SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
Landscape of
 Web Identity Management
                                                                       Surveillance




                                                                                                                                                                                    User-centric
Data Protection
                                                                       RFID
                                                                                                                 Authentication                                                                                                                                         Credentials
                                                                                                                                                                                                         Aggregation




                                                                                                                                                                                                                                                                                    Data Protection
     Identity Theft




                                                                                                                                                                                                                                                                                             Transparency
            Claims




                      Tracking Confidentiality                                                                                                                                                        Access Control




                                                                                                                                    LBS
                      Attributes                                                Smartcards                                                                                                         Anonymity
                      Context-awareness




                                                                                                                                                                                                                 GPS
                                                                                                                                                                                                                              Loyalty
          Personalisation
          Cyber Security
                                                                                                                                                         Biometry                                                                       CRM
                                                                                                                                                         Policies                                                                       Privacy
                                                                                                                                                                  Profiling                                        Interoperability



                                                                                                                                                                               Technologies
                                                                                                                                                              Authorizing
                                                                                                                                                                 User



                                                            Use Ca
                                                              e Cases                                                                  Manage
                                                                                                                                       Ma

                                                                                                                                                                    Control
                                                                                                                                                                                                         Kantara - UMA 2012
                                                                                                                                                                                                         User-Managed Access is a protocol designed to give a web
                                                                                                                                                                                                         user a unified control point for authorizing who and what
                                                                                                                             Host                                                                        can get access to their online personal data (such as identity
                                                                                                                                             Protect         Authorization
                                                                                                                                       PEP             PDP                                    Delegate
                                                                                                                                                                                                         attributes), content (such as photos), and services
                                                                                                                                                               Manager
                                                                                                                           Protected                                                                     (such as viewing and creating status updates).
                                                                                                                           Resource                                                                                                                                            Shibboleth is an
                                                                       eGov
                                                                       eGov
                                                                        G       nt
                                                                       eGovernment                                                                                                                                                                                        Internet2 Middleware
                                                       ess
                                                       ess
                                                 eBusiness                                                                                                                                                                                                          Initiative project that has
                                                                                                                                                                                                                                                               created an architecture and
                                                                                                                                                                   Authorize
                                                                                                                                                                                                                                                          open-source implementation for
                                                                                                                                       Access                                                                                                              Identity management and federated
                                                                                                                                                                                                                                                            identity-based authentication and
                                                                                                                                                                                                                                                             authorization (or Access control)
                                                                                                                                                                                                                                                             infrastructure based on SAML.
                                                                                   mar
                                                                                   ma t
                                                                                    art
                                                                                 Smart                                                                                                                                              h
                                                                                                                                                                                                                           Shibbolet
                                                                                                                                                              Requester


                                                                                  ronments
                                                                                  ronments
                                                                                    nm
                                                                                     m
                                                                              Environments
                                               eHealth
                                                                                                                                                                             2.0 ect
                                                                                                             The OAuth 2.0 authorization proto-                                                                                                                  Identity Mixer (idemix) is an anonymous
                                                                                                             col enables a third-party application
                                                                                                                                                                                                                                 Ide                            credential system developed at IBM
                                                                                                             to obtain limited access to an HTTP
                                                                                                             service, either on behalf of a resource                    u th        n                                                    mix                    Research that enables strong authentica-

                                                                                                                                                                     OA          on
                                                                                                              owner by orchestrating an approval                                                                                                               tion and privacy at the same time. With
                                                           Social & Business                                                                                                   C                                                                              identity mixer, users can obtain from an
                                                                                                                                                                                                              C rd p
                                                                                                                                                                                                              CardSp




                                                                                                              interaction between the resource
                                                                                                                                                                                                              Hi




                                                                                                               owner and the HTTP service, or by                                                                                                             issuer a credential containing all the
                                    Corporate
                                            e
                                           te                  Networks                                                                                                              ID
                                                                                                                                                                                                               ig
                                                                                                                                                                                                         ve




                                                                                                               allowing the third-party application to                                                                                                     information the issuer is ready to attest
                                       IdM                                                                      obtain access on its own behalf.
                                                                                                                                                                                  en                                                                       about them. When a user later wants to
                                                                                                                                                                                                                  gi
                                                                                                                                                                                                                  gi




                                                                                                                                                                               Op
                                                                                                                 (The OAuth 2.0 Authoriza-                                                                                                                        prove to a service provider a state-
                                                                                                                                                                                                   U-Pro



                                                                                                                                                                                                                     ns




                                                                                                                  tion Protocol draft-ietf-                                                                                                                           ment about her, she employs
                                                                                                                                                                                                                      s




                                                                                                                   oauth-v2-25,                                                                                                                    Higgins –               identity mixer to securely
                                                                                                                    March 8,                    OpenID Connect                                                                                                                  transform the
                                                                                                                                                                                                                                                initiated 2003 – is
                                                                                                                                                                                                                        a e
                                                                                                                                                                                                                        ac e




                                                                                                                     2012)                 OpenID Connect (based
                                                                                                                                       on the OAuth 2.0 protocol) is                                                                         a framework that                        issued creden-
                                                                                                                                  a suite of lightweight specifications                                                                   enables users and enterprises to                 tial.
                                                                                                                             that provide a framework for identity                                                                      integrate identity, profile, and

                                         User Empowerment                                                                interactions via RESTful APIs. The simp-                                                                         relationship information across multi-
                                                                                                                           lest deployment of OpenID Connect                U-Prove is a                      Windows CardSpace            ple systems. Applications can use Higgins
                                                                                                                             allows for clients of all to request          cryptographic tech-                is Microsoft's client          to create a unified, virtual view of
                                                                                                                               and receive information about             nology that enables                  software for the Identity       identity, profile and relationship
                                                                                                                                 identities and currently               the issuance and pre-                 Metasystem (canceled in           information. A key focus of
                                                                                                                                    authenticated sessions.           sentation of cryptogra-                 Feb 2011). CardSpace                Higgins is providing a founda-
                                                                                                                                      (Implementer’s Draft,          phically protected claims                stores references to users'          tion for new "user-centric
                                                                              Privacy by Design                                          Feb. 14, 2012)            in a manner that provides
                                                                                                                                                                 multi-party security. The goal
                                                                                                                                                                                                              digital identities for them.
                                                                                                                                                                                                              Resistance to phishing attacks
                                                                                                                                                                                                                                                     identity" and personal
                                                                                                                                                                                                                                                       information
                                                                                                                                                               is to enable the exchange of                   and adherence to Kim                       management
                                                                                                                                                              verified identity information                    Cameron's "7 Laws of Identity”              applica-
                                                                              User-centric Services                                                         from sources (Claims Provider),
                                                                                                                                                           under the user’s control (via the
                                                                                                                                                                                                              were goals in its design. Windows
                                                                                                                                                                                                              CardSpace 2.0 will be extended to
                                                                                                                                                                                                                                                           tions.
                                                                                                                                                            U-Prove Agent), to the recipients                 use the U-Prove protocol.
                                                                                                                                                                 (Relying Party).
                                                                              Data Protection
                                                                              Context-awareness
                                                                              Identity Management                                                                             Threats
                                                                              Usable Security                                                            Identity Theft
                                                                                                                                                                                                         tamper
                                                                                                                                                         Surveillance

                                                                                                  In the future internet users
                                                                                                                                                         Profiling                                    misinform
                                                                                                 will be downloaded as apps.
                                                                                        en
                                                                                        t




                                                                             s    sm                                                                   deny                                 misuse
                                  Privacy Impact A                       sse                 Virtual identities
                                                                                           will be created dynamically
                      Compliance                                                                and context-aware.                                                              spy
                                                                                     The
                        to data protec-                                      users master                                                                                       out
                           tion laws and securi- Authorised Confirmed           their identity life
                               ty policies will subscribers    subscribers        cycle securely
                                   be built     are up-to-date are authorised       and confidentially.
                                        in.    at any time.     to access partial
                                                                 profiles.


7 Laws of Identity
                                                                                                                                                                                                    Contact:
1. User Control and Consent                                              5. Pluralism of Operators and Technologies                                                                                 Mario Hoffmann
2. Minimal Disclosure for a Constrained Use                              6. Human Integration                                                                                                       mario.hoffmann@aisec.fraunhofer.de
3. Justifiable Parties                                                    7. Consistent Experience Across Contexts                                                                                   www.identity‐competence‐center.de
4. Directed Identity                                                     Kim Cameron (http://www.identityblog.com/stories/2004/12/09/thelaws.html)

Weitere ähnliche Inhalte

Ähnlich wie Landscape of Web Identity Management

A Recipe For Innovation and Creative Thinking [creating the 8th wonder of the...
A Recipe For Innovation and Creative Thinking [creating the 8th wonder of the...A Recipe For Innovation and Creative Thinking [creating the 8th wonder of the...
A Recipe For Innovation and Creative Thinking [creating the 8th wonder of the...Vishy Poosala
 
M2M Billing - Comarch M2M Projects
M2M Billing - Comarch M2M ProjectsM2M Billing - Comarch M2M Projects
M2M Billing - Comarch M2M ProjectsComarch
 
Csooow12 amit-jasuja-securing-new-experience6
Csooow12 amit-jasuja-securing-new-experience6Csooow12 amit-jasuja-securing-new-experience6
Csooow12 amit-jasuja-securing-new-experience6OracleIDM
 
Emulex OneCommand Management Framework
Emulex OneCommand Management Framework Emulex OneCommand Management Framework
Emulex OneCommand Management Framework Emulex Corporation
 
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Towards a Trustworthy Privacy in Pervasive Video Surveillance SystemsTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systemssipcworkshop
 
Reference architecture for community clouds
Reference architecture for community cloudsReference architecture for community clouds
Reference architecture for community cloudsJonathan Spindel
 

Ähnlich wie Landscape of Web Identity Management (7)

A Recipe For Innovation and Creative Thinking [creating the 8th wonder of the...
A Recipe For Innovation and Creative Thinking [creating the 8th wonder of the...A Recipe For Innovation and Creative Thinking [creating the 8th wonder of the...
A Recipe For Innovation and Creative Thinking [creating the 8th wonder of the...
 
M2M Billing - Comarch M2M Projects
M2M Billing - Comarch M2M ProjectsM2M Billing - Comarch M2M Projects
M2M Billing - Comarch M2M Projects
 
Csooow12 amit-jasuja-securing-new-experience6
Csooow12 amit-jasuja-securing-new-experience6Csooow12 amit-jasuja-securing-new-experience6
Csooow12 amit-jasuja-securing-new-experience6
 
Emulex OneCommand Management Framework
Emulex OneCommand Management Framework Emulex OneCommand Management Framework
Emulex OneCommand Management Framework
 
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Towards a Trustworthy Privacy in Pervasive Video Surveillance SystemsTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
 
Getting Started In The Cloud
Getting Started In The CloudGetting Started In The Cloud
Getting Started In The Cloud
 
Reference architecture for community clouds
Reference architecture for community cloudsReference architecture for community clouds
Reference architecture for community clouds
 

Mehr von Fraunhofer AISEC

Fraunhofer Magazin weiter.vorn
Fraunhofer Magazin weiter.vornFraunhofer Magazin weiter.vorn
Fraunhofer Magazin weiter.vornFraunhofer AISEC
 
Produktschutz-Technologien für elektronische Geräte
Produktschutz-Technologien für elektronische GeräteProduktschutz-Technologien für elektronische Geräte
Produktschutz-Technologien für elektronische GeräteFraunhofer AISEC
 
Cyber-Sicherheit - Newsletter 2013
Cyber-Sicherheit - Newsletter 2013Cyber-Sicherheit - Newsletter 2013
Cyber-Sicherheit - Newsletter 2013Fraunhofer AISEC
 
Native Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on AndroidNative Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on AndroidFraunhofer AISEC
 
An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition Fraunhofer AISEC
 
Marktchancen mit IT-Sicherheit
Marktchancen mit IT-SicherheitMarktchancen mit IT-Sicherheit
Marktchancen mit IT-SicherheitFraunhofer AISEC
 
Cybersecurity 2013 - Design for Security
Cybersecurity 2013 - Design for SecurityCybersecurity 2013 - Design for Security
Cybersecurity 2013 - Design for SecurityFraunhofer AISEC
 
Sicherheitsgipfel - Chancen und Risiken der IT
Sicherheitsgipfel - Chancen und Risiken der ITSicherheitsgipfel - Chancen und Risiken der IT
Sicherheitsgipfel - Chancen und Risiken der ITFraunhofer AISEC
 
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidFraunhofer AISEC
 
PEP - Protecting Electronic Products
PEP - Protecting Electronic ProductsPEP - Protecting Electronic Products
PEP - Protecting Electronic ProductsFraunhofer AISEC
 
Firmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote UpdateFirmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote UpdateFraunhofer AISEC
 
Cyber Security aus Sicht der Wissenschaft
Cyber Security aus Sicht der WissenschaftCyber Security aus Sicht der Wissenschaft
Cyber Security aus Sicht der WissenschaftFraunhofer AISEC
 
IKT-Trends und deren Bedeutung für eHealth
IKT-Trends und deren Bedeutung für eHealthIKT-Trends und deren Bedeutung für eHealth
IKT-Trends und deren Bedeutung für eHealthFraunhofer AISEC
 
Innovation braucht Sicherheit - Sicherheit braucht Forschung
Innovation braucht Sicherheit - Sicherheit braucht ForschungInnovation braucht Sicherheit - Sicherheit braucht Forschung
Innovation braucht Sicherheit - Sicherheit braucht ForschungFraunhofer AISEC
 

Mehr von Fraunhofer AISEC (20)

Fraunhofer Magazin weiter.vorn
Fraunhofer Magazin weiter.vornFraunhofer Magazin weiter.vorn
Fraunhofer Magazin weiter.vorn
 
Internet of (Every)Thing
Internet of (Every)ThingInternet of (Every)Thing
Internet of (Every)Thing
 
App Ray: 10000 Apps
App Ray: 10000 AppsApp Ray: 10000 Apps
App Ray: 10000 Apps
 
Produktschutz-Technologien für elektronische Geräte
Produktschutz-Technologien für elektronische GeräteProduktschutz-Technologien für elektronische Geräte
Produktschutz-Technologien für elektronische Geräte
 
Cyber-Sicherheit - Newsletter 2013
Cyber-Sicherheit - Newsletter 2013Cyber-Sicherheit - Newsletter 2013
Cyber-Sicherheit - Newsletter 2013
 
Native Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on AndroidNative Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on Android
 
An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition
 
Marktchancen mit IT-Sicherheit
Marktchancen mit IT-SicherheitMarktchancen mit IT-Sicherheit
Marktchancen mit IT-Sicherheit
 
Cybersecurity 2013 - Design for Security
Cybersecurity 2013 - Design for SecurityCybersecurity 2013 - Design for Security
Cybersecurity 2013 - Design for Security
 
Sicherheitsgipfel - Chancen und Risiken der IT
Sicherheitsgipfel - Chancen und Risiken der ITSicherheitsgipfel - Chancen und Risiken der IT
Sicherheitsgipfel - Chancen und Risiken der IT
 
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on Android
 
PEP - Protecting Electronic Products
PEP - Protecting Electronic ProductsPEP - Protecting Electronic Products
PEP - Protecting Electronic Products
 
Firmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote UpdateFirmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote Update
 
Infografik Produktschutz
Infografik ProduktschutzInfografik Produktschutz
Infografik Produktschutz
 
Cyber Security aus Sicht der Wissenschaft
Cyber Security aus Sicht der WissenschaftCyber Security aus Sicht der Wissenschaft
Cyber Security aus Sicht der Wissenschaft
 
Produktschutz Infografik
Produktschutz InfografikProduktschutz Infografik
Produktschutz Infografik
 
IKT-Trends und deren Bedeutung für eHealth
IKT-Trends und deren Bedeutung für eHealthIKT-Trends und deren Bedeutung für eHealth
IKT-Trends und deren Bedeutung für eHealth
 
Innovation braucht Sicherheit - Sicherheit braucht Forschung
Innovation braucht Sicherheit - Sicherheit braucht ForschungInnovation braucht Sicherheit - Sicherheit braucht Forschung
Innovation braucht Sicherheit - Sicherheit braucht Forschung
 
Alan Turing
Alan Turing Alan Turing
Alan Turing
 
Sicherheit im Smart Grid
Sicherheit im Smart GridSicherheit im Smart Grid
Sicherheit im Smart Grid
 

Kürzlich hochgeladen

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Kürzlich hochgeladen (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Landscape of Web Identity Management

  • 1. Landscape of Web Identity Management Surveillance User-centric Data Protection RFID Authentication Credentials Aggregation Data Protection Identity Theft Transparency Claims Tracking Confidentiality Access Control LBS Attributes Smartcards Anonymity Context-awareness GPS Loyalty Personalisation Cyber Security Biometry CRM Policies Privacy Profiling Interoperability Technologies Authorizing User Use Ca e Cases Manage Ma Control Kantara - UMA 2012 User-Managed Access is a protocol designed to give a web user a unified control point for authorizing who and what Host can get access to their online personal data (such as identity Protect Authorization PEP PDP Delegate attributes), content (such as photos), and services Manager Protected (such as viewing and creating status updates). Resource Shibboleth is an eGov eGov G nt eGovernment Internet2 Middleware ess ess eBusiness Initiative project that has created an architecture and Authorize open-source implementation for Access Identity management and federated identity-based authentication and authorization (or Access control) infrastructure based on SAML. mar ma t art Smart h Shibbolet Requester ronments ronments nm m Environments eHealth 2.0 ect The OAuth 2.0 authorization proto- Identity Mixer (idemix) is an anonymous col enables a third-party application Ide credential system developed at IBM to obtain limited access to an HTTP service, either on behalf of a resource u th n mix Research that enables strong authentica- OA on owner by orchestrating an approval tion and privacy at the same time. With Social & Business C identity mixer, users can obtain from an C rd p CardSp interaction between the resource Hi owner and the HTTP service, or by issuer a credential containing all the Corporate e te Networks ID ig ve allowing the third-party application to information the issuer is ready to attest IdM obtain access on its own behalf. en about them. When a user later wants to gi gi Op (The OAuth 2.0 Authoriza- prove to a service provider a state- U-Pro ns tion Protocol draft-ietf- ment about her, she employs s oauth-v2-25, Higgins – identity mixer to securely March 8, OpenID Connect transform the initiated 2003 – is a e ac e 2012) OpenID Connect (based on the OAuth 2.0 protocol) is a framework that issued creden- a suite of lightweight specifications enables users and enterprises to tial. that provide a framework for identity integrate identity, profile, and User Empowerment interactions via RESTful APIs. The simp- relationship information across multi- lest deployment of OpenID Connect U-Prove is a Windows CardSpace ple systems. Applications can use Higgins allows for clients of all to request cryptographic tech- is Microsoft's client to create a unified, virtual view of and receive information about nology that enables software for the Identity identity, profile and relationship identities and currently the issuance and pre- Metasystem (canceled in information. A key focus of authenticated sessions. sentation of cryptogra- Feb 2011). CardSpace Higgins is providing a founda- (Implementer’s Draft, phically protected claims stores references to users' tion for new "user-centric Privacy by Design Feb. 14, 2012) in a manner that provides multi-party security. The goal digital identities for them. Resistance to phishing attacks identity" and personal information is to enable the exchange of and adherence to Kim management verified identity information Cameron's "7 Laws of Identity” applica- User-centric Services from sources (Claims Provider), under the user’s control (via the were goals in its design. Windows CardSpace 2.0 will be extended to tions. U-Prove Agent), to the recipients use the U-Prove protocol. (Relying Party). Data Protection Context-awareness Identity Management Threats Usable Security Identity Theft tamper Surveillance In the future internet users Profiling misinform will be downloaded as apps. en t s sm deny misuse Privacy Impact A sse Virtual identities will be created dynamically Compliance and context-aware. spy The to data protec- users master out tion laws and securi- Authorised Confirmed their identity life ty policies will subscribers subscribers cycle securely be built are up-to-date are authorised and confidentially. in. at any time. to access partial profiles. 7 Laws of Identity Contact: 1. User Control and Consent 5. Pluralism of Operators and Technologies Mario Hoffmann 2. Minimal Disclosure for a Constrained Use 6. Human Integration mario.hoffmann@aisec.fraunhofer.de 3. Justifiable Parties 7. Consistent Experience Across Contexts www.identity‐competence‐center.de 4. Directed Identity Kim Cameron (http://www.identityblog.com/stories/2004/12/09/thelaws.html)