Norman Wiseman JISC Head of Programmes Presentation to JISC Authentication Concertation Day March 1999 International Authentication Activities Joint Information.

Slides:



Advertisements
Similar presentations
VON Europe /19/00 SIP and the Future of VON Protocols SIP and the Future of VON Protocols: Presence and IM Jonathan Rosenberg.
Advertisements

Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Authorisation Models for National Scale Services Alan Robiette Joint Information Systems Committee
1 2 nd Shanghai, 19/02/06 Architecture for Next Generation Grids Kostas Tserpes, NTUA Shanghai, 20th of February 2006.
Eduserv Athens Federations David Orrell Eduserv Athens Technical Architect.
Next Generation Athens Services Ed Zedlewski UK e-Science Town Meeting, London, 11 April 2005.
UPortal Workshop The Deep 19 th November The University of Hull Portal and the Digital University Project Ian Dolphin Head of Interactive Media,
1 ROADS to ATHENS Manjula Patel UKOLN University of Bath Bath, BA2 7AY UKOLN is funded by the British Library Research and Innovation.
Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
Architecture Decision Group Group Organization & Processes April 7, 2015 | Tuesday.
1 Technical Developments Related to Quality Issues Brian Kelly UK Web Focus UKOLN University of Bath Bath, BA2 7AY
1 Authentication and Open Standards Brian Kelly UKOLN University of Bath Bath, BA2 7AY UKOLN is funded by the British Library Research.
E-Research Coordinating Committee report to CAUL April 2006 Cathrine Harboe-Ree.
Norman Wiseman JISC Head of Programmes Presentation to CNI Seattle, December 1998 ATHENS ATHENS One Year On Joint Information Systems Committee.
Supporting Further and Higher Education Building the UK National Information Environment - Lessons from the Past and Pointers To the Future Norman Wiseman.
Supporting education and research E-learning tools, standards and systems Sarah Porter Head of Development, JISC.
The Community Authorisation Service – CAS Dr Steven Newhouse Technical Director London e-Science Centre Department of Computing, Imperial College London.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
1 June 1, 2015 Secure access to project budget information for OAR Principal Investigators Eugene F Burger Sylvia Scott Tracey Nakamura John L Forbes PMEL.
CNI Fall 1998 Access Management Requirements and Approaches Joan Gargano California Digital Library
Public Key Infrastructure at the University of Pittsburgh Robert F. Pack, Vice Provost Academic Planning and Resources Management March 27, 2000 CNI Spring.
May 22, 2002 Joint Operations Group Discussion Overview Describe the UC Davis Security Architecture Describe Authentication Efforts at UC Davis Current.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI Network Layer Network Fundamentals – Chapter 5.
03 December 2003 Digital Certificate Operation in a Complex Environment Consultation/Stakeholders Meeting 3 December 2003.
Copyright JNT Association 20051OptionalCopyright JNT Association 2007 Overview of the UK Access Management Federation Josh Howlett.
Business Intelligence Dr. Mahdi Esmaeili 1. Technical Infrastructure Evaluation Hardware Network Middleware Database Management Systems Tools and Standards.
Web-Enabling the Warehouse Chapter 16. Benefits of Web-Enabling a Data Warehouse Better-informed decision making Lower costs of deployment and management.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Scottish Information Landscape An overview from SLIC Elaine Fulton Director Scottish Library and Information Council
1 Enabling Secure Internet Access with ISA Server.
Rights / Business Models in the NSDL Columbia University David Millman April, 2001.
1998 Fall Internet2 Project Meeting San Francisco September.
Athens Building Communities Ed Zedlewski & Lyn Norris UKSG, Warwick, April 2002.
MIMCom 2006: Deploying a campus area network for the University Teaching Hospital Lusaka – Zambia Midterm Presentation March 24th 2006 Project Team: Michael.
New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.
Joint Information Systems Committee 18-Jul-2006 | | Slide 1 Change Management for Libraries Session B, 11: :00 John Paschoud and Peter Spring London.
LIGHT WEIGHT DIRECTORY ACCESS PROTOCOL Presented by Chaithra H.T.
Joint Information Systems Committee Supporting Higher and Further Education Catherine Grout Assistant Director for Development, JISC/DNER
DNS based IP NetLocation Service China Telecom Guangzhou Institute
DOI Workshop, Luxembourg - 20 May Identifiers in Context Andy Powell UKOLN University of Bath UKOLN.
Supporting further and higher education Middleware and AA within the JISC Environment Nicole Harris, JISC Development Group.
Vidmid VC working group: Scenarios & workplan Egon Verharen, SURFnet.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
TERENA NORDUnet Networking Conference 1999 Lund Norman Wiseman JISC Head of Programmes JISC Programme for Middleware Development.
Supporting education and research JISC Strategy for Support of eResearch Nicole Harris JISC Programme Manager.
1 © SURFnet 2001 Roadmap to European Middleware Is it different? TERENA Networking Conference Antalya, May 2001.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
Shibboleth at Columbia Update David Millman R&D July ’05
MAT U M A T U Middleware Assisted Take-Up Service For JISC Funded Early Adopters.
VoN September ‘98 1 9/17/98 VoN Standards Update Jonathan Rosenberg Bell Laboratories September 17, 1998.
Athens – integrated AMS services Ed Zedlewski JISC/CNI Conference Edinburgh, June 2002.
The HEP White Pages Project Ray Jackson CERN / IT - Internet Services Group 23rd April HEPiX/HEPNT Conference, LAL-Orsay, France.
UK Access Management Federation Matthew Dovey Programme Director, Digital Infrastructures (Research) 10 June 2011 CERN.
University of Washington Identity and Access Management IEEAF – RENU Network Design Workshop Seattle - 29 Nov 2007 Lori Stevens, Director, Distributed.
New Developments in Access Management: Setting the Scene Alan Robiette JISC Development Group JISC-CNI Conference, June 2002.
Mairéad Martin The University of Tennessee December 16, 2015 Federated Digital Rights Management.
Identity Management in DEISA/PRACE Vincent RIBAILLIER, Federated Identity Workshop, CERN, June 9 th, 2011.
1 VoIP Peering Peering, it’s not just for IP anymore Kingsley Hill XConnect Global Networks, Ltd VP for Strategic Federations.
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
What’s Happening at Internet2 Renee Woodten Frost Associate Director Middleware and Security 8 March 2005.
Summary of HEP SW workshop Ian Bird MB 15 th April 2014.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College.
Bob Jones EGEE Technical Director
Enabling Secure Internet Access with TMG
E-Research Coordinating Committee report to CAUL
UPortal Workshop The Deep 19th November 2002.
Presentation transcript:

Norman Wiseman JISC Head of Programmes Presentation to JISC Authentication Concertation Day March 1999 International Authentication Activities Joint Information Systems Committee

Programme i)CNI ii)UCCAP iii)Internet 2 iv)IETF v)and next…? Joint Information Systems Committee Describe what is happening in (mostly) the USA in the authentication field:

CNI - History Authentication White Paper (Cliff Lynch) Proxies IP source filtering Credential-based access management Workshop: Enabling Access in Digital Libraries April 1998, report published February Joint Information Systems Committee History

CNI Authentication Workshop Principles Identified: Simplicity - implementation, adoption, acceptability Privacy - no compromise Good Faith - reasonable barriers to abuse Trusted Intermediaries - recognise role Reasonable terms -access by need and for accidental discovery Joint Information Systems Committee CNI

CNI Authentication Workshop (cont) Areas for Research: System Usability - user interaction need for new information types functionality of new types Economic models - assessing usage new pricing schemes Joint Information Systems Committee CNI

UCCAP University of California Common Authentication Project One of many in USA Campus similar in size to whole UK Following up CNI workshop Evaluation completed of different models (as proposed by Ira Fuchs of JSTOR) Joint Information Systems Committee UCCAP

UCCAP ( cont ) Components University Directory list every person ever associated with UC Public key infrastructure manage certificates using Netscape server hierarchical certificate architecture develop RFI/RFP for future technical development Authorisation Infrastructure gateway to database of user attributes associated query protocol Joint Information Systems Committee UCCAP

UCCAP ( cont ) But….. Scalability Only for internal UC certificates Not addressing wider issues for some time Costs: University of Minnesota expects certificates to cost $1million per year Gartner group estimates $100 per user per year Joint Information Systems Committee UCCAP

Internet 2 Network, Applications and ‘Middleware’ Run by UCAID Network - Abilene Applications: Qbone Digital Video Network (DVN) Distributed Storage Infrastructure (DSI) Joint Information Systems Committee Internet 2

Internet 2 (cont) Network, Applications and ‘Middleware’ Middleware includes: Security Quality of Service Network Management Topology IPv6 Routing Working Groups to take each area forward Joint Information Systems Committee Internet 2

Internet 2 (cont) Working Group Objectives Identify technology Scalable and interoperable Standard API’s JISC Involvement through MoU? Explanatory paper on JISC web pages soon Joint Information Systems Committee Internet 2

Internet Protocols Request for Comment: General Authentication, Authorisation and Accounting Protocol / Discusses underlying technology and protocols to allow services to work Joint Information Systems Committee IETF

International solution needed through joint efforts with US, Europe, Australia and Govt. How can we maintain awareness within technical/information community? What is the role of ATHENS? Processes to develop models and protocols? What are the human and organisational issues? Priorities and next steps for JISC? Joint Information Systems Committee Summary Where Next?

CNI UCCAP Internet2 IETF / Joint Information Systems Committee Reprise Addresses

Joint Information Systems Committee Joint Information Systems Committee Networks and Innovative Services for United Kingdom Education