Fundamentals: Security, Privacy, Trust. Scenarios we’d like to see... Use of licensed library materials regardless of student’s location Signed email.

Slides:



Advertisements
Similar presentations
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Advertisements

Launching Egyptian Root CA and Inaugurating E-Signature Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA.
Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
| Copyright© 2010 Microsoft Corporation Quick Start into Activating and Selling Office 365.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
High Performance Computing Course Notes Grid Computing.
Breaking Trust On The Internet
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Lecture 23 Internet Authentication Applications
Grid Security. Typical Grid Scenario Users Resources.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
1 ARPA A regional infrastructure for secure role-based access to RTRT services Ing. Laura Castellani Tuscany Region.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Understanding Active Directory
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
Copyright JNT Association 20051OptionalCopyright JNT Association 2007 Overview of the UK Access Management Federation Josh Howlett.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Welcome Acknowledgments and thanks Security Acronymny: then and now What’s working What’s proving hard.
Shibboleth Update a.k.a. “shibble-ware”
Understanding Active Directory
Shibboleth and InCommon: Making Secure Collaboration a Reality Scott Cantor Internet2/MACE and The.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
Middleware challenges to service providers, the Nordic view TERENA, Ingrid Melve, UNINETT.
Internet Security for Small & Medium Business Week 6
Invitation to Computer Science 5th Edition
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
GT Components. Globus Toolkit A “toolkit” of services and packages for creating the basic grid computing infrastructure Higher level tools added to this.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
R & Ethinking Trust Ken Klingenstein, custodian, InCommon and the CREN CAt.
Of Security, Privacy, and Trust. Security Personal security is largely distinct from network security (modulo VPN’s and authentication to the network)
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
Identity in the Virtual World: Creating Virtual Certainty David L. Wasley Information Resources & Communications UC Office of the President.
® Gradient Technologies, Inc. Inter-Cell Interworking Access Control Across the Boundary Open Group Members Meeting Sand Diego, CA USA April 1998 Brian.
1 The World Bank Internet Services Program Rajan Bhardvaj
Rethinking Privacy As Bob Blakley says, “It’s not about privacy, it’s about discretion.” Passive privacy - The current approach. A user passes identity.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
Middleware CAMP Day 2. Current Research Research that develops th e…
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Shibboleth Trust Model Shibboleth/SAML Communities (aka Federated Administrations) Club Shib Club Shib Application process Policy decision points at the.
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Origins: The Requirements of Participating in Federations CAMP Shibboleth June 29, 2004 Barry Ribbeck & David Wasley.
AuthZ WG Conceptual Grid Authorization Framework document Presentation of Chapter 2 GGF8 Seattle June 25th 2003 Document AID 222 draft-ggf-authz-framework pdf.
01 October 2001 “...By Any Other Name…”. Consequences and Truths (Ken) The Pieces and the Processes (Bob) Directories (Keith) Shibboleth and SAML (Scott)
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Identity and Access Management
Grid Security.
THE STEPS TO MANAGE THE GRID
“Ten Years Ago… on a cold dark night”
Presentation transcript:

Fundamentals: Security, Privacy, Trust

Scenarios we’d like to see... Use of licensed library materials regardless of student’s location Signed Stronger, more secure authentication procedures where needed Encrypting of documents and as appropriate Fewer accounts/passwords per user Authentication of individuals for desktop videoconferencing, chat, other collaboration tools Inter-institutional courses sharing web sites without additional user or faculty overhead Portals acting on our behalf Digital signatures and work flow Access based on roles instead of hard-coding in user names And more….

Key Concepts Security - protecting servers, communications, networks, hosts, personal information; has distinct authentication and authorization needs Privacy – moving from passive privacy to active privacy Trust - the continuum of trust and how communities use trust models Identity Service Providers – to broker external uses of authentication and authorization, respecting security and privacy, in an appropriate trust fabric Authentication and Authorization architectures technologies

Security of networks (denial of service, physical infrastructure) of hosts (OS bugs, mis-settings, etc.) of personal information and communication (signed and encrypted , directory protection, etc,) some technologies (PKI, firewalls, etc.) can serve several areas

Key security issues cost/benefit ratio in money cost/benefit ratio in functionality the human factors complexity and ease of use mobility multiple systems and contexts think globally, act inconsistently

Rethinking Privacy As Bob Blakely says, “It’s not about privacy, it’s about discretion.” Passive privacy - The current approach. A user passes identity to the target, and then worries about the target’s privacy policy. To comply with privacy, targets have significant regulatory requirements. And no one is happy... Active privacy - A new approach. A user (through their security domain) can pass attributes to the target that are not necessarily personally identifiable. If they are personally identifiable, the user decides whether to release them. Who will be happy?

Rethinking Privacy For access to controlled resources, there is a spectrum of approaches available. At one end is authorization approach, where attributes are exchanged about a prospective user until the controlled resource has sufficient information to make a decision. This approach supports privacy. At the other end is the authentication approach, where the identity of a prospective user is passed to the controlled resource and is used to determine (perhaps with requests for additional attributes about the user) whether to permit access. Since this leads with identity, this approach requires the target to protect privacy.

Business Issues and Active Privacy When does a company want to know identity versus behavior? How many people register software? Does software support depend on the user or the attribute “have a registered copy of the software?” When a company wants to know identity, what will it take for the user to reveal it? Obvious business requirement Compelling ease of use for the user (A rubber squeeze toy) Think of how popular cash is despite the convenience of credit

The Continuum of Trust Collaborative trust at one end… can I videoconference with you? you can look at my calendar You can join this computer science workgroup and edit this computing code Students in course Physics Brown can access this on-line sensor Members of the UWash community can access this licensed resource Legal trust at the other end… Sign this document, and guarantee that what was signed was what I saw Encrypt this file and save it Identifiy yourself to this high security area

Dimensions of the Trust Continuum Collaborative trust handshake consequences of breaking trust more political (ostracism, shame, etc.) fluid (additions and deletions frequent) shorter term structures tend to clubs and federations privacy issues more user-based Legal trust contractual consequences of breaking trust more financial (liabilities, fines and penalties, indemnification, etc.) more static (legal process time frames) longer term (justify the overhead) tends to hierarchies and bridges privacy issues more laws and rules

Interrealm Trust Structures Federated administration basic bilateral (origins and targets in web services) complex bilateral (videoconferencing with external MCU’s, digital rights management with external rights holders) multilateral virtual organizations and Grids Hierarchies may assert stronger or more formal trust requires bridges and policy mappings to connect hierarchies appear larger scale

Simple point-to-point model client Enterprise LDAP directory Attribute authority Authentication Service target Attribute requestor Policv decision point Policy enforcement point Policy enforcement point Policy enforcement points Video directory Service discovery service Protocols Grid directory Video directory Enterprise LDAP directory

Trust in Transactions In a business transaction The user trusts the origin to faithfully represent its attributes to targets and obey privacy rules The origin trusts the user to obey its authentication and authorization rules The target trusts the origin to accurately manage and communicate user attributes and respect the user’s privacy settings The origin trusts the target to take the appropriate transaction actions and to not misuse the user’s information.

The Trust Continuum, Applications and their Users Applications and their user community must decide where their requirements fit on the trust continuum Some apps can only be done at one end of the continuum, and that might suggest a particular technical approach. Many applications fit somewhere in the middle and the user communities (them that trust each other) need to select a approach that works for them.

Mapping the issues: (a slide for Annie…) Collaborative TrustLegal Trust Security Privacy

Identity Service Providers An emergent service need Serves as an electronic broker for users to other service providers (content providers, web servers, calendar services, e- commerce, etc,) Protects users, their resources and their privacy Typical folks will have a handful: work, home, private Potential suppliers are: businesses (either in-house or out- source), desktop operating systems (Microsoft), ISP’s (AOL), banks, other...

Authentication and Authorization Authentication Authorization the sources of confusion

The Architecture of Authentication Identification/Authentication has two components the initial determination that a particular subject should be provided a specific credential (identification). i.e. “getting a credential” the continuing processes of that subject establishing their electronic presence (authentication) “using a credential” Examples two forms of photo id in person to be issued a computer account, and then Kerberos to authenticate providing a name and social security number to receive a PIN, and being able to view student loan data with that PIN The “strength” of authentication depends on both processes The need for strong authentication depends on the resources that are being offered to the authenticator

The Architecture of Authorization Should the authorization decision be made by the user’s domain, based on business rules provided by the target or by the target, based upon attributes provided by the user’s domain? If at the target, should the user’s domain pass all attributes about a user to a target, to protect the privacy of the target, or a minimal set of attributes, to protect the privacy of the user? The answers depend on point of view, scalability, manageability, and performance

We Need A Strong Authentication Service Identity in the real world is very hard. There are some legitimate needs that need formal and high levels of security services Documents must be notarized There are cases where be signed and encrypted Authentication is in general a “local” service that can be conveyed globally

We Need a Flexible Interrealm Authorization Service We are only beginning to understand authorization Permissions are much more volatile than identity Delegation and non-determinism are hard Privacy rests here, and we don’t understand privacy Expressions of permissions require complex data structures

Layclergy Rules of Thumb X.509 for strong authentication/legal trust SAML/Shibboleth for flexible authorization/collaborative trust Note that X.509 can be used for authorization SAML/Shibboleth can exchange that someone was authenticated Neither is necessarily wise but neither is unavoidable