Web 3.0 Overview: Interoperability in the Web dimension (1) Web 3.0 Overview: Interoperability in the Web dimension (2) Metadata

Size: px
Start display at page:

Download "Web 3.0 Overview: Interoperability in the Web dimension (1) Web 3.0 Overview: Interoperability in the Web dimension (2) Metadata"

Transcription

1 Information Network I Web 3.0 Youki Kadobayashi NAIST Web 3.0 Overview: Interoperability in the Web dimension (1) Interoperability of data: Assist in interacting with arbitrary (including unknown) resources that support known interfaces of resources Openness of services associated with the resource Address Copyright(C)2010 Youki Kadobayashi. All rights reserved. 2 Web 3.0 Overview: Interoperability in the Web dimension (2) Interoperability of user identifier of user Authentication Proof of identity through shared secret, proof of possession, physical traits etc. Authorization Access privileges Set of granted operations Copyright(C)2010 Youki Kadobayashi. All rights reserved. 3 Data about data Assist in interacting with arbitrary (including unknown) resources that support known interfaces Copyright(C)2010 Youki Kadobayashi. All rights reserved. 4 standard: RDF RDF: an example (1) RDF: Resource Description Format W3C standards RDF primer RDF concepts and abstract syntax RDF vocabulary description language 1.0: RDF schema Many representation forms: RDF/XML RDF triples Turtle Copyright(C)2010 Youki Kadobayashi. All rights reserved. 5 An RDF Graph. Source: W3C RDF primer Copyright(C)2010 Youki Kadobayashi. All rights reserved. 6

2 RDF/XML example RDF: an example (2) <?xml version="1.0"?> <rdf:rdf xmlns:rdf=" xmlns:contact=" <contact:person rdf:about=" <contact:fullname>eric Miller</contact:fullName> <contact:mailbox <contact:personaltitle>dr.</contact:personaltitle> </contact:person> </rdf:rdf> RDF triples ex:index.html dc:creator exstaff: RDF: an example (3) Turtle serialization syntax for rdf: contact: < < rdf:type contact:person; contact:fullname "Eric Miller"; contact:mailbox contact:personaltitle "Dr.". Source: W3C RDF primer, turtle version ex:index.html exterms:creation-date "August 16, 1999". ex:index.html dc:language "en". Source: W3C RDF primer Copyright(C)2010 Youki Kadobayashi. All rights reserved Copyright(C)2010 Youki Kadobayashi. All rights reserved. 8 XHTML-based Simple, open data formats microformats.org No new language hcard Microformat <span class="tel"> <span class="type">home</span>: <span class="value"> </span> </span> hcalendar <span class="vevent"> <span class="summary">the WASForum 2010</span> on <span class="dtstart"> </span> at the Kokuyo Hall in <span class="location">tokyo, Japan</span>. </span> Look for Microformat-aware plugin for your favorite Web browser Copyright(C)2010 Youki Kadobayashi. All rights reserved. 9 Identification of resources Openness URI revisited foo://example.com:8042/over/there?name=ferret#nose _/ / / / / scheme authority path query fragment / / urn:example:animal:ferret:nose Globally unique identification of resources? Copyright(C)2010 Youki Kadobayashi. All rights reserved. 10 Data identification standards DOI: Digital Object Identifier UUID: Universally Unique Identifier DOI: Digital Object Identifier Coordinated by International DOI Foundation Standardized as ISO/DIS Used to globally and uniquely identify electronic document or other object DOI: / Naming authority (10: DOI project) Registrant (1145: ACM) Item ID Copyright(C)2010 Youki Kadobayashi. All rights reserved Copyright(C)2010 Youki Kadobayashi. All rights reserved. 12

3 UUID: Universally Unique Identifier also known as GUID X.667 (ITU-T SG17) RFC 4122 (IETF) Generation and registration of Universally Unique Identifiers (UUIDs) and their use as ASN.1 object identifier components Time-based UUID (v1) Node: 48-bit MAC address Name-based UUID (v3, v5) Node: 48 bits from hash: MD5(name) or SHA1(name) Random number-based UUID (v4) Node: 48-bit random of services associated with the resource Resource identifier Resolver? UUID URN namespace urn:uuid:f81d4fae-7dec-11d0-a765-00a0c91e6bf6 v node Copyright(C)2010 Youki Kadobayashi. All rights reserved. 13 Service endpoint identifier Capabilities Copyright(C)2010 Youki Kadobayashi. All rights reserved. 14 standards Handle System For DOI etc. Defined by: IETF EPCglobal Object Name Service (ONS) For RFID tags Defined by: EPCglobal XRI For web 3.0 etc. Defined by: OASIS OID resolver For OID (object identifier) Defined by: ITU-T SG Copyright(C)2010 Youki Kadobayashi. All rights reserved. 15 Handle System RFC 3650 Identifier and resolution services DOI: an application of Handle System For more info: Copyright(C)2010 Youki Kadobayashi. All rights reserved. 16 standard: XRI -- An OASIS standard for service discovery Interoperability of data in Web 3.0 Identification Data Confined Data Interactions 3.0 Services Source: OASIS Extensible Resource Identifier (XRI) Resolution Version Copyright(C)2010 Youki Kadobayashi. All rights reserved. 17 Bring back the ownership of data! Copyright(C)2010 Youki Kadobayashi. All rights reserved. 18

4 Identification of user Identity management standards Common ID space Hierarchical vs Federated Implications of openness Assignment Identity ownership Conflict resolution/avoidance Assurance Verification Persistence X.500 series Hierarchical ID space Distinguished Name as user identifier Originally defined by ITU-T SG 17 in X.500 series Today: IETF PKIX WG / ITU-T SG 17 Q.12 OpenID Federated ID space URL as user identifier Notion of Persona Ability to control privacy of identity information Developed by OpenID Foundation Copyright(C)2010 Youki Kadobayashi. All rights reserved Copyright(C)2010 Youki Kadobayashi. All rights reserved. 20 Authentication Proof of identity through: Shared secret Password Use of public/private key pair Digital certificate Proof of possession Hardware token -- IC card etc. Physical traits Fingerprints etc. etc. Multi-factor authentication Combination of two or more of the above Copyright(C)2010 Youki Kadobayashi. All rights reserved. 21 X.509 Digital Certificate Defined in ITU-T X.509 Information technology Open Systems Interconnection The Directory: Public-key and attribute certificate frameworks X.509 certificate contains: Issuer CN Subject CN Validity period Subject Public Key Signature Algorithm Signature of the issuer Digital signature in X.509. Source: ITU-T Rec. X / Copyright(C)2010 Youki Kadobayashi. All rights reserved. 22 X.509 Digital Certificate in action Issuer CN: Equifax Secure Global ebusiness CA-1 Subject CN: Equifax Secure Global ebusiness CA-1 Validity period: 99/06/21 13:00:00-20/06/21 13:00:00 Signature Algorithm: PKCS #1 MD5 With RSA Encryption sign certificate Issuer CN: Equifax Secure Global ebusiness CA-1 Subject CN: *.myopenid.com Validity period: 09/04/29 7:08:45-11/05/30 7:08:45 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption OpenID authentication protocol Federated ID space URL as user identifier OP: OpenID provider Provides authentication service RP: Relying Party Service that relies on OpenID authentication service Copyright(C)2010 Youki Kadobayashi. All rights reserved Copyright(C)2010 Youki Kadobayashi. All rights reserved. 24

5 OpenID auth protocol in action Agent Relying Party OpenID Provider URI or XRI Redirect; get token XRDS Diffie-Hellman Get token Post credential Redirect Token For more details, consult OpenID Authentication 2.0 spec Copyright(C)2010 Youki Kadobayashi. All rights reserved. 25 Authorization Access privileges Set of granted operations Create, Delete Read, Update Persona Example: CRUD operation over Persona in social media Copyright(C)2010 Youki Kadobayashi. All rights reserved. 26 Authorization process Identify user Authenticate user Map to specific group or role Authorization standards OAuth For use with OpenID authentication simple and standard method from desktop and web IETF Open Authentication Protocol WG Identify access privilege Permit or deny operation N.B. many variations do exist Copyright(C)2010 Youki Kadobayashi. All rights reserved. 27 X.509 attribute certificate RFC 3281: An Internet Attribute Certificate Profile for Authorization For use with X.509 digital certificate Copyright(C)2010 Youki Kadobayashi. All rights reserved. 28 Open Identity in Web 3.0 Identification Summary -- Web 3.0: Interoperability in the Web dimension Interoperability of data: Interoperability of user ID: Confined Assignment Ownership Conflict resolution Assurance Verification Persistence Interactions Services 3.0 Authentication Authorization Bring back the ownership of identity! Copyright(C)2010 Youki Kadobayashi. All rights reserved Copyright(C)2010 Youki Kadobayashi. All rights reserved. 30

Information Network I Web 3.0. Youki Kadobayashi NAIST

Information Network I Web 3.0. Youki Kadobayashi NAIST Information Network I Web 3.0 Youki Kadobayashi NAIST Web 3.0 Overview: Interoperability in the Web dimension (1) Interoperability of data: Metadata Data about data Assist in interacting with arbitrary

More information

What's New in RDF 1.1

What's New in RDF 1.1 What's New in RDF 1.1 SemTechBiz June 2013 http://www.w3.org/2013/talks/0603-rdf11 Sandro Hawke, W3C Staff sandro@w3.org @sandhawke Overview 1. Stability and Interoperability 2. Non-XML Syntaxes Turtle

More information

Chapter 13: Advanced topic 3 Web 3.0

Chapter 13: Advanced topic 3 Web 3.0 Chapter 13: Advanced topic 3 Web 3.0 Contents Web 3.0 Metadata RDF SPARQL OWL Web 3.0 Web 1.0 Website publish information, user read it Ex: Web 2.0 User create content: post information, modify, delete

More information

Implementing and extending SPARQL queries over DLVHEX

Implementing and extending SPARQL queries over DLVHEX Implementing and extending SPARQL queries over DLVHEX Gennaro Frazzingaro Bachelor Thesis Presentation - October 5, 2007 From a work performed in Madrid, Spain Galway, Ireland Rende, Italy How to solve

More information

Semantic Web Engineering

Semantic Web Engineering Semantic Web Engineering Gerald Reif reif@ifi.unizh.ch Fr. 10:15-11:45, Room 2.A.10 The Resource Description Framework RDF Trust Proof Logic Ontology vocabulary RDF + RDF Schema XML + NS + XML Schema Unicode

More information

RDF and RDF Schema. Resource Description Framework

RDF and RDF Schema. Resource Description Framework RDF and RDF Schema Resource Description Framework Outline RDF Design objectives RDF General structure RDF Vocabularies Serialization: XML Semantic features RDF Schema RDF Semantics and Reasoning 2019-01-14

More information

PKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore

PKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore PKI Standards Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore Under the Aegis of Controller of Certifying Authorities (CCA) Government of India 1 PKCS Why PKCS? Even

More information

O N T O P E D I A. The Identity of Everything. Subject Identity. Steve Pepper. INF5909,

O N T O P E D I A. The Identity of Everything. Subject Identity. Steve Pepper. INF5909, Subject Identity Steve Pepper pepper.steve@gmail.com INF5909, 2009-02-23 Agenda Merging in Topic Maps The Importance of Identity The Topic Maps Approach to Identity The Identity Crisis of the Web Published

More information

Identity management. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014

Identity management. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014 Identity management Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 Outline 1. Single sign-on 2. SAML and Shibboleth 3. OpenId 4. OAuth 5. (Corporate IAM) 6. Strong identity 2

More information

Web Based Single Sign-On and Access Control

Web Based Single Sign-On and Access Control 0-- Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking

More information

Authentication in the Cloud. Stefan Seelmann

Authentication in the Cloud. Stefan Seelmann Authentication in the Cloud Stefan Seelmann Agenda Use Cases View Points Existing Solutions Upcoming Solutions Use Cases End user needs login to a site or service End user wants to share access to resources

More information

Descriptions. Robert Grimm New York University

Descriptions. Robert Grimm New York University Descriptions Robert Grimm New York University The Final Assignment! Your own application! Discussion board! Think: Paper summaries! Time tracker! Think: Productivity tracking! Web cam proxy! Think: George

More information

Descriptions. Robert Grimm New York University

Descriptions. Robert Grimm New York University Descriptions Robert Grimm New York University The Final Assignment! Your own application! Discussion board! Think: Paper summaries! Web cam proxy! Think: George Orwell or JenCam! Visitor announcement and

More information

Identity management. Tuomas Aura T Information security technology. Aalto University, autumn 2011

Identity management. Tuomas Aura T Information security technology. Aalto University, autumn 2011 Identity management Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 Outline 1. Single sign-on 2. OpenId 3. SAML and Shibboleth 4. Corporate IAM 5. Strong identity 2

More information

Technical Overview. Version March 2018 Author: Vittorio Bertola

Technical Overview. Version March 2018 Author: Vittorio Bertola Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which

More information

Practical. David Recordon Brian Ellin

Practical. David Recordon Brian Ellin Practical David Recordon drecordon@verisign.com Brian Ellin brian@janrain.com OSCON 2006 What was OpenID 1.1? An identity authentication system A protocol gratis, libre Not a service or company not Passport

More information

PKCS #15: Conformance Profile Specification

PKCS #15: Conformance Profile Specification Table of Contents PKCS #15: Conformance Profile Specification RSA Laboratories August 1, 2000 1 INTRODUCTION... 2 1 REFERENCES AND RELATED DOCUMENTS... 2 2 DEFINITIONS... 2 3 SYMBOLS AND ABBREVIATIONS...

More information

Lesson 13 Securing Web Services (WS-Security, SAML)

Lesson 13 Securing Web Services (WS-Security, SAML) Lesson 13 Securing Web Services (WS-Security, SAML) Service Oriented Architectures Module 2 - WS Security Unit 1 Auxiliary Protocols Ernesto Damiani Università di Milano element This element

More information

INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD

INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD Jeffy Mwakalinga, Prof Louise Yngström Department of Computer and System Sciences Royal Institute of Technology / Stockholm University

More information

The Identity Web An Overview of XNS and the OASIS XRI TC

The Identity Web An Overview of XNS and the OASIS XRI TC The Identity Web An Overview of XNS and the OASIS XRI TC XML WG December 17, 2002 Marc LeMaitre VP Technology Strategy OneName Corporation Goals of this presentation Introduce the idea of the Identity

More information

Security Protocols and Infrastructures. Winter Term 2015/2016

Security Protocols and Infrastructures. Winter Term 2015/2016 Security Protocols and Infrastructures Winter Term 2015/2016 Nicolas Buchmann (Harald Baier) Chapter 5: Standards for Security Infrastructures Contents Introduction and naming scheme X.509 and its core

More information

Digital Certificates Demystified

Digital Certificates Demystified Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates

More information

Security Protocols and Infrastructures

Security Protocols and Infrastructures Security Protocols and Infrastructures Dr. Michael Schneider michael.schneider@h-da.de Chapter 5: Standards for Security Infrastructures November 13, 2017 h_da WS2017/18 Dr. Michael Schneider 1 1 Introduction

More information

Semantic Web Tools. Federico Chesani 18 Febbraio 2010

Semantic Web Tools. Federico Chesani 18 Febbraio 2010 Semantic Web Tools Federico Chesani 18 Febbraio 2010 Outline A unique way for identifying concepts How to uniquely identified concepts? -> by means of a name system... SW exploits an already available

More information

Distributed Access Control. Trust Management Approach. Characteristics. Another Example. An Example

Distributed Access Control. Trust Management Approach. Characteristics. Another Example. An Example CS489/589: Access Control & System Security Lecture 5 : Distributed Access Control and Trust anagement Distributed Access Control Flexible and scalable access control in large scale, open, distributed,

More information

05/31/2010. Smart OpenID

05/31/2010. Smart OpenID 05/31/2010 Smart OpenID Smart OpenID Smartcard Webserver Enabled SSO for Web 2.0 using OpenID Andreas Leicher, Andreas U. Schmidt (Novalyst IT), Inhyok Cha, Yogendra Shah (InterDigital Communications)

More information

The Semantic Web Revisited. Nigel Shadbolt Tim Berners-Lee Wendy Hall

The Semantic Web Revisited. Nigel Shadbolt Tim Berners-Lee Wendy Hall The Semantic Web Revisited Nigel Shadbolt Tim Berners-Lee Wendy Hall Today sweb It is designed for human consumption Information retrieval is mainly supported by keyword-based search engines Some problems

More information

Tutorial: Building the Services Ecosystem

Tutorial: Building the Services Ecosystem Tutorial: Building the Services Ecosystem GlobusWorld 2018 Steve Tuecke tuecke@globus.org What is a services ecosystem? Anybody can build services with secure REST APIs App Globus Transfer Your Service

More information

Displaying SSL Configuration Information and Statistics

Displaying SSL Configuration Information and Statistics CHAPTER 7 Displaying SSL Configuration Information and Statistics This chapter describes the show commands available for displaying CSS SSL configuration information and statistics and an explanation of

More information

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018 Distributed Systems 25. Authentication Paul Krzyzanowski Rutgers University Fall 2018 2018 Paul Krzyzanowski 1 Authentication For a user (or process): Establish & verify identity Then decide whether to

More information

Extended Identity for Social Networks

Extended Identity for Social Networks Extended Identity for Social Networks Antonio Tapiador, Antonio Fumero, and Joaquín Salvachúa Universidad Politécnica de Madrid, ETSI Telecomunicación, Avenida Complutense 30, 28040 Madrid, Spain {atapiador,amfumero,jsalvachua}@dit.upm.es

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 11: Public Key Infrastructure Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Public key infrastructure Certificates Trust

More information

CS November 2018

CS November 2018 Authentication Distributed Systems 25. Authentication For a user (or process): Establish & verify identity Then decide whether to allow access to resources (= authorization) Paul Krzyzanowski Rutgers University

More information

Web Services Security: XCBF Token Profile

Web Services Security: XCBF Token Profile 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 Web Services Security: XCBF Token Profile Working Draft 1.1, Sunday, 30 March 2003 Document identifier:

More information

U.S. E-Authentication Interoperability Lab Engineer

U.S. E-Authentication Interoperability Lab Engineer Using Digital Certificates to Establish Federated Trust chris.brown@enspier.com U.S. E-Authentication Interoperability Lab Engineer Agenda U.S. Federal E-Authentication Background Current State of PKI

More information

Federal Identity, Credentialing, and Access Management. OpenID 2.0 Profile. Version Release Candidate

Federal Identity, Credentialing, and Access Management. OpenID 2.0 Profile. Version Release Candidate Federal Identity, Credentialing, and Access Management OpenID 2.0 Profile Version 1.0.1 Release Candidate November 18, 2009 Document History Status Release Date Comment Audience Release Candidate Release

More information

Web Services Security XCBF Token Profile

Web Services Security XCBF Token Profile 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 Web Services Security XCBF Token Profile Working Draft 1.0, Monday, 25 November 2002 Document identifier:

More information

PUBLIC-KEY CERTIFICATES

PUBLIC-KEY CERTIFICATES INFS 766 Internet Security Protocols Lecture 6 Digital Certificates Prof. Ravi Sandhu PUBLIC-KEY CERTIFICATES reliable distribution of public-keys public-key encryption sender needs public key of receiver

More information

Nigori: Storing Secrets in the Cloud. Ben Laurie

Nigori: Storing Secrets in the Cloud. Ben Laurie Nigori: Storing Secrets in the Cloud Ben Laurie (benl@google.com) April 23, 2013 1 Introduction Secure login is something we would clearly like, but achieving it practically for the majority users turns

More information

Authentication CHAPTER 17

Authentication CHAPTER 17 Authentication CHAPTER 17 Authentication Authentication is the process by which you decide that someone is who they say they are and therefore permitted to access the requested resources. getting entrance

More information

OAuth 2 and Native Apps

OAuth 2 and Native Apps OAuth 2 and Native Apps Flows While all OAuth 2 flows can be used by native apps, only the user delegation flows will be considered in this document: Web Server, User-Agent and Device flows. The Web Server

More information

RSA SecurID Ready Implementation Guide. Last Modified: December 13, 2013

RSA SecurID Ready Implementation Guide. Last Modified: December 13, 2013 Ping Identity RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 13, 2013 Product Information Partner Name Ping Identity Web Site www.pingidentity.com Product Name PingFederate

More information

Validation Working Group: Proposed Revisions to

Validation Working Group: Proposed Revisions to Validation Working Group: Proposed Revisions to 3.2.2.4 Introduction Current Baseline Requirements For each Fully Qualified Domain Name listed in a Certificate, the CA SHALL confirm that, as of the date

More information

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure 1.0 INTRODUCTION 1.1 Overview The Federal Reserve Banks operate a public key infrastructure (PKI) that manages

More information

API Gateway. Version 7.5.1

API Gateway. Version 7.5.1 O A U T H U S E R G U I D E API Gateway Version 7.5.1 15 September 2017 Copyright 2017 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.5.1 No part

More information

How to Configure Authentication and Access Control (AAA)

How to Configure Authentication and Access Control (AAA) How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual

More information

Authentication. August 17, 2018 Version 9.4. For the most recent version of this document, visit our documentation website.

Authentication. August 17, 2018 Version 9.4. For the most recent version of this document, visit our documentation website. Authentication August 17, 2018 Version 9.4 For the most recent version of this document, visit our documentation website. Table of Contents 1 Authentication 4 1.1 Authentication mechanisms 4 1.2 Authentication

More information

KEY DISTRIBUTION AND USER AUTHENTICATION

KEY DISTRIBUTION AND USER AUTHENTICATION KEY DISTRIBUTION AND USER AUTHENTICATION Key Management and Distribution No Singhalese, whether man or woman, would venture out of the house without a bunch of keys in his hand, for without such a talisman

More information

Cryptologic and Cyber Systems Division

Cryptologic and Cyber Systems Division Cryptologic and Cyber Systems Division OVERALL BRIEFING IS Someone Scraped My Identity! Is There a Doctrine in the House? AF Identity, Credential, and Access Management (ICAM) August 2018 Mr. Richard Moon,

More information

Transport Level Security

Transport Level Security 2 Transport Level Security : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l12, Steve/Courses/2013/s2/css322/lectures/transport.tex,

More information

NCP Secure Enterprise macos Client Release Notes

NCP Secure Enterprise macos Client Release Notes Service Release: 3.10 r40218 Date: July 2018 Prerequisites Apple OS X operating systems: The following Apple macos operating systems are supported with this release: macos High Sierra 10.13 macos Sierra

More information

Warm Up to Identity Protocol Soup

Warm Up to Identity Protocol Soup Warm Up to Identity Protocol Soup David Waite Principal Technical Architect 1 Topics What is Digital Identity? What are the different technologies? How are they useful? Where is this space going? 2 Digital

More information

Web 2.0 Lecture 8: Resource Description Framework

Web 2.0 Lecture 8: Resource Description Framework Web 2.0 Lecture 8: Resource Description Framework doc. Ing. Tomáš Vitvar, Ph.D. tomas@vitvar.com @TomasVitvar http://www.vitvar.com Leopold-Franzens Universität Innsbruck and Czech Technical University

More information

X.509 CERTIFICATE X.509 CERTIFICATE PUBLIC-KEY CERTIFICATES THE CERTIFICATE TRIANGLE CERTIFICATE TRUST. INFS 766 Internet Security Protocols

X.509 CERTIFICATE X.509 CERTIFICATE PUBLIC-KEY CERTIFICATES THE CERTIFICATE TRIANGLE CERTIFICATE TRUST. INFS 766 Internet Security Protocols INFS 766 Internet Security Protocols X.509 CERTIFICATE Lecture 6 Digital Certificates VERSION SERIAL NUMBER SIGNATURE ALGORITHM ISSUER VALIDITY Prof. Ravi SUBJECT SUBJECT PUBLIC KEY INFO SIGNATURE 4 PUBLIC-KEY

More information

Decentralized IDentifers (DIDs) Markus Sabadello, M.Sc., M.A. Danube Tech, Sovrin Foundation, OASIS XDI TC.

Decentralized IDentifers (DIDs) Markus Sabadello, M.Sc., M.A. Danube Tech, Sovrin Foundation, OASIS XDI TC. Decentralized IDentifers (DIDs) Markus Sabadello, M.Sc., M.A. Danube Tech, Sovrin Foundation, OASIS XDI TC https://danubetech.com/ on Privacy and Linked Data, Vienna, 17th April 2018 Intro: Self-Sovereign

More information

HIPAA by the Numbers. Presented by: Mark L. Schuweiler Director of Global Information Assurance Services EDS Corporation

HIPAA by the Numbers. Presented by: Mark L. Schuweiler Director of Global Information Assurance Services EDS Corporation HIPAA by the Numbers Presented by: Mark L. Schuweiler Director of Global Information Assurance Services EDS Corporation Security vs Privacy Privacy right of a individual to control his/her personal information

More information

stir-certs-02 IETF 93 (Prague) STIR WG Jon

stir-certs-02 IETF 93 (Prague) STIR WG Jon stir-certs-02 IETF 93 (Prague) STIR WG Jon What we did since -01 Basic specification of the cert extension (TNAuthList) didn t change much here Cert scope may include one or more or many TNs Fleshed out

More information

Contents. G52IWS: The Semantic Web. The Semantic Web. Semantic web elements. Semantic Web technologies. Semantic Web Services

Contents. G52IWS: The Semantic Web. The Semantic Web. Semantic web elements. Semantic Web technologies. Semantic Web Services Contents G52IWS: The Semantic Web Chris Greenhalgh 2007-11-10 Introduction to the Semantic Web Semantic Web technologies Overview RDF OWL Semantic Web Services Concluding comments 1 See Developing Semantic

More information

COMP20008 Elements of Data Processing. Week 1: Lecture 2. Data format and storage

COMP20008 Elements of Data Processing. Week 1: Lecture 2. Data format and storage COMP20008 Elements of Data Processing Week 1: Lecture 2 Data format and storage Announcements Lecture recordings Lecture Capture: Current Technical Issue. There are currently long delays in processing

More information

Telemetry Data Sharing Using S/MIME

Telemetry Data Sharing Using S/MIME Telemetry Data Sharing Using S/MIME Item Type text; Proceedings Authors Kalibjian, Jeffrey R. Publisher International Foundation for Telemetering Journal International Telemetering Conference Proceedings

More information

IBM i Version 7.2. Security Digital Certificate Manager IBM

IBM i Version 7.2. Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM IBM i Version 7.2 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information

More information

SAS Event Stream Processing 4.2: Security

SAS Event Stream Processing 4.2: Security SAS Event Stream Processing 4.2: Security Encryption on Sockets Overview to Enabling Encryption You can enable encryption on TCP/IP connections within an event stream processing engine. Specifically, you

More information

Assignment 11 (NF) - Repetition

Assignment 11 (NF) - Repetition Assignment 11 (NF) - Repetition -- no due date, no submission -- This assignment is meant to help you prepare for the exam. It is not necessary to turn in your solutions. The solutions will be discussed

More information

MediaAUTH Draft Proposal

MediaAUTH Draft Proposal MediaAUTH Draft Proposal August 21, 2012 Contents 1 Introduction 2 2 Service & User Perspective 2 2.1 Login...................................... 2 2.2 Soft Login.................................... 3

More information

Registry for identifiers assigned by the Swedish e- identification

Registry for identifiers assigned by the Swedish e- identification Registry for identifiers assigned by the Swedish e- identification board ELN-0603-v1.3 Version 1.3 2015-10-05 1 (14) 1 BACKGROUND... 3 2 STRUCTURE... 4 2.1 URI IDENTIFIERS... 4 2.2 OID IDENTIFIERS... 4

More information

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University Identity Management and Federated ID (Liberty Alliance) ISA 767, Secure Electronic Commerce Xinwen Zhang, xzhang6@gmu.edu George Mason University Identity Identity is the fundamental concept of uniquely

More information

Knowledge Representation RDF Turtle Namespace

Knowledge Representation RDF Turtle Namespace Knowledge Representation RDF Turtle Namespace Jan Pettersen Nytun, UiA 1 URIs Identify Web Resources Web addresses are the most common URIs, i.e., uniform Resource Locators (URLs). RDF resources are usually

More information

Registry for identifiers assigned by the Swedish e-identification board

Registry for identifiers assigned by the Swedish e-identification board Registry for identifiers assigned by the Swedish e-identification board Version 1.5-2018-06-19 ELN-0603-v1.5 Table of Contents 1. Background 2. Structure 2.1. URI Identifiers 2.2. OID Identifiers 3. Assigned

More information

Cryptographic Concepts

Cryptographic Concepts Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general

More information

VMware Identity Manager vidm 2.7

VMware Identity Manager vidm 2.7 RSA SECURID ACCESS Standard Agent Implementation Guide VMware Daniel R. Pintal, RSA Partner Engineering Last Modified: August 19, 2016 Solution Summary VMware Identity

More information

INDIGO-Datacloud Identity and Access Management Service

INDIGO-Datacloud Identity and Access Management Service INDIGO-Datacloud Identity and Access Management Service RIA-653549 Presented by Andrea Ceccanti (INFN) andrea.ceccanti@cnaf.infn.it WLCG AuthZ WG Meeting Dec, 14th 2017 IAM overview INDIGO IAM The Identity

More information

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006 PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy

More information

and Registration Authorities

and Registration Authorities Introduction to Object Identifiers (OIDs) and Introduction Registration to Authorities Object Identifiers (OIDs) and Registration Authorities France Telecom Orange Olivier Dubuisson 7 March 2011 Many approaches

More information

Overview! Automated Certificate Management (ACME) Protocol! IP-NNI Task Force! Mary Barnes - iconectiv!

Overview! Automated Certificate Management (ACME) Protocol! IP-NNI Task Force! Mary Barnes - iconectiv! Overview! Automated Certificate Management (ACME) Protocol! IP-NNI Task Force! Mary Barnes - iconectiv! ACME Overview! ACME is a protocol being developed in IETF for Automated Certificate Management.!

More information

Security analysis of OpenID, followed by a reference implementation of an npabased OpenID provider

Security analysis of OpenID, followed by a reference implementation of an npabased OpenID provider Security analysis of OpenID, followed by a reference implementation of an npabased OpenID provider Sebastian Feld, Norbert Pohlmann Institute for Internet-Security, if(is) Gelsenkirchen University of Applied

More information

Semantic Web Fundamentals

Semantic Web Fundamentals Semantic Web Fundamentals Web Technologies (706.704) 3SSt VU WS 2017/18 Vedran Sabol with acknowledgements to P. Höfler, V. Pammer, W. Kienreich ISDS, TU Graz December 11 th 2017 Overview What is Semantic

More information

Single Sign-On for PCF. User's Guide

Single Sign-On for PCF. User's Guide Single Sign-On for PCF Version 1.2 User's Guide 2018 Pivotal Software, Inc. Table of Contents Table of Contents Single Sign-On Overview Installation Getting Started with Single Sign-On Manage Service Plans

More information

Copyright. Copyright Ping Identity Corporation. All rights reserved. PingAccess Server documentation Version 4.

Copyright. Copyright Ping Identity Corporation. All rights reserved. PingAccess Server documentation Version 4. Server 4.3 Copyright 1 Copyright 2017 Ping Identity Corporation. All rights reserved. PingAccess Server documentation Version 4.3 June, 2017 Ping Identity Corporation 1001 17th Street, Suite 100 Denver,

More information

Web Security Model and Applications

Web Security Model and Applications Web Security Model and Applications In this Tutorial Motivation: formal security analysis of web applications and standards Our Model of the Web Infrastructure Single Sign-On Case Studies Formal Security

More information

CORRIGENDA ISIS-MTT SPECIFICATION 1.1 COMMON ISIS-MTT SPECIFICATIONS VERSION JANUARY 2008 FOR INTEROPERABLE PKI APPLICATIONS

CORRIGENDA ISIS-MTT SPECIFICATION 1.1 COMMON ISIS-MTT SPECIFICATIONS VERSION JANUARY 2008 FOR INTEROPERABLE PKI APPLICATIONS COMMON ISIS-MTT SPECIFICATIONS FOR INTEROPERABLE PKI APPLICATIONS FROM T7 & TELETRUST CORRIGENDA TO ISIS-MTT SPECIFICATION 1.1 AS OF 16 MARCH 2004 VERSION 1.2 18 JANUARY 2008 Contact Information The up-to-date

More information

Sample excerpt. Virtual Private Networks. Contents

Sample excerpt. Virtual Private Networks. Contents Contents Overview...................................................... 7-3.................................................... 7-5 Overview of...................................... 7-5 IPsec Headers...........................................

More information

Enhanced OpenID Protocol in Identity Management

Enhanced OpenID Protocol in Identity Management Enhanced OpenID Protocol in Identity Management Ronak R. Patel 1, Bhavesh Oza 2 1 PG Student, Department of Computer Engg, L.D.College of Engineering, Gujarat Technological University, Ahmedabad 2 Associate

More information

Single Sign-On Showdown

Single Sign-On Showdown Single Sign-On Showdown ADFS vs Pass-Through Authentication Max Fritz Solutions Architect SADA Systems #ITDEVCONNECTIONS Azure AD Identity Sync & Auth Timeline 2009 2012 DirSync becomes Azure AD Sync 2013

More information

HTTPS--HTTP Server and Client with SSL 3.0

HTTPS--HTTP Server and Client with SSL 3.0 The feature provides Secure Socket Layer (SSL) version 3.0 support for the HTTP 1.1 server and HTTP 1.1 client within Cisco IOS software. SSL provides server authentication, encryption, and message integrity

More information

Microsoft XML Namespaces Standards Support Document

Microsoft XML Namespaces Standards Support Document [MS-XMLNS]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,

More information

Towards the Semantic Desktop. Dr. Øyvind Hanssen University Library of Tromsø

Towards the Semantic Desktop. Dr. Øyvind Hanssen University Library of Tromsø Towards the Semantic Desktop Dr. Øyvind Hanssen University Library of Tromsø Agenda Background Enabling trends and technologies Desktop computing and The Semantic Web Online Social Networking and P2P Computing

More information

Inland Revenue. Build Pack. Identity and Access Services. Date: 04/09/2017 Version: 1.5 IN CONFIDENCE

Inland Revenue. Build Pack. Identity and Access Services. Date: 04/09/2017 Version: 1.5 IN CONFIDENCE Inland Revenue Build Pack Identity and Access Services Date: 04/09/2017 Version: 1.5 IN CONFIDENCE About this Document This document is intended to provide Service Providers with the technical detail required

More information

Public Key Establishment

Public Key Establishment Public Key Establishment Bart Preneel Katholieke Universiteit Leuven February 2007 Thanks to Paul van Oorschot How to establish public keys? point-to-point on a trusted channel mail business card, phone

More information

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow)

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow) Integration Guide PingFederate SAML Integration Guide (SP-Initiated Workflow) Copyright Information 2018. SecureAuth is a registered trademark of SecureAuth Corporation. SecureAuth s IdP software, appliances,

More information

6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename

6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename 6 Public Key Infrastructure 6.1 Certificates Structure of an X.509 certificate X.500 Distinguished Name and X.509v3 subjectalternativename Certificate formats (DER, PEM, PKCS #12) 6.2 Certificate Authorities

More information

Microsoft XML Namespaces Standards Support Document

Microsoft XML Namespaces Standards Support Document [MS-XMLNS]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS DEVICE PROFILING ANALYSIS IN DEVICE-AWARE NETWORK by Shang-Yuan Tsai December 2004 Thesis Advisor: Thesis Co-Advisor: Singh Gurminder John Gibson Approved

More information

ALAP - AgiLe Authentication Provider

ALAP - AgiLe Authentication Provider Documentation ALAP - AgiLe Authentication Provider Description of the Agile Authentication Provider (ALAP) Version 0.1, 23.11.2015 Andreas Fitzek andreas.fitzek@egiz.gv.at Summary: This document describes

More information

Semantic Days 2011 Tutorial Semantic Web Technologies

Semantic Days 2011 Tutorial Semantic Web Technologies Semantic Days 2011 Tutorial Semantic Web Technologies Lecture 2: RDF, The Resource Description Framework Martin Giese 7th June 2011 Department of Informatics University of Oslo Outline 1 The RDF data model

More information

Security Assertions Markup Language

Security Assertions Markup Language . Send comments to: Phillip Hallam-Baker, Senior Author 401 Edgewater Place, Suite 280 Wakefield MA 01880 Tel 781 245 6996 x227 Email: pbaker@verisign.com Security Assertions Markup Language Straw-man

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 7816-15 Second edition 2016-05-15 Identification cards Integrated circuit cards Part 15: Cryptographic information application Cartes d identification Cartes à circuit intégré

More information

From the Web to the Semantic Web: RDF and RDF Schema

From the Web to the Semantic Web: RDF and RDF Schema From the Web to the Semantic Web: RDF and RDF Schema Languages for web Master s Degree Course in Computer Engineering - (A.Y. 2016/2017) The Semantic Web [Berners-Lee et al., Scientific American, 2001]

More information

Participant User Guide, Version 2.6

Participant User Guide, Version 2.6 Developers Integration Lab (DIL) Participant User Guide, Version 2.6 3/17/2013 REVISION HISTORY Author Date Description of Change 0.1 Laura Edens Mario Hyland 9/19/2011 Initial Release 1.0 Michael Brown

More information

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

[MS-ADFSOAL]: Active Directory Federation Services OAuth Authorization Code Lookup Protocol

[MS-ADFSOAL]: Active Directory Federation Services OAuth Authorization Code Lookup Protocol [MS-ADFSOAL]: Active Directory Federation Services OAuth Authorization Code Lookup Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft

More information