Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman,

Slides:



Advertisements
Similar presentations
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
Advertisements

European Consumer Summit 2014 On-line and mobile payments Dr Florent Frederix Trust & Security Unit, DG CONNECT, European Commission 1 th of April 2014.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
European Electronic Identity Practices Country Update of …………… Speaker: Date:
Dematerialization of Organisations’ Key Business Processes Security and e-Invoicing ATHENEE PALACE HILTON, Bucuresti September 21 st 2004 Genovel Iovu.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
UbIdentity Ubiquitous Identity Management in the Cloud 20/03/2014 Dan BUTNARU Product Line Manager Trusted Identity.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
August 2004 Providing Industry-wide Security and Identity Management Solutions.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
SECURITATEA SISTEMELOR INFORMATICE ŞI DE COMUNICAŢII Bucharest, September, 21, 2004 ATHENEE PALACE HILTON, Sala Le Diplomate Quo Vadis Information Security.
Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Password?. Project CLASP: Common Login and Access rights across Services Plan
Page 1 Issues in and perspectives on electronic authentication of health professionals Pascal POITEVIN Marketing and Communication manager GIP-CPS e-Health.
Network Identity Kai Kang 27 th October Outline Introduction –Definition –Five drivers –Basic services –Roadmap Network Identity management approaches.
Page16/2/2015 Sirlan Usage and usability considerations for SIRLAN solution success.
Figure 1: SDR / MExE Download Framework SDR Framework Network Server Gateway MExE Download + Verification Using MExE Repository (Java sandbox) MExE Applet.
2-Jun-15 1 ACCESSING ON LINE SERVICES PROTECTED BY THE ITALIAN EID GIOVANNI MANCA National Center for Information technology in Public Administration (CNIPA)
European Signatures versus Global SignaturesRome, 7 April, 2003 EESSI open specifications and interoperability The state of the art in Italy Giovanni Manca.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
FIT3105 Smart card based authentication and identity management Lecture 4.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
E-commerce E-commerce, or electronic commerce, refers to systems that support electronically executed business transactions. In this section: E-commerce.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Public Key Infrastructure Ammar Hasayen ….
IDA Security Experts Workshop Olivier LIBON Vice President – GlobalSign November 2000.
European Electronic Identity Practices Country Update of Austria Peter F Brown Office of the CIO, Austrian Federal Chancellery Chair, CEN eGov Focus Group.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Selected problems of the e-signature law and of its implementation Doc. RNDr. Daniel Olejár, CSc. Department of computer science Comenius University, Bratislava.
PRESENTATION OF ETSI © ETSI All rights reserved Sophia Antipolis, 22 May 2014 Luis Jorge Romero Director General, ETSI.
EGov Interop'05 - Feb 23-24, Geneva (Switzerland) OBSERVATORY ON INTEROPERABLE eGOVERNMENT SERVICES eGov-Interop'05 Annual Conference February.
1 10 THE INTERNET AND THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE.
Internet Security for Small & Medium Business Week 6
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
E-Procurement An Architectural Framework Approach December 10, 2008.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Internet Banking Key Issues Internet Banking Working Group May 14, 1998.
Privacy, Confidentiality, and Security Unit 8: Professional Values and Medical Ethics Lecture 2 This material was developed by Oregon Health & Science.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
PKI: The Key to Electronic Identity Initiatives? Overview of models and examples Stijn Bijnens, SVP Identity Management, Cybertrust.
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Jason Kuo APSCA October 29, 2010 Convergence and cross usage of secure elements for mobile PKI and secure mobile contactless services.
MOLDOVA: OPENING NEW FRONTIERS IN E-GOVERNANCE TALLINN MAY 31, 2016 GOVERNMENT OF REPUBLIC OF MOLDOVA IURIE ȚURCANU Government Chief Information Officer,
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Application Of Cloud Computing On Cooperative Supply Chain Management
Secure Connected Infrastructure
E-Commerce for Developing Countries (EC-DC)
HIMSS National Conference New Orleans Convention Center
e-Security Solutions Penki Kontinentai Vladas Lapinskas
E-identities (and e-signatures)
Presentation transcript:

Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman, e Europe Smart Cards October 21, 2002 Vilnius

Vilnius, October 21st, 2002 © eEurope SmartCards Agenda Where do we come from Trends and Obstacles The World is more than Europe Authentication Requirements and Security Levels Smart.IS objectives Scope and functional Characteristics of NAME NAME vs NAME.ES

Vilnius, October 21st, 2002 © eEurope SmartCards The IT (R)Evolution Mainframe Department Computer Personal Computer (Desktop) Personal Computer (Laptop) Palmtop Smartcard 1960s 1990s The Internet IPv6, UMTS Mobile Communication

Vilnius, October 21st, 2002 © eEurope SmartCards Trends From static to mobile –any time any where From weak to strong –Pin / PKI From moderate to large volumes –Scalability from Thousands to Millions of users From intra-enterprise to inter-enterprise –Supply chain management, community of interest networking From person to application –Outside application integration From medium to larger threats –Password level attacks to complex sophisticated identity thefts

Vilnius, October 21st, 2002 © eEurope SmartCards Obstacles Non standardized software architecture generally in use, Multiple hardware architecture of access devices, Technical complexity of platforms, Different application requirements in terms of security (payment, financial, health, government, exchange of confidential information, etc), Different security rules in different schemes (payment, financial, health, government, exchange of confidential information, etc), Different administration rules addressing different types of users, Societal constraints not yet resolved, more than 80% of authentication services are still simple password systems. Legal aspects of technology not well understood by the professionals (lawyers, legal experts)

Vilnius, October 21st, 2002 © eEurope SmartCards Scope of eEurope Smart Cards SECURITY/PPSECURITY/PP TB3 USER/REQSUSER/REQS TB8 GOVERN- MENT TB10 HEALTH TB11 PAYMENTS TB5 PUBLIC TRANSPORT TB9 PUBLIC ID, AUTHENTICATION, ELEC. SIGNATURE MULTI APPLICATION PLATFORM GENERIC CARD READERS CONTACTLESS CARDS TB6TB4 TB7 TB1, TB2, TB12 GLOBAL INTEROPERABILITY FRAMEWORK GIF APPLICATIONS GENERIC FUNCTIONS

Vilnius, October 21st, 2002 © eEurope SmartCards Cooperation with NICSS Japan Interoperability Issues Not-on-us smart card community Issuer Content provider User Service provider Access provider SCC Admin. Issuer Content provider User Service provider Access provider SCC Admin On-us smart card community

Vilnius, October 21st, 2002 © eEurope SmartCards Secure Interoperability Architecture IOP adapter Host smart card community card infrastructure application connectivity PKI 0 0

Vilnius, October 21st, 2002 © eEurope SmartCards EESSI : Proposed Classes of Electronic Signatures European directive: on electronic signature OPEN & TECHNOLOGY NEUTRAL TB12 FOCUS Smart IS AM

Vilnius, October 21st, 2002 © eEurope SmartCards Different Authentication Requirements User Name Module Security Device User Terminal Authentication of the device Server Authentication of the user Mutual Authentication of the user and the server Mutual Authentication of the device and the server

Vilnius, October 21st, 2002 © eEurope SmartCards Security Interaction at different Levels - Human interface - Module level API and data structure - Device driver API - Applications level API

Vilnius, October 21st, 2002 © eEurope SmartCards Smart.IS Objectives The main objective of the Smart. IS - Accompanying Measures is to develop cross-industry, cross sector co-operative studies between users, network operators and manufacturers to define an open, technology independent solution of interoperability and security of smart card based e-Commerce applications

Vilnius, October 21st, 2002 © eEurope SmartCards Functional Description of NAME As its title “Network Authentication Module for internet End users “ implies, NAME is (1) a module for (2) authentication of (3) the Internet end-user (4) over a network. (1) Module, means that NAME is a logical or physical (or a combination) part of a smart card. Even if NAME can be a standalone smart card with only a “NAME” application, it can be hosted inside a multi-application smart card. (2) Authentication is the main function of this module. This means that the module has the functionality to provide a verifier with an identity and the functionality to provide this verifier with a means to authenticate the module. (3) An Internet end-user is an end-user who is using Internet for private or public usage. The private or public usage question is out of the scope of NAME. Since the level of expertise of the end-user is unknown, it should be assumed to be the lowest. (4) Over a network means that the security level of the network is unknown. As the network is not defined, its security level should be assumed to be the lowest.

Vilnius, October 21st, 2002 © eEurope SmartCards Scope of NAME Different generic needs in e-business have been identified : To give access to institutional or public information : The aim is just to facilitate and personalize, but not to control, the access to information. e.g. personalized or profiled public information. To give access to specific information : The aim is to control access to the information, and to be sure that only the right person access to the information he is supposed to access. e.g. personal or client specific information. To give access to critical/confidential information : the aim is similar to the previous needs, but with a higher level of trust and security. E.g. access to medical information, etc. To make simple or low value transactions : The need is to have non- repudiation between two parties that are already in a trust relationship, or on low value transactions. E.g. electronic purchase order between a company and a supplier that have a previously signed contract. To make high value transactions, contracts, etc. : the need is to have strong non-repudiation between two parties that aren’t in a trust relationship, or for high value transaction. E.g. : funds transfers, etc.

Vilnius, October 21st, 2002 © eEurope SmartCards Scope of NAME vs. NAME.ES NAMEESNAMEES NAMENAME Advanced electronic signature Electronic signature Integrity of communications Authentication of the authorized user Authentication of the device Qualified certificate Secure display Public key and certificate Secure keyboard Card + Reader Level Services Optional Mandatory

Vilnius, October 21st, 2002 © eEurope SmartCards Document Availability The specifications of NAME and NAME.ES can be found in the following documents NAME-V NAME-ES_V and are available under

Vilnius, October 21st, 2002 © eEurope SmartCards SMART.IS management office e Europe Smart Cards Contacts