CSP Forum 2014, Athens, May

Similar documents
Ανοικτή Διακυβέρνηση & τρόποι εφαρμογής της Σεπτέμβριος 2015

Federal Identity, Credential, and Access Management Trust Framework Solutions. Overview

eidas Regulation (EU) 910/2014 Gábor Bartha DG CONNECT, European Commission Unit "e-government and Trust"

Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market

STORK 2.0: Breaking New Grounds on eid and Mandates

Challenges of eid Interoperability: The STORK Project

ISA Action Pilot DEMO session. Date: Authors: Britt Joosten, Guillermo Enero, Ignasi González

e-sens white paper D3.4 Preliminary Proposal for a governance body Instruments Deliverable 3.4, version 3

Internet identity: Forward in All Directions. Dr Ken Klingenstein, Director, Middleware, Internet2

Principles & Guidance for eidas interoperability track eidas and IAM working side by side 14 November 2017

Cross-Border Legal Identity Management

Hub. Human Trust Protocol. An introduction

Understanding Your Enterprise API Requirements

Review of Priviti PSD2 Use Case and its positioning compared to alternative marketplace offerings

EGI-Engage: The AAI Strategy for the EGI Infrastructure

ICS JUMP Session. IBM Connections Cloud Catalog

MANAGE THE LIFECYCLE OF EVERY DIGITAL USER

<Insert Picture Here> Externalizing Identity

XBRL and the EU ETS. Exploring the opportunities for streamlining ETS reporting

FINACLE SERVICES: API MANAGEMENT USING CA API GATEWAY

Legal Aspects of Identity Management

EduKEEP Towards a User-Centric Identity Management Model

Sharing Acclaim Badges. What to Expect When Earners Share Their Badges

INCOMMON TRUST FEDERATION

COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION STAFF WORKING PAPER. Annex to the COMMUNICATION FROM THE COMMISSION

Identity and Access Management Success Stories.

GÉANT project update. eduteams - AAI as a Service for Collaborative organisations. InAcademia Simple affiliation validation as a Service

eidas Regulation (EU) 910/2014 "Boosting trust in the digital market"

Facilitating interoperable electronic procurement across Europe

Driving XML Standards Convergence and Interoperability

When IOT Meets Blockchain with GS1. Dr. Stephen Lam Chief Operating Officer GS1 Hong Kong

Delivering Rich Cloud Services with APS 2.0. Michael Toutonghi, Parallels CTO

E-Commerce. Other Apps. Organizational Applications 6/14/2016. Electronic Commerce. Prof. Ir. Kudang B. Seminar, MSc, PhD.

Integrating the Healthcare Enterprise (IHE) Integration Statement

The Austrian Citizen Card

Remote Access Virtual Environment (RAVE)

REFIT Platform Opinion

Medical Virtual Public Services

Blockchain Eine technische Einführung Roadshow Blockchain München, 21 März 2018

Oracle Identity und Access Management

STREAMLINING USER PROVISIONING WITHIN JIVE USING ACTIVE DIRECTORY

e-prior Facilitating interoperable electronic procurement across Europe Technical Overview

Auditing Identity & Access Management: Addressing the Root Causes

Study on the use of Electronic Identification (eid) for the European Citizens' Initiative

#CITIZENS #PARTICIPATION #EUROPEAN UNION #INTERNET #DISTRUST

A Business-Driven Web Service Creation Methodology

Direktur Komunikasi & Sistem Informasi I

INNOVATION MANAGEMENT

Case Study. How Gemalto s Trust ID Network is revolutionizing self-sovereign digital identities by leveraging R3 s Corda blockchain platform

BUYER S GUIDE: CUSTOMER IDENTITY & ACCESS MANAGEMENT (CIAM)

Automating the Collaborative Enterprise

2.2 SEMANTIC INTEROPERABILITY FOR REPRESENTATION POWERS AND MANDATES ( )

Annex 7 - Critical Success Factors

Orig. Date: TABLE OF CONTENTS. I. Purpose... 2 II. Standards... 2

InAcademia. Simple Validation Service

A Web Services Based Architecture for Improvement of the Transparency and Decision-making in Public Administration

All the presented projects have received funding from the European Union s Horizon 2020 research and innovation programme

OPIRIA & PDATA TOKEN Summary

Recruiting Privacy Statement

CaSPAR Remote Qualified. electronic signatures with Smartphones. Dr. Sven Kloppenburg, AUTHADA

InAcademia Simple Validation Service

Aaron Wright November 15,

Your Guide to the Identity of Things

Security for the Internet of Things: Strategy and Road Map

Enterprise Blockchain Solutions

Both Sides of the Coin: Addressing Online and Mobile Privacy Concerns for Canadian Consumers and Advertisers

Success factors for governments and business in standards-based cross-border implementations: the case of e-procurement

egovernment adoption Cases based on ebxml

RSA SECURID ACCESS Implementation Guide. Rescale

THE B2X WORLD B2B. Electronic Transactions. by Koussouris S., Lampathaki F., Askounis D.

GridEcon The Economic-Enhanced Next-Generation Internet

Greek Presidency of the European Union

The World of e-business Management Information Systems

Global Issues in the Digital Economy. OECD - APEC Global Forum Policy Frameworks for the Digital Economy Honolulu, January 2003

ANNEX: cross border electronic transactions. The old framework the e Signature Directive of 1999 was a big step. However, the European

Open Global Trade Digitization Platform

Vertical service-oriented solutions supporting industrial inter-enterprise collaboration

The Digital Firm: Electronic Business and Electronic Commerce by Prentice Hall

Universal Description, Discovery and Integration (UDDI) 1.0

TISA Digital ID Pilot High Level Approach September

Higher Ed. Identity Management Collaboration : Position Paper - Making Identity Federation Work for Canadian Universities

New business models and revenue streams with blockchain

117 shades of black within PSD2

Will the Online Banking e-payments stimulate e-commerce in Europe? Piet Mallekoote, CEO Currence Brussels, 4 May 2012

THE DIGITAL FIRM: ELECTRONIC COMMERCE AND ELECTRONIC BUSINESS

CORA - MODERNIZING PUBLIC ADMINISTRATION IN SPAIN

Open Banking, PSD2 and the New API Economy

GIGYA: Connect, Collect, Convert

Utilizing Oracle Standard Functionality and other Oracle tools to comply with Sarbanes- Oxley By Olga Johnson City of Detroit

Enabling NASA Software-as-a-Service (SaaS) Use

Deployment Recommendations for SAP Fiori Front-End Server & SAP Fiori Cloud

Emmanuelle Ganne, Senior Analyst, WTO

Accelerate Order-to-Cash on Any Device Fuel Revenue Through Your CRM

Selective distribution after Coty and the interplay of the geo-blocking regulation with competition law

TokenD principles. A framework for enterprise tokenization platforms. Distributed Lab

Mission Billion Challenge Webinar Presentation

CompatibleOne Open Source Cloud Broker Architecture Overview

A Semantic Service Oriented Architecture for Enterprise Application Integration

14. E-Commerce Applications and Infrastructures

InAcademia Simple Validation Service

Transcription:

CSP Forum 2014, Athens, May STORK 2.0 in motion! Identity as a Service and the emerging Attribute Economics <Petros KAVASSALIS, Univ. of the Aegean, i4m Lab & CTI, Greece> <Stelios LELIS, Univ. of the Aegean, i4m Lab, Greece>

STORK 2.0 in a nutshell A common framework for cross-border federation and delivery of electronic identity in Europe In online-processes web authentication via multi-attributes digital identities e-mandate provision (vital for legal entities) e-signature cross-border transfer Open standards (SAML 2.0, HTTP POST, WebSSO) Allowing different deployment models Centralized (aka PEPS proxy nodes) Decentralized (aka middleware ) Pilots in real-world environment (examples, open a bank account, diploma supplement, mandates with detailed power description etc.) Previous STORK until Dec. 2011 - STORK 2.0: 2013-15, go pilot now, go in real life after the end of STORK 2.0 2

What is a digital identity today? A digital identity is a composite document Multi-section; each section includes a personal attribute Multi-provider; attributes are collected from multiple Identity and Attribute Providers -- IdPs and APs providing service at different quality levels (LOA) Is managed by a federated identity structure (which also manages the user consent process) Is created through the collection of attributes from IdPs and APs members of the federation Is delivered to a Service Provider (SP), and consumed by the SP in an online authentication are access control process 3

STORK 2.0 is a large EU online identity federation identity as a service STORK EU-EEA MS proxy nodes MS B ***In US: Backend Attribute Exchange (BAE) but only for Federal Government Services Identity and Attribute Providers 4

It is essentially: (i) a network of proxy nodes (PEPS) IdP AP C-PEPS SP S-PEPS 5

It is essentially: (ii) an attribute collection and aggregation service STORK 2.0 ACS 6 1 2 7 AtP1 AP SP SP 11 10 3 9 8 AtP2 5 attribute collection service 4 IdP Interaction with the user National IdP 6

STORK enabled applicatons STORK 2.0 in (industry) perspective: strengthen links with key players from my point of view common enterprise technologies WS-REST AP SP IdP industry nodes (academia, banks etc.) common syntax, semantics common enterprise technologies SSO-WS-workflow Streamline to increase efficiency 7

STORK 2.0 enabler for an EU market for identity attributes from my point of view What is a market for attributes? The product? Attributes stored in various databases around the world Trend product: digital badges for professional qualifications Early example: facebook list of friends The buyers? In the beginning, the Online Service Providers now the emerging Attribute Brokers Example: ID DataWeb (IDW) Attribute Exchange Network (AXN) eidas creates a positive environment for identity attributes commerce STORK can play the role of enabler and rule-setting for personal data protection, privacy, transparency, non-discrimination etc. 8

New Developments on the Enterprise Integration Architecture and Internet of Things side Bring Your Own Identity! Gartner: By 2020, 60% of digital identities interacting with the enterprise will come from external identity providers through a competitive marketplace up from less than 10% today Attribute-Based Access Control (ABAC) Access rights are granted to users upon request and through the use of policies which combine attributes together. Capability-Based Access Control (new) Attributes for autonomic things and services Access tokens embedded in things and services that provide permission access Personal Identity Attributes meet Object Attributes 9

Towards Attribute (industrial) economics How much attributes should be transferred to Attribute Consumers (Service Providers, ABAC systems etc )? What is the optimal quantity of the disclosed personal information? Too much attributes introduce: Privacy costs (for the customer) Exploration and storage costs (for the Attributes Consumer, SP etc.) Is there room for negotiation in the definition of the requested attributes for a transaction access authorization? Price-based negotiation? Brokerage? A price overhead for reselling attributes? 10