1 Identity and Transparency ( Bridging the GAPS of Governance Bridging the GAPS of Governance in eGov Initiatives in eGov Initiatives )‏ Badri Sriraman.

Slides:



Advertisements
Similar presentations
© 2012 Open Grid Forum Simplifying Inter-Clouds October 10, 2012 Hyatt Regency Hotel Chicago, Illinois, USA.
Advertisements

DG INFSO- Grid Research & Infrastructures: W. Boch, M. Campolargo 1 Delivery of Industrial-strength Grid Middleware: establishing an effective European.
From e-Government to e-Governance: The OECD Experience Elizabeth Muller E-Government Project OECD SitExpo February 1004, Casablanca - Morocco.
Intelligence Step 5 - Capacity Analysis Capacity Analysis Without capacity, the most innovative and brilliant interventions will not be implemented, wont.
Risk & Novelty Collaboration & Engagement Efficiency & Effectiveness Transferability & Scalability ▪Led government as first agency to implement enterprise-wide,
Open Government: WSIS +10 and Beyond Yuri Hohlov AL C7 e-Government Open Government Coordinator.
CC 2009 ClickforHelp.com Inc. Shareable for not for profit use. What is Social Media? Ken Fischer blog: web20blog.org
BusinessUSA Igniting Innovation Showcase Overview U.S. Department of Commerce and U.S. Small Business Administration February 6, 2014.
6th MSDI Working Group Meeting
Building Trusted Transactions Identity Authentication & Attribute Exchange In Public and Private Federations OASIS Conference September 2010 Joni Brennan,
Developing a target ‘future state’ in social care informatics Andrew Fenton DH.
A Survey of Risk: Federated ID Management in Cloud and Grid Computing Presentation by Andy Wood (P )
BIG DATA AND THE HEALTHCARE REVOLUTION FORD+SSPG 2014.
The Business of Identity Management Barry R. Ribbeck Director Systems Architecture & Infrastructure Rice University
LEVERAGING THE ENTERPRISE INFORMATION ENVIRONMENT Louise Edmonds Senior Manager Information Management ACT Health.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
European Network of Living Labs User-driven innovation and value of open platforms in creation of digital services Prof. Alvaro Duarte de Oliveira President.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Justice Information Network Strategic Plan Development Justice Information Network Board March 18, 2008 Mo West, JIN Program Manager.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Information Sharing Puzzle: Next Steps Chris Rogers California Department of Justice April 28, 2005.
US NITRD LSN-MAGIC Coordinating Team – Organization and Goals Richard Carlson NGNS Program Manager, Research Division, Office of Advanced Scientific Computing.
Open Development Landscape in Uganda Uganda Open Development Stakeholders Workshop, Hotel Africana 11 th - 12 th September 2012.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
An Overview Presentation to Senate Committee on Human Rights December 13, 2004.
EGI-Engage EGI-Engage Engaging the EGI Community towards an Open Science Commons Project Overview 9/14/2015 EGI-Engage: a project.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
Cyber Authentication Renewal Project Executive Overview June – minute Brief.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
DRAFT – For Discussion Only HHSC IT Governance Executive Briefing Materials DRAFT April 2013.
Development with Disabled Network Mainstreaming Disability into Community Governance System Asitha Weweldeniya, Weweldenige, Development with Disabled.
JOINING UP GOVERNMENTS EUROPEAN COMMISSION Establishing a European Union Location Framework.
E-government models Lecture 8.
The Federal Bridge A Brief Overview 1. 4BF Industry Forum April Fed PKI: View from 20,000 km FBCA C4 Common Policy CA (HSPD-12) CertiPath SSPs.
PROTECTING AMERICA THROUGH PUBLIC ALERT & WARNING NATIONAL HURRICANE CONFERENCE APRIL 6, 2004 Kenneth B. Allen Executive Director Partnership for Public.
EGovOS Panel Discussion CIO Council Architecture & Infrastructure Committee Subcommittee Co-Chairs March 15, 2004.
Web 2.0 Melanie Hartgraves Director of New Media Governor David. A. Paterson Jessica Harrison Social Media Coordinator New York State Department of Labor.
Interoperable Trust Networks Chris Rogers California Dept of Justice February 16, 2005.
C-DERL is an application designed to be a Federal- wide, online repository for data standards, definitions, and context. It was authorized jointly by the.
UNCLASSIFIED Homeland Security Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
The Value of Creating the Identity Ecosystem. The Identity Ecosystem Steering Group (IDESG) is the source of expertise, guidance, best practices and tools.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
FROM PRINCIPLE TO PRACTICE: Implementing the Principles for Digital Development Perspectives and Recommendations from the Practitioner Community.
Taiwan e-Governance Research Center Research Fellow,, Taiwan e-Governance Research Center Assistant professor, Dep. Public Administration, National Open.
1 Dr. Spyros Papastergiou, University of Piraeus (Greece)–Dept. of Informatics M. Zaharias Singular Logic (Greece) CYSM Risk Assessment Methodology.
KNOWLEDGE MANAGEMENT (KM) Session # 15. Knowledge management is a method to simplify and improve the processes of creating, capturing, sharing, distributing,
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
UNGGIM – PRIVATE SECTOR NETWORK. AGENDA > OVERVIEW OF PRIVATE SECTOR >PURPOSE AND VISION OF PRIVATE SECTOR NETWORK > STRUCTURE AND TERMS OF REFERENCE.
NATIONAL INCIDENT MANAGEMENT SYSTEM (NIMS)
AGRICULTURE DEVELOPMENT
Summit 2017 Breakout Group 2: Data Management (DM)
Health Information Security and Privacy Collaborative (HISPC) Overview
EGI-Engage Engaging the EGI Community towards an Open Science Commons
Interoperability of Data Systems Administration for Children & Families Office of Planning, Research & Evaluation Robert (Bob) Garcia Regional Administrator,
U.S. Federal e-Authentication Initiative
AGRICULTURE DEVELOPMENT
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
AGRICULTURE DEVELOPMENT
HIMSS National Conference New Orleans Convention Center
Olli-Pekka Rissanen HRWG, Helsinki 11th September 2006
Olli-Pekka Rissanen Troika Secretariat, Helsinki 17th July 2006
Sachiko A. Kuwabara, PhD, MA
EOSC-hub Contribution to the EOSC WGs
Presentation transcript:

1 Identity and Transparency ( Bridging the GAPS of Governance Bridging the GAPS of Governance in eGov Initiatives in eGov Initiatives )‏ Badri Sriraman Unisys Incorporated Rakesh Radhakrishnan Sun Microsystems, Inc.

2 Agenda Overview of “Identity & Transparency” OSTP – IDM Report – GAPS Current Transparency Initiative IDM as the Bridge (Telco eGOV partnerships) Conclusions

IDM enables Transparency Identity enabled Security Architecture (Confidentiality, Integrity and Availability) Identity enabled Pervasive Policies for the Network Identity enabled Context Distributed Authentication, Authorization and Attribute Authorities All THREE Lay the foundation for Transparency & Trust 4 th and 5 th book: “Identity and Transparency” + “Identity & Trust”

OSTP – Report on IDM - GAPS Current Model is Stovepiped Difficult to Integrate Static in Nature

OSTP – Report on IDM - Deficiencies Cross Organizational Coordination Disparate Security Management Protocol Inconsistent Agency Implementations Screening Information Sharing Inconsistent system-security usages, operating rules and procedures System wide security for evolving grid Exploitation of Identity Information Interoperability Shortfalls lack of trust, consistent metrics, etc.) Designed to provide convenience and efficiency by allowing secure reuse of credentials and attributes across many apps

OSTP – Report on IDM - Goals Adaptive, Responsive and Universally Accessible Attuned to social acceptability and privacy –valued by users Extensible in Scale and Scope (billions of identities, trillions of policies and millions of use cases) Easy to Use and Maintain Secure & Effective (leaving minimal risk for exploitation, alteration of misuse) Invisible to the end USER More responsive to Law, Policy, Social Sensitiveness as regards to privacy Streamlined Simplified structure from the point of view of sponsors and users Designed to provide convenience and efficiency by allowing secure reuse of credentials and attributes across many apps

OSTP- Report on IDM – Target Digital ID Repository Privilege Applications Grid Cloud Computing

OSTP- Report on IDM – Target Technology Collaborative User Centric

OSTP- Report on IDM – Target Federated Identity (A Construct of Credentials within a Context) Federated Policy (A Policy Set Executing for a Context) Federated Context ( A Set of Attributes about the Identity)

OSTP- Report on IDM – Target Pluggable Architecture Extensible in Scale and Scope Utility Model with Balanced Stakeholder equities

OSTP – Report on IDM -Scope Internal to the Federal Government Between the Federal Government and other Government Jurisdictions Between the Federal Government and the International Community Between the federal government and U.S. organizations, commercial entities, and individuals accessing government re-sources (both facilities and systems).

IDM enables Transparency President Obama's directive on “Transparency and Open Government” Government should be transparent. Transparency promotes accountability and provides information for citizens about what their Government is doing. Information maintained by the Federal Government is a national asset. Government should be participatory. Public engagement enhances the Government's effectiveness and improves the quality of its decisions. Knowledge is widely dispersed in society, and public officials benefit from having access to that dispersed knowledge. Executive departments and agencies should offer Americans increased opportunities to participate in policymaking and to provide their Government with the benefits of their collective expertise. Government should be collaborative. Collaboration actively engages Americans in the work of their Government. Executive departments and agencies should use innovative tools, methods, and systems to cooperate among themselves, across all levels of Government, and with nonprofit organizations, businesses, and individuals in the private sector.

Transparency, Participation& Collaboration Data.gov – Public Data available in Public Domain DODtechpedia – Collaboration on Defence Related Tech Regulations.gov – Participation in Policy Making OpenforQuestions – Forum for Participation Healthreform.org – Forum for Participation in Health Care PeertoPatents – Collaborate on Patents IdeaFactory – Collaborate on Ideas Business.gov – Business & Gov Collaboration

IDM enables Trust & Transparency Trust implies Security (confidentiality, integrity, availability) Trust implemented via a IDM enabled Pervasive Policy Paradigm Trust enables Transparency (Trust equates to Truth over Time and Transparency is Truth near Real Time) IDM integrated with DLP, JEE Containers, Apps, VM/OS & Network IDM Integrated with Integrity and Audit tools IDM enables Privacy & Confidentiality IDM integrated with Compute and Carrier Clouds (NG Grid) IDM enables Secure Context Exchange Bidirectional (multi-directional between respective stakeholders) Transparency is Critical