Presentation is loading. Please wait.

Presentation is loading. Please wait.

Norman Wiseman JISC Head of Programmes Presentation to JISC Authentication Concertation Day March 1999 International Authentication Activities Joint Information.

Similar presentations


Presentation on theme: "Norman Wiseman JISC Head of Programmes Presentation to JISC Authentication Concertation Day March 1999 International Authentication Activities Joint Information."— Presentation transcript:

1 Norman Wiseman JISC Head of Programmes Presentation to JISC Authentication Concertation Day March 1999 International Authentication Activities Joint Information Systems Committee

2 Programme i)CNI ii)UCCAP iii)Internet 2 iv)IETF v)and next…? Joint Information Systems Committee Describe what is happening in (mostly) the USA in the authentication field:

3 CNI - History Authentication White Paper (Cliff Lynch) Proxies IP source filtering Credential-based access management http://www.cni.org/projects/authentication/authentication-wp.html Workshop: Enabling Access in Digital Libraries April 1998, report published February 1999 http://www.clir.org/pubs/reports/arms-79/contents.html Joint Information Systems Committee History

4 CNI Authentication Workshop Principles Identified: Simplicity - implementation, adoption, acceptability Privacy - no compromise Good Faith - reasonable barriers to abuse Trusted Intermediaries - recognise role Reasonable terms -access by need and for accidental discovery Joint Information Systems Committee CNI

5 CNI Authentication Workshop (cont) Areas for Research: System Usability - user interaction need for new information types functionality of new types Economic models - assessing usage new pricing schemes Joint Information Systems Committee CNI

6 UCCAP University of California Common Authentication Project One of many in USA Campus similar in size to whole UK Following up CNI workshop Evaluation completed of different models (as proposed by Ira Fuchs of JSTOR) http://www.jstor.org/about/authentication.html Joint Information Systems Committee UCCAP http://www.ucop.edu/irc/auth/work.html

7 UCCAP ( cont ) Components University Directory list every person ever associated with UC Public key infrastructure manage certificates using Netscape server hierarchical certificate architecture develop RFI/RFP for future technical development Authorisation Infrastructure gateway to database of user attributes associated query protocol Joint Information Systems Committee UCCAP

8 UCCAP ( cont ) But….. Scalability Only for internal UC certificates Not addressing wider issues for some time Costs: University of Minnesota expects certificates to cost $1million per year Gartner group estimates $100 per user per year Joint Information Systems Committee UCCAP

9 Internet 2 Network, Applications and ‘Middleware’ Run by UCAID Network - Abilene Applications: Qbone Digital Video Network (DVN) Distributed Storage Infrastructure (DSI) http://www.internet2.edu Joint Information Systems Committee Internet 2

10 Internet 2 (cont) Network, Applications and ‘Middleware’ Middleware includes: Security Quality of Service Network Management Topology IPv6 Routing Working Groups to take each area forward Joint Information Systems Committee Internet 2

11 Internet 2 (cont) Working Group Objectives Identify technology Scalable and interoperable Standard API’s http://www.internet2.edu/html/working-groups.html JISC Involvement through MoU? Explanatory paper on JISC web pages soon Joint Information Systems Committee Internet 2

12 Internet Protocols Request for Comment: General Authentication, Authorisation and Accounting Protocol http://www.merit.edu/working.group/documents / Discusses underlying technology and protocols to allow services to work Joint Information Systems Committee IETF

13 International solution needed through joint efforts with US, Europe, Australia and Govt. How can we maintain awareness within technical/information community? What is the role of ATHENS? Processes to develop models and protocols? What are the human and organisational issues? Priorities and next steps for JISC? Joint Information Systems Committee Summary Where Next?

14 CNI http://www.cni.org/projects/authentication/authentication-wp.html http://www.clir.org/pubs/reports/arms-79/contents.html UCCAP http://www.jstor.org/about/authentication.html http://www.ucop.edu/irc/auth/work.html Internet2 http://www.internet2.edu http://www.internet2.edu/html/working-groups.html IETF http://www.merit.edu/working.group/documents / Joint Information Systems Committee Reprise Addresses

15 Joint Information Systems Committee Joint Information Systems Committee Networks and Innovative Services for United Kingdom Education


Download ppt "Norman Wiseman JISC Head of Programmes Presentation to JISC Authentication Concertation Day March 1999 International Authentication Activities Joint Information."

Similar presentations


Ads by Google