Www.chyp.com Please Copy and Distribute 1 Privacy and Inclusion: Can you have both in digital identity? 18 April 2016.

Slides:



Advertisements
Similar presentations
Conclusions from e-Health
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
cetis Really Complex Web Service Specifications Scott Wilson.
1 Leveraging Your Existing Campus Systems to Access Resource Partners: Federated Identity Management and Tales of Campus Participation EDUCAUSE 2006 October.
HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
US View on the Technological Convergence Between the Internet of Things and Cloud Computing June 1, 2010 Brussels, Belgium Presented by: Dan Caprio.
Trusted computing: implementing virtual identity Dave Birch. Director, Consult Hyperion. Introduction  Trusted computing  TCPA & Palladium.
Technical Issues with Establishing Levels of Assurance Zephyr McLaughlin Lead, Security Middleware Computing & Communications University of Washington.
Cross Sector Digital Identity Initiative March 12, 2014 Hearing on the National Strategy for Trusted Identities in Cyberspace (NSTIC) Cross Sector Digital.
1 ARPA A regional infrastructure for secure role-based access to RTRT services Ing. Laura Castellani Tuscany Region.
A case for Shibboleth and grid security: are we paranoid about identity? UK e-Science All Hands Meeting, 2006 Mark Norman 19 Sept 2006.
Identity Federation: Some Challenges and Thoughts OGF 19 Jan 30, 2007 Von Welch
Government Online – White Paper Companion – Copyright © 2007 Credentica Inc. All Rights Reserved. This presentation is animated. Press the “space bar”
Insight Consulting Siemens Identity Management Survey Conducted April – June 2007 Info
Agenda Project beginnings and funding. Purpose of the federation. Federation members. Federation protocols. Special features in our federation. Pilot.
Identity & Access Management DCS 861 Team2 Kirk M. Anne Carolyn Sher-Decaustis Kevin Kidder Joe Massi John Stewart.
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
May 22, 2002 Joint Operations Group Discussion Overview Describe the UC Davis Security Architecture Describe Authentication Efforts at UC Davis Current.
SOA Security Chapter 12 SOA for Dummies. Outline User Authentication/ authorization Authenticating Software and Data Auditing and the Enterprise Service.
Lecture to Carleton University, Center for European Studies, December 1, 2010.
National Strategies for Digital Identity Management UNCITRAL Colloquium on Electronic Commerce February 2011, New York Laurent Bernat – OECD Secretariat.
Federating Identity Management in the Government of Canada Identity North Conference November 20 th 2012 Presented by: Rita Whittle Senior Director, Cyber.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
Non-immigration Applications for Incorporation into the Smart ID Card Information Technology and Broadcasting Bureau 20 December 2001.
Sierra Systems itSMF Development Days Presentation March 4 th, 2014 Colin James Assyst Implementation Specialist.
Lee Kinsman (soon to be) Consultant, Chamonix IT Consulting
Identifying the Baseline IDESG Security Committee Discussion 10/23/
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.
Integrating with UCSF’s Shibboleth system
Identity Assurance Services For Preventing Identity Theft Bob Pinheiro Robert Pinheiro Consulting LLC
Challenges to a Canadian Identity Policy: Learning from International Experiences Krista Boa, Andrew Clement & Gus Hosein Identity Project - Canada 7th.
Norman Wiseman JISC Head of Programmes Presentation to JISC Authentication Concertation Day March 1999 International Authentication Activities Joint Information.
GC Credential Management Evolution for the OASIS/World Bank eGov Workshop 17 th April, 2009For information, please contact:
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
Public Key Encryption  Illustration  Uses  Importance  RSA  Cryptcard.
Levels of Assurance in Authentication Tim Polk April 24, 2007.
Identity Assurance: When it Matters David L. Wasley Internet2 / InCommon.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
April 8, 2011Page 1 April 8, 2011 The University of Texas Interdisciplinary Energy Conference Overcoming Barriers to Smart Grid & New Energy Services Panel.
MAT U M A T U Middleware Assisted Take-Up Service For JISC Funded Early Adopters.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The privacy risks and rewards of distributed identity Conference Presentation (8 September 2003) Surveillance and Privacy 2003, University of New South.
CPS 82, Fall Privacy l Taxonomy of Privacy  Understanding Privacy, Daniel Solove, MIT Press 2008 l Information Processing  Aggregation  Identification.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
All Rights Reserved 2014 © CMG Consulting LLC Federated Identity Management and Access Andres Carvallo Dwight Moore CMG Consulting, LLC October
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
Creating a European entity Management Architecture for eGovernment Id GUIDE Keiron Salt
C. Bettini, X.S. Wang, S. Jajodia Secure Data Management (SDM 2005), pp , DOI: / _13. David MacDonald.
Shibboleth for Middle Schools James Burger -
Towards an IoT Good Practice Workshop organized by the DC IoT on 12 November 2015, 09:00 – 10:30, Joao Pessoa.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Please Copy and Distribute 1 Blockchain Understanding the Potential of Blockchain and Shared Ledger Technology TechUK April 2016.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Digital Identity and My Data as Business Enablers 1 My Pekka Turpeinen, Business Architect.
6 Tips To Grow Your Business
CONTACT: Glenda Hill, MBA (775)
Law Enforcement Information Sharing Program (LEISP) Federated Identity Management Pilot February 27, 2006.
Sandy Porter - Strategy Director Avoco Secure
Extending Authentication to Members of Social Networks
OTA & IoT A Shared & Collaborative Responsibility 24 October 2017
Open Banking & PSD2 How regulation is shaping the future of banking
HIPAA.
Who Uses Encryption? Module 7 Section 3.
Reiniger LLC.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Global Smart Card Market to hit $65 Bn by 2025: Global Market Insights.
Presentation transcript:

Please Copy and Distribute 1 Privacy and Inclusion: Can you have both in digital identity? 18 April 2016

Please Copy and Distribute Who cares about privacy? “If You Have Something You Don't Want Anyone To Know, Maybe You Shouldn't Be Doing It”, Eric Schmidt (2010) Google makes secure boot, full-disk encryption mandatory for some Android 6.0 devices (2015) “Privacy is a fundamental human right”, Tim Cook (2015) 2

Please Copy and Distribute Why is privacy important to digital identity? 3 Consult Hyperion, 2013 IoT

Please Copy and Distribute The project Digital identity is a key enabler for inclusive services in emerging markets Can we get privacy by design? Existing foundational digital identity systems tend to be expensive state led eID smart cards What other digital identity models are there and how well do they address both privacy and inclusion? 4

Please Copy and Distribute How to assess? Need to think about: Regulatory Technical Commercial 5 What is digital identity: Identification Authentication Authorisation Centralised Decentralised Key issues: Surveillance Data breach Identity theft Inappropriate use of data

Please Copy and Distribute Federated RegulatoryTechnicalCommercial UnregulatedFB FederationConflicts privacy RegulatedOpen FederationCould allow privacy 6 Identification Establish identity Authentication Assert identity Authorisation Use identity Identity Provider Service Provider Collect Data Share Data Key issues: Surveillance Data breach? Identity theft Inappropriate use of data

Please Copy and Distribute Brokered Identity RegulatoryTechnicalCommercial GPGsHubGovernment Pays 7 Identification Establish identity Authentication Assert identity Authorisation Use identity Identity Provider Service Provider Collect Data HUB Share Data Key issues: Surveillance? Data breach? Inclusive?

Please Copy and Distribute Brokered Authentication RegulatoryTechnicalCommercial GoCAuthentication HubGovernment Pays 8 Identification Establish identity Authentication Assert identity Authorisation Use identity Credential Provider Service Provider Collect Data HUB No Data Key issues: Not really an identity system...but authentication could be a foundation to grow identity?

Please Copy and Distribute Personal IDP RegulatoryTechnicalCommercial Market definedUser is control pointMarket defined 9 Identification Establish identity Authentication Assert identity Authorisation Use identity Attribute Provider Service Provider Collect Data Share Data User Agent Key issues: Critical mass Greater reliance on individual

Please Copy and Distribute In summary 10 Inclusion Privacy Centralised Decentralised Direction of the market

Please Copy and Distribute Contact 11 Browse Mail Comment Listen Consult Hyperion UK Tweed House, 12 The Mount Guildford, Surrey GU24HN, UK Consult Hyperion USA 535 Madison Avenue, 19 th Floor New York, NY 10022, USA