SlideShare a Scribd company logo
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
ICT Resilience in EU
Int. Workshop on Information Systems for Social Innovation (ISSI) 2013
Session: Systems Resilience
National Institute of Informatics, Tokyo, Japan
February 4, 2014
!
Dr. Sven Wohlgemuth
!
Head of Consortium
Technische Universität Darmstadt, Germany
Center for Advanced Security Research Darmstadt (CASED)
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
• Textebene 1
– Textebene 2
• Textebene 3
– Textebene 4
• Textebene 5
Dr. Sven Wohlgemuth PersoApp – Secure and User-Friendly Internet Applications. Trust in Identity
Center for Advanced Security Research Darmstadt (CASED)

www.cased.de
!2
Secure Software Engineering
Cryptography
Identity, Privacy,
Trust
Usable Security
Cloud Security
Mobile and Cyber-Physical System Security
Internet and Infrastructure Security
Third-party funding since 07/2008: > € 60 Mio.
• 33 professorships
• 102 PhD students
• 30 Post Docs
• > 80 guest scientists p.a.
• #1 University in Germany for computer science/

security and privacy1
; 31 awards (2011-2013)
1
#publications at TOP25 conferences; Microsoft Academic Search
Some projects and joint institutes
DFG Priority Program "RS3
- Reliable
secure software systems (coordination)"
Internet privacy
+ industry
Security evaluation of
PACE protocol; PersoApp
(coordination)
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
Agenda
!3
I. A Digital Agenda for Europe
!
II. Trustworthy Information Exchange
!
III. PersoApp: German national ID card
!
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
I. A Digital Agenda for Europe
Objective: ICT support to deliver sustainable economic and social benefits
I: Single digital
market
II: Interoperability &
standards
III: Trust & security
IV: Fast and ultra-fast
internet access
V: Research
and innovation
VI: Enhancing digital literarcy,
skills and inclusion
VII: ICT-enabled benefits
for EU society
Examples: e-ESTONIA The digital society (Estonia), INDUSTRIE 4.0 (Germany), EU data protection
regulatory framework, Security and integrity of electronic communications networks and services (ENISA)
Expectation: Within 8 years increase European GDP by 5% & 3.8 million new jobs
cf. A Digital Agenda for Europe, COM(2010) 245 final/2
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
ICT Supported EU Society
Threats:
Interferences due to
• Crime, Terrorism,
• Natural phenomena,
• Human errors, and
• System failures
Security and integrity (resilience):
• Resistance against threats (prevent and
protect) &
• Adapt sectors to deal with incidents
(respond and recover)
Possible impact:
Interference propagates across sectors
via dependencies, e.g. third party failures
• Common ICT information infrastructure
• Internet of Things
• Internet of Services
cf. A Digital Agenda for Europe, COM(2010) 245 final/2, Directive 2009/140/EC as amendments to 2002/21/EC, 2002/19/EC, and 2002/20/EC
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
Incidents and their Impact
Natural
phenome
na
Human
errors
Malicious
actions
System
failures
Third
party
failure
Cause in detail
Incidents per
root cause (%) 6 5 8 76 13
1. Hardware failure
2. Software bug
…
6. Cyber attack
Average
duration of
recovery
(hours)
36 26 4 9 13
Average
number of user
connections
557 447 1528 2330 2808
1. Overload
2. Software bug
…
4. Cyber attack
User hours lost 20283 11393 5858 19842 36502
1. Overload
2. Power cut
…
6. Cyber attack
Third-party failure and non-availability of ICT have highest impact
cf. ENISA. Annual Incident Reports 2013
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
IT Security Situation in Germany in 2011
Source: BSI
Fig. 1: Development of IT threats as assessed by BSI [7]
Source: BSI
Fig. 1: Development of IT threats as assessed by BSI [7]
Source: BSI
Fig. 2: Risk potential of attack opportunities in selected applications and technologies as a
Source: BSI
Fig. 3: Risk profile of innovative applications and technologies as assessed by BSI [7 ]
Source: BSI
Fig. 2: Risk potential of attack opportunities in selected applications and technologies as
Source: BSI
Fig. 3: Risk profile of innovative applications and technologies as assessed by BSI [7 ]
Trend:
• Direct attack from attacker ➔ attack via compromised IT system
• Propagation via dependency between IT systems
• Focus: Mobile and Cyber-Physical Systems
cf. Federal Office for Information Security (BSI). The IT Security Situation in Germany in 2011.
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
ICT Resilience
Real World
(Relevance)
System Spec
Threats
Refined Systems
Spec.
Model
Properties
Refined
Model
Abstract World
(Rigor)
Formal
Methods, Big Data
analytics, …
Environment
Implementation
Abstraction
Interpretation
Dependability,
and,
Security,
A2ributes,
Threats,
Means,
Availability,
Reliability,
Safety,
Confiden=ality,
Integrity,
Maintainability,
Faults,
Errors,
Failures,
Fault,Preven=on,
Fault,Tolerance,
Fault,Removal,
Fault,Forecas=ng,
Avienžies,et,al.,,2004,
Requirements:
• Prevent and protect: Secure IT systems and information about threats
• Respond and recover: Information about incidents and system adaption in “real-time”
ICT Resilience: Ability of an ICT system to provide and maintain an acceptable level of 

service in the face of various faults and challenges to normal operation
(Sterbenz et al., 2010)
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
Support: Incident Reporting (Article 13)
Commission (EC) about the incidents.
The incident reporting flows are shown in the diagram below. This document analyses th
that have been reported to ENISA and the EC (the black dashed arrow).
Member stateMember state
Incident notification
Incident reporting
National
authority
Network or
service
provider
Network or
service
provider
Network or
service
provider
Member stateMember state
National
authority
Network or
service
provider
Network or
service
provider
Network or
service
provider
ENISA
EC
Figure 1: Incident reporting in Article 13a.
Article 13 requests auditable information flow:
• Providers (public & private) should take measures and report incidents to NRA
• Audit by a qualified independent body
• Safeguarding competition and boosting consumer choice
cf. Directive 2002/21/EC and Directive 2009/140/EC
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
Proposal for Extension: Social Network
Requires authentic information according to a given threat0 2 4 6 8
0
0.05
0.1
0.15
0.2
0.25
0.3
% of attack points in training data
0 2 4 6 8
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
% of attack points in training data
classification error (9 vs 8)
validation error
testing error
0.1
0.15
0.2
0.25
0.3
0.35
0.4
classification error (4 vs 0)
validation error
testing error
approached with sequential single-point attacks. The
first question is how to optimally perturb a subset of
the training data; that is, instead of individually opti-
mizing each attack point, one could derive simultane-
ous steps for every attack point to better optimize their
overall e↵ect. The second question is how to choose
the best subset of points to use as a starting point
for the attack. Generally, the latter is a subset selec-
tion problem but heuristics may allow for improved ap-
proximations. Regardless, we demonstrate that even
non-optimal multi-point attack strategies significantly
degrade the SVM’s performance.
An important practical limitation of the proposed
method is the assumption that the attacker controls
the labels of the injected points. Such assumptions
may not hold when the labels are only assigned by
trusted sources such as humans. For instance, a spam
filter uses its users’ labeling of messages as its ground
truth. Thus, although an attacker can send arbitrary
messages, he cannot guarantee that they will have the
labels necessary for his attack. This imposes an ad-
ditional requirement that the attack data must satisfy
certain side constraints to fool the labeling oracle. Fur-
ther work is needed to understand these potential side
constraints and to incorporate them into attacks.
The final extension would be to incorporate the real-
world inverse feature-mapping problem; that is, the
problem of finding real-world attack data that can
achieve the desired result in the learner’s input space.
For data like handwritten digits, there is a direct map-
ping between the real-world image data and the input
features used for learning. In many other problems
Supervised ML (e.g. SVM)

Biggio et al. 2012
0.00.20.40.60.81.0
Single Poisoning Period: Evading PCA
Mean chaff volume
Evasionsuccess(FNR)
0% 10% 20% 30% 40% 50%
Uninformed
Locally−informed
Globally−informed
10
0
0.00.20.40.60.81.0
Evasionsuccess(averagetestFNR)
Figure 3: Effect of poisoning attacks on the PCA-based detector [
relative chaff volume under Single-Training Period poisoning attack
(dotted black line) locally-informed (dashed blue line) and globally
success of PCA under Boiling Frog poisoning attacks in terms of th
of locally-informed poisoning for four different poisoning schedules
size of the poisoning by factors 1.01, 1.02, 1.05, and 1.15 respectively)
rates of 1.05 and 1.15) significantly increase the FNR within a few w
many weeks to achieve the same result but are more stealthy in do
sequent DoS attack. When trained on this poisoned data,
the detector learned a distorted set of principal components
that are unable to effectively discern these DoS attacks—a
We call this
soning meth
slowly incre
Unsupervised ML (e.g. PCA)
Huang et al. 2011
Detection of incident for both prevent and protect & response and recover
Extend set of information to improve resilience: Social Network
• Aggregation of (personal) data
• Secondary usage of (personal) data
• Disclosure of (personal) data to third parties
Security and privacy require trustworthy information sharing
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
Example: Information Flow with Social Networks in USA
HOW AMERICANS USE
SOCIAL TOOLS IN
EMERGENCIES18% use FB to
get information
about emergencies.
More than 1/3
expect help to arrive
within 1 hour of
posting need to
social site.
It’s BEST to
call 9-1-1
24% would use
social tools to tell
others they’re safe.
“I’m safe”
1 in 5 would try
an online channel
to get help if unable
to reach EMS.
30% in metro
areas would sign
up for alerts.
20% in non-
metro areas
would sign up
for alerts.
Online news is the 3rd
most popular source
for emergency info.
TV
RADIO
ONLINE
80% expect emergency
responders to monitor
social sites.
H21055
1 in 5 experienced
an emergency posted
something about it
on a social site.
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
II. Trustworthy Information Exchange
Example: Public Key Exchange
Availability and integrity of pkBob
• Assumption: Authentic pre-sharing exists, e.g. via personal exchange, PKI, …
ICT-supported society:
• No global PKI for humans
• Multilateral IT Security: Accountability and unobservability are explicitly to configure
• Germany: 74% of population want to delegate responsibility to a Third Party
pkBob, pkCA2, pkCA1
“Man in the
middle”
Alice Bob
!12
W. Diffie and M.E. Hellmann. New Directions in Cryptography, 1976; K. Rannenberg. Multilateral Security A Concept and Examples for Balanced Security, 2000; http://www.divsi.de
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
• Unilateral trust: No control on usage of pkBob
Trust Model
pkBob
Alice Bob
Charlie
• Availability and integrity of pkBob via necessary “Man-in-the-Middle”
eIDBobeIDAlice
• Accountability and unobservability by access control of eID infrastructures
!13
pkBob pkBob
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
• Unilateral trust: No control on usage of pkBob
Objective: Multilateral Trust
Trust Model
pkBob
Alice Bob
Charlie
• Availability and integrity of pkBob via necessary “Man-in-the-Middle”
eIDBobeIDAlice
• Accountability and unobservability by access control of eID infrastructures
!13
pkBob pkBob
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
• Textebene 1
– Textebene 2
• Textebene 3
– Textebene 4
• Textebene 5
Prof. Dr. Ahmad-Reza Sadeghi and Dr. Sven Wohlgemuth PersoApp – Secure and User-Friendly Internet Applications. Trust in Identity !14
Problem: Unknown, inevitable Vulnerabilities
• Modeled dependencies imply vulnerability by undesired ones (covert channels, escalation
of rights, security configuration, human errors, …)
• Impossible to automatically detect all undesired dependencies
Case (a): Passive interference Case (b): Active interference
Adaptive IT system: "Programming at run-time" - Dependencies emerge at run-time
C. Wang and S. Ju. The Dilemma of Covert Channels Searching, 2005.
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
• Textebene 1
– Textebene 2
• Textebene 3
– Textebene 4
• Textebene 5
Prof. Dr. Ahmad-Reza Sadeghi and Dr. Sven Wohlgemuth PersoApp – Secure and User-Friendly Internet Applications. Trust in Identity !14
Problem: Unknown, inevitable Vulnerabilities
• Modeled dependencies imply vulnerability by undesired ones (covert channels, escalation
of rights, security configuration, human errors, …)
• Impossible to automatically detect all undesired dependencies
Case (a): Passive interference Case (b): Active interference
Adaptive IT system: "Programming at run-time" - Dependencies emerge at run-time
Detecting misuse of identity to (ex post) enforce privacy
C. Wang and S. Ju. The Dilemma of Covert Channels Searching, 2005.
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
• Textebene 1
– Textebene 2
• Textebene 3
– Textebene 4
• Textebene 5
Dr. Sven Wohlgemuth !15
ICT Resilience: Enforcing Multilateral Security
ICT Resilience: Ability of an ICT system to provide and maintain an acceptable level of 

service in the face of various faults and challenges to normal operation
(Sterbenz et al., 2010)
Acceptable enforcement of individual security interests for a
spontaneous, trustworthy information exchange of pkBob
Eigene Abbildung nach illustration following (Sheffi, 2005; Günther et al., 2007; McNanus, 2009)
PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen.
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
• Textebene 1
– Textebene 2
• Textebene 3
– Textebene 4
• Textebene 5
Dr. Sven Wohlgemuth PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen. !16
Approach: Control and Transparency
Enhanced trust infrastructure by measuring with Privacy Control and Privacy Forensics
eID client evaluates individually evidences on data usage anomalies and their origin
IT Risk Analysis
Privacy Control
Privacy ForensicsOptimization
Usage Control Policy
Toolbox
X
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
• Textebene 1
– Textebene 2
• Textebene 3
– Textebene 4
• Textebene 5
Dr. Sven Wohlgemuth PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen. !16
Approach: Control and Transparency
Enhanced trust infrastructure by measuring with Privacy Control and Privacy Forensics
eID client evaluates individually evidences on data usage anomalies and their origin
IT Risk Analysis
Privacy Control
Privacy ForensicsOptimization
Usage Control Policy
Toolbox
X
Privacy is an evidence for security and integrity (reliability)"
The German national ID card can be a trust anchor.
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
• Textebene 1
– Textebene 2
• Textebene 3
– Textebene 4
• Textebene 5
Dr. Sven Wohlgemuth !17
Privacy Control
PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen.
Specification of isolation by pseudonymized delegation of rights to third parties
In case of confidentiality breach: Information is linked to pseudonymous identity
Control: Individual pseudonymized eID based on national eID infrastructure
S. Wohlgemuth. Privatsphäre durch die Delegation von Rechten, 2008; N. Sonehara, I. Echizen
und S. Wohlgemuth. Isolation in Cloud Computing and Privacy-Enhancing Technologies, 2011
Control Transparency
Transparency
System 1
DP/DC
System 3
DP/DC
System 2
DP/DC
pkBob pkBob pkBob
Policy
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
• Textebene 1
– Textebene 2
• Textebene 3
– Textebene 4
• Textebene 5
Dr. Sven Wohlgemuth !17
Privacy Control
PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen.
Specification of isolation by pseudonymized delegation of rights to third parties
In case of confidentiality breach: Information is linked to pseudonymous identity
Control: Individual pseudonymized eID based on national eID infrastructure
S. Wohlgemuth. Privatsphäre durch die Delegation von Rechten, 2008; N. Sonehara, I. Echizen
und S. Wohlgemuth. Isolation in Cloud Computing and Privacy-Enhancing Technologies, 2011
Control Transparency
Transparency
System 1
DP/DC
System 3
DP/DC
System 2
DP/DC
pkBob pkBobpkBob
Policy
d
Control
System 4
DP/DC
d
d
Policy
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
• Textebene 1
– Textebene 2
• Textebene 3
– Textebene 4
• Textebene 5
Transparency
& Control
Dr. Sven Wohlgemuth !17
Privacy Control
PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen.
Specification of isolation by pseudonymized delegation of rights to third parties
In case of confidentiality breach: Information is linked to pseudonymous identity
Control: Individual pseudonymized eID based on national eID infrastructure
S. Wohlgemuth. Privatsphäre durch die Delegation von Rechten, 2008; N. Sonehara, I. Echizen
und S. Wohlgemuth. Isolation in Cloud Computing and Privacy-Enhancing Technologies, 2011
Control
Transparency
System 1
DP/DC
System 3
DP/DC
System 2
DP/DC
pkBob pkBobpkBob
Policy
d
Control
System 4
DP/DC
d
d
Policy
Dr. Sven Wohlgemuth PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen.
Transparency: Reconstructing usage of pkBob by data provenance
eID client enforces documenting data provenance audit trail
!18
Privacy Forensics
Transparenz
Kontrolle Transparenz
Transparenz
System 1
DP/DC
System 3
DP/DC
System 2
DP/DC
pkBob
System 4
DP/DC
pkBob
pkBob
System 2
pkBob
System 2
System 3
Control: Pseudonymous eID with eID infrastructure of national ID card
D.J. Weitzner, H. Abelson, T. Berners-Lee, J. Feigenbaum, J. Hendler, and G.J. Sussman. Information Accountability, 2008; S.
Wohlgemuth, I. Echizen, N. Sonehara und G. Müller. Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy, 2010.
Dr. Sven Wohlgemuth PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen.
Transparency: Reconstructing usage of pkBob by data provenance
eID client enforces documenting data provenance audit trail
!18
Privacy Forensics
Transparenz
Kontrolle Transparenz
Transparenz
System 1
DP/DC
System 3
DP/DC
System 2
DP/DC
pkBob
System 4
DP/DC
pkBob
pkBob
System 2
Control: Pseudonymous eID with eID infrastructure of national ID card
pkBob
System 2
System 3
System 4
pkBob
System 2
System 3
System 4
System 3
D.J. Weitzner, H. Abelson, T. Berners-Lee, J. Feigenbaum, J. Hendler, and G.J. Sussman. Information Accountability, 2008; S.
Wohlgemuth, I. Echizen, N. Sonehara und G. Müller. Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy, 2010.
Dr. Sven Wohlgemuth PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen.
Transparency: Reconstructing usage of pkBob by data provenance
eID client enforces documenting data provenance audit trail
!18
Privacy Forensics
Transparenz
Kontrolle Transparenz
Transparenz
System 1
DP/DC
System 3
DP/DC
System 2
DP/DC
pkBob
System 4
DP/DC
pkBob
pkBob
System 2
Control: Pseudonymous eID with eID infrastructure of national ID card
pkBob
System 2
System 3
System 4
pkBob
System 2
System 3
System 4
System 3
Hindering non-authorized re-
identification"
Unobservability
Misuse of pkBob can be detected"
Accountability
D.J. Weitzner, H. Abelson, T. Berners-Lee, J. Feigenbaum, J. Hendler, and G.J. Sussman. Information Accountability, 2008; S.
Wohlgemuth, I. Echizen, N. Sonehara und G. Müller. Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy, 2010.
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
• Textebene 1
– Textebene 2
• Textebene 3
– Textebene 4
• Textebene 5
!19
Example
Exemplary Privacy
Forensics
• Data Provenance for images
• Derived information are not listed
Identity Forensics
• Overview on data usage with Google ID
• Accountability, availability
and unobservability
• Accountability and availability
but no unobservability
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
• Textebene 1
– Textebene 2
• Textebene 3
– Textebene 4
• Textebene 5
Dr. Sven Wohlgemuth
II. PersoApp – Open Source Community

Citizen, Government, Industry, and Academia
!20PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen.
• Introduced German national ID card with eID in November, 2010
• Project PersoApp: € 684.880,- (without VAT) until Dec. 31, 2015
Federal Ministry of the Interior (BMI):
• Objectives:
Core Team of PersoApp:
• AGETO Service GmbH: Open source library for electronic identification
• Fraunhofer SIT: Guidelines for security engineering
• TUD/CASED: Community building with user survey, 

use cases, workshops, …
1. Establishment of an open source community
2. Alternative for eID client of the Government (AusweisApp)
3. Experimental platform for new requirements, services, ...
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
Objectives of PersoApp
!21
1. Establishment of an Open Source Community
!
!
!
!
2. Alternative to official eID client (AusweisApp)
!
!
!
!
3. Experiments for new requirements, services, …
!
PersoApp Major Release A1
https://persoapp.googlecode.com
• Internet Milieus in Germany
• A digitalized Campus
• Spontaneous information exchange
• Spontaneous information exchange
• ICT Resilience: Extension of IT Security
• Control and transparency
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
• Textebene 1
– Textebene 2
• Textebene 3
– Textebene 4
• Textebene 5
Dr. Sven Wohlgemuth PersoApp – Sichere und benutzerfreundliche Internet-Anwendungen. Sichere Identitäten schaffen Vertrauen. "22
Advisory Board
Focus:
• Consulting steering committee in requirements and interests
• 43 stakeholders from national and abroad industries, academia, data protection, and
government
• Annual meeting (constitutive meeting on September 2014 at BMI)
D01-QM Organisation und Rollenverteilung; D10-QM Community Building: Konzept, Maßnahmen und Bewertung
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
• Textebene 1
– Textebene 2
• Textebene 3
– Textebene 4
• Textebene 5
Dr. Sven Wohlgemuth PersoApp – Sichere und benutzerfreundliche Internet-Anwendungen. Sichere Identitäten schaffen Vertrauen. "23
Advisory Board: A Network of Networks
Kernteam
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
• Textebene 1
– Textebene 2
• Textebene 3
– Textebene 4
• Textebene 5
Prof. Dr. Ahmad-Reza Sadeghi and Dr. Sven Wohlgemuth PersoApp – Secure and User-Friendly Internet Applications. Trust in Identity !24
Target Group for Initial Community Building
Internet Milieu in Germany
Digital Outsiders:
• Personal benefit of Internet usage is
not clear
• Strongly uncertain for security and
privacy risks
Digital Immigrants:
• Internet usage for communication
with trusted participants
• Highly aware of security and privacy
risks
Digital Natives:
• “Always on-line” for personal benefit
• High Internet ability but less risk
awareness
https://www.divsi.de/sites/default/files/DIVSI_Milieu_Study_Summary.pdf
• Digital Natives provides orientation as disseminators
• Initial community building at gymnasium and universities
• Digital Natives have largest part on higher education
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
• Textebene 1
– Textebene 2
• Textebene 3
– Textebene 4
• Textebene 5
Dr. Sven Wohlgemuth PersoApp – Sichere und benutzerfreundliche Internet-Anwendungen. Sichere Identiätem schaffen Vertrauen. !25
Call for Apps
• Identity forensics
• Privacy Control"
• Privacy Forensics
eID client and extensions for
• User-centric survey"
• Design of use cases in particular for mobile applications"
• Open source software library for eID functionality (client) of German national ID card"
• Extension by “Feature Requests”"
• Guidelines for integration of security functionality in own application (Security by Design)"
• Publication of results on workshop, talk, education, …
We offer
Partner are welcome!
https://www.persoapp.de
Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity.
• Textebene 1
– Textebene 2
• Textebene 3
– Textebene 4
• Textebene 5
Dr. Sven Wohlgemuth !26
ご清聴ありがとうございました。
Twitter at https://www.twitter.com/persoapp"• Announcement of news and collaboration regarding PersoApp
E-Mail Listing"• Contact: persoapp@trust.cased.de"• Project leader: persoapp-projects@trust.cased.de"• Software engineer: persoapp-devel@trust.cased.de"• Broadcast: persoapp-broadcast@trust.cased.de"• Steering committee: persoapp-steering@trust.cased.de"• Advisory board: persoapp-advisory@trust.cased.de
Code Repository https://persoapp.googlecode.com/"• SVN repository"• Issue tracker
Internet Portal https://www.persoapp.de"• Forum"• Pre-Release"• Demo and test service"• Documentation"• Event calendar
PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen.

More Related Content

What's hot

Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
IJECEIAES
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITYENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY
IJITE
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY
IJITE
 
Mobile Cyber Security
Mobile Cyber SecurityMobile Cyber Security
Mobile Cyber Security
Bob's Business
 
Blockchain framework for detecting the infected cases of covid 19 pandemic
Blockchain framework for detecting the infected cases of covid 19 pandemicBlockchain framework for detecting the infected cases of covid 19 pandemic
Blockchain framework for detecting the infected cases of covid 19 pandemic
Aboul Ella Hassanien
 
Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...
Maurice Dawson
 
Internet service providers responsibilities in botnet mitigation: a Nigerian ...
Internet service providers responsibilities in botnet mitigation: a Nigerian ...Internet service providers responsibilities in botnet mitigation: a Nigerian ...
Internet service providers responsibilities in botnet mitigation: a Nigerian ...
IJECEIAES
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
IJECEIAES
 
A Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android SmartphonesA Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android Smartphones
IOSR Journals
 

What's hot (9)

Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITYENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY
 
Mobile Cyber Security
Mobile Cyber SecurityMobile Cyber Security
Mobile Cyber Security
 
Blockchain framework for detecting the infected cases of covid 19 pandemic
Blockchain framework for detecting the infected cases of covid 19 pandemicBlockchain framework for detecting the infected cases of covid 19 pandemic
Blockchain framework for detecting the infected cases of covid 19 pandemic
 
Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...
 
Internet service providers responsibilities in botnet mitigation: a Nigerian ...
Internet service providers responsibilities in botnet mitigation: a Nigerian ...Internet service providers responsibilities in botnet mitigation: a Nigerian ...
Internet service providers responsibilities in botnet mitigation: a Nigerian ...
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
A Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android SmartphonesA Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android Smartphones
 

Viewers also liked

Resilience by Usable Security
Resilience by Usable SecurityResilience by Usable Security
Resilience by Usable Security
Sven Wohlgemuth
 
Privacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal InformationPrivacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal Information
Sven Wohlgemuth
 
PersoApp - Sichere und benutzerfreundliche Internetanwendungen
PersoApp - Sichere und benutzerfreundliche InternetanwendungenPersoApp - Sichere und benutzerfreundliche Internetanwendungen
PersoApp - Sichere und benutzerfreundliche Internetanwendungen
Sven Wohlgemuth
 
PersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsPersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet Applications
Sven Wohlgemuth
 
Resilience as a new Enforcement Model for IT Security based on Usage Control
Resilience as a new Enforcement Model for IT Security based on Usage ControlResilience as a new Enforcement Model for IT Security based on Usage Control
Resilience as a new Enforcement Model for IT Security based on Usage Control
Sven Wohlgemuth
 
Privacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningPrivacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process Mining
Sven Wohlgemuth
 
PersoApp - An Open Source Community for the new German national ID card
PersoApp - An Open Source Community for the new German national ID cardPersoApp - An Open Source Community for the new German national ID card
PersoApp - An Open Source Community for the new German national ID card
Sven Wohlgemuth
 
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacyTagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Sven Wohlgemuth
 

Viewers also liked (8)

Resilience by Usable Security
Resilience by Usable SecurityResilience by Usable Security
Resilience by Usable Security
 
Privacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal InformationPrivacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal Information
 
PersoApp - Sichere und benutzerfreundliche Internetanwendungen
PersoApp - Sichere und benutzerfreundliche InternetanwendungenPersoApp - Sichere und benutzerfreundliche Internetanwendungen
PersoApp - Sichere und benutzerfreundliche Internetanwendungen
 
PersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet ApplicationsPersoApp - Secure and User-Friendly Internet Applications
PersoApp - Secure and User-Friendly Internet Applications
 
Resilience as a new Enforcement Model for IT Security based on Usage Control
Resilience as a new Enforcement Model for IT Security based on Usage ControlResilience as a new Enforcement Model for IT Security based on Usage Control
Resilience as a new Enforcement Model for IT Security based on Usage Control
 
Privacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningPrivacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process Mining
 
PersoApp - An Open Source Community for the new German national ID card
PersoApp - An Open Source Community for the new German national ID cardPersoApp - An Open Source Community for the new German national ID card
PersoApp - An Open Source Community for the new German national ID card
 
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacyTagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
 

Similar to ICT Resilience in EU

Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
Community Protection Forum
 
Encountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismEncountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanism
IJECEIAES
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
International Journal of Reconfigurable and Embedded Systems
 
Whitepaper | Network Security - How to defend your Plant against the threats ...
Whitepaper | Network Security - How to defend your Plant against the threats ...Whitepaper | Network Security - How to defend your Plant against the threats ...
Whitepaper | Network Security - How to defend your Plant against the threats ...
Yokogawa
 
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET Journal
 
The red book
The red book  The red book
The red book
habiba Elmasry
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
 
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docxRunning Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
healdkathaleen
 
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...
Pierre-Jean Verrando
 
Data Science for IoT
Data Science for IoTData Science for IoT
Data Science for IoT
Olivera Kotevska, Ph.D.
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
Jeewanthi Fernando
 
IJET-V3I2P16
IJET-V3I2P16IJET-V3I2P16
188
188188
Botnets' networks
Botnets' networksBotnets' networks
Botnets' networks
Bederna Zsolt
 
[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranja...
[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranja...[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranja...
[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranja...
IJET - International Journal of Engineering and Techniques
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
IJECEIAES
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
segughana
 
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesOpen Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Black Duck by Synopsys
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
African Cyber Security Summit
 
Presentation on iot- Internet of Things
Presentation on iot- Internet of ThingsPresentation on iot- Internet of Things
Presentation on iot- Internet of Things
JIGAR MAKHIJA
 

Similar to ICT Resilience in EU (20)

Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Encountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanismEncountering social engineering activities with a novel honeypot mechanism
Encountering social engineering activities with a novel honeypot mechanism
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
 
Whitepaper | Network Security - How to defend your Plant against the threats ...
Whitepaper | Network Security - How to defend your Plant against the threats ...Whitepaper | Network Security - How to defend your Plant against the threats ...
Whitepaper | Network Security - How to defend your Plant against the threats ...
 
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
IRJET- Windows Log Investigator System for Faster Root Cause Detection of a D...
 
The red book
The red book  The red book
The red book
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from Patents
 
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docxRunning Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
 
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...
 
Data Science for IoT
Data Science for IoTData Science for IoT
Data Science for IoT
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
IJET-V3I2P16
IJET-V3I2P16IJET-V3I2P16
IJET-V3I2P16
 
188
188188
188
 
Botnets' networks
Botnets' networksBotnets' networks
Botnets' networks
 
[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranja...
[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranja...[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranja...
[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranja...
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
 
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source LicensesOpen Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
Open Source Insight: CVE–2017-9805, Equifax Breach & Wacky Open Source Licenses
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
Presentation on iot- Internet of Things
Presentation on iot- Internet of ThingsPresentation on iot- Internet of Things
Presentation on iot- Internet of Things
 

More from Sven Wohlgemuth

A Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity ManagementA Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity Management
Sven Wohlgemuth
 
Competitive Compliance with Blockchain
Competitive Compliance with BlockchainCompetitive Compliance with Blockchain
Competitive Compliance with Blockchain
Sven Wohlgemuth
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with Blockchains
Sven Wohlgemuth
 
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 個人情報の有効活用を可能にする (Enabling effective use of personal information) 個人情報の有効活用を可能にする (Enabling effective use of personal information)
個人情報の有効活用を可能にする (Enabling effective use of personal information)
Sven Wohlgemuth
 
EN 6.3: 4 Kryptographie
EN 6.3: 4 KryptographieEN 6.3: 4 Kryptographie
EN 6.3: 4 Kryptographie
Sven Wohlgemuth
 
EN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleEN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 Sicherheitsmodelle
Sven Wohlgemuth
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
Sven Wohlgemuth
 
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
Sven Wohlgemuth
 
Privacy in e-Health
Privacy in e-HealthPrivacy in e-Health
Privacy in e-Health
Sven Wohlgemuth
 
On Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsOn Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health Records
Sven Wohlgemuth
 
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementEN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
Sven Wohlgemuth
 
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzEN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
Sven Wohlgemuth
 
International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009
Sven Wohlgemuth
 
Durchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenDurchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in Dienstenetzen
Sven Wohlgemuth
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
Sven Wohlgemuth
 
Privacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementPrivacy in Business Processes by Identity Management
Privacy in Business Processes by Identity Management
Sven Wohlgemuth
 
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSchlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Sven Wohlgemuth
 
Sicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten WeltSicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten Welt
Sven Wohlgemuth
 
Solutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and UsabilitySolutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and Usability
Sven Wohlgemuth
 
iManager - nutzer-zentrierter Identitätsmanager
iManager - nutzer-zentrierter IdentitätsmanageriManager - nutzer-zentrierter Identitätsmanager
iManager - nutzer-zentrierter Identitätsmanager
Sven Wohlgemuth
 

More from Sven Wohlgemuth (20)

A Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity ManagementA Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity Management
 
Competitive Compliance with Blockchain
Competitive Compliance with BlockchainCompetitive Compliance with Blockchain
Competitive Compliance with Blockchain
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with Blockchains
 
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 個人情報の有効活用を可能にする (Enabling effective use of personal information) 個人情報の有効活用を可能にする (Enabling effective use of personal information)
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 
EN 6.3: 4 Kryptographie
EN 6.3: 4 KryptographieEN 6.3: 4 Kryptographie
EN 6.3: 4 Kryptographie
 
EN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleEN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 Sicherheitsmodelle
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
 
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
 
Privacy in e-Health
Privacy in e-HealthPrivacy in e-Health
Privacy in e-Health
 
On Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsOn Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health Records
 
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementEN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
 
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzEN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
 
International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009
 
Durchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenDurchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in Dienstenetzen
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
 
Privacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementPrivacy in Business Processes by Identity Management
Privacy in Business Processes by Identity Management
 
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSchlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
 
Sicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten WeltSicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten Welt
 
Solutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and UsabilitySolutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and Usability
 
iManager - nutzer-zentrierter Identitätsmanager
iManager - nutzer-zentrierter IdentitätsmanageriManager - nutzer-zentrierter Identitätsmanager
iManager - nutzer-zentrierter Identitätsmanager
 

Recently uploaded

留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 

Recently uploaded (20)

留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 

ICT Resilience in EU

  • 1. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. ICT Resilience in EU Int. Workshop on Information Systems for Social Innovation (ISSI) 2013 Session: Systems Resilience National Institute of Informatics, Tokyo, Japan February 4, 2014 ! Dr. Sven Wohlgemuth ! Head of Consortium Technische Universität Darmstadt, Germany Center for Advanced Security Research Darmstadt (CASED)
  • 2. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. • Textebene 1 – Textebene 2 • Textebene 3 – Textebene 4 • Textebene 5 Dr. Sven Wohlgemuth PersoApp – Secure and User-Friendly Internet Applications. Trust in Identity Center for Advanced Security Research Darmstadt (CASED)
 www.cased.de !2 Secure Software Engineering Cryptography Identity, Privacy, Trust Usable Security Cloud Security Mobile and Cyber-Physical System Security Internet and Infrastructure Security Third-party funding since 07/2008: > € 60 Mio. • 33 professorships • 102 PhD students • 30 Post Docs • > 80 guest scientists p.a. • #1 University in Germany for computer science/
 security and privacy1 ; 31 awards (2011-2013) 1 #publications at TOP25 conferences; Microsoft Academic Search Some projects and joint institutes DFG Priority Program "RS3 - Reliable secure software systems (coordination)" Internet privacy + industry Security evaluation of PACE protocol; PersoApp (coordination)
  • 3. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. Agenda !3 I. A Digital Agenda for Europe ! II. Trustworthy Information Exchange ! III. PersoApp: German national ID card !
  • 4. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. I. A Digital Agenda for Europe Objective: ICT support to deliver sustainable economic and social benefits I: Single digital market II: Interoperability & standards III: Trust & security IV: Fast and ultra-fast internet access V: Research and innovation VI: Enhancing digital literarcy, skills and inclusion VII: ICT-enabled benefits for EU society Examples: e-ESTONIA The digital society (Estonia), INDUSTRIE 4.0 (Germany), EU data protection regulatory framework, Security and integrity of electronic communications networks and services (ENISA) Expectation: Within 8 years increase European GDP by 5% & 3.8 million new jobs cf. A Digital Agenda for Europe, COM(2010) 245 final/2
  • 5. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. ICT Supported EU Society Threats: Interferences due to • Crime, Terrorism, • Natural phenomena, • Human errors, and • System failures Security and integrity (resilience): • Resistance against threats (prevent and protect) & • Adapt sectors to deal with incidents (respond and recover) Possible impact: Interference propagates across sectors via dependencies, e.g. third party failures • Common ICT information infrastructure • Internet of Things • Internet of Services cf. A Digital Agenda for Europe, COM(2010) 245 final/2, Directive 2009/140/EC as amendments to 2002/21/EC, 2002/19/EC, and 2002/20/EC
  • 6. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. Incidents and their Impact Natural phenome na Human errors Malicious actions System failures Third party failure Cause in detail Incidents per root cause (%) 6 5 8 76 13 1. Hardware failure 2. Software bug … 6. Cyber attack Average duration of recovery (hours) 36 26 4 9 13 Average number of user connections 557 447 1528 2330 2808 1. Overload 2. Software bug … 4. Cyber attack User hours lost 20283 11393 5858 19842 36502 1. Overload 2. Power cut … 6. Cyber attack Third-party failure and non-availability of ICT have highest impact cf. ENISA. Annual Incident Reports 2013
  • 7. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. IT Security Situation in Germany in 2011 Source: BSI Fig. 1: Development of IT threats as assessed by BSI [7] Source: BSI Fig. 1: Development of IT threats as assessed by BSI [7] Source: BSI Fig. 2: Risk potential of attack opportunities in selected applications and technologies as a Source: BSI Fig. 3: Risk profile of innovative applications and technologies as assessed by BSI [7 ] Source: BSI Fig. 2: Risk potential of attack opportunities in selected applications and technologies as Source: BSI Fig. 3: Risk profile of innovative applications and technologies as assessed by BSI [7 ] Trend: • Direct attack from attacker ➔ attack via compromised IT system • Propagation via dependency between IT systems • Focus: Mobile and Cyber-Physical Systems cf. Federal Office for Information Security (BSI). The IT Security Situation in Germany in 2011.
  • 8. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. ICT Resilience Real World (Relevance) System Spec Threats Refined Systems Spec. Model Properties Refined Model Abstract World (Rigor) Formal Methods, Big Data analytics, … Environment Implementation Abstraction Interpretation Dependability, and, Security, A2ributes, Threats, Means, Availability, Reliability, Safety, Confiden=ality, Integrity, Maintainability, Faults, Errors, Failures, Fault,Preven=on, Fault,Tolerance, Fault,Removal, Fault,Forecas=ng, Avienžies,et,al.,,2004, Requirements: • Prevent and protect: Secure IT systems and information about threats • Respond and recover: Information about incidents and system adaption in “real-time” ICT Resilience: Ability of an ICT system to provide and maintain an acceptable level of 
 service in the face of various faults and challenges to normal operation (Sterbenz et al., 2010)
  • 9. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. Support: Incident Reporting (Article 13) Commission (EC) about the incidents. The incident reporting flows are shown in the diagram below. This document analyses th that have been reported to ENISA and the EC (the black dashed arrow). Member stateMember state Incident notification Incident reporting National authority Network or service provider Network or service provider Network or service provider Member stateMember state National authority Network or service provider Network or service provider Network or service provider ENISA EC Figure 1: Incident reporting in Article 13a. Article 13 requests auditable information flow: • Providers (public & private) should take measures and report incidents to NRA • Audit by a qualified independent body • Safeguarding competition and boosting consumer choice cf. Directive 2002/21/EC and Directive 2009/140/EC
  • 10. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. Proposal for Extension: Social Network Requires authentic information according to a given threat0 2 4 6 8 0 0.05 0.1 0.15 0.2 0.25 0.3 % of attack points in training data 0 2 4 6 8 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 % of attack points in training data classification error (9 vs 8) validation error testing error 0.1 0.15 0.2 0.25 0.3 0.35 0.4 classification error (4 vs 0) validation error testing error approached with sequential single-point attacks. The first question is how to optimally perturb a subset of the training data; that is, instead of individually opti- mizing each attack point, one could derive simultane- ous steps for every attack point to better optimize their overall e↵ect. The second question is how to choose the best subset of points to use as a starting point for the attack. Generally, the latter is a subset selec- tion problem but heuristics may allow for improved ap- proximations. Regardless, we demonstrate that even non-optimal multi-point attack strategies significantly degrade the SVM’s performance. An important practical limitation of the proposed method is the assumption that the attacker controls the labels of the injected points. Such assumptions may not hold when the labels are only assigned by trusted sources such as humans. For instance, a spam filter uses its users’ labeling of messages as its ground truth. Thus, although an attacker can send arbitrary messages, he cannot guarantee that they will have the labels necessary for his attack. This imposes an ad- ditional requirement that the attack data must satisfy certain side constraints to fool the labeling oracle. Fur- ther work is needed to understand these potential side constraints and to incorporate them into attacks. The final extension would be to incorporate the real- world inverse feature-mapping problem; that is, the problem of finding real-world attack data that can achieve the desired result in the learner’s input space. For data like handwritten digits, there is a direct map- ping between the real-world image data and the input features used for learning. In many other problems Supervised ML (e.g. SVM)
 Biggio et al. 2012 0.00.20.40.60.81.0 Single Poisoning Period: Evading PCA Mean chaff volume Evasionsuccess(FNR) 0% 10% 20% 30% 40% 50% Uninformed Locally−informed Globally−informed 10 0 0.00.20.40.60.81.0 Evasionsuccess(averagetestFNR) Figure 3: Effect of poisoning attacks on the PCA-based detector [ relative chaff volume under Single-Training Period poisoning attack (dotted black line) locally-informed (dashed blue line) and globally success of PCA under Boiling Frog poisoning attacks in terms of th of locally-informed poisoning for four different poisoning schedules size of the poisoning by factors 1.01, 1.02, 1.05, and 1.15 respectively) rates of 1.05 and 1.15) significantly increase the FNR within a few w many weeks to achieve the same result but are more stealthy in do sequent DoS attack. When trained on this poisoned data, the detector learned a distorted set of principal components that are unable to effectively discern these DoS attacks—a We call this soning meth slowly incre Unsupervised ML (e.g. PCA) Huang et al. 2011 Detection of incident for both prevent and protect & response and recover Extend set of information to improve resilience: Social Network • Aggregation of (personal) data • Secondary usage of (personal) data • Disclosure of (personal) data to third parties Security and privacy require trustworthy information sharing
  • 11. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. Example: Information Flow with Social Networks in USA HOW AMERICANS USE SOCIAL TOOLS IN EMERGENCIES18% use FB to get information about emergencies. More than 1/3 expect help to arrive within 1 hour of posting need to social site. It’s BEST to call 9-1-1 24% would use social tools to tell others they’re safe. “I’m safe” 1 in 5 would try an online channel to get help if unable to reach EMS. 30% in metro areas would sign up for alerts. 20% in non- metro areas would sign up for alerts. Online news is the 3rd most popular source for emergency info. TV RADIO ONLINE 80% expect emergency responders to monitor social sites. H21055 1 in 5 experienced an emergency posted something about it on a social site.
  • 12. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. II. Trustworthy Information Exchange Example: Public Key Exchange Availability and integrity of pkBob • Assumption: Authentic pre-sharing exists, e.g. via personal exchange, PKI, … ICT-supported society: • No global PKI for humans • Multilateral IT Security: Accountability and unobservability are explicitly to configure • Germany: 74% of population want to delegate responsibility to a Third Party pkBob, pkCA2, pkCA1 “Man in the middle” Alice Bob !12 W. Diffie and M.E. Hellmann. New Directions in Cryptography, 1976; K. Rannenberg. Multilateral Security A Concept and Examples for Balanced Security, 2000; http://www.divsi.de
  • 13. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. • Unilateral trust: No control on usage of pkBob Trust Model pkBob Alice Bob Charlie • Availability and integrity of pkBob via necessary “Man-in-the-Middle” eIDBobeIDAlice • Accountability and unobservability by access control of eID infrastructures !13 pkBob pkBob
  • 14. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. • Unilateral trust: No control on usage of pkBob Objective: Multilateral Trust Trust Model pkBob Alice Bob Charlie • Availability and integrity of pkBob via necessary “Man-in-the-Middle” eIDBobeIDAlice • Accountability and unobservability by access control of eID infrastructures !13 pkBob pkBob
  • 15. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. • Textebene 1 – Textebene 2 • Textebene 3 – Textebene 4 • Textebene 5 Prof. Dr. Ahmad-Reza Sadeghi and Dr. Sven Wohlgemuth PersoApp – Secure and User-Friendly Internet Applications. Trust in Identity !14 Problem: Unknown, inevitable Vulnerabilities • Modeled dependencies imply vulnerability by undesired ones (covert channels, escalation of rights, security configuration, human errors, …) • Impossible to automatically detect all undesired dependencies Case (a): Passive interference Case (b): Active interference Adaptive IT system: "Programming at run-time" - Dependencies emerge at run-time C. Wang and S. Ju. The Dilemma of Covert Channels Searching, 2005.
  • 16. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. • Textebene 1 – Textebene 2 • Textebene 3 – Textebene 4 • Textebene 5 Prof. Dr. Ahmad-Reza Sadeghi and Dr. Sven Wohlgemuth PersoApp – Secure and User-Friendly Internet Applications. Trust in Identity !14 Problem: Unknown, inevitable Vulnerabilities • Modeled dependencies imply vulnerability by undesired ones (covert channels, escalation of rights, security configuration, human errors, …) • Impossible to automatically detect all undesired dependencies Case (a): Passive interference Case (b): Active interference Adaptive IT system: "Programming at run-time" - Dependencies emerge at run-time Detecting misuse of identity to (ex post) enforce privacy C. Wang and S. Ju. The Dilemma of Covert Channels Searching, 2005.
  • 17. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. • Textebene 1 – Textebene 2 • Textebene 3 – Textebene 4 • Textebene 5 Dr. Sven Wohlgemuth !15 ICT Resilience: Enforcing Multilateral Security ICT Resilience: Ability of an ICT system to provide and maintain an acceptable level of 
 service in the face of various faults and challenges to normal operation (Sterbenz et al., 2010) Acceptable enforcement of individual security interests for a spontaneous, trustworthy information exchange of pkBob Eigene Abbildung nach illustration following (Sheffi, 2005; Günther et al., 2007; McNanus, 2009) PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen.
  • 18. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. • Textebene 1 – Textebene 2 • Textebene 3 – Textebene 4 • Textebene 5 Dr. Sven Wohlgemuth PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen. !16 Approach: Control and Transparency Enhanced trust infrastructure by measuring with Privacy Control and Privacy Forensics eID client evaluates individually evidences on data usage anomalies and their origin IT Risk Analysis Privacy Control Privacy ForensicsOptimization Usage Control Policy Toolbox X
  • 19. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. • Textebene 1 – Textebene 2 • Textebene 3 – Textebene 4 • Textebene 5 Dr. Sven Wohlgemuth PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen. !16 Approach: Control and Transparency Enhanced trust infrastructure by measuring with Privacy Control and Privacy Forensics eID client evaluates individually evidences on data usage anomalies and their origin IT Risk Analysis Privacy Control Privacy ForensicsOptimization Usage Control Policy Toolbox X Privacy is an evidence for security and integrity (reliability)" The German national ID card can be a trust anchor.
  • 20. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. • Textebene 1 – Textebene 2 • Textebene 3 – Textebene 4 • Textebene 5 Dr. Sven Wohlgemuth !17 Privacy Control PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen. Specification of isolation by pseudonymized delegation of rights to third parties In case of confidentiality breach: Information is linked to pseudonymous identity Control: Individual pseudonymized eID based on national eID infrastructure S. Wohlgemuth. Privatsphäre durch die Delegation von Rechten, 2008; N. Sonehara, I. Echizen und S. Wohlgemuth. Isolation in Cloud Computing and Privacy-Enhancing Technologies, 2011 Control Transparency Transparency System 1 DP/DC System 3 DP/DC System 2 DP/DC pkBob pkBob pkBob Policy
  • 21. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. • Textebene 1 – Textebene 2 • Textebene 3 – Textebene 4 • Textebene 5 Dr. Sven Wohlgemuth !17 Privacy Control PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen. Specification of isolation by pseudonymized delegation of rights to third parties In case of confidentiality breach: Information is linked to pseudonymous identity Control: Individual pseudonymized eID based on national eID infrastructure S. Wohlgemuth. Privatsphäre durch die Delegation von Rechten, 2008; N. Sonehara, I. Echizen und S. Wohlgemuth. Isolation in Cloud Computing and Privacy-Enhancing Technologies, 2011 Control Transparency Transparency System 1 DP/DC System 3 DP/DC System 2 DP/DC pkBob pkBobpkBob Policy d Control System 4 DP/DC d d Policy
  • 22. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. • Textebene 1 – Textebene 2 • Textebene 3 – Textebene 4 • Textebene 5 Transparency & Control Dr. Sven Wohlgemuth !17 Privacy Control PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen. Specification of isolation by pseudonymized delegation of rights to third parties In case of confidentiality breach: Information is linked to pseudonymous identity Control: Individual pseudonymized eID based on national eID infrastructure S. Wohlgemuth. Privatsphäre durch die Delegation von Rechten, 2008; N. Sonehara, I. Echizen und S. Wohlgemuth. Isolation in Cloud Computing and Privacy-Enhancing Technologies, 2011 Control Transparency System 1 DP/DC System 3 DP/DC System 2 DP/DC pkBob pkBobpkBob Policy d Control System 4 DP/DC d d Policy
  • 23. Dr. Sven Wohlgemuth PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen. Transparency: Reconstructing usage of pkBob by data provenance eID client enforces documenting data provenance audit trail !18 Privacy Forensics Transparenz Kontrolle Transparenz Transparenz System 1 DP/DC System 3 DP/DC System 2 DP/DC pkBob System 4 DP/DC pkBob pkBob System 2 pkBob System 2 System 3 Control: Pseudonymous eID with eID infrastructure of national ID card D.J. Weitzner, H. Abelson, T. Berners-Lee, J. Feigenbaum, J. Hendler, and G.J. Sussman. Information Accountability, 2008; S. Wohlgemuth, I. Echizen, N. Sonehara und G. Müller. Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy, 2010.
  • 24. Dr. Sven Wohlgemuth PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen. Transparency: Reconstructing usage of pkBob by data provenance eID client enforces documenting data provenance audit trail !18 Privacy Forensics Transparenz Kontrolle Transparenz Transparenz System 1 DP/DC System 3 DP/DC System 2 DP/DC pkBob System 4 DP/DC pkBob pkBob System 2 Control: Pseudonymous eID with eID infrastructure of national ID card pkBob System 2 System 3 System 4 pkBob System 2 System 3 System 4 System 3 D.J. Weitzner, H. Abelson, T. Berners-Lee, J. Feigenbaum, J. Hendler, and G.J. Sussman. Information Accountability, 2008; S. Wohlgemuth, I. Echizen, N. Sonehara und G. Müller. Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy, 2010.
  • 25. Dr. Sven Wohlgemuth PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen. Transparency: Reconstructing usage of pkBob by data provenance eID client enforces documenting data provenance audit trail !18 Privacy Forensics Transparenz Kontrolle Transparenz Transparenz System 1 DP/DC System 3 DP/DC System 2 DP/DC pkBob System 4 DP/DC pkBob pkBob System 2 Control: Pseudonymous eID with eID infrastructure of national ID card pkBob System 2 System 3 System 4 pkBob System 2 System 3 System 4 System 3 Hindering non-authorized re- identification" Unobservability Misuse of pkBob can be detected" Accountability D.J. Weitzner, H. Abelson, T. Berners-Lee, J. Feigenbaum, J. Hendler, and G.J. Sussman. Information Accountability, 2008; S. Wohlgemuth, I. Echizen, N. Sonehara und G. Müller. Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy, 2010.
  • 26. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. • Textebene 1 – Textebene 2 • Textebene 3 – Textebene 4 • Textebene 5 !19 Example Exemplary Privacy Forensics • Data Provenance for images • Derived information are not listed Identity Forensics • Overview on data usage with Google ID • Accountability, availability and unobservability • Accountability and availability but no unobservability
  • 27. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. • Textebene 1 – Textebene 2 • Textebene 3 – Textebene 4 • Textebene 5 Dr. Sven Wohlgemuth II. PersoApp – Open Source Community
 Citizen, Government, Industry, and Academia !20PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen. • Introduced German national ID card with eID in November, 2010 • Project PersoApp: € 684.880,- (without VAT) until Dec. 31, 2015 Federal Ministry of the Interior (BMI): • Objectives: Core Team of PersoApp: • AGETO Service GmbH: Open source library for electronic identification • Fraunhofer SIT: Guidelines for security engineering • TUD/CASED: Community building with user survey, 
 use cases, workshops, … 1. Establishment of an open source community 2. Alternative for eID client of the Government (AusweisApp) 3. Experimental platform for new requirements, services, ...
  • 28. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. Objectives of PersoApp !21 1. Establishment of an Open Source Community ! ! ! ! 2. Alternative to official eID client (AusweisApp) ! ! ! ! 3. Experiments for new requirements, services, … ! PersoApp Major Release A1 https://persoapp.googlecode.com • Internet Milieus in Germany • A digitalized Campus • Spontaneous information exchange • Spontaneous information exchange • ICT Resilience: Extension of IT Security • Control and transparency
  • 29. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. • Textebene 1 – Textebene 2 • Textebene 3 – Textebene 4 • Textebene 5 Dr. Sven Wohlgemuth PersoApp – Sichere und benutzerfreundliche Internet-Anwendungen. Sichere Identitäten schaffen Vertrauen. "22 Advisory Board Focus: • Consulting steering committee in requirements and interests • 43 stakeholders from national and abroad industries, academia, data protection, and government • Annual meeting (constitutive meeting on September 2014 at BMI) D01-QM Organisation und Rollenverteilung; D10-QM Community Building: Konzept, Maßnahmen und Bewertung
  • 30. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. • Textebene 1 – Textebene 2 • Textebene 3 – Textebene 4 • Textebene 5 Dr. Sven Wohlgemuth PersoApp – Sichere und benutzerfreundliche Internet-Anwendungen. Sichere Identitäten schaffen Vertrauen. "23 Advisory Board: A Network of Networks Kernteam
  • 31. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. • Textebene 1 – Textebene 2 • Textebene 3 – Textebene 4 • Textebene 5 Prof. Dr. Ahmad-Reza Sadeghi and Dr. Sven Wohlgemuth PersoApp – Secure and User-Friendly Internet Applications. Trust in Identity !24 Target Group for Initial Community Building Internet Milieu in Germany Digital Outsiders: • Personal benefit of Internet usage is not clear • Strongly uncertain for security and privacy risks Digital Immigrants: • Internet usage for communication with trusted participants • Highly aware of security and privacy risks Digital Natives: • “Always on-line” for personal benefit • High Internet ability but less risk awareness https://www.divsi.de/sites/default/files/DIVSI_Milieu_Study_Summary.pdf • Digital Natives provides orientation as disseminators • Initial community building at gymnasium and universities • Digital Natives have largest part on higher education
  • 32. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. • Textebene 1 – Textebene 2 • Textebene 3 – Textebene 4 • Textebene 5 Dr. Sven Wohlgemuth PersoApp – Sichere und benutzerfreundliche Internet-Anwendungen. Sichere Identiätem schaffen Vertrauen. !25 Call for Apps • Identity forensics • Privacy Control" • Privacy Forensics eID client and extensions for • User-centric survey" • Design of use cases in particular for mobile applications" • Open source software library for eID functionality (client) of German national ID card" • Extension by “Feature Requests”" • Guidelines for integration of security functionality in own application (Security by Design)" • Publication of results on workshop, talk, education, … We offer Partner are welcome! https://www.persoapp.de
  • 33. Dr. Sven Wohlgemuth PersoApp - An Open Source Community for the new German national ID card. Trust in identity. • Textebene 1 – Textebene 2 • Textebene 3 – Textebene 4 • Textebene 5 Dr. Sven Wohlgemuth !26 ご清聴ありがとうございました。 Twitter at https://www.twitter.com/persoapp"• Announcement of news and collaboration regarding PersoApp E-Mail Listing"• Contact: persoapp@trust.cased.de"• Project leader: persoapp-projects@trust.cased.de"• Software engineer: persoapp-devel@trust.cased.de"• Broadcast: persoapp-broadcast@trust.cased.de"• Steering committee: persoapp-steering@trust.cased.de"• Advisory board: persoapp-advisory@trust.cased.de Code Repository https://persoapp.googlecode.com/"• SVN repository"• Issue tracker Internet Portal https://www.persoapp.de"• Forum"• Pre-Release"• Demo and test service"• Documentation"• Event calendar PersoApp – Eine Open-Source-Community zum neuen Personalausweis. Sichere Identitäten schaffen Vertrauen.