SlideShare a Scribd company logo
1 of 41
Download to read offline
Protecting “Personal Clouds” with
UMA and OpenID Connect	

@UMAWG
#UMApcloud for questions
19 June 2014
tinyurl.com/umawg for slides, recording, and more
1
The marvelous spiral of controlled
personal data sharing
2	

Further reading:
tinyurl.com/umawg
Agenda
•  The realities and challenges
of personal data sharing
•  “UMA for humans 101”
•  A walk through personal
cloud models
•  Use cases
•  How UMA leverages OpenID
Connect – with demo
•  Next steps
3	

Thanks to Kantara for
supporting the UMA work!
Thanks to our additional
webinar participants!
Thanks to MIT-KIT
for sponsoring this webinar
and taking part!
The realities and challenges of
personal data sharing
4
What is personal data?
5	

Personal Data is the Life Blood of
the Information Age
Personal Data is the New “Oil of
the Internet”
Personal Data is the new currency
Ways to measure the value of
personal data
6	

•  Market capitalization
•  Revenue per record/user
•  Market Price
•  Cost of data breach
•  Pay to protect
$112	
  per	
  user	
  record	
  
0! 10! 20! 30! 40!
Streat address!
Data of Birth!
Social Number!
Military record!
USD	
  1.7	
  per	
  record	
  
Data	
  breach	
  cost	
  $171M	
  
Source:	
  OECD	
  (2013),	
  “Exploring	
  the	
  Economics	
  of	
  Personal	
  Data:	
  A	
  Survey	
  of	
  Methodologies	
  for	
  Measuring	
  Monetary	
  Value”	
  
USD	
  
Personal data risks
7	

Individual	
   OrganizaPon	
  
Personal	
  Data	
  
…t	
  e	
  n	
  s	
  i	
  o	
  n…	
  
“72%	
  of	
  European	
  ciPzens	
  are	
  concerned	
  that	
  their	
  personal	
  data	
  may	
  be	
  misused…”	
  
Individuals have little visibility into the practices of the organizations they are
putting their trust in – until their data is breached or misused.
Risks:	
  Loss	
  of	
  Trust	
  
EU	
  commission	
  survey	
  2012	
  
The “personal data price” for online
service is too high: typing…
•  Provisioning by
hand
•  Provisioning by
value
•  Oversharing
•  Lying!
8
The “personal data price” for online
service is too high: connecting…
•  Meaningless
consent to
unfavorable terms
•  Painful, inconsistent,
and messy access
management
•  Oblivious
oversharing
9
The “personal data price” for online
service is too high: private URLs…
•  Handy but
insecure
•  Unsuitable for
really sensitive
data
10
“UMA for humans 101”
11
UMA turns online sharing into a
privacy-by-design solution
12	

The “user” in User-Managed
Access (UMA)
Alice hears Bob
knocking – can
he come in?
Further reading:
tinyurl.com/umapbd
UMA turns online sharing into a
privacy-by-design solution
Historical	

Municipal	

Financial	

Vocational	

Artistic	

Social	

Geolocation	

Computational	

Genealogical	

Biological	

Legal	

...	

13
UMA turns online sharing into a
privacy-by-design solution
I want to share this stuff
selectively	

•  Among my own apps	

•  With family and friends	

•  With organizations	

I want to protect this stuff
from being seen by everyone
in the world	

14	

I want to control access
proactively, not just feel forced
to consent over and over
UMA turns online sharing into a
privacy-by-design solution
15	

Standardized APIs for
privacy and “selective
sharing”
Outsources protection to
a centralized “digital
footprint control console”
A walk through
personal cloud models
16
Personal data ecosystem emerging
trends
17
Mapping UMA to personal clouds
and life management platforms
18	

Access	
   Requesting
PartyLMP
Bank	
  
Healthcare	
  
Home	
  
Car	
  
Data
Stores
Data	
  
Control	
  
Informed	
  Pull	
  
Controlled	
  Push	
  
Mapping UMA to personal clouds
and life management platforms
19	

Data
Stores
Bank	
  
Healthcare	
  
Home	
  
Car	
  
Requesting
PartyLMP
UMA AS
Mapping UMA to personal clouds
and life management platforms
20	

Data
Stores
Bank	
  
Healthcare	
  
Home	
  
Car	
  
Requesting
PartyLMP
Resource
Owner
Client
UMA AS
manage	
  
negoPate	
  protect	
  
manage	
  
consent	
  
authorize	
  
access	
  
Use cases
21
Case studies for…
•  Management and sharing of personal
accessibility needs and preferences
•  Secure sharing of university e-transcripts
•  Healthcare relationship locator service and
patient-centric consent directives
•  Access management 2.0 for the enterprise
(previous webinar)
•  …
•  Protecting the personal data stores of everyone
at MIT
22	

Further reading:
tinyurl.com/umacase
23	

Protected personal data stores:
MIT’s view
How UMA leverages
OpenID Connect
24
Use case:
Transcript of Records sharing
•  Student interacts with an online job application system
•  Student fills in a job application form and provides:
–  Personal information
–  Transcript of Records document
•  Data is transferred from the student’s personal data service
–  With explicit consent
•  Employer requests access to additional data
–  …and this has to be confirmed by the student
“Sharing Trustworthy Personal Data with Future Employers” 
http://kantarainitiative.org/confluence/display/uma/cv_sharing_scenario	

25
UMA model
26
Scenario (Peter sharing data)
27	

27	

(Student,	
  	
  
Job	
  Seeker)	
  
Personal	
  
Informa-on	
  
Transcript	
  of	
  
Records	
  
Scenario (Tom accessing data)
28	

28	

(Employer)	
  
Phone	
  Number	
  
(Student,	
  	
  
Job	
  Seeker)	
  
Live demo
29
NuveAM – Authorisation Manager
•  UMA-compliant Authorisation Server (AS)
from Cloud Identity Limited:
–  Access control to data in the Cloud
–  API security management
–  Real-time monitoring and audit
•  Use cases: Securing Cloud-based Personal Data
Services (PDS); Managing access to Cloud-based APIs
•  Uses open standards, including: UMA, OAuth 2.0,
OpenID Connect, SAML 2.0
•  Open source frameworks: Java and Python
http://www.cloudidentity.co.uk/products/nuveam
30
Nuve User-Managed Access
31
UMA claims-based authorisation
32	

•  UMA allows for the use of claims to support Claim-Based
Access Control (CBAC):
–  Trusted claims from Trusted Third Parties
–  Self-asserted claims
•  In CBAC, the decision to grant access to a protected
resource is made based on Subject’s information/
attributes, such as name, age, email address, role,
location, credit score, etc.
•  …or a Subject’s statement (e.g. promise to adhere to
licensing terms)
OpenID Connect role in UMA
33	

•  OpenID Connect (OIDC) provides
authentication, consented attribute sharing, and
attribute transmission capability
•  OIDC allows third-party asserted claims from
distributed sources to be collected
•  UMA leverages OIDC in claims-gathering flow in
one of two ways:
–  AS interacts directly with requesting parties, or
–  indirectly via clients
UMA AS Collecting Claims from
Requesting Party
34	

manage
control
protect
authorize
access
negotiate
consentmanage
resource
owner
resource
server
authorization
server
Authenticate OIDC
Server
client
requesting
party
Client acting as claims
conveyor
Client redirects the
Requesting Party to AS
Generic UMA Model
35	

UMA
AS
Resource
Server
Resource
Owner
Client
Requesting
Party
Protect
Control
Authorize
policy decision
Point
Protected
Resource
Access
Manage
SSO
UMA
Domain
OpenID
Domain
Client application conveying claims
to UMA AS
36	

UMA
AS
Resource
Server
Resource
Owner
Client
Requesting
Party
OpenID
Connect
AS
Protect
1. Request
Control
Authorize
Protect
policy decision
Point
Protected
Resource
4. Request Userinfo
Access
UserInfo
EndPoint
Manage
SSO
2.AuthN
AuthZ
UMA
Domain
OpenID
Domain
3.Access_token
5. Userinfo
OIDC
Client
UMA AS acting as Claims Client
37	

UMA
AS
Resource
Server
Resource
Owner
Client
Requesting
Party
OpenID
Connect
AS
Protect
1. Request
Control
Authorize
Protect
policy decision
Point
Protected
Resource
4. Request Userinfo
Access
UserInfo
EndPoint
Manage
SSO
2.AuthN
AuthZ
UMA
Domain
OpenID
Domain
OIDC
Client 3.Access_token
5. Userinfo
UMA AS acting as Claims Client
38	

UMA
AS
Resource
Server
Resource
Owner
Client
Requesting
Party
OpenID
Connect
AS
Protect
1. Request
Control
Authorize
Protect
policy decision
Point
Protected
Resource
4. Request Userinfo
Access
UserInfo
EndPoint
Manage
SSO
2.AuthN
AuthZ
UMA
Domain
OpenID
Domain
OIDC
Client 3.Access_token
5. Userinfo
UMA AS can collect additional
claims from internal user store
This can be a SAML-
compliant IDP just as well
Next steps
39
Next steps for the WG…and you
•  Get involved!
–  Become an “UMAnitarian” (it’s free)
–  Participate in the interop and
our implementation discussions
–  Follow and engage with @UMAWG on Twitter
•  Current work:
–  Technical: claim profiling and core spec variations
–  Business: access federation trust frameworks
•  Stay tuned for a webinar on UMA and Healthcare
in Q3
40	

Join	
  at:	
  
Pnyurl.com/umawg	
  
Questions? Thank you!	

@UMAWG
#UMApcloud for questions
19 June 2014
tinyurl.com/umawg for slides, recording, and more
41

More Related Content

What's hot

Cloud computing
Cloud computingCloud computing
Cloud computingAli Raza
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainAhmed Banafa
 
Anonos PR Newswire Press Release 07-09-15
Anonos PR Newswire Press Release 07-09-15Anonos PR Newswire Press Release 07-09-15
Anonos PR Newswire Press Release 07-09-15Ted Myerson
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industryCloudMask inc.
 
The day when role based access control disappears
The day when role based access control disappearsThe day when role based access control disappears
The day when role based access control disappearsUlf Mattsson
 
Securing data with blockchain and ai
Securing data with blockchain and aiSecuring data with blockchain and ai
Securing data with blockchain and aiVenkat Projects
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondAhmed Banafa
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainAltoros
 
Global Digital Sukuk (GDS) - A basic framework
Global Digital Sukuk (GDS) - A basic frameworkGlobal Digital Sukuk (GDS) - A basic framework
Global Digital Sukuk (GDS) - A basic frameworkTariqullah Khan
 
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Chad Lawler
 
The most relevant platforms overview for blockchain developers in 2020
The most relevant platforms overview for blockchain developers in 2020The most relevant platforms overview for blockchain developers in 2020
The most relevant platforms overview for blockchain developers in 2020Blockchain Council
 
Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring
Towards Blockchain-Based Secure Data Management for Remote Patient MonitoringTowards Blockchain-Based Secure Data Management for Remote Patient Monitoring
Towards Blockchain-Based Secure Data Management for Remote Patient MonitoringMd Jobair Hossain Faruk
 
Evaluation and Innovative Solution for Wellstar Health System
Evaluation and Innovative Solution for Wellstar Health SystemEvaluation and Innovative Solution for Wellstar Health System
Evaluation and Innovative Solution for Wellstar Health SystemMd Jobair Hossain Faruk
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...Ahmed Banafa
 
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...OpenAthens
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd Iaetsd
 

What's hot (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Project 3
Project 3Project 3
Project 3
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
Wenger Replacing IP Filtering: Challenges for Academic Libraries
Wenger Replacing IP Filtering: Challenges for Academic LibrariesWenger Replacing IP Filtering: Challenges for Academic Libraries
Wenger Replacing IP Filtering: Challenges for Academic Libraries
 
Anonos PR Newswire Press Release 07-09-15
Anonos PR Newswire Press Release 07-09-15Anonos PR Newswire Press Release 07-09-15
Anonos PR Newswire Press Release 07-09-15
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
 
The day when role based access control disappears
The day when role based access control disappearsThe day when role based access control disappears
The day when role based access control disappears
 
Securing data with blockchain and ai
Securing data with blockchain and aiSecuring data with blockchain and ai
Securing data with blockchain and ai
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using Blockchain
 
Global Digital Sukuk (GDS) - A basic framework
Global Digital Sukuk (GDS) - A basic frameworkGlobal Digital Sukuk (GDS) - A basic framework
Global Digital Sukuk (GDS) - A basic framework
 
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
 
The most relevant platforms overview for blockchain developers in 2020
The most relevant platforms overview for blockchain developers in 2020The most relevant platforms overview for blockchain developers in 2020
The most relevant platforms overview for blockchain developers in 2020
 
Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring
Towards Blockchain-Based Secure Data Management for Remote Patient MonitoringTowards Blockchain-Based Secure Data Management for Remote Patient Monitoring
Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring
 
Evaluation and Innovative Solution for Wellstar Health System
Evaluation and Innovative Solution for Wellstar Health SystemEvaluation and Innovative Solution for Wellstar Health System
Evaluation and Innovative Solution for Wellstar Health System
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
 
Sovereign identity
Sovereign identitySovereign identity
Sovereign identity
 
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
 

Viewers also liked

Digital Consent: Taking UMA from Concept to Reality
Digital Consent: Taking UMA from Concept to RealityDigital Consent: Taking UMA from Concept to Reality
Digital Consent: Taking UMA from Concept to RealityForgeRock
 
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламе
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламеРИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламе
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламеТарасов Константин
 
What Is Chiropractic
What Is ChiropracticWhat Is Chiropractic
What Is Chiropracticaccesschiro
 
Engaging Customers Before
Engaging Customers BeforeEngaging Customers Before
Engaging Customers Beforesyp77888
 
Anna kostenko paintings_not_photographs1
Anna kostenko paintings_not_photographs1Anna kostenko paintings_not_photographs1
Anna kostenko paintings_not_photographs1Kostas Tampakis
 
Коммуникации в условия кризиса: повышение продаж от имеющихся клиентов
Коммуникации в условия кризиса: повышение продаж от имеющихся клиентовКоммуникации в условия кризиса: повышение продаж от имеющихся клиентов
Коммуникации в условия кризиса: повышение продаж от имеющихся клиентовТарасов Константин
 
РИФ 2016, Performance-маркетинг в электронной коммерции
РИФ 2016, Performance-маркетинг в электронной коммерцииРИФ 2016, Performance-маркетинг в электронной коммерции
РИФ 2016, Performance-маркетинг в электронной коммерцииТарасов Константин
 
Summitix draft adoptionfundingbreakout-110501223638-phpapp02
Summitix draft adoptionfundingbreakout-110501223638-phpapp02Summitix draft adoptionfundingbreakout-110501223638-phpapp02
Summitix draft adoptionfundingbreakout-110501223638-phpapp02Andy Lehman
 
! реализовать настройки га 14 sergeev-etarget2011
! реализовать настройки га 14 sergeev-etarget2011! реализовать настройки га 14 sergeev-etarget2011
! реализовать настройки га 14 sergeev-etarget2011Тарасов Константин
 
απολαυστε και σκεφτειτε
απολαυστε και σκεφτειτεαπολαυστε και σκεφτειτε
απολαυστε και σκεφτειτεKostas Tampakis
 
La bella roma[1][1]._tno
La bella roma[1][1]._tnoLa bella roma[1][1]._tno
La bella roma[1][1]._tnoKostas Tampakis
 
РИФ 2016, Аналитика и ее автоматизация при поисковом продвижении трафиковых п...
РИФ 2016, Аналитика и ее автоматизация при поисковом продвижении трафиковых п...РИФ 2016, Аналитика и ее автоматизация при поисковом продвижении трафиковых п...
РИФ 2016, Аналитика и ее автоматизация при поисковом продвижении трафиковых п...Тарасов Константин
 
РИФ 2016, Поисковая оптимизация для мобильных приложений на практике
РИФ 2016, Поисковая оптимизация для мобильных приложений на практикеРИФ 2016, Поисковая оптимизация для мобильных приложений на практике
РИФ 2016, Поисковая оптимизация для мобильных приложений на практикеТарасов Константин
 
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителю
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителюРИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителю
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителюТарасов Константин
 
Hybrid Rice -- Alternative for Professional Farmers
Hybrid Rice -- Alternative for Professional FarmersHybrid Rice -- Alternative for Professional Farmers
Hybrid Rice -- Alternative for Professional FarmersNSTDA THAILAND
 
Namfon Farm T Mai Long Mai Roo 011009
Namfon Farm  T Mai Long Mai Roo 011009Namfon Farm  T Mai Long Mai Roo 011009
Namfon Farm T Mai Long Mai Roo 011009NSTDA THAILAND
 
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...Тарасов Константин
 

Viewers also liked (20)

Digital Consent: Taking UMA from Concept to Reality
Digital Consent: Taking UMA from Concept to RealityDigital Consent: Taking UMA from Concept to Reality
Digital Consent: Taking UMA from Concept to Reality
 
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламе
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламеРИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламе
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламе
 
What Is Chiropractic
What Is ChiropracticWhat Is Chiropractic
What Is Chiropractic
 
Engaging Customers Before
Engaging Customers BeforeEngaging Customers Before
Engaging Customers Before
 
Anna kostenko paintings_not_photographs1
Anna kostenko paintings_not_photographs1Anna kostenko paintings_not_photographs1
Anna kostenko paintings_not_photographs1
 
Коммуникации в условия кризиса: повышение продаж от имеющихся клиентов
Коммуникации в условия кризиса: повышение продаж от имеющихся клиентовКоммуникации в условия кризиса: повышение продаж от имеющихся клиентов
Коммуникации в условия кризиса: повышение продаж от имеющихся клиентов
 
РИФ 2016, Performance-маркетинг в электронной коммерции
РИФ 2016, Performance-маркетинг в электронной коммерцииРИФ 2016, Performance-маркетинг в электронной коммерции
РИФ 2016, Performance-маркетинг в электронной коммерции
 
Summitix draft adoptionfundingbreakout-110501223638-phpapp02
Summitix draft adoptionfundingbreakout-110501223638-phpapp02Summitix draft adoptionfundingbreakout-110501223638-phpapp02
Summitix draft adoptionfundingbreakout-110501223638-phpapp02
 
! реализовать настройки га 14 sergeev-etarget2011
! реализовать настройки га 14 sergeev-etarget2011! реализовать настройки га 14 sergeev-etarget2011
! реализовать настройки га 14 sergeev-etarget2011
 
απολαυστε και σκεφτειτε
απολαυστε και σκεφτειτεαπολαυστε και σκεφτειτε
απολαυστε και σκεφτειτε
 
La bella roma[1][1]._tno
La bella roma[1][1]._tnoLa bella roma[1][1]._tno
La bella roma[1][1]._tno
 
РИФ 2016, Аналитика и ее автоматизация при поисковом продвижении трафиковых п...
РИФ 2016, Аналитика и ее автоматизация при поисковом продвижении трафиковых п...РИФ 2016, Аналитика и ее автоматизация при поисковом продвижении трафиковых п...
РИФ 2016, Аналитика и ее автоматизация при поисковом продвижении трафиковых п...
 
РИФ 2016, Поисковая оптимизация для мобильных приложений на практике
РИФ 2016, Поисковая оптимизация для мобильных приложений на практикеРИФ 2016, Поисковая оптимизация для мобильных приложений на практике
РИФ 2016, Поисковая оптимизация для мобильных приложений на практике
 
BCS Selenium Workshop
BCS Selenium WorkshopBCS Selenium Workshop
BCS Selenium Workshop
 
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителю
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителюРИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителю
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителю
 
Hybrid Rice -- Alternative for Professional Farmers
Hybrid Rice -- Alternative for Professional FarmersHybrid Rice -- Alternative for Professional Farmers
Hybrid Rice -- Alternative for Professional Farmers
 
Animals
AnimalsAnimals
Animals
 
Namfon Farm T Mai Long Mai Roo 011009
Namfon Farm  T Mai Long Mai Roo 011009Namfon Farm  T Mai Long Mai Roo 011009
Namfon Farm T Mai Long Mai Roo 011009
 
Food & Social Justice
Food & Social JusticeFood & Social Justice
Food & Social Justice
 
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...
 

Similar to Uma webinar 2014 06-19

User-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management PlatformUser-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management PlatformDomenico Catalano
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyMicah Altman
 
20220301 digital person v15
20220301 digital person v1520220301 digital person v15
20220301 digital person v15ISSIP
 
Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Logindrummondreed
 
UX Edinburgh Meetup deck - Privacy UX - March 2024.pdf
UX Edinburgh Meetup deck - Privacy UX - March 2024.pdfUX Edinburgh Meetup deck - Privacy UX - March 2024.pdf
UX Edinburgh Meetup deck - Privacy UX - March 2024.pdfinfo948069
 
UX Edinburgh Meetup deck - Privacy UX - March 2024.pdf
UX Edinburgh Meetup deck - Privacy UX - March 2024.pdfUX Edinburgh Meetup deck - Privacy UX - March 2024.pdf
UX Edinburgh Meetup deck - Privacy UX - March 2024.pdfinfo948069
 
IoTMeetupGuildford#20: Michele Nati, Personal data and Blockchain: Opportunit...
IoTMeetupGuildford#20: Michele Nati, Personal data and Blockchain: Opportunit...IoTMeetupGuildford#20: Michele Nati, Personal data and Blockchain: Opportunit...
IoTMeetupGuildford#20: Michele Nati, Personal data and Blockchain: Opportunit...MicheleNati
 
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMADomenico Catalano
 
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...MicheleNati
 
How Respect Network Will Make VRM Work
How Respect Network Will Make VRM WorkHow Respect Network Will Make VRM Work
How Respect Network Will Make VRM Workdrummondreed
 
82320171CSC 200 – Cyberspace and Cybersecurity.docx
82320171CSC 200 – Cyberspace and Cybersecurity.docx82320171CSC 200 – Cyberspace and Cybersecurity.docx
82320171CSC 200 – Cyberspace and Cybersecurity.docxransayo
 
Let the trust evolve itself
Let the trust evolve itselfLet the trust evolve itself
Let the trust evolve itselfSanjeev Azad
 
Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Matthew Lease
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Datarobkitchin
 
Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care Napier University
 
Future is private intel dev fest
Future is private   intel dev festFuture is private   intel dev fest
Future is private intel dev festgeetachauhan
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingRebecca Leitch
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingSecurity Innovation
 

Similar to Uma webinar 2014 06-19 (20)

User-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management PlatformUser-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management Platform
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
20220301 digital person v15
20220301 digital person v1520220301 digital person v15
20220301 digital person v15
 
Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Login
 
UX Edinburgh Meetup deck - Privacy UX - March 2024.pdf
UX Edinburgh Meetup deck - Privacy UX - March 2024.pdfUX Edinburgh Meetup deck - Privacy UX - March 2024.pdf
UX Edinburgh Meetup deck - Privacy UX - March 2024.pdf
 
UX Edinburgh Meetup deck - Privacy UX - March 2024.pdf
UX Edinburgh Meetup deck - Privacy UX - March 2024.pdfUX Edinburgh Meetup deck - Privacy UX - March 2024.pdf
UX Edinburgh Meetup deck - Privacy UX - March 2024.pdf
 
IoTMeetupGuildford#20: Michele Nati, Personal data and Blockchain: Opportunit...
IoTMeetupGuildford#20: Michele Nati, Personal data and Blockchain: Opportunit...IoTMeetupGuildford#20: Michele Nati, Personal data and Blockchain: Opportunit...
IoTMeetupGuildford#20: Michele Nati, Personal data and Blockchain: Opportunit...
 
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
 
How Respect Network Will Make VRM Work
How Respect Network Will Make VRM WorkHow Respect Network Will Make VRM Work
How Respect Network Will Make VRM Work
 
Citizen-consumer permission based data sharing | Dr Matt Stroud | January 2015
Citizen-consumer permission based data sharing | Dr Matt Stroud | January 2015Citizen-consumer permission based data sharing | Dr Matt Stroud | January 2015
Citizen-consumer permission based data sharing | Dr Matt Stroud | January 2015
 
82320171CSC 200 – Cyberspace and Cybersecurity.docx
82320171CSC 200 – Cyberspace and Cybersecurity.docx82320171CSC 200 – Cyberspace and Cybersecurity.docx
82320171CSC 200 – Cyberspace and Cybersecurity.docx
 
Let the trust evolve itself
Let the trust evolve itselfLet the trust evolve itself
Let the trust evolve itself
 
Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences.
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
 
Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care
 
Future is private intel dev fest
Future is private   intel dev festFuture is private   intel dev fest
Future is private intel dev fest
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 

More from kantarainitiative

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022kantarainitiative
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summarykantarainitiative
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiativekantarainitiative
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020kantarainitiative
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15kantarainitiative
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15kantarainitiative
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)kantarainitiative
 
Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)kantarainitiative
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 kantarainitiative
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Updatekantarainitiative
 

More from kantarainitiative (20)

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022
 
2021 Annual General Meeting
2021 Annual General Meeting2021 Annual General Meeting
2021 Annual General Meeting
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary
 
2020 Annual General Meeting
2020 Annual General Meeting2020 Annual General Meeting
2020 Annual General Meeting
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiative
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara orientation 2018
Kantara orientation 2018Kantara orientation 2018
Kantara orientation 2018
 
Kantara Overview 2017
Kantara Overview 2017Kantara Overview 2017
Kantara Overview 2017
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
Cloud Identity Summit
Cloud Identity SummitCloud Identity Summit
Cloud Identity Summit
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Update
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Uma webinar 2014 06-19

  • 1. Protecting “Personal Clouds” with UMA and OpenID Connect @UMAWG #UMApcloud for questions 19 June 2014 tinyurl.com/umawg for slides, recording, and more 1
  • 2. The marvelous spiral of controlled personal data sharing 2 Further reading: tinyurl.com/umawg
  • 3. Agenda •  The realities and challenges of personal data sharing •  “UMA for humans 101” •  A walk through personal cloud models •  Use cases •  How UMA leverages OpenID Connect – with demo •  Next steps 3 Thanks to Kantara for supporting the UMA work! Thanks to our additional webinar participants! Thanks to MIT-KIT for sponsoring this webinar and taking part!
  • 4. The realities and challenges of personal data sharing 4
  • 5. What is personal data? 5 Personal Data is the Life Blood of the Information Age Personal Data is the New “Oil of the Internet” Personal Data is the new currency
  • 6. Ways to measure the value of personal data 6 •  Market capitalization •  Revenue per record/user •  Market Price •  Cost of data breach •  Pay to protect $112  per  user  record   0! 10! 20! 30! 40! Streat address! Data of Birth! Social Number! Military record! USD  1.7  per  record   Data  breach  cost  $171M   Source:  OECD  (2013),  “Exploring  the  Economics  of  Personal  Data:  A  Survey  of  Methodologies  for  Measuring  Monetary  Value”   USD  
  • 7. Personal data risks 7 Individual   OrganizaPon   Personal  Data   …t  e  n  s  i  o  n…   “72%  of  European  ciPzens  are  concerned  that  their  personal  data  may  be  misused…”   Individuals have little visibility into the practices of the organizations they are putting their trust in – until their data is breached or misused. Risks:  Loss  of  Trust   EU  commission  survey  2012  
  • 8. The “personal data price” for online service is too high: typing… •  Provisioning by hand •  Provisioning by value •  Oversharing •  Lying! 8
  • 9. The “personal data price” for online service is too high: connecting… •  Meaningless consent to unfavorable terms •  Painful, inconsistent, and messy access management •  Oblivious oversharing 9
  • 10. The “personal data price” for online service is too high: private URLs… •  Handy but insecure •  Unsuitable for really sensitive data 10
  • 11. “UMA for humans 101” 11
  • 12. UMA turns online sharing into a privacy-by-design solution 12 The “user” in User-Managed Access (UMA) Alice hears Bob knocking – can he come in? Further reading: tinyurl.com/umapbd
  • 13. UMA turns online sharing into a privacy-by-design solution Historical Municipal Financial Vocational Artistic Social Geolocation Computational Genealogical Biological Legal ... 13
  • 14. UMA turns online sharing into a privacy-by-design solution I want to share this stuff selectively •  Among my own apps •  With family and friends •  With organizations I want to protect this stuff from being seen by everyone in the world 14 I want to control access proactively, not just feel forced to consent over and over
  • 15. UMA turns online sharing into a privacy-by-design solution 15 Standardized APIs for privacy and “selective sharing” Outsources protection to a centralized “digital footprint control console”
  • 16. A walk through personal cloud models 16
  • 17. Personal data ecosystem emerging trends 17
  • 18. Mapping UMA to personal clouds and life management platforms 18 Access   Requesting PartyLMP Bank   Healthcare   Home   Car   Data Stores Data   Control   Informed  Pull   Controlled  Push  
  • 19. Mapping UMA to personal clouds and life management platforms 19 Data Stores Bank   Healthcare   Home   Car   Requesting PartyLMP UMA AS
  • 20. Mapping UMA to personal clouds and life management platforms 20 Data Stores Bank   Healthcare   Home   Car   Requesting PartyLMP Resource Owner Client UMA AS manage   negoPate  protect   manage   consent   authorize   access  
  • 22. Case studies for… •  Management and sharing of personal accessibility needs and preferences •  Secure sharing of university e-transcripts •  Healthcare relationship locator service and patient-centric consent directives •  Access management 2.0 for the enterprise (previous webinar) •  … •  Protecting the personal data stores of everyone at MIT 22 Further reading: tinyurl.com/umacase
  • 23. 23 Protected personal data stores: MIT’s view
  • 25. Use case: Transcript of Records sharing •  Student interacts with an online job application system •  Student fills in a job application form and provides: –  Personal information –  Transcript of Records document •  Data is transferred from the student’s personal data service –  With explicit consent •  Employer requests access to additional data –  …and this has to be confirmed by the student “Sharing Trustworthy Personal Data with Future Employers” http://kantarainitiative.org/confluence/display/uma/cv_sharing_scenario 25
  • 27. Scenario (Peter sharing data) 27 27 (Student,     Job  Seeker)   Personal   Informa-on   Transcript  of   Records  
  • 28. Scenario (Tom accessing data) 28 28 (Employer)   Phone  Number   (Student,     Job  Seeker)  
  • 30. NuveAM – Authorisation Manager •  UMA-compliant Authorisation Server (AS) from Cloud Identity Limited: –  Access control to data in the Cloud –  API security management –  Real-time monitoring and audit •  Use cases: Securing Cloud-based Personal Data Services (PDS); Managing access to Cloud-based APIs •  Uses open standards, including: UMA, OAuth 2.0, OpenID Connect, SAML 2.0 •  Open source frameworks: Java and Python http://www.cloudidentity.co.uk/products/nuveam 30
  • 32. UMA claims-based authorisation 32 •  UMA allows for the use of claims to support Claim-Based Access Control (CBAC): –  Trusted claims from Trusted Third Parties –  Self-asserted claims •  In CBAC, the decision to grant access to a protected resource is made based on Subject’s information/ attributes, such as name, age, email address, role, location, credit score, etc. •  …or a Subject’s statement (e.g. promise to adhere to licensing terms)
  • 33. OpenID Connect role in UMA 33 •  OpenID Connect (OIDC) provides authentication, consented attribute sharing, and attribute transmission capability •  OIDC allows third-party asserted claims from distributed sources to be collected •  UMA leverages OIDC in claims-gathering flow in one of two ways: –  AS interacts directly with requesting parties, or –  indirectly via clients
  • 34. UMA AS Collecting Claims from Requesting Party 34 manage control protect authorize access negotiate consentmanage resource owner resource server authorization server Authenticate OIDC Server client requesting party Client acting as claims conveyor Client redirects the Requesting Party to AS
  • 35. Generic UMA Model 35 UMA AS Resource Server Resource Owner Client Requesting Party Protect Control Authorize policy decision Point Protected Resource Access Manage SSO UMA Domain OpenID Domain
  • 36. Client application conveying claims to UMA AS 36 UMA AS Resource Server Resource Owner Client Requesting Party OpenID Connect AS Protect 1. Request Control Authorize Protect policy decision Point Protected Resource 4. Request Userinfo Access UserInfo EndPoint Manage SSO 2.AuthN AuthZ UMA Domain OpenID Domain 3.Access_token 5. Userinfo OIDC Client
  • 37. UMA AS acting as Claims Client 37 UMA AS Resource Server Resource Owner Client Requesting Party OpenID Connect AS Protect 1. Request Control Authorize Protect policy decision Point Protected Resource 4. Request Userinfo Access UserInfo EndPoint Manage SSO 2.AuthN AuthZ UMA Domain OpenID Domain OIDC Client 3.Access_token 5. Userinfo
  • 38. UMA AS acting as Claims Client 38 UMA AS Resource Server Resource Owner Client Requesting Party OpenID Connect AS Protect 1. Request Control Authorize Protect policy decision Point Protected Resource 4. Request Userinfo Access UserInfo EndPoint Manage SSO 2.AuthN AuthZ UMA Domain OpenID Domain OIDC Client 3.Access_token 5. Userinfo UMA AS can collect additional claims from internal user store This can be a SAML- compliant IDP just as well
  • 40. Next steps for the WG…and you •  Get involved! –  Become an “UMAnitarian” (it’s free) –  Participate in the interop and our implementation discussions –  Follow and engage with @UMAWG on Twitter •  Current work: –  Technical: claim profiling and core spec variations –  Business: access federation trust frameworks •  Stay tuned for a webinar on UMA and Healthcare in Q3 40 Join  at:   Pnyurl.com/umawg  
  • 41. Questions? Thank you! @UMAWG #UMApcloud for questions 19 June 2014 tinyurl.com/umawg for slides, recording, and more 41