WebID4VIVO Erich Bremer and Tammy DiPrima Stony Brook University July 18, 2013 PREVIEW! BETA! BETA! BETA! BETA! BETA! BETA!

Slides:



Advertisements
Similar presentations
Introduction of Grid Security
Advertisements

Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
PIS: Unit III Digital Signature & Authentication Sanjay Rawat PIS Unit 3 Digital Sign Auth Sanjay Rawat1 Based on the slides of Lawrie.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E IEPG March 2000 APNIC Certificate Authority Status Report.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CS5204 – Operating Systems 1 Authentication. CS 5204 – Operating Systems2 Authentication Digital signature validation proves:  message was not altered.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Certificates.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
It’s not about security... it’s about access! Grid Security Pieter van Beek.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
 A public-key infrastructure ( PKI ) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store,
Digital Signatures. Anononymity and the Internet.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Http Web Authentication Web authentication is used to verify a users identity before allowing access to certain web pages On web browsers you get a login.
Grid Security. Typical Grid Scenario Users Resources.
SMUCSE 5349/7349 Public-Key Infrastructure (PKI).
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC)
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
Computer Science Public Key Management Lecture 5.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Cryptography 101 Frank Hecker
Chapter 31 Network Security
IT:Network:Applications.  Single Key (Symmetric) encryption ◦ One “key” or passphrase used to encrypt and decrypt ◦ FAST – good for large amounts of.
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Information Security Fundamentals Major Information Security Problems and Solutions Department of Computer Science Southern Illinois University Edwardsville.
National Institute of Advanced Industrial Science and Technology Self-audit report of AIST GRID CA Yoshio Tanaka Information.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Unit 1: Protection and Security for Grid Computing Part 2
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Cryptography and Network Security Chapter 14 Authentication Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed and extended by.
Attribute Certificate By Ganesh Godavari. Talk About An Internet Attribute Certificate for Authorization -- RFC 3281.
SSL(Secure Socket Layer) Guided By:- Presented By:- Richard Sinn Jimmy Mehta
Module 4 Network & Application Security: Kerberos – X509 Authentication service – IP security Architecture – Secure socket layer – Electronic mail security.
KISTI Grid CA Status Report Korea Institute of Science and Technology Information Sangwan Kim Jae-Hyuck Kwan
The TAOS Authentication System: Reasoning Formally About Security Brad Karp UCL Computer Science CS GZ03 / M th November, 2008.
IST E-infrastructure shared between Europe and Latin America ULAGrid Certification Authority Vanessa Hamar Universidad de Los.
Certificate Requests to HIP Jani Pellikka 80 th IETF Mar 27 th – Apr 1 st 2011 Prague, Czech Republic.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Security CNS 4650 Fall 2004 Rev. 2 SSL, SASL, PKI.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Installing a SSL Server. Creating a key Before you can create a digital signature/certificate. You need first to create a private key. To do this process.
1 Certification Issue : how do we confidently know the public key of a given user? Authentication : a process for confirming or refuting a claim of identity.
QuoVadis accreditation with EuGridPMA Alessandro Usai
GRID-FR French CA Alice de Bignicourt.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
IRAN-GRID Certificate Authority 13 th EUgridPMA Meeting Copenhagen May 2008 Majid Arabgol Hessamdding Arfaei Shahin Rouhani
Secure Distributed Open Social Networks Henry Story Senior Staff Engineer Semantic Web Evangelist Sun Microsystem photo by.
SSL Certificates for Secure Websites
Grid Security.
Cryptography and Network Security
Authentication Applications
Security, Authorisation and Authentication
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
X-Road as a Platform to Exchange MyData
A Programmer’s Guide to Secure Connections
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
PKI (Public Key Infrastructure)
Presentation transcript:

WebID4VIVO Erich Bremer and Tammy DiPrima Stony Brook University July 18, 2013 PREVIEW! BETA! BETA! BETA! BETA! BETA! BETA!

What is WebID? Single Sign-on authentication No Passwords (uses digital certificates) Central Identity Being developed by the W3C WebID Community Group 67 Members, Henry Story – Chair Originally, it went under the name foaf+ssl The term "WebID" was coined by Dan Brickley and Tim Berners-Lee in 2000 Hopefully, WebID will be in the standards track this year… (fingers crossed)

Key A – I can’t decrypt what I encrypt, but I can decrypt anything Key B encrypts Key B – I can’t decrypt what I encrypt, but I can decrypt anything Key A encrypts Pick A/B or B/A One becomes “Public key” The other the “Private key” Once selection is made, never change it! How this mathematical relationship works is the subject of another talk… How does WebID work in a Nutshell? Public Key Encryption A behind the scenes look…

How does WebID work in a Nutshell? Version: 3 (0x2) Serial Number: 5f:df:d6:be:2c:73:c1:fb:aa:2a:2d:23:a6:91:3b:5c Issuer: O=FOAF+SSL, OU=The Community of Self Signers, CN=Not a Certification Authority Validity Not Before: Jun 8 14:16: GMT Not After : Jun 8 16:16: GMT Subject: O=FOAF+SSL, OU=The Community Of Self Signers, CN=WebID for Erich Bremer Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: B8:CD:08:20:2D:…….(much much longer than this!) Exponent: (0x10001) X509v3 extensions: X509v3 Basic Constraints: critical CA:FALSE X509v3 Key Usage: critical Digital Signature, Non Repudiation, Key Encipherment, Key Agreement Netscape Cert Type: SSL Client, S/MIME X509v3 Subject Key Identifier: 08:8E:A5:5B:AE:5D:C3:8B:00:B7:30:62:65:2A:5A:F5:D2:E9:00:FA X509v3 Subject Alternative Name: critical URI: Signature Algorithm: sha1WithRSAEncryption c0:fd:ac:bc:fb:1b:c9:e0:1c:01:18:5e:44:bb: d8:b8:……. (another really really long string) The X509v3 Certificate

A Sample WebID profile (non-vivo) a foaf:Person ; foaf:family_name "Bremer" ; foaf:firstName "Erich" ; foaf:knows ; foaf:knows foaf:status "Happy" ; cert:key [ a cert:RSAPublicKey ; cert:exponent ; cert:modulus "B8CD08202DB1C18A704AE4ABBF0C2C7A23C7FD9C8D85BC957645D91922BC79BF81C468A75A80629DD134C B639213B661E1762B365A85EFC37E110E6946A882A429103E2601C1EBC42F612635E8E5B9C968D53940FA9ED C4644B20A89E9CA B0625D2FFED66AB5BB97E700D2ACCE91D972D B01B3632CA43E42B0DD 8DD283D5B FA772480A2B5DB8781E69CF7DBD6BDC61A5165A2F659DE A5AC4C70AA226F DCCEC514B9AE081C40E917368B4882F769F9A8BAA818E8BD72DBEDD3ABCF9BCB66BD9AAC916CD56F47FCA A3DA4337E99B4064DF4AF4F2869D751E35F324C8E06996D7B1491F55F1C7B05E5BD5D31C95919D25801"^^ ] ;

How does WebID work in a Nutshell? The Process Auth Server Jon Client Jon Client’s WebID profile server Hey, I want to log on Give me your WebID certificate Prove to me you have the private key to this public key Give me the WebID profile for the URI listed in this WebID certificate Here ya go! Compares modulus and exponent of WebID cert to the WebID profile Here ya go! Hi Jon!

WebID and VIVO make for great dance partners WebID4VIVO Allows VIVO to accept WebID for authentication Allows VIVO to be a WebID provider Leverages the fact that VIVO provides RDF foundation for WebID Installs within and along side VIVO itself moves data in and out of VIVO using VIVO DAO’s to maintain portability will be available at the low price of free and open-source (BSD – same as VIVO :-) WebID and VIVO (WebID4VIVO)

Possible Future directions using WebID and VIVO W3C WebAccessControl Ontology Enable inter-VIVO logins allowing remote delegated editors. Web Of Trust Ontology Open Annotations Model (W3C Community Group) Link Data Platform (W3C Working Group)

DEMO TIME! Learn more about WebID at: