SlideShare a Scribd company logo
1 of 36
1
Implementing Privacy
Using the OASIS XACML Standard to
implement privacy using attribute-
based access control
Externalizing Authorization Introduction to XACML XACML & Privacy
© 2014 Axiomatics AB
Customer use cases
2
Externalizing Authorization
Next Generation Authorization
Attribute Based Access Control
© 2014 Axiomatics AB
Authentication & Authorization
© 2014 Axiomatics AB 3
Authentication:
Determine who the user is
Authorization:
Determine what the user can do
© 2014 Axiomatics AB 4
AuthZ
Business-
driven
Operation-
driven
Compliance
-driven
Examples
 Business-driven
 Finance: A junior teller can approve transactions up to 1,000 USD.
 Healthcare: A senior nurse can edit the notes of a medical record.
 Operations-driven
 Finance: No one can approve transactions between 5pm and 9am.
 Healthcare: No one can print a medical record from home.
 Compliance-driven
 Finance: a trader cannot approve a trade order he created (segregation of duty)
 Healthcare: mask the social security number on the X-ray print-out
© 2014 Axiomatics AB 5
This is where privacy fits in.
Privacy-enabling authorization: requirements
 A bank customer wants their account information to be available to bank staff.
 So long as their access is motivated by services they provide the customer
 The customer doesn’t want bank staff to access the data for other reasons
 E.g. gossip
 For privacy, CONTEXT IS KEY.
 A staff member viewing a record may be aligned with privacy requirements on Monday…
 But violating them on Tuesday.
 How do existing authorization frameworks cater for context?
 They don’t
 We need to look for a new framework or model?
© 2014 Axiomatics AB 6
Challenges with existing authorization solutions
 User-centric only
 Software-specific
 Static
 Lack of visibility  difficult to audit the system
 Cannot cater for context
 Cannot evolve to meet new business needs
 Expensive
 Developers don’t like it
© 2014 Axiomatics AB 7
The need for next-generation authorization
© 2014 Axiomatics AB 8
External from
applications
•Decouple
business logic
implementation
from
authorization
logic
Standards-based
•OASIS XACML:
eXtensible
Access Control
Markup
Language
Fine-grained
•It’s not just
about who the
user is, it’s
about who,
what, when,
where, why, and
how
Context-aware
•Context
matters: time of
day, device,
purpose of use…
Attribute-based Access Control (ABAC)
Implement privacy with Attribute-based access control
© 2014 Axiomatics AB 9
Doctors should be able to view the
records of patients assigned to their
unit and edit the records of those
patients with whom they have a care
relationship
Privacy by design: ONLY authorized persons can access/update the record
ABAC takes multiple factors into account
 Not just users and roles…
… but also attributes reflecting the business process and context
 Policies define precise access rules….
… which are dynamically enforced in real-time
© 2014 Axiomatics AB 10
WHO WHAT WHERE WHEN WHY HOW
It’s not
just about
but also and
Attribute-Based Access Control
© 2014 Axiomatics AB
User
Attributes
Policies
Example: Doctors can open &
edit a patient’s health record
in the hospital emergency
room between 5PM and 8 AM.
Action Resource Context
Read more here:
csrc.nist.gov/projects/abac/
Externalized Authorization Management Benefits
 User-, Resource-, Relationship-centric: *-based access control
 Standards-based, generic: implemented on top of OASIS XACML
 Dynamic: adapt to change and context
 Centrally managed authorization: all authorization policies are in one place
 Context is one of the parameters: take time, location and device into account
 Adapts to new requirements: authorization policies can grow independently
 Reusable, cost-effective: write once, enforce everywhere
 Easy on developers: developers no longer need to worry about authorization.
© 2014 Axiomatics AB 12
13
An introduction to XACML
OASIS XACML:
eXtensible Access Control Markup Language
© 2014 Axiomatics AB
What is XACML?
 Pronunciation
 eXtensible Access Control Markup Language
 OASIS standard
 V 3.0 approved in January 2013
 V 1.0 approved in 2003 (11 years ago!)
 XACML is expressed as
 A specification document and
 An XML schema
 http://www.oasis-open.org/committees/xacml/
© 2014 Axiomatics AB 14
What does XACML contain?
© 2014 Axiomatics AB 15
XACML
Reference
Architecture
Policy
Language
Request /
Response
Protocol
The XACML Architecture & Flow
© 2014 Axiomatics AB
Decide
Policy Decision Point
Manage
PolicyAdministration Point
Support
Policy Information Point
Policy Retrieval Point
Enforce
Policy Enforcement Point
Access Doc.
#123
Can Alice access
Document
#123?
Yes, Permit
Load XACML
policies
Retrieve user
role, clearance
and document
classification
Access Doc.
#123
Where do I protect?
 Choose a broad protection
 At the API level
 At the database level
© 2014 Axiomatics AB 17
Database Tier
DB
API & Business Tier
(Web Services,
REST…)
Presentation tier
(Portals)
Sample XACML Policy
© 2014 Axiomatics AB 18
Root Policy Set
PolicySet
Policy
Rule
Effect=Permit
Rule
Effect = Deny
PolicySet
Policy
Rule
Effect =
Permit
19
XACML & Privacy
Using XACML to implement various privacy regulations
© 2014 Axiomatics AB
XACML profiles on privacy
 Cross-Enterprise Security and Privacy Authorization (XSPA) Profile of XACML for
Healthcare (link)
 This profile provides a cross-enterprise security and privacy profile that describes how to use
XACML to provide privacy policies and consent directives in an interoperable manner.
 Cross-Enterprise Security and Privacy Authorization (XSPA) profile of XACML v2.0 for
Healthcare, Implementation Examples (link)
 This profile takes HL7 examples and converts to XACML
 Privacy policy profile of XACML v2.0
 Based on the Organization of Economic Cooperation and Development (1980) privacy
guidelines
 Other regulations on data protection (not specific to privacy)
 XACML Intellectual Property Control (IPC) Profile
 XACML 3.0 Export Compliance-US (EC-US) Profile
© 2014 Axiomatics AB 20
HL7 Security and Privacy Ontology Use Cases
© 2014 Axiomatics AB 21
/*
* Access Control Based on Category of Action
* Access to progress notes
*/
policy progressNotes{
target clause objectType=="progress note"
apply firstApplicable
/*
* A primary physician can create a patient's progress note
*/
rule createNote{
target clause role=="physician" and action=="create"
condition primaryPhysician==requestorId
permit
}
}
link
(the above is ALFA – a XACML pseudo-code. Download ALFA here.)
XACML & the 7 Foundational Principles (1/2)
© 2014 Axiomatics AB 22
Proactive not
Reactive; Preventative not
Remedial
•XACML defines an
architecture enacted at
runtime
Privacy as the Default
Setting
•XACML policies enable
exact privilege settings
Privacy Embedded into
Design
•IT projects can focus on
authorization requirements
on the one hand and
business requirements on
the other
•Clear separation of
concerns
XACML & the 7 Foundational Principles (2/2)
© 2014 Axiomatics AB 23
Full Functionality — Positive-
Sum, not Zero-Sum
•XACML is a business enabler
•It allows for data to be securely
shared
•XACML helps deliver new services
End-to-End Security — Full
Lifecycle Protection
•XACML policies evolve with the
data they protect
•XACML policies can adapt to
regulatory change
Visibility and Transparency —
Keep it Open
•XACML policies are centrally
managed and can be easily
audited
•XACML policies mirror business
requirements closely
Respect for User Privacy — Keep
it User-Centric
•XACML policies focus on the
entire picture: from who is
accessing the data to the
relationships to the purpose of
use…
Privacy by Design:Trilogy of Applications & XACML
© 2014 Axiomatics AB 24
Information
Technology
Accountable
Business
Practices
Physical
Design
Watch Ann Cavoukian
on the Trilogy of Applications.
XACML promotes a
well-defined
architecture
XACML policies map
closely to business
requirements
XACML enables the positive-sum
 Example: medical records
 Medical records used to be stored in a physical location at the doctor’s office.
 Security was there by default: it is hard to access information stored in a file cabinet
 Today: new consumer & medical patterns emerge
 Let patients browse their medical data online
 Share data with other medical actors (hospitals, specialists, pharmacies…) and non-
medical actors (insurance companies…)
 The promise: deliver better care
 XACML, as an IT security artefact, can help go from high-level privacy designs
to technical implementations
© 2014 Axiomatics AB 25
Key take-aways
 Privacy is more about controlled information sharing than the prevention
thereof  XACML enables secure information sharing
 The privacy headache will explode once the new EU regulation becomes reality
 industries will need a means to quickly and efficiently implement privacy.
XACML is the way to go on a technical level
 Privacy is not just about compliance, it’s also about
 Brand
 Reputation, and
 Trust.
 A key challenge is that privacy is a human concept. XACML bridges the gap
between human & business requirements and technical implementations
© 2014 Axiomatics AB 26
27
Customer Implementations
Examples from the world of finance, healthcare, and
pharmaceutical
© 2014 Axiomatics AB
Norwegian bank (1/2)
 Lov om behandling av personopplysninger (personopplysningsloven | link)
 Datatilsynet (Norwegian Data Protection Authority) requires:
 that bank clients should be able to demand exact records of which staff member
accessed their account details or other privacy sensitive data and when this happened
 that the bank must ensure that only staff members with a purpose of use motivated by
tasks performed in the course of their professional duties access sensitive data. The
bank must be able to investigate any suspicions that this rule is being violated by staff
members.
 that the bank duly considers the risk assessment mandates of the legislation must be
recognized (for instance with regard to VIP accounts or accounts of citizens with a
protected identity due to witness protection etc.)
 The project used XACML to implement fine-grained access control in
conformance with privacy regulations
© 2014 Axiomatics AB 28
Norwegian bank (2/2) Details
 A whitelist is defined: customers have the right to define who can access their
data
 A blacklist is defined: customer have the right to define who cannot access
their data
 E.g. relatives…
 Common rules are implemented
 Only employees in a given branch can view customer data from that branch
 Exception handling and flags are implemented
 All access to data is logged for future accountability
© 2014 Axiomatics AB 29
Swedish National Healthcare
 Project driven by the Swedish Medical Care Advice Service
 Goal: comprehensive IT-solution for electronic patient record management
 Uniform technical choices for future security services
 Excerpt from the general goals for BIF services
 Provide access to authorized personnel
 Protect sensitive patient data against unauthorized access
 Functional requirements
 Strong emphasis on standard based approaches
 E.g. XACML shall be used for access control
 World’s largest deployment of XACML yet
© 2014 Axiomatics AB 30
Swedish National Healthcare: access control rules
 At the medical center level
 Only doctors that belong to the given medical center can see records of patients from
that medical center
 At the district level
 Only doctors that belong to the given district can see records of patients from that
district
 Patients can define their own policies: patient-defined disclosure policies (pddp)
 At the top level – the organization
 Patients need to provide an additional consent form for their data to be disclosed
 An emergency plan provides for exceptional policies to override patient-defined rules
Northern Spain Hospitals CancerTreatment (1/2)
 BEinGRID: EU-funded development of Business Models for the Grid Industry.
 Healthcare business use case
 Provide new compute intensive radiotherapy tools to hospitals remotely
 Challenge: A new treatment needs several hours or days.
 Goal: drive down the time it takes to design radiotherapy treatments
 Privacy?
 Radiotherapy records contain Personal Health Information (PHI) that must be stripped
before the records can be sent to the super computers
 Read more
 Link
© 2014 Axiomatics AB 32
Northern Spain Hospitals CancerTreatment (2/2)
© 2014 Axiomatics AB 33
Security GWHOSPITAL
Policy
Server
TREATMENT
SERVICES
Policies
DB
PDP
Web Service
getRole
verify
optimize
commissioning
verify
1
2
3
4
5
6
PDP
PEP
US Pharmaceutical
 Goal: share medical information (clinical trials, molecule…) with partners,
contractors, universities, and authorities
 Privacy?
 Clinical trials contain highly sensitive PHI.
 For the customer the alternative is not sharing the data at all to avoid breaches & fines.
© 2014 Axiomatics AB 34
More examples here at EIC 2014
 Drivers and Lessons learned from a Recent ABAC Implementation at Generali
 Manuel Schneider, Generali
 14.05.2014 14:30-15:30
 ABAC - Visions and Reality
 Finn Frisch, Axiomatics
 14.05.2014 14:30-15:30
 Dynamic Authorization Management: The Market and its Future
 Graham Williamson
 14.05.2014 12:00-13:00
 RBAC, ABAC, or Both?
 Panel
 14.05.2014 12:00-13:00
© 2014 Axiomatics AB 35
© 2014 Axiomatics AB 36
Thank you.

More Related Content

What's hot

Cloud design patterns - Federated Identity & Gatekeeper
Cloud design patterns - Federated Identity & GatekeeperCloud design patterns - Federated Identity & Gatekeeper
Cloud design patterns - Federated Identity & GatekeeperRoger Chien
 
Entertainment case study - Scalable and secure cloud delivery framework speed...
Entertainment case study - Scalable and secure cloud delivery framework speed...Entertainment case study - Scalable and secure cloud delivery framework speed...
Entertainment case study - Scalable and secure cloud delivery framework speed...Sendachi
 
Federated Identity Architectures Integrating With The Cloud
Federated Identity Architectures   Integrating With The CloudFederated Identity Architectures   Integrating With The Cloud
Federated Identity Architectures Integrating With The Cloudrsnarayanan
 
Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsBertrand Carlier
 
Getting Cloud Architecture Right the First Time Ver 2
Getting Cloud Architecture Right the First Time Ver 2Getting Cloud Architecture Right the First Time Ver 2
Getting Cloud Architecture Right the First Time Ver 2David Linthicum
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementPrashanth BS
 
Salesforce Backup, Restore & Archiving- Adam Best, Senior Program Architect
Salesforce Backup, Restore & Archiving- Adam Best, Senior Program ArchitectSalesforce Backup, Restore & Archiving- Adam Best, Senior Program Architect
Salesforce Backup, Restore & Archiving- Adam Best, Senior Program Architectgemziebeth
 
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...Profesia Srl, Lynx Group
 
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Eve Maler
 
Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?Ocean9, Inc.
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management OverviewSAP Technology
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerHitachi ID Systems, Inc.
 
The New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT EraThe New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT EraForgeRock
 
Microsoft Insurance Solutions Keynote Presentation at the Financial Services ...
Microsoft Insurance Solutions Keynote Presentation at the Financial Services ...Microsoft Insurance Solutions Keynote Presentation at the Financial Services ...
Microsoft Insurance Solutions Keynote Presentation at the Financial Services ...Mike Walker
 
Salesforce Shield: How to Deliver a New Level of Trust and Security in the Cloud
Salesforce Shield: How to Deliver a New Level of Trust and Security in the CloudSalesforce Shield: How to Deliver a New Level of Trust and Security in the Cloud
Salesforce Shield: How to Deliver a New Level of Trust and Security in the CloudDreamforce
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference ArchitectureHannu Kasanen
 
CIS14: User-Managed Access
CIS14: User-Managed AccessCIS14: User-Managed Access
CIS14: User-Managed AccessCloudIDSummit
 

What's hot (20)

Cloud design patterns - Federated Identity & Gatekeeper
Cloud design patterns - Federated Identity & GatekeeperCloud design patterns - Federated Identity & Gatekeeper
Cloud design patterns - Federated Identity & Gatekeeper
 
Identity as a Service
Identity as a ServiceIdentity as a Service
Identity as a Service
 
Entertainment case study - Scalable and secure cloud delivery framework speed...
Entertainment case study - Scalable and secure cloud delivery framework speed...Entertainment case study - Scalable and secure cloud delivery framework speed...
Entertainment case study - Scalable and secure cloud delivery framework speed...
 
Federated Identity Architectures Integrating With The Cloud
Federated Identity Architectures   Integrating With The CloudFederated Identity Architectures   Integrating With The Cloud
Federated Identity Architectures Integrating With The Cloud
 
Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundations
 
Getting Cloud Architecture Right the First Time Ver 2
Getting Cloud Architecture Right the First Time Ver 2Getting Cloud Architecture Right the First Time Ver 2
Getting Cloud Architecture Right the First Time Ver 2
 
Two Factor Authentication for Salesforce
Two Factor Authentication for SalesforceTwo Factor Authentication for Salesforce
Two Factor Authentication for Salesforce
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
Salesforce Backup, Restore & Archiving- Adam Best, Senior Program Architect
Salesforce Backup, Restore & Archiving- Adam Best, Senior Program ArchitectSalesforce Backup, Restore & Archiving- Adam Best, Senior Program Architect
Salesforce Backup, Restore & Archiving- Adam Best, Senior Program Architect
 
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
 
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
 
Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?Agility, Business Continuity & Security in a Digital World: Can we have it all?
Agility, Business Continuity & Security in a Digital World: Can we have it all?
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity Manager
 
The New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT EraThe New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT Era
 
Microsoft Insurance Solutions Keynote Presentation at the Financial Services ...
Microsoft Insurance Solutions Keynote Presentation at the Financial Services ...Microsoft Insurance Solutions Keynote Presentation at the Financial Services ...
Microsoft Insurance Solutions Keynote Presentation at the Financial Services ...
 
Salesforce Shield: How to Deliver a New Level of Trust and Security in the Cloud
Salesforce Shield: How to Deliver a New Level of Trust and Security in the CloudSalesforce Shield: How to Deliver a New Level of Trust and Security in the Cloud
Salesforce Shield: How to Deliver a New Level of Trust and Security in the Cloud
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference Architecture
 
CIS14: User-Managed Access
CIS14: User-Managed AccessCIS14: User-Managed Access
CIS14: User-Managed Access
 
Rits Brown Bag - vtiger
Rits Brown Bag - vtigerRits Brown Bag - vtiger
Rits Brown Bag - vtiger
 

Viewers also liked

Get data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design conceptGet data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design conceptAurélie Pols
 
RBAC & ABAC: гибридное решение для управления правами доступа
RBAC & ABAC: гибридное решение для управления правами доступаRBAC & ABAC: гибридное решение для управления правами доступа
RBAC & ABAC: гибридное решение для управления правами доступаCUSTIS
 
XACML - Fight For Your Love
XACML - Fight For Your LoveXACML - Fight For Your Love
XACML - Fight For Your LoveDavid Brossard
 
Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.Marlon Domingus
 
XACML in five minutes: excerpt from Catalyst 2013 panel "New school identity ...
XACML in five minutes: excerpt from Catalyst 2013 panel "New school identity ...XACML in five minutes: excerpt from Catalyst 2013 panel "New school identity ...
XACML in five minutes: excerpt from Catalyst 2013 panel "New school identity ...David Brossard
 
Case Study: Healthcare Outsourcing - Operational Efficiencies and Cost Saving...
Case Study: Healthcare Outsourcing - Operational Efficiencies and Cost Saving...Case Study: Healthcare Outsourcing - Operational Efficiencies and Cost Saving...
Case Study: Healthcare Outsourcing - Operational Efficiencies and Cost Saving...Infinit-O Global, Limited
 
Oasis Home healthcare slide show
Oasis Home healthcare  slide showOasis Home healthcare  slide show
Oasis Home healthcare slide showAnab Ali
 
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity ServerWSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity ServerWSO2
 
Oasis Canada Presentation
Oasis Canada PresentationOasis Canada Presentation
Oasis Canada PresentationOrm India
 

Viewers also liked (9)

Get data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design conceptGet data without the creepiness factor, the privacy by design concept
Get data without the creepiness factor, the privacy by design concept
 
RBAC & ABAC: гибридное решение для управления правами доступа
RBAC & ABAC: гибридное решение для управления правами доступаRBAC & ABAC: гибридное решение для управления правами доступа
RBAC & ABAC: гибридное решение для управления правами доступа
 
XACML - Fight For Your Love
XACML - Fight For Your LoveXACML - Fight For Your Love
XACML - Fight For Your Love
 
Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.Towards Privacy by Design. Key issues to unlock science.
Towards Privacy by Design. Key issues to unlock science.
 
XACML in five minutes: excerpt from Catalyst 2013 panel "New school identity ...
XACML in five minutes: excerpt from Catalyst 2013 panel "New school identity ...XACML in five minutes: excerpt from Catalyst 2013 panel "New school identity ...
XACML in five minutes: excerpt from Catalyst 2013 panel "New school identity ...
 
Case Study: Healthcare Outsourcing - Operational Efficiencies and Cost Saving...
Case Study: Healthcare Outsourcing - Operational Efficiencies and Cost Saving...Case Study: Healthcare Outsourcing - Operational Efficiencies and Cost Saving...
Case Study: Healthcare Outsourcing - Operational Efficiencies and Cost Saving...
 
Oasis Home healthcare slide show
Oasis Home healthcare  slide showOasis Home healthcare  slide show
Oasis Home healthcare slide show
 
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity ServerWSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
 
Oasis Canada Presentation
Oasis Canada PresentationOasis Canada Presentation
Oasis Canada Presentation
 

Similar to EIC 2014 Oasis Workshop: Using XACML to implement Privacy by Design

Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...ggebel
 
Top Ten Reasons Why Developers Don't Adopt ABAC
Top Ten Reasons Why Developers Don't Adopt ABACTop Ten Reasons Why Developers Don't Adopt ABAC
Top Ten Reasons Why Developers Don't Adopt ABACForgeRock
 
Authorization The Missing Piece of the Puzzle
Authorization The Missing Piece of the PuzzleAuthorization The Missing Piece of the Puzzle
Authorization The Missing Piece of the PuzzleNordic APIs
 
Do you have a business case for Attribute Based Access Control (ABAC)?
Do you have a business case for Attribute Based Access Control (ABAC)?Do you have a business case for Attribute Based Access Control (ABAC)?
Do you have a business case for Attribute Based Access Control (ABAC)?Finn Frisch
 
Do you have a business case for Attribute Based Access Control (ABAC)?
Do you have a business case for Attribute Based Access Control (ABAC)?Do you have a business case for Attribute Based Access Control (ABAC)?
Do you have a business case for Attribute Based Access Control (ABAC)?Finn Frisch
 
Cut Through Cloud Clutter: Insights from Visible Ops Private Cloud
Cut Through Cloud Clutter: Insights from Visible Ops Private CloudCut Through Cloud Clutter: Insights from Visible Ops Private Cloud
Cut Through Cloud Clutter: Insights from Visible Ops Private CloudFlexera
 
Oracle Revenue Management and Billing; ORMB para Actividades Bancarias
Oracle Revenue Management and Billing; ORMB para Actividades BancariasOracle Revenue Management and Billing; ORMB para Actividades Bancarias
Oracle Revenue Management and Billing; ORMB para Actividades Bancariasclaudiablest
 
EXL - Global Risk Privacy Framework
EXL -  Global Risk Privacy FrameworkEXL -  Global Risk Privacy Framework
EXL - Global Risk Privacy FrameworkAshish Kumar
 
Jelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with AxcientJelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with AxcientErin Olson
 
CIS14: The Very Latest in Authorization Standards
CIS14: The Very Latest in Authorization StandardsCIS14: The Very Latest in Authorization Standards
CIS14: The Very Latest in Authorization StandardsCloudIDSummit
 
Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture Italia
 
CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel
CIS 2015- Rethinking Your Authorization Strategy- Gerry GebelCIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel
CIS 2015- Rethinking Your Authorization Strategy- Gerry GebelCloudIDSummit
 
Safe Cloud Principles for the FSI Industry 2014, endorsed by the Asia Cloud C...
Safe Cloud Principles for the FSI Industry 2014, endorsed by the Asia Cloud C...Safe Cloud Principles for the FSI Industry 2014, endorsed by the Asia Cloud C...
Safe Cloud Principles for the FSI Industry 2014, endorsed by the Asia Cloud C...accacloud
 
Oracle Insurance: A Clear Vision for the Industry
Oracle Insurance: A Clear Vision for the IndustryOracle Insurance: A Clear Vision for the Industry
Oracle Insurance: A Clear Vision for the Industrymuratc2a
 
Key Considerations for Cloud Procurement - AWS Innovate Ottawa:
 Key Considerations for Cloud Procurement - AWS Innovate Ottawa: Key Considerations for Cloud Procurement - AWS Innovate Ottawa:
Key Considerations for Cloud Procurement - AWS Innovate Ottawa:Amazon Web Services
 
End User Computing at CloudHesive.pptx
End User Computing at CloudHesive.pptxEnd User Computing at CloudHesive.pptx
End User Computing at CloudHesive.pptxCloudHesive
 
1.Innova Zurich
1.Innova Zurich1.Innova Zurich
1.Innova ZurichErmando
 
Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016
Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016
Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016Amazon Web Services
 

Similar to EIC 2014 Oasis Workshop: Using XACML to implement Privacy by Design (20)

Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
 
Top Ten Reasons Why Developers Don't Adopt ABAC
Top Ten Reasons Why Developers Don't Adopt ABACTop Ten Reasons Why Developers Don't Adopt ABAC
Top Ten Reasons Why Developers Don't Adopt ABAC
 
Authorization The Missing Piece of the Puzzle
Authorization The Missing Piece of the PuzzleAuthorization The Missing Piece of the Puzzle
Authorization The Missing Piece of the Puzzle
 
Do you have a business case for Attribute Based Access Control (ABAC)?
Do you have a business case for Attribute Based Access Control (ABAC)?Do you have a business case for Attribute Based Access Control (ABAC)?
Do you have a business case for Attribute Based Access Control (ABAC)?
 
Do you have a business case for Attribute Based Access Control (ABAC)?
Do you have a business case for Attribute Based Access Control (ABAC)?Do you have a business case for Attribute Based Access Control (ABAC)?
Do you have a business case for Attribute Based Access Control (ABAC)?
 
Cut Through Cloud Clutter: Insights from Visible Ops Private Cloud
Cut Through Cloud Clutter: Insights from Visible Ops Private CloudCut Through Cloud Clutter: Insights from Visible Ops Private Cloud
Cut Through Cloud Clutter: Insights from Visible Ops Private Cloud
 
Oracle Revenue Management and Billing; ORMB para Actividades Bancarias
Oracle Revenue Management and Billing; ORMB para Actividades BancariasOracle Revenue Management and Billing; ORMB para Actividades Bancarias
Oracle Revenue Management and Billing; ORMB para Actividades Bancarias
 
EXL - Global Risk Privacy Framework
EXL -  Global Risk Privacy FrameworkEXL -  Global Risk Privacy Framework
EXL - Global Risk Privacy Framework
 
Jelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with AxcientJelecos: Achieving Compliance with Axcient
Jelecos: Achieving Compliance with Axcient
 
CIS14: The Very Latest in Authorization Standards
CIS14: The Very Latest in Authorization StandardsCIS14: The Very Latest in Authorization Standards
CIS14: The Very Latest in Authorization Standards
 
Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault
 
8 k miles embracing the cloud webinar
8 k miles embracing the cloud webinar8 k miles embracing the cloud webinar
8 k miles embracing the cloud webinar
 
CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel
CIS 2015- Rethinking Your Authorization Strategy- Gerry GebelCIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel
CIS 2015- Rethinking Your Authorization Strategy- Gerry Gebel
 
Paras LIS
Paras LISParas LIS
Paras LIS
 
Safe Cloud Principles for the FSI Industry 2014, endorsed by the Asia Cloud C...
Safe Cloud Principles for the FSI Industry 2014, endorsed by the Asia Cloud C...Safe Cloud Principles for the FSI Industry 2014, endorsed by the Asia Cloud C...
Safe Cloud Principles for the FSI Industry 2014, endorsed by the Asia Cloud C...
 
Oracle Insurance: A Clear Vision for the Industry
Oracle Insurance: A Clear Vision for the IndustryOracle Insurance: A Clear Vision for the Industry
Oracle Insurance: A Clear Vision for the Industry
 
Key Considerations for Cloud Procurement - AWS Innovate Ottawa:
 Key Considerations for Cloud Procurement - AWS Innovate Ottawa: Key Considerations for Cloud Procurement - AWS Innovate Ottawa:
Key Considerations for Cloud Procurement - AWS Innovate Ottawa:
 
End User Computing at CloudHesive.pptx
End User Computing at CloudHesive.pptxEnd User Computing at CloudHesive.pptx
End User Computing at CloudHesive.pptx
 
1.Innova Zurich
1.Innova Zurich1.Innova Zurich
1.Innova Zurich
 
Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016
Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016
Get Started Today with Cloud-Ready Contracts | AWS Public Sector Summit 2016
 

More from David Brossard

Internet Identity Workshop IIW 2023 - Introduction to ALFA Authorization Lang...
Internet Identity Workshop IIW 2023 - Introduction to ALFA Authorization Lang...Internet Identity Workshop IIW 2023 - Introduction to ALFA Authorization Lang...
Internet Identity Workshop IIW 2023 - Introduction to ALFA Authorization Lang...David Brossard
 
ABAC, ReBAC, Zanzibar, ALFA… How Should I Implement AuthZ in My APIs - Nordi...
ABAC, ReBAC, Zanzibar, ALFA…  How Should I Implement AuthZ in My APIs - Nordi...ABAC, ReBAC, Zanzibar, ALFA…  How Should I Implement AuthZ in My APIs - Nordi...
ABAC, ReBAC, Zanzibar, ALFA… How Should I Implement AuthZ in My APIs - Nordi...David Brossard
 
The Holy Grail of IAM: Getting to Grips with Authorization
The Holy Grail of IAM: Getting to Grips with AuthorizationThe Holy Grail of IAM: Getting to Grips with Authorization
The Holy Grail of IAM: Getting to Grips with AuthorizationDavid Brossard
 
OpenID AuthZEN ALFA PEP-PDP Prior Art
OpenID AuthZEN ALFA PEP-PDP Prior ArtOpenID AuthZEN ALFA PEP-PDP Prior Art
OpenID AuthZEN ALFA PEP-PDP Prior ArtDavid Brossard
 
OpenID Foundation AuthZEN WG Update
OpenID Foundation AuthZEN WG UpdateOpenID Foundation AuthZEN WG Update
OpenID Foundation AuthZEN WG UpdateDavid Brossard
 
Policy enabling your services - using elastic dynamic authorization to contro...
Policy enabling your services - using elastic dynamic authorization to contro...Policy enabling your services - using elastic dynamic authorization to contro...
Policy enabling your services - using elastic dynamic authorization to contro...David Brossard
 
Updates from the OASIS XACML Technical Committee - Making Authorization Devel...
Updates from the OASIS XACML Technical Committee - Making Authorization Devel...Updates from the OASIS XACML Technical Committee - Making Authorization Devel...
Updates from the OASIS XACML Technical Committee - Making Authorization Devel...David Brossard
 
Why lasagna is better than spaghetti: baking authorization into your applicat...
Why lasagna is better than spaghetti: baking authorization into your applicat...Why lasagna is better than spaghetti: baking authorization into your applicat...
Why lasagna is better than spaghetti: baking authorization into your applicat...David Brossard
 

More from David Brossard (8)

Internet Identity Workshop IIW 2023 - Introduction to ALFA Authorization Lang...
Internet Identity Workshop IIW 2023 - Introduction to ALFA Authorization Lang...Internet Identity Workshop IIW 2023 - Introduction to ALFA Authorization Lang...
Internet Identity Workshop IIW 2023 - Introduction to ALFA Authorization Lang...
 
ABAC, ReBAC, Zanzibar, ALFA… How Should I Implement AuthZ in My APIs - Nordi...
ABAC, ReBAC, Zanzibar, ALFA…  How Should I Implement AuthZ in My APIs - Nordi...ABAC, ReBAC, Zanzibar, ALFA…  How Should I Implement AuthZ in My APIs - Nordi...
ABAC, ReBAC, Zanzibar, ALFA… How Should I Implement AuthZ in My APIs - Nordi...
 
The Holy Grail of IAM: Getting to Grips with Authorization
The Holy Grail of IAM: Getting to Grips with AuthorizationThe Holy Grail of IAM: Getting to Grips with Authorization
The Holy Grail of IAM: Getting to Grips with Authorization
 
OpenID AuthZEN ALFA PEP-PDP Prior Art
OpenID AuthZEN ALFA PEP-PDP Prior ArtOpenID AuthZEN ALFA PEP-PDP Prior Art
OpenID AuthZEN ALFA PEP-PDP Prior Art
 
OpenID Foundation AuthZEN WG Update
OpenID Foundation AuthZEN WG UpdateOpenID Foundation AuthZEN WG Update
OpenID Foundation AuthZEN WG Update
 
Policy enabling your services - using elastic dynamic authorization to contro...
Policy enabling your services - using elastic dynamic authorization to contro...Policy enabling your services - using elastic dynamic authorization to contro...
Policy enabling your services - using elastic dynamic authorization to contro...
 
Updates from the OASIS XACML Technical Committee - Making Authorization Devel...
Updates from the OASIS XACML Technical Committee - Making Authorization Devel...Updates from the OASIS XACML Technical Committee - Making Authorization Devel...
Updates from the OASIS XACML Technical Committee - Making Authorization Devel...
 
Why lasagna is better than spaghetti: baking authorization into your applicat...
Why lasagna is better than spaghetti: baking authorization into your applicat...Why lasagna is better than spaghetti: baking authorization into your applicat...
Why lasagna is better than spaghetti: baking authorization into your applicat...
 

Recently uploaded

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

EIC 2014 Oasis Workshop: Using XACML to implement Privacy by Design

  • 1. 1 Implementing Privacy Using the OASIS XACML Standard to implement privacy using attribute- based access control Externalizing Authorization Introduction to XACML XACML & Privacy © 2014 Axiomatics AB Customer use cases
  • 2. 2 Externalizing Authorization Next Generation Authorization Attribute Based Access Control © 2014 Axiomatics AB
  • 3. Authentication & Authorization © 2014 Axiomatics AB 3 Authentication: Determine who the user is Authorization: Determine what the user can do
  • 4. © 2014 Axiomatics AB 4 AuthZ Business- driven Operation- driven Compliance -driven
  • 5. Examples  Business-driven  Finance: A junior teller can approve transactions up to 1,000 USD.  Healthcare: A senior nurse can edit the notes of a medical record.  Operations-driven  Finance: No one can approve transactions between 5pm and 9am.  Healthcare: No one can print a medical record from home.  Compliance-driven  Finance: a trader cannot approve a trade order he created (segregation of duty)  Healthcare: mask the social security number on the X-ray print-out © 2014 Axiomatics AB 5 This is where privacy fits in.
  • 6. Privacy-enabling authorization: requirements  A bank customer wants their account information to be available to bank staff.  So long as their access is motivated by services they provide the customer  The customer doesn’t want bank staff to access the data for other reasons  E.g. gossip  For privacy, CONTEXT IS KEY.  A staff member viewing a record may be aligned with privacy requirements on Monday…  But violating them on Tuesday.  How do existing authorization frameworks cater for context?  They don’t  We need to look for a new framework or model? © 2014 Axiomatics AB 6
  • 7. Challenges with existing authorization solutions  User-centric only  Software-specific  Static  Lack of visibility  difficult to audit the system  Cannot cater for context  Cannot evolve to meet new business needs  Expensive  Developers don’t like it © 2014 Axiomatics AB 7
  • 8. The need for next-generation authorization © 2014 Axiomatics AB 8 External from applications •Decouple business logic implementation from authorization logic Standards-based •OASIS XACML: eXtensible Access Control Markup Language Fine-grained •It’s not just about who the user is, it’s about who, what, when, where, why, and how Context-aware •Context matters: time of day, device, purpose of use… Attribute-based Access Control (ABAC)
  • 9. Implement privacy with Attribute-based access control © 2014 Axiomatics AB 9 Doctors should be able to view the records of patients assigned to their unit and edit the records of those patients with whom they have a care relationship Privacy by design: ONLY authorized persons can access/update the record
  • 10. ABAC takes multiple factors into account  Not just users and roles… … but also attributes reflecting the business process and context  Policies define precise access rules…. … which are dynamically enforced in real-time © 2014 Axiomatics AB 10 WHO WHAT WHERE WHEN WHY HOW It’s not just about but also and
  • 11. Attribute-Based Access Control © 2014 Axiomatics AB User Attributes Policies Example: Doctors can open & edit a patient’s health record in the hospital emergency room between 5PM and 8 AM. Action Resource Context Read more here: csrc.nist.gov/projects/abac/
  • 12. Externalized Authorization Management Benefits  User-, Resource-, Relationship-centric: *-based access control  Standards-based, generic: implemented on top of OASIS XACML  Dynamic: adapt to change and context  Centrally managed authorization: all authorization policies are in one place  Context is one of the parameters: take time, location and device into account  Adapts to new requirements: authorization policies can grow independently  Reusable, cost-effective: write once, enforce everywhere  Easy on developers: developers no longer need to worry about authorization. © 2014 Axiomatics AB 12
  • 13. 13 An introduction to XACML OASIS XACML: eXtensible Access Control Markup Language © 2014 Axiomatics AB
  • 14. What is XACML?  Pronunciation  eXtensible Access Control Markup Language  OASIS standard  V 3.0 approved in January 2013  V 1.0 approved in 2003 (11 years ago!)  XACML is expressed as  A specification document and  An XML schema  http://www.oasis-open.org/committees/xacml/ © 2014 Axiomatics AB 14
  • 15. What does XACML contain? © 2014 Axiomatics AB 15 XACML Reference Architecture Policy Language Request / Response Protocol
  • 16. The XACML Architecture & Flow © 2014 Axiomatics AB Decide Policy Decision Point Manage PolicyAdministration Point Support Policy Information Point Policy Retrieval Point Enforce Policy Enforcement Point Access Doc. #123 Can Alice access Document #123? Yes, Permit Load XACML policies Retrieve user role, clearance and document classification Access Doc. #123
  • 17. Where do I protect?  Choose a broad protection  At the API level  At the database level © 2014 Axiomatics AB 17 Database Tier DB API & Business Tier (Web Services, REST…) Presentation tier (Portals)
  • 18. Sample XACML Policy © 2014 Axiomatics AB 18 Root Policy Set PolicySet Policy Rule Effect=Permit Rule Effect = Deny PolicySet Policy Rule Effect = Permit
  • 19. 19 XACML & Privacy Using XACML to implement various privacy regulations © 2014 Axiomatics AB
  • 20. XACML profiles on privacy  Cross-Enterprise Security and Privacy Authorization (XSPA) Profile of XACML for Healthcare (link)  This profile provides a cross-enterprise security and privacy profile that describes how to use XACML to provide privacy policies and consent directives in an interoperable manner.  Cross-Enterprise Security and Privacy Authorization (XSPA) profile of XACML v2.0 for Healthcare, Implementation Examples (link)  This profile takes HL7 examples and converts to XACML  Privacy policy profile of XACML v2.0  Based on the Organization of Economic Cooperation and Development (1980) privacy guidelines  Other regulations on data protection (not specific to privacy)  XACML Intellectual Property Control (IPC) Profile  XACML 3.0 Export Compliance-US (EC-US) Profile © 2014 Axiomatics AB 20
  • 21. HL7 Security and Privacy Ontology Use Cases © 2014 Axiomatics AB 21 /* * Access Control Based on Category of Action * Access to progress notes */ policy progressNotes{ target clause objectType=="progress note" apply firstApplicable /* * A primary physician can create a patient's progress note */ rule createNote{ target clause role=="physician" and action=="create" condition primaryPhysician==requestorId permit } } link (the above is ALFA – a XACML pseudo-code. Download ALFA here.)
  • 22. XACML & the 7 Foundational Principles (1/2) © 2014 Axiomatics AB 22 Proactive not Reactive; Preventative not Remedial •XACML defines an architecture enacted at runtime Privacy as the Default Setting •XACML policies enable exact privilege settings Privacy Embedded into Design •IT projects can focus on authorization requirements on the one hand and business requirements on the other •Clear separation of concerns
  • 23. XACML & the 7 Foundational Principles (2/2) © 2014 Axiomatics AB 23 Full Functionality — Positive- Sum, not Zero-Sum •XACML is a business enabler •It allows for data to be securely shared •XACML helps deliver new services End-to-End Security — Full Lifecycle Protection •XACML policies evolve with the data they protect •XACML policies can adapt to regulatory change Visibility and Transparency — Keep it Open •XACML policies are centrally managed and can be easily audited •XACML policies mirror business requirements closely Respect for User Privacy — Keep it User-Centric •XACML policies focus on the entire picture: from who is accessing the data to the relationships to the purpose of use…
  • 24. Privacy by Design:Trilogy of Applications & XACML © 2014 Axiomatics AB 24 Information Technology Accountable Business Practices Physical Design Watch Ann Cavoukian on the Trilogy of Applications. XACML promotes a well-defined architecture XACML policies map closely to business requirements
  • 25. XACML enables the positive-sum  Example: medical records  Medical records used to be stored in a physical location at the doctor’s office.  Security was there by default: it is hard to access information stored in a file cabinet  Today: new consumer & medical patterns emerge  Let patients browse their medical data online  Share data with other medical actors (hospitals, specialists, pharmacies…) and non- medical actors (insurance companies…)  The promise: deliver better care  XACML, as an IT security artefact, can help go from high-level privacy designs to technical implementations © 2014 Axiomatics AB 25
  • 26. Key take-aways  Privacy is more about controlled information sharing than the prevention thereof  XACML enables secure information sharing  The privacy headache will explode once the new EU regulation becomes reality  industries will need a means to quickly and efficiently implement privacy. XACML is the way to go on a technical level  Privacy is not just about compliance, it’s also about  Brand  Reputation, and  Trust.  A key challenge is that privacy is a human concept. XACML bridges the gap between human & business requirements and technical implementations © 2014 Axiomatics AB 26
  • 27. 27 Customer Implementations Examples from the world of finance, healthcare, and pharmaceutical © 2014 Axiomatics AB
  • 28. Norwegian bank (1/2)  Lov om behandling av personopplysninger (personopplysningsloven | link)  Datatilsynet (Norwegian Data Protection Authority) requires:  that bank clients should be able to demand exact records of which staff member accessed their account details or other privacy sensitive data and when this happened  that the bank must ensure that only staff members with a purpose of use motivated by tasks performed in the course of their professional duties access sensitive data. The bank must be able to investigate any suspicions that this rule is being violated by staff members.  that the bank duly considers the risk assessment mandates of the legislation must be recognized (for instance with regard to VIP accounts or accounts of citizens with a protected identity due to witness protection etc.)  The project used XACML to implement fine-grained access control in conformance with privacy regulations © 2014 Axiomatics AB 28
  • 29. Norwegian bank (2/2) Details  A whitelist is defined: customers have the right to define who can access their data  A blacklist is defined: customer have the right to define who cannot access their data  E.g. relatives…  Common rules are implemented  Only employees in a given branch can view customer data from that branch  Exception handling and flags are implemented  All access to data is logged for future accountability © 2014 Axiomatics AB 29
  • 30. Swedish National Healthcare  Project driven by the Swedish Medical Care Advice Service  Goal: comprehensive IT-solution for electronic patient record management  Uniform technical choices for future security services  Excerpt from the general goals for BIF services  Provide access to authorized personnel  Protect sensitive patient data against unauthorized access  Functional requirements  Strong emphasis on standard based approaches  E.g. XACML shall be used for access control  World’s largest deployment of XACML yet © 2014 Axiomatics AB 30
  • 31. Swedish National Healthcare: access control rules  At the medical center level  Only doctors that belong to the given medical center can see records of patients from that medical center  At the district level  Only doctors that belong to the given district can see records of patients from that district  Patients can define their own policies: patient-defined disclosure policies (pddp)  At the top level – the organization  Patients need to provide an additional consent form for their data to be disclosed  An emergency plan provides for exceptional policies to override patient-defined rules
  • 32. Northern Spain Hospitals CancerTreatment (1/2)  BEinGRID: EU-funded development of Business Models for the Grid Industry.  Healthcare business use case  Provide new compute intensive radiotherapy tools to hospitals remotely  Challenge: A new treatment needs several hours or days.  Goal: drive down the time it takes to design radiotherapy treatments  Privacy?  Radiotherapy records contain Personal Health Information (PHI) that must be stripped before the records can be sent to the super computers  Read more  Link © 2014 Axiomatics AB 32
  • 33. Northern Spain Hospitals CancerTreatment (2/2) © 2014 Axiomatics AB 33 Security GWHOSPITAL Policy Server TREATMENT SERVICES Policies DB PDP Web Service getRole verify optimize commissioning verify 1 2 3 4 5 6 PDP PEP
  • 34. US Pharmaceutical  Goal: share medical information (clinical trials, molecule…) with partners, contractors, universities, and authorities  Privacy?  Clinical trials contain highly sensitive PHI.  For the customer the alternative is not sharing the data at all to avoid breaches & fines. © 2014 Axiomatics AB 34
  • 35. More examples here at EIC 2014  Drivers and Lessons learned from a Recent ABAC Implementation at Generali  Manuel Schneider, Generali  14.05.2014 14:30-15:30  ABAC - Visions and Reality  Finn Frisch, Axiomatics  14.05.2014 14:30-15:30  Dynamic Authorization Management: The Market and its Future  Graham Williamson  14.05.2014 12:00-13:00  RBAC, ABAC, or Both?  Panel  14.05.2014 12:00-13:00 © 2014 Axiomatics AB 35
  • 36. © 2014 Axiomatics AB 36 Thank you.