Presentation is loading. Please wait.

Presentation is loading. Please wait.

01 October 2001 “...By Any Other Name…”. Consequences and Truths (Ken) The Pieces and the Processes (Bob) Directories (Keith) Shibboleth and SAML (Scott)

Similar presentations


Presentation on theme: "01 October 2001 “...By Any Other Name…”. Consequences and Truths (Ken) The Pieces and the Processes (Bob) Directories (Keith) Shibboleth and SAML (Scott)"— Presentation transcript:

1 01 October 2001 “...By Any Other Name…”

2 Consequences and Truths (Ken) The Pieces and the Processes (Bob) Directories (Keith) Shibboleth and SAML (Scott) The Human Issues (Stewart) Q&A (Bob, Ken)

3 Consequences to our members Provide the infrastructure for email, calendaring, portals, desktop video, course management systems, etc. Link legacy systems to new applications Enable a rich set of inter-institutional collaborations and environments

4 Consequences to the R&E community Enable wider deployments of distributed computing environments Build a consistent base for international science and collaboration

5 Consequences to the R&E community Permit “personal objects” to be exchanged Support new instructional and professional development opportunities in K-20

6 Consequences at large Our issues have become their issues Federated administration Privacy Flexible trust models Open standards

7 Consequences at large Our urgency presages their urgency Sharing resources Use of video for conferencing and collaboration

8 Our corporate partners tell the story IBM/Tivoli - interrealm exchange of attributes (Shibboleth) Sun on large-scale directories (DoDHE) RADvision and Polycomm/Accord on videoconferencing (vidmid) Metamerge on metadirectories (mace-dir)

9 Our federal partners tell the story US Government in PKI (HEPKI) NSF and the Grid Centers in the NSF Middleware Initiative

10 Truths Reworking security Rethinking privacy Restructuring trust

11 Reworking Security Security is a bigger space Network and host security is mission critical Personal security is urgent and just now developing Human nature must be accounted for Is it security or is it liability?

12 Network/Host Security Activities Abilene leadership in the effort to characterize and to respond to all classes of Distributed Denial of Service Indiana NOC – operational response approaches Collaborative relationships with Internet2 Corporate Member start-ups: Arbor Networks, Asta Networks Ohio ITEC – real-time traffic information

13 Internet2 Security Working Group Focus on campus and collaborative efforts Planning for Intensive Training program Will request identification of Internet2 contact for Security Work with EDUCAUSE Systems Security Groups

14 Personal Security Activities HEPKI-TAG and HEPKI-PAG Web-ISO PKILABS at Wisconsin and Dartmouth NIH/NIST/Internet2 Personal Security Research Conference next April Shibboleth

15 Rethinking Privacy Privacy can only be degraded; it cannot be repaired People will part with privacy for good reasons and appropriately defined rubber squeeze toys Is it privacy or is it discretion?

16 Privacy Built In - Shibboleth Passive privacy - A user passes identity to the target. The user has no control, and no responsibility. Active privacy - A user, through a security domain, releases attributes to the target which can include identity. The user has control and commensurate responsibility.

17 Restructuring Trust Federated administration now a theme of Microsoft and the Liberty Alliance. Tribes can form agreements more easily than broader, more formal associations Trust tends to grow rather than be delivered Is is trust or is it risk management?

18 Leadership trust activities Higher Ed Certificate Policy/Certificate Practice Drafts Club Shib International discussions on broader trust models


Download ppt "01 October 2001 “...By Any Other Name…”. Consequences and Truths (Ken) The Pieces and the Processes (Bob) Directories (Keith) Shibboleth and SAML (Scott)"

Similar presentations


Ads by Google