internet
INTERNET BASICS 1 Introduction to the Internet Level: Media Needed: All ESL Levels Computer Learn New Words Do this page at your desk. Directions: Write the words. (choose) select select scroll bar s Back
More informationHOW TO RECEIVE YOUR JAMES MADISON UNIVERSITY COOPERATING TEACHER HONORARIUM
HOW TO RECEIVE YOUR JAMES MADISON UNIVERSITY COOPERATING TEACHER HONORARIUM Thank you for hosting a James Madison University student teacher. Please complete the following after the first 2 weeks of student
More informationLecture Notes 14 : Public-Key Infrastructure
6.857 Computer and Network Security October 24, 2002 Lecture Notes 14 : Public-Key Infrastructure Lecturer: Ron Rivest Scribe: Armour/Johann-Berkel/Owsley/Quealy [These notes come from Fall 2001. These
More information2015 AmeriHealth New Jersey Sales Sentinel User Guide FLEXIBLE BENEFITS PLANS
2015 AmeriHealth New Jersey Sales Sentinel User Guide FLEXIBLE BENEFITS PLANS SALES SENTINEL LINK The Sales Sentinel link below should be used for Flexible Benefits Plans affiliated selling agents and
More informationContinuing Education
Continuing Education Attendance & Grade Roster Training Documentation 7/21/08 1 Welcome to CE Faculty Web Services. This page can be accessed using: http://cefaculty.sdccd.edu or via the District Web Page.
More informationPrivacy-Enhancing Technologies: Anonymous Credentials and Pseudonym Systems. Anja Lehmann IBM Research Zurich
Privacy-Enhancing Technologies: Anonymous Credentials and Pseudonym Systems Anja Lehmann IBM Research Zurich ROADMAP Anonymous Credentials privacy-preserving (user) authentication Pseudonym Systems privacy-preserving
More informationFacilitating the Attribute Economy. David W Chadwick George Inman, Kristy Siu 2011 University of Kent
Facilitating the Attribute Economy David W Chadwick George Inman, Kristy Siu University of Kent 2011 University of Kent Internet 2 Fall 2011 Member Meeting 1 (Some) Attribute AuthzRequirements Attributes
More informationU.S. E-Authentication Interoperability Lab Engineer
Using Digital Certificates to Establish Federated Trust chris.brown@enspier.com U.S. E-Authentication Interoperability Lab Engineer Agenda U.S. Federal E-Authentication Background Current State of PKI
More informationTrusted Computing: Introduction & Applications
Trusted Computing: Introduction & Applications Lecture 5: Remote Attestation, Direct Anonymous Attestation Dr. Andreas U. Schmidt Fraunhofer Institute for Secure Information Technology SIT, Darmstadt,
More informationData Sharing Project CompTIA Update
Data Sharing Project CompTIA Update Gretchen Koch December 17, 2014 Certification Data Exchange Project Phase I CompTIA & IL Community College Board (ICCB) Pilot Project Phase II Opened up to other states.
More informationCreating a Parent Portal Account
Creating a Parent Portal Account Step 1: Go to https://focus.bayschools.net/focus/auth Step 2: Click on I DO NOT have an Account Registered on the Parent Portal but my child is Actively Enrolled Welcome
More informationMember Access User Guide Edit My Profile
UMN.8.015 Revised Date: 10/7/2008 Edit My Profile 3.0 EDIT MY PROFILE 3.1 Overview Click Edit My Profile to update your email address, phone number, or change your Password. Simply enter the new information.
More informationMyUni - Discussion Boards, Blogs, Wikis & Journals
- Discussion Boards, Blogs, Wikis & Journals Discussion Boards... 2 Create a discussion board forum... 2 Discussion Board Threads... 2 Create a thread... 2 Reply to a thread... 2 Forum settings... 3 Edit
More informationD3.1 Scientific comparison of ABC protocols
-Based Credentials for Trust D3.1 Scientific comparison of ABC protocols Part II: Practical comparison Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ahmad Sabouri, Michael Østergaard Pedersen, Jesus Luna
More informationPrivacy Privacy Preserving Authentication Schemes: Theory and Applications
Privacy Privacy Preserving Authentication Schemes: Theory and Applications 18 th Infocom World, Athens, Greece, 2016 Yannis C. Stamatiou Computer Technology Institute & Press Diophantus and Business Administration
More informationTrusted National Identity Schemes. Coralie MESNARD
Trusted National Identity Schemes Coralie MESNARD Worldwide digital transactions are booming Digitization The number of G2C digital transactions is said to grow 30% by 2020 Privacy - Convenience Citizens
More informationSYDNEY FESTIVAL PRIVACY POLICY
1. Level 5, 10 Hickson Road The Rocks Sydney NSW 2000 Australia Phone 61 2 8248 6500 Fax 61 2 8248 6599 sydneyfestival.org.au ABN 60 070 285 344 SYDNEY FESTIVAL PRIVACY POLICY Our Commitment to your Privacy
More informationTRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model
TRUST. assured reliance on the character, ability, strength, or truth of someone or something - Merriam-Webster TRUST AND IDENTITY July 2017 Trusted Relationships for Access Management: The InCommon Model
More informationEnterprise Privacy and Federated Identity Management
Enterprise Privacy and Federated Identity Management Michael Waidner IBM Zurich Research Lab & IBM Privacy Research Institute April 2003 Outline 1. Motivation 2. Enterprise Privacy Management 3. Federated
More informationSECTION 2: PROGRAM IDENTIFICATION
UTAH REGISTRY FOR PROFESSIONAL DEVELOPMENT PROFESSIONAL DEVELOPMENT INCENTIVE APPLICATION SECTION 1: CANDIDATE IDENTIFICATION (Use through 7/1/2017 5/31/2018) DATE OF BIRTH / / FILL OUT PAGE 1 OF THE ATTACHED
More informationOn the Revocation of U-Prove Tokens
On the Revocation of U-Prove Tokens Christian Paquin, Microsoft Research September nd 04 U-Prove tokens provide many security and privacy benefits over conventional credential technologies such as X.509
More informationFederated authentication for e-infrastructures
Federated authentication for e-infrastructures 5 September 2014 Federated Authentication for E-Infrastructures Jisc Published under the CC BY 4.0 licence creativecommons.org/licenses/by/4.0/ Contents Introduction
More informationMobile Driver s License Region IV May 24, 2017 Seattle, WA
Mobile Driver s License 2017 Region IV May 24, 2017 Seattle, WA Presenter: Loffie Jordaan Senior Project Manager, AAMVA 2 Introduction & background CDS Committee & eid WG What is a mdl? Functional requirements
More informationGerri Holden Ministries Executive Summary Student Consultant, Kate Stepp Community Partner, Gerri Holden
Gerri Holden Ministries Executive Summary Student Consultant, Kate Stepp Community Partner, Gerri Holden I. Background Information The mission of Gerri Holden Ministries is to provide academic programs
More informationMeasuring Authentication: NIST and Vectors of Trust
SESSION ID: IDY-F01 Measuring Authentication: NIST 800-63 and Vectors of Trust auth Sarah Squire Senior Identity Solution Architect Engage Identity @SarahKSquire Eyewitness News 3 A Play in Five Acts
More information2015 Independence Blue Cross Sales Sentinel User Guide FLEXIBLE BENEFITS PLANS
2015 Independence Blue Cross Sales Sentinel User Guide FLEXIBLE BENEFITS PLANS SALES SENTINEL LINK The Sales Sentinel link below should be used for Flexible Benefits Plans affiliated selling agents and
More informationPrivacy-preserving PKI design based on group signature
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2011 Privacy-preserving PKI design based on group signature Sokjoon
More informationPRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser. CSP2015 Brussels /
PRISMACLOUD Privacy and Security Maintaining Services in the Cloud Thomas Loruenser CSP2015 Brussels / 29.04.2015 Challenges for future ICT Cloud computing will be at the heart of future ICT systems The
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name:_Unversity of Regina Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert
More informationPersonal Data collected for the following purposes and using the following services: Personal Data: address, first name and last name
Privacy Policy This Application collects some Personal Data from its Users. POLICY SUMMARY Personal Data collected for the following purposes and using the following services: Contacting the User Contact
More informationSecurity Digital Certificate Manager
System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure
More informationSWAMID Identity Assurance Level 2 Profile
Document SWAMID Identity Assurance Level 2 Profile Identifier http://www.swamid.se/policy/assurance/al2 Version V1.0 Last modified 2015-12-02 Pages 11 Status FINAL License Creative Commons BY-SA 3.0 SWAMID
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: Lynda.com Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative
More informationIBM. Security Digital Certificate Manager. IBM i 7.1
IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in
More informationPolymorphic Encryption and Pseudonymization in the Dutch eid scheme. IRMA meeting, 23 September 2016
1 Polymorphic Encryption and Pseudonymization in the Dutch eid scheme Eric.Verheul@logius.nl IRMA meeting, 23 September 2016 1 2 Agenda Background on the Dutch eid scheme The Dutch eid Introduction Plateau
More informationPRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale
PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale Muhammad Rizwan Asghar Department of Computer Science The University of Auckland Michael Backes CISPA, Saarland University & MPI-SWS
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationNASS Remote Notarization Task Force
NASS Remote Notarization Task Force Knowledge-Based Verification David Temoshok Applied Cybersecurity IT Laboratory National Institute of Standards and Technology (NIST) 2/23/2017 1 Today s Discussion
More informationUsing Trusted Execution Environments in Two-Factor Authentication
Using Trusted Execution Environments in Two-Factor Authentication Roland van Rijswijk-Deij M.Sc. rijswijk@cs.ru.nl http://www.cs.ru.nl/~rijswijk/ nstitute for Computing and nformation Sciences Digital
More informationHow to Use the LaunchBoard Contract Education Tool
How to Use the LaunchBoard Contract Education Tool The Contract Education Tool can be used to record students' participation in contract education. Information is gathered by creating discrete training
More informationD2.2 - Architecture for Attribute-based Credential Technologies - Final Version
D2.2 - Architecture for Attribute-based Credential Technologies - Final Version Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann, Gregory
More informationCombining ABCs with ABE
Combining ABCs with ABE T. R. van de Kamp Combining ABCs with ABE Privacy-Friendly Key Generation for Smart Card Based Attribute-Based Encryption 2014 Master s thesis Computer Science, Services, Cybersecurity,
More informationABOUT THE DELTEK CERTIFICATION PROGRAM
DELTEK CERTIFICATION POLICY AND AGREEMENT Deltek offers certification exams to help identify people with Deltek skills and to enable individuals to distinguish themselves and validate their experience
More informationElectronic ID at work: issues and perspective
Electronic ID at work: issues and perspective Antonio Lioy < lioy @ polito.it > Politecnico di Torino Dip. Automatica e Informatica Why should I have/use an (e-) ID? to prove my identity to an "authority":
More informationSAP Single Sign-On 2.0 Overview Presentation
SAP Single Sign-On 2.0 Overview Presentation June 2014 Public Legal disclaimer This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue
More informationConceptual Data Modeling and the Entity- Relationship Model. Department of Computer Science Northern Illinois University September 2014
Conceptual Data Modeling and the Entity- Relationship Model Department of Computer Science Northern Illinois University September 2014 Data Models A means of describing the structure of the data A set
More informationRhode Island Medicaid Provider Enrollment User Guide. Executive Office of Health and Human Services Medicaid
Rhode Island Executive Office of Health and Human Services Medicaid Ordering, Prescribing, Referring Provider User Guide Version 1.0 DXC Technology PR0123 V1.0 06/19/2017 Rhode Island Page 1 of 24 Revision
More informationSide-channel attacks on the IRMA card
Radboud University Nijmegen Master Thesis Computer Science Side-channel attacks on the IRMA card April 1, 2014 Author: C.W.T.P. Thijssen, BSc. christiaanthijssen@gmail.com Supervisors: Prof. dr. B.P.F.
More informationTask: Design an ER diagram for that problem. Specify key attributes of each entity type.
Q1. Consider the following set of requirements for a university database that is used to keep track of students transcripts. (10 marks) 1. The university keeps track of each student s name, student number,
More informationAttribute-based Authentication
Attribute-based Authentication Privacy and Identity Bart Jacobs and Gergely Alpár Institute for Computing and Information Sciences Digital Security Radboud University 5th January 2016 Page 1 of 46 Jacobs
More informationHow to Activate Your Tk20 Account for SHSU Students
How to Activate Your Tk20 Account for SHSU Students Who Needs To Have an Activated Tk20 Account? All undergraduate and post-baccalaureate students seeking initial teacher certification. This includes graduate
More informationMERLIN Documentation Applicant Interface
MERLIN Documentation: Applicant Interface 1 MERLIN Documentation Applicant Interface Table of Contents Getting Started... 1 Creating a Merlin Account... 2 Starting an Application... 3 HSC General Information
More informationPennsylvania Certification by Endorsement
Pennsylvania Certification by Endorsement Thank you for your interest in obtaining Pennsylvania EMS Certification by Endorsement. This is the process whereby a person certified by a state other than Pennsylvania
More informationDigital Identity Guidelines aka NIST SP March 1, 2017 Ken Klingenstein, Internet2
Digital Identity Guidelines aka NIST SP 800-63 March 1, 2017 Ken Klingenstein, Internet2 Topics 800-63 History and Current Revision process Caveats and Comments LOA Evolution Sections: 800-63A (Enrollment
More informationStep 1: Completing the CCCApply and Cabrillo Application (TO BE COMPLETED FROM OCT 1 st and ON)
Step 1: Completing the CCCApply and Cabrillo Application (TO BE COMPLETED FROM OCT 1 st and ON) Information Needed Before Applying Before beginning the Cabrillo application have the following information
More informationReturning student-athletes
v. 3-16-18 - Contact Jcampbell@vivature.com for edits. Page 1 Click ONE of the three boxes below. Click links throughout to navigate instructions. Returning student-athletes I DO NOT KNOW/REMEMBER my Athletic
More information10 minutes, 10 slides, goals, tech details and why it matters. Decentralized ID & Verifiable Claims
10 minutes, 10 slides, goals, tech details and why it matters Decentralized ID & Verifiable Claims Terminology & Current Model Claim or Assertion a claim or way of communicating what a person or thing
More informationWhere we are, so far. IRMA history, in two phases. IRMA overview. Cryptographic essentials. IRMA in action. Conclusions
Attribute-based Authentication and Signing with IRMA Summer School on real-world crypto and privacy Bart Jacobs Radboud University and Privacy by Design foundation bart@cs.ru.nl Šibenik, Croatia, 15 June
More informationLOG IN AT THE APPLICATION PORTAL
LOG IN AT THE APPLICATION PORTAL You log in to the Application Portal through WAYF (Where Are You From), a national login service, which is used by Danish universities, NemID, etc. There are three different
More informationAll about SAML End-to-end Tableau and OKTA integration
Welcome # T C 1 8 All about SAML End-to-end Tableau and OKTA integration Abhishek Singh Senior Manager, Regional Delivery Tableau Abhishek Singh Senior Manager Regional Delivery asingh@tableau.com Agenda
More informationDissecting NIST Digital Identity Guidelines
Dissecting NIST 800-63 Digital Identity Guidelines KEY CONSIDERATIONS FOR SELECTING THE RIGHT MULTIFACTOR AUTHENTICATION Embracing Compliance More and more business is being conducted digitally whether
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: Concordia University of Edmonton Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that
More informationIf you have any questions or concerns about this Privacy Policy, please Contact Us.
Illuminate Education Your Privacy Rights Are Important To Us The privacy of students and their parents and guardians is important to Illuminate Education, Inc. ( Illuminate ) and the teachers, administrators,
More informationProtecting Your Gear, Your Work & Cal Poly
9/20/2016 1 Protecting Your Gear, Your Work & Cal Poly Information Security Office Shar i f Shar i f i, CI SSP, CRISC Kyle Gustafson, Information Security Analyst Jon Vasquez, Information Security Analyst
More informationDigital Identity Modelling and Management
Digital Identity Modelling and Management by Sittampalam Subenthiran Supervisor Dr Johnson Agbinya Thesis submitted to the University of Technology, Sydney in total fulfilment of the requirement for the
More informationDirect Anonymous Attestation
Direct Anonymous Attestation Revisited Jan Camenisch IBM Research Zurich Joint work with Ernie Brickell, Liqun Chen, Manu Drivers, Anja Lehmann. jca@zurich.ibm.com, @JanCamenisch, ibm.biz/jancamenisch
More informationIdentity Proofing Standards and Beyond
Solutions for Health Care Providers Identity Proofing Standards and Beyond Kimberly Little Sutherland LexisNexis Risk Solutions Sr. Director, Identity Management Solution Strategy Agenda Identity Proofing
More informationPublic Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman
Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National
More informationA privacy-preserving authentication service using mobile devices
A privacy-preserving authentication service using mobile devices Mihai Togan Security Software Architect certsign Context Mobile devices Present everywhere What to consider High performance Computing power
More informationWill Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions?
Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions? Jack Radzikowski,, Northrop Grumman & FiXs Smart Card Alliance Annual Meeting La Jolla, California
More informationCPE Webcast Encrypting PDF Files in Attachments: Reduce Risk, Automation & Compliance Presented by: Sponsored by:
CPE Webcast Encrypting PDF Files in Email Attachments: Reduce Risk, Automation & Compliance Presented by: Sponsored by: Administrative Items 100 120 Minutes (Education, Demo, Q&A) Participants are muted.
More informationWelcome to the Guest Access Portal
Welcome to the Guest Access Portal The Guest Access Portal allows students to grant a guest, such as a parent or spouse, access to view their education records in Banner Self-Service. Only students may
More informationNew user introduction to Attend
1 New user introduction to Attend 1. Sign up to Attend... 2 2. First Steps Create a Course... 2 3. Sharing your course... 4 4. Viewing the course participants... 5 5. Create a new member of Staff... 6
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources being accessed, and that Participants
More informationDeliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift
Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) Version 1.0 Author: Bharadwaj Pulugundla (Verizon) 25.10.2015 Table of content 1. Introduction... 3
More informationConfiguring EAP for Wireless Network Connectivity By Victor Zapata
Configuring EAP for Wireless Network Connectivity By Victor Zapata Requirements: 1. Windows 2000 Domain Controller Service Pack 2 with hotfixes Q306260 and Q304347 OR Service Pack 3 2. Enterprise Certificate
More informationAn Implementation of a Pairing-Based Anonymous Credential System with Constant Complexity
An Implementation of a Pairing-Based Anonymous Credential System with Constant Complexity Amang Sudarsono, Toru Nakanishi, Nobuo Funabiki Abstract An anonymous credential system allows the user to convince
More informationDe Montfort Students Union Student Data Privacy Statement
De Montfort Students Union Student Data Privacy Statement Introduction De Montfort Students Union (DSU) promises to respect any personal data you share with us, or that we get from other organisations
More informationHANDWRITTEN FORMS WILL NOT BE ACCEPTED APPLICATION MUST BE SINGLE SIDED DO NOT STAPLE. Directions for Completion of the IRB Application Form
HANDWRITTEN FORMS WILL NOT BE ACCEPTED APPLICATION MUST BE SINGLE SIDED DO NOT STAPLE Directions for Completion of the IRB Application Form Handwritten forms will not be accepted. Check boxes by double
More informationHIPAA and Research Contracts JILL RAINES, ASSISTANT GENERAL COUNSEL AND UNIVERSITY PRIVACY OFFICIAL
HIPAA and Research Contracts JILL RAINES, ASSISTANT GENERAL COUNSEL AND UNIVERSITY PRIVACY OFFICIAL Just a Few Reminders HIPAA applies to Covered Entities HIPAA is a federal law that governs the privacy
More information