SlideShare une entreprise Scribd logo
1  sur  32
Jonathan Hare
CEO, WebShield Inc.
jonathan@webshield.io
(415) 265-3250
eP3 Network Ecosystem Overview
Empowering People with Privacy and Personalization
www.eP3.network
2
Traditional enterprise-centric security and policy enforcement creates
an inherent conflict between privacy, security and sharing…
…making it fundamentally incapable of enabling personalization
while protecting privacy and security on a global scale.
WebShield Inc.
No reliable way for disparate organizations and systems to agree when they are talking about the same person
(either for online users, or records about them)
No robust way to enforce policies or enable personalization without undermining privacy
(enterprises control the “keys” to data, must understand context and monitor activities to enforce policies)
No reliable way to de-identify comprehensive longitudinal records
(genomics, claims, clinical, demographics, online behavior, etc.)
No way to get disparate stakeholders to trust each other with sensitive resources
(can’t agree on policies, commercial terms, or who is in control)
No way to link, analyze or use data without decrypting it somewhere
(who is trusted with the keys for everyone’s data?)
The Fundamental Barrier Enterprise-centric computing Personalization with Privacy
3 WebShield Inc.
4
fragmented islands of data and functionality,
ineffective personalization and process optimization across organizations,
systemic lack of security, privacy and consumer control,
and periodic disasters...
It always ends
the same way
WebShield Inc.
5
We need to try something
different that completely eliminates
the fundamental conflict
between privacy and sharing…
WebShield Inc.
6 WebShield Inc.
New Paradigm: “Quantum Privacy”
obfuscate data so that it is both
- fully opaque (meaningless gibberish)
and
- fully computable (no loss of information)
- at the same time…
simultaneously enforce policies of all stakeholders
at the finest possible level of granularity (‘quantum level’)
before any meaningful data is revealed to anyone (including “insiders”)
enables global pooling and analytics of proprietary and regulated data
7 WebShield Inc.
eP3 Network Ecosystem
Empowering People with Privacy and Personalization
open, self-funding and freely available – with privacy and prosperity for all
Unified Trust Model
supports diverse trust criteria for regulatory compliance, audit processes,
commercial terms and access authorization by disparate stakeholders
Trust Network
precision cross-organizational policy enforcement
via certified cloud-based trust authorities
Privacy Network
frictionless privacy-preserving data pooling, cloud
analytics & personalization on a global scale
Quantum Privacy
Empowering People with Privacy and Personalization
8
eP3 Network Ecosystem
eP3 Network Ecosystem is an informal multi-sector consortium of non-profits, commercial vendors, standards
organizations, enterprises, research institutions, government agencies and individuals committed to empowering
people with privacy and personalization. This means giving people in every aspect of their lives the ability to:
• find, access and securely share information about them or that they’re authorized to use, and to…
• select policies for privacy and security protection and personalization, while at the same time…
• allowing individuals and society to benefit from shared services for precision personalization,
process optimization, and population research on a global scale.
Non-Profit and Trust Governance Launch Partners
WebShield Inc.
WebShield Inc.9
• Software defined ‘neutral zone’ enables privacy-preserving data pooling, analytics and
access authorization on a global scale
- all data is encrypted and anonymized at source, and linked to publisher’s “trust criteria”
- supports analytics or policy enforcement without revealing any information to anyone
• End-to-end attribute-level enforcement of trust criteria
- commercial terms, regulatory compliance, authorized recipients and purposes of use, etc.
- each publisher remains in control of their resources regardless of where they flow
- no data sharing agreements or consent necessary for processing in the ‘neutral zone’
• Trust criteria automatically inherited by aggregates, analytic outputs and user responses
- stakeholder’s policies are consistently enforced on any resources published, and upon
anything directly or indirectly derived from them
- enables global-scale pooling across organizations and people that don’t trust each other
Privacy Network
Privacy Network
10 WebShield Inc.
Privacy Network
2952.3367731...
sJ92fKA24sL…
72679426.3166…
82Fa4JiqR3i…
93742157.4126…
We2B381H5…
Privacy
Proxy
Node 1 Node 2 Node N
encrypt
tokenize
randomize
crypto-hash
Input Graph
148.53
148.53
clear
text
Privacy Graph
apply
policies
obfuscatePrivacy
Algorithm
management plane
control plane
data plane
tokenized
randomized
crypto-hashed
429jQk1Mz9…
93742157.4126…
We2B381H5…
{148.53} {dx72Fx92Ua…} {T62p2JsV9sI…}
429jQk1Mz9…T62p2JsV9sI…dx72Fx92Ua…
Trust
Authority
Privacy Algorithms
Graphs are broken up into individual values, obfuscated by distributed “privacy pipes”,
then re-assembled into a “privacy graph” made up entirely of opaque tokens.
Privacy graphs are completely opaque and meaningless
to any observer, yet remain fully computable.
Algorithms and policy rules obfuscated by the same
privacy algorithm can be executed upon privacy graph
data without revealing any information to anyone.
Self-describing input graphs
including data, algorithms, schema,
provenance & trust criteria
11 WebShield Inc.
Privacy Network
Privacy
Proxy
Node 1 Node 2 Node N
encrypt
tokenize
randomize
crypto-hash
Input Graph
148.53
148.53
clear
text
148.53
Privacy Graph
apply
policies
obfuscate
enforce
policies
de-obfuscate
Privacy
Algorithm
management plane
control plane
data plane
tokenized
randomized
crypto-hashed
429jQk1Mz9…
93742157.4126…
We2B381H5…
429jQk1Mz9…
{148.53} {dx72Fx92Ua…} {T62p2JsV9sI…}
429jQk1Mz9…T62p2JsV9sI…dx72Fx92Ua…
Trust
Authority
Privacy Algorithms
Privacy graph information can be resolved into clear text only after all of the
trust criteria linked to all resources that contributed to creating it are enforced.
• vastly better security and privacy (up to millions of times more secure)
• unlimited aggregation and analysis with no loss of accuracy
• precision access control (single attribute, single recipient, specified purpose, one-time)
• no need to agree on trust criteria
Privacy Network
WebShield Inc.12
• Inherently neutral and open – can incorporate any standards or proprietary technologies
- supports any data models, assessment methodologies, trust frameworks, audit standards,
- supports any algorithms, software, technology infrastructure, etc.
• Simultaneous enforcement of disparate policies & regulatory requirements
- payment/licensing terms, privacy, security, authorized recipients, authorized purposes
- HIPAA, CFR 42-2, GLBA, FERPA, IRS 6103, COPPA, FISMA, ISO-2701/2, EU GDPR, etc.
- distributed governance by multiple stakeholders (including the subject of records)
• Certification / accreditation of cloud-based shared services by neutral trust authorities
- data sharing, cybersecurity, analytics, decision support, secure communication, etc.
- FISMA/FedRAMP, EHNAC (18 accreditations programs), SAFE-BioPharma (FICAM), etc.
Unified Trust Model
Can dynamically combine any
authentication services into a
personalized many-factor
authentication network that
learns to recognize a user
across devices and through
time with an unprecedented
combination of convenience,
accuracy and privacy.
WebShield Inc.13
Authentication
SMS
Touch IDVoice
Authenticator
Password Device ID
Email ID Verification
Privacy Network
Genomic
Exchange &
Clearinghouse MPIs
Online Device
Profiles
Insurance
Claims Phone
Registries
Insurance
Enrollment
HR
Payroll
Government
Records
ERP/CRM
Postal
Database
Security
Directories
Online
Profiles
In-Person
Proofing
EHR
Records
Labs
Records
Credit
Bureau
Online Device
Profiles
Public
Records
Practice
Management
Professional
Licensing
Trust
Network
Please enter your email address or mobile number:
Mobile Phone
- or -
Email Address
other options…
* Protected by the Privacy Network
✅ Accept Privacy Policies explain
CancelVerify my Identity*
jonathan.hare@me.com
Choose how to authenticate your identity:
◎ Message my Cell Phone AND send me Email
◎ Send me Email AND Google Authenticator
◎ Touch ID on my Cell Phone
` explainCancelAuthenticate Me
Patient Record Request
Digitally Signed
Provider NPI
Patient ID (at Provider)
Deliver to (Direct Address)
Patient Digital Signature
Trust Network
Certified / Accredited Authorization Credentials
• Encrypted with intended recipient’s public key
• Digitally signed by multiple trusted authorities
• Attributes verified with unprecedented assurance
• Linked to privacy-preserving trust authorities for
cybersecurity, regulatory compliance, licensing, etc.
• Eliminates identity theft and cyber-security fraud
Supports convenient global single-sign-on and
high-assurance authentication and authorization,
with no need to remember usernames, passwords
or account numbers.
A diverse network of authoritative data
sources, record-linking algorithms and
consent and authorization services
enables privacy-preserving precision
identity and attribute proofing, record
linking, resource discovery and access
authorization – all without revealing
any personal information to anyone.
14 WebShield Inc.
treating clinicians
& patient
general
public
researchers &
care managers
Data and other resources can be
shared, aggregated and analyzed
in a virtual ‘data ocean’ without
risking the regulatory compliance,
privacy, security or commercial
rights of any participants.
trust
authorities
identity
networks
analytics
networks
data
networks
Data remains obfuscated until all trust criteria are satisfied for all inputs and all
stakeholders, enforced with the finest-grained access control possible – individual
attributes, a single recipient, a specified purpose, one time, on a trusted device
Global Crowdsourcing
Claims
Records
EHR
Records
Lab
Records
Pharmacy
Records
Genomic
Data
Practice
Management
Device
Data
Demographic
Data
Online
Behavior
Other
Records
trust frameworks & brands
algorithms
computing infrastructure
software & cloud services
schemas & data models
Free crowdsourcing and
value-added syndication
via a virtual exchange and
marketplace supports a
self-funding network
freely available to any
participants….
Child
Teacher
Clinician
Colleague
Friend
Spouse
any
credential
or relationship
Trusted Social Networking
Privacy Network
WebShield Inc.* Brands shown are for illustration only
any
social media,
messaging clients
or websites
any digital
content
general health education banking children online
My Policies edit my polices JonathanHare cancel
people
devices
security
payments
advertising
messaging
privacy
general
Users and organizations can link privacy and security policies directly to their content
(documents, messages, pictures, videos, web pages, etc.), and freely share it through
standard messaging clients, social media apps, websites and collaboration tools.
Content is encrypted end-to-end
until recipient is authenticated and
authorized, and not revealed to apps
or websites used for sharing.
Neutral trust authorities independently verify the identities, credentials and
relationships of recipients, enabling trusted social networking with built-in
regulatory compliance (HIPAA, FERPA, COPPA, etc.) and rights management.
15
Self-funding Network Each additional solution, person or organization pulls in more data, users,
and ecosystem resources, creating a self-reinforcing network effect.
Business Model Enabling global crowd-sourcing of privacy sensitive and proprietary resources
translates into vastly lower costs, free access and unprecedented personalization and privacy.
WebShield Inc.16
in-kind resources
Individuals Enterprisesanonymised data, opt-ins,
online engagement
Consumers and enterprises “pay” for solutions
with cash and/or in-kind resources.
$
$
Solutions
Vendors
licensed
resources
16
privacy network
data
personalized
education
personalized
entertainment
identity fraud
prevention
virtual exchange &
marketplace
payment
syndicate
trust
syndicate
identity
syndicate personalized
healthcare
17 WebShield Inc.
$
$
$$
$
$
$
$
$
$
$
Privacy Network Syndicates are virtual joint ventures whose members pool resources to create
value-added services, receiving a share of resulting revenues and/or access to free services…
revenues and in-kind resources generated by syndicates are
allocated among their members based upon agreed-upon
payment and syndication terms….
Enterprises
Individuals
eP3 Network Ecosystem
has sweeping implications anywhere that
privacy and trust matters
18 WebShield Inc.
By empowering individuals and eliminating regulatory and commercial barriers to sharing resources, the
eP3 Network cross-fertilizes previously disparate markets into a vast exchange and marketplace with a
common underlying network of users, devices, computing infrastructure, trust authorities and data sources
WebShield Inc.
Merit-Based
Incentive
Payment System
Alternative
Payment Models OR
MACRAMedicare Access and CHIP Reauthorization Act
Moonshot to Cure Cancer
Veterans Access
Choice and Accountability
Act
fraud
& abuse
19
eP3 Network for Personalized Healthcare
Patient20
Hospital Radiology Imaging Center
Labs
Skilled Nursing
Facility
Pharmacy
Genomics
Consumer
Devices & Apps
Healthcare
Clearinghouses
Clinic Research
Institutions
Commercial
Payers
Federal
Agencies
Privacy Network
Patient-Centered Health - On-demand, Privacy-Preserving, National Scale
• comprehensive patient-centered longitudinal records
• personalized care management & cost, quality and safety metrics
• personalized prior authorization / pre-cert / e-referral management
• patient-centered secure messaging, data access and care coordination
• forgery proof audit trails, virtual audits, automated pre-emptive fraud prevention
WebShield Inc.
Patient21
Hospital Radiology Imaging Center
Labs
Skilled Nursing
Facility
Pharmacy
Carebox
VisionTree
Genomics
Consumer
Devices & Apps
Healthcare
Clearinghouses
Clinic Research
Institutions
Consumer Directed Exchange
Network Commercial
Payers
Federal
Agencies
Identity and Authorization
OpenID Connect
OAuth 2.0, SAML
UMA (User Managed Access)
POET (Pre-OAuth Entity Trust)
HEART Profile
Data Exchange
FHIR
Direct Messaging
eHealth Exchange
Blue Button
Privacy Network
Open Standards
WebShield Inc.
web phone email tablet
Privacy Network
22
Preemptive Fraud and Abuse Prevention
• better identity screening and
surveillance keeps “bad” guys out
• forgery-proof audit trails keeps
“good” guys honest and productive
• analytics “connects dots” better,
detects fraud and abuse before
delivery or payment
• Pre-payment Virtual Audits are
self-funding, effective, fair, scalable
• Trusted Provider Fast Track builds
compliance into care coordination,
flags and deters inappropriate
utilization before it happens
WebShield Inc.
eP3 Network
for Consumer Online and e-Commerce
• Vastly better privacy and security for consumers, dramatically greater revenue for industry.
• Privacy-preserving global single-sign-on and 1-click “Buy Button” enables trusted social
commerce via any messaging client, social media app or website.
• Precision anonymous personalization increases advertising revenue yield 500%+, opens
new markets in personalized services and cross-organizational process optimization.
• User-centric syndication gives consumers convenient access to content they want on any
device at any time, while doubling online revenue for content owners.
23 WebShield Inc.
Eliminating the conflict between privacy and personalization has sweeping implications
Privacy Network
Buy Season Pass $19.99
Watch Ad-Free for $1.99
Watch Free with Ads
* Brands shown are for illustration only
Watch Free with Ads
Accept Privacy Protection
Show Policies
The Privacy Network uses information about you to
authorize access to content, protect you from identity
theft, and to enforce privacy policies on the use of
your information and files.
Cancel
explain
1-click Privacy Protection opt-in
First-time users must opt-in to privacy and
cybersecurity protection in order to access
protected content (e.g. a football game).
Opt-in authorizes use of fully obfuscated data
in order to anonymously:
• authenticate user and verify attributes and
relationships.
• detect and verify user devices.
• analyze obfuscated activity logs to detect
identity theft & cyber-security fraud.
• locate and authorize access to user’s
records, accounts and digital media.
• authorize 1-click payments.
• enforce security, privacy and personalization
policies of user and other stakeholders.
better privacy, better security, better personalization
• robust identity theft protection with multi-factor
authentication, identity proofing and cyber-fraud
detection.
• user’s identity and personal data hidden from advertisers,
content owners, apps and websites.
• all user data and activity logging fully obfuscated and
anonymised – no insider access by anyone.
• personal information only revealed if authorized by user.
• all payments information fully tokenized.
The Privacy Network eliminates the conflict between privacy, personalization and convenience
WebShield Inc.24
Proving authorization without revealing any personal information to anyone
Privacy Network
Buy Season Pass $19.99
Watch Ad-Free for $1.99
Watch Free with Ads
* Brands shown are for illustration only
Watch Free with Ads
Commercial
Credit
Bureaus
Phone
RegistriesProfessional
Licensing
Marketing
Profiles
Data
Aggregators
Fraud
Analytics
Enterprise
Healthcare
Records
Security
DirectoriesEmployer
HR
Retailer
Affinity ProgramsSupply-
Chain
Insurance
Databases
Banking
Records`
CRM
ERP
Government
Education
Records
Public
Records DMV Records
State & Local
Records
IRS
Records
Social Security
Citizenship &
Immigration
Healthcare
Data
Sources
(3) virtual database of obfuscated
and anonymised data used to verify
user’s identity, authorize access
and derive authentication options.
Accept Privacy Protection
Show Policies Cancel
explain
Text my Cell Send me Email
your phone your email- or -
The Privacy Network does not recognize this device.
To authorize access, please enter one of the following:
other options
verify device(415) 265-3250 verify device
(Y4t) rG2-Ua91
xRs4Mw42dAk
baX3yPEq7Nm
(6) obfuscated log
entries returned
(5) User authenticated, which in turn:
• verifies identity, authorizes access
• validates privacy protection opt-in
• registers device to enable subsequent
no-login access and 1-click buy
no personal information revealed to anyone
E9ts S120Ls7V
xRs4Mw42dAk
baX3yPEq7Nm
phone
voice
print
password
Authentication Services
device
fingerprint
email
fingerprint
facial
biometric
(4) passes encrypted authentication
parameters to neutral authentication
services that satisfy authorization
requirements.
(415) 265-3250
jonathan.hare@me.com
FaceBookID 2335135
Trust
Authorities
Y4trG2-Ua91
(2) attributes are obfuscated and
anonymised by Privacy Network
and submitted to Trust Authorities.
Anonymised &
Obfuscated Data
Obfuscated
Computation
Unified
Trust Model
WebShield Inc.25
(1) for first-time users and
unrecognized devices, user enters
any attribute (phone, email, etc.)
that specifies their identity.
Individual users gain direct control of privacy and personalization policies
Privacy Network
Buy Season Pass $19.99
Watch Ad-Free for $1.99
Watch Free with Ads
* Brands shown are for illustration only
Watch Free with Ads
Accept Privacy Protection
Show Policies Cancel
explain
• Individuals control personal policies that are
enforced globally on records and accounts
held by any participating publisher,
organization or online service.
• Enables consumers to assert their legal
rights to access and share their healthcare
(HIPAA), educational (FERPA), financial and
government records.
• Consumer control with neutral governance
of security, privacy and access control
mitigates regulatory liability of participants.
Accept Privacy Protection
Show Policies
general health education banking children online
My Policies edit my polices Jonathan Hare cancel
people
devices
security
payments
advertising
messaging
privacy
general
Retrieve my records for my personal health network:
Healthcare providers can access my personal health network:
o whenever they are treating me, as long as they are agree to enforce HIPAA.
o only if they have my express consent.
In an emergency, Emergency Room and Ambulance staff may:
o access my complete personal health record network.
o access only my critical health information (e.g. allergies, vaccinations, medications).
o NOT access my personal health vault, even if my life is in jeopardy.
I want to be notified whenever:
o anyone accesses my health records.
o my records are accessed by someone not on my list of authorized providers.
o I do NOT want to be notified – just keep track so I can check later if I want to.
Find and request copies of my health records and store them for me.
Microsoft HealthVaultStore in:
Welcome, Jonathan:
You are now being protected
by the Privacy Network:
26 WebShield Inc.
1-click purchasing anywhere, without privacy or security risks
WebShield Inc.
Privacy Network
Buy Season Pass $19.99
Watch Ad-Free for $1.99
Watch Free with Ads
* Brands shown are for illustration only27
• Embeddable “Buy Button” enables 1-click, no-login purchasing – can be linked to any
digital content or online offer.
• No need to reveal sensitive identity or credit card information to verify identity, log
in, create accounts or authorize payments.
• Eliminates identity fraud and cyber-security risks with multi-factor authentication and
identity proofing, forgery-proof audit trails, and global ‘privatized’ fraud analytics.
Precision-targeted advertising with “perfect privacy”
28 WebShield Inc.
Privacy Network
Buy Season Pass $19.99
Watch Ad-Free for $1.99
Watch Free with Ads
• Enables 500%+ increase in online advertising revenue.
• Anonymised advertising networks can be linked directly to any online content. Ads are
personalized without login, and delivered via any social network, messaging app or website.
• Ad-stream is embedded in content and can’t be detected or blocked by ad-blockers or
non-participating websites or apps.
* Brands shown are for illustration only
Global single-sign-on – 1-click access on any registered user device, for any online
content
29 WebShield Inc.
Any Device
Privacy Network
• 1-click access to all purchases, subscriptions and ad-supported content
from any participating retailers and publishers, on any user devices.
• Devices can be provisioned on demand without remembering account
names or passwords or revealing any sensitive information.
• Seamless digital library management across all retailers and publishers.
* Brands shown are for illustration only
Any Device
Any Online
Channel
User-centric social commerce and content distribution
Privacy Network
Buy Episode 1 $1.99
Buy Season 1 $15.99
Watch Free with Ads
Hi, Jonathan My Policies
Protected by Privacy Network
Watch Free with Ads
30 WebShield Inc.* Brands shown are for illustration only
• Digital content and e-commerce offers can be freely distributed through any social
media apps, messaging clients or websites.
• Digital content (and embedded ads) can be dynamically personalized without
requiring user login or revealing any sensitive information to anyone.
• Branded “Buy” or “Subscribe” buttons and advertising networks can be embedded in
any online content, offering owners multi-channel distribution without losing control.
Any Device
Any Online
Channel
User-Centric Syndication: consumers create their own personal entertainment networks
Privacy Network
Any
Content
Movies
Videos
Games
Digital Media
Messaging
Files
TV
Music
Web Sites
WebShield Inc.31 * Brands shown are for illustration only
• Content owners more than double their online revenues via precision targeted anonymous
ads, free social marketing, and frictionless conversion into purchases and paid subscriptions.
• Consumers choose their own personal bundle of free ad-supported viewing, paid
subscriptions and paid on-demand or purchases.
• Online channels incorporate Privacy Network services to deliver faster performance and
“native” user experience in exchange for a share of advertising and commerce revenues.
WebShield Inc.32
April eP3 Network Ecosystem Stakeholder Meetings & Events
April 25th in Washington DC:
• Patient-Centered Data Liquidity and Regulatory Compliance
• Sponsored by EHNAC, SAFE BioPharma Association, NH-ISAC
April 26th in Washington DC:
• Consumer Empowerment and Privacy Protection
• Veterans Health, Education and Student Privacy, Child Safety, Identity & Privacy for
BlockChain, Legislative Opportunities, etc.
• Organized by moderators, speakers from IEEE, Society for Women’s Health, Future of
Privacy Forum, Veterans Prostate Cancer Awareness, etc.
April 27th - 28th in Washington DC:
• Health Datapalooza Start-up Panel, Consumer Directed Exchange Exhibit Hall

Contenu connexe

Tendances

A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
 
Cyber Theft Solutions
Cyber Theft SolutionsCyber Theft Solutions
Cyber Theft Solutionswbesse
 
Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCloudMask inc.
 
White paper-diligent-cybersecurity
White paper-diligent-cybersecurityWhite paper-diligent-cybersecurity
White paper-diligent-cybersecurityjames morris
 
Operational CyberSecurity Final Case Report
Operational CyberSecurity Final Case ReportOperational CyberSecurity Final Case Report
Operational CyberSecurity Final Case ReportJames Konderla
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionTrend Micro
 
Takshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in IndiaTakshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in IndiaThe Takshashila Institution
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoTnsangary
 
Self-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic RelationshipsSelf-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic RelationshipsJeremy Hilton
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationIRJET Journal
 
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...Cláudia Alves
 
Contractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataContractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataDigital Shadows
 
DYNAMIC PRIVACY PROTECTING SHORT GROUP SIGNATURE SCHEME
DYNAMIC PRIVACY PROTECTING SHORT GROUP SIGNATURE SCHEMEDYNAMIC PRIVACY PROTECTING SHORT GROUP SIGNATURE SCHEME
DYNAMIC PRIVACY PROTECTING SHORT GROUP SIGNATURE SCHEMEIJCI JOURNAL
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudUlf Mattsson
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 

Tendances (20)

A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
 
Cyber Theft Solutions
Cyber Theft SolutionsCyber Theft Solutions
Cyber Theft Solutions
 
Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidence
 
White paper-diligent-cybersecurity
White paper-diligent-cybersecurityWhite paper-diligent-cybersecurity
White paper-diligent-cybersecurity
 
Sqrrl
SqrrlSqrrl
Sqrrl
 
Operational CyberSecurity Final Case Report
Operational CyberSecurity Final Case ReportOperational CyberSecurity Final Case Report
Operational CyberSecurity Final Case Report
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryption
 
Takshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in IndiaTakshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in India
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
 
Self-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic RelationshipsSelf-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic Relationships
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
 
Contractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataContractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive Data
 
DYNAMIC PRIVACY PROTECTING SHORT GROUP SIGNATURE SCHEME
DYNAMIC PRIVACY PROTECTING SHORT GROUP SIGNATURE SCHEMEDYNAMIC PRIVACY PROTECTING SHORT GROUP SIGNATURE SCHEME
DYNAMIC PRIVACY PROTECTING SHORT GROUP SIGNATURE SCHEME
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 

Similaire à WebShield eP3 Network Overview (02-04-2017)

HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShieldHXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShieldHxRefactored
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51Felipe Prado
 
Blockchain For Enhancing Enterprise Cybersecurity.pdf
Blockchain For Enhancing Enterprise Cybersecurity.pdfBlockchain For Enhancing Enterprise Cybersecurity.pdf
Blockchain For Enhancing Enterprise Cybersecurity.pdfaNumak & Company
 
Blockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdfBlockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdfJamieDornan2
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Controljwpiccininni
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldIdentive
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability Adz91 Digital Ads Pvt Ltd
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfV2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxV2Infotech1
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceKim Cook
 
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...IJCSIS Research Publications
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 
Blockchains Impact on Identity Management.pdf
Blockchains Impact on Identity Management.pdfBlockchains Impact on Identity Management.pdf
Blockchains Impact on Identity Management.pdfniahiggins21
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak PreventionTanvir Hashmi
 

Similaire à WebShield eP3 Network Overview (02-04-2017) (20)

HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShieldHXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
 
Blockchain For Enhancing Enterprise Cybersecurity.pdf
Blockchain For Enhancing Enterprise Cybersecurity.pdfBlockchain For Enhancing Enterprise Cybersecurity.pdf
Blockchain For Enhancing Enterprise Cybersecurity.pdf
 
Blockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdfBlockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdf
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
 
CC ss.pptx
CC ss.pptxCC ss.pptx
CC ss.pptx
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
Blockchains Impact on Identity Management.pdf
Blockchains Impact on Identity Management.pdfBlockchains Impact on Identity Management.pdf
Blockchains Impact on Identity Management.pdf
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 

Dernier

Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Anamikakaur10
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 

Dernier (20)

Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 

WebShield eP3 Network Overview (02-04-2017)

  • 1. Jonathan Hare CEO, WebShield Inc. jonathan@webshield.io (415) 265-3250 eP3 Network Ecosystem Overview Empowering People with Privacy and Personalization www.eP3.network
  • 2. 2 Traditional enterprise-centric security and policy enforcement creates an inherent conflict between privacy, security and sharing… …making it fundamentally incapable of enabling personalization while protecting privacy and security on a global scale. WebShield Inc.
  • 3. No reliable way for disparate organizations and systems to agree when they are talking about the same person (either for online users, or records about them) No robust way to enforce policies or enable personalization without undermining privacy (enterprises control the “keys” to data, must understand context and monitor activities to enforce policies) No reliable way to de-identify comprehensive longitudinal records (genomics, claims, clinical, demographics, online behavior, etc.) No way to get disparate stakeholders to trust each other with sensitive resources (can’t agree on policies, commercial terms, or who is in control) No way to link, analyze or use data without decrypting it somewhere (who is trusted with the keys for everyone’s data?) The Fundamental Barrier Enterprise-centric computing Personalization with Privacy 3 WebShield Inc.
  • 4. 4 fragmented islands of data and functionality, ineffective personalization and process optimization across organizations, systemic lack of security, privacy and consumer control, and periodic disasters... It always ends the same way WebShield Inc.
  • 5. 5 We need to try something different that completely eliminates the fundamental conflict between privacy and sharing… WebShield Inc.
  • 6. 6 WebShield Inc. New Paradigm: “Quantum Privacy” obfuscate data so that it is both - fully opaque (meaningless gibberish) and - fully computable (no loss of information) - at the same time… simultaneously enforce policies of all stakeholders at the finest possible level of granularity (‘quantum level’) before any meaningful data is revealed to anyone (including “insiders”)
  • 7. enables global pooling and analytics of proprietary and regulated data 7 WebShield Inc. eP3 Network Ecosystem Empowering People with Privacy and Personalization open, self-funding and freely available – with privacy and prosperity for all Unified Trust Model supports diverse trust criteria for regulatory compliance, audit processes, commercial terms and access authorization by disparate stakeholders Trust Network precision cross-organizational policy enforcement via certified cloud-based trust authorities Privacy Network frictionless privacy-preserving data pooling, cloud analytics & personalization on a global scale Quantum Privacy
  • 8. Empowering People with Privacy and Personalization 8 eP3 Network Ecosystem eP3 Network Ecosystem is an informal multi-sector consortium of non-profits, commercial vendors, standards organizations, enterprises, research institutions, government agencies and individuals committed to empowering people with privacy and personalization. This means giving people in every aspect of their lives the ability to: • find, access and securely share information about them or that they’re authorized to use, and to… • select policies for privacy and security protection and personalization, while at the same time… • allowing individuals and society to benefit from shared services for precision personalization, process optimization, and population research on a global scale. Non-Profit and Trust Governance Launch Partners WebShield Inc.
  • 9. WebShield Inc.9 • Software defined ‘neutral zone’ enables privacy-preserving data pooling, analytics and access authorization on a global scale - all data is encrypted and anonymized at source, and linked to publisher’s “trust criteria” - supports analytics or policy enforcement without revealing any information to anyone • End-to-end attribute-level enforcement of trust criteria - commercial terms, regulatory compliance, authorized recipients and purposes of use, etc. - each publisher remains in control of their resources regardless of where they flow - no data sharing agreements or consent necessary for processing in the ‘neutral zone’ • Trust criteria automatically inherited by aggregates, analytic outputs and user responses - stakeholder’s policies are consistently enforced on any resources published, and upon anything directly or indirectly derived from them - enables global-scale pooling across organizations and people that don’t trust each other Privacy Network
  • 10. Privacy Network 10 WebShield Inc. Privacy Network 2952.3367731... sJ92fKA24sL… 72679426.3166… 82Fa4JiqR3i… 93742157.4126… We2B381H5… Privacy Proxy Node 1 Node 2 Node N encrypt tokenize randomize crypto-hash Input Graph 148.53 148.53 clear text Privacy Graph apply policies obfuscatePrivacy Algorithm management plane control plane data plane tokenized randomized crypto-hashed 429jQk1Mz9… 93742157.4126… We2B381H5… {148.53} {dx72Fx92Ua…} {T62p2JsV9sI…} 429jQk1Mz9…T62p2JsV9sI…dx72Fx92Ua… Trust Authority Privacy Algorithms Graphs are broken up into individual values, obfuscated by distributed “privacy pipes”, then re-assembled into a “privacy graph” made up entirely of opaque tokens. Privacy graphs are completely opaque and meaningless to any observer, yet remain fully computable. Algorithms and policy rules obfuscated by the same privacy algorithm can be executed upon privacy graph data without revealing any information to anyone. Self-describing input graphs including data, algorithms, schema, provenance & trust criteria
  • 11. 11 WebShield Inc. Privacy Network Privacy Proxy Node 1 Node 2 Node N encrypt tokenize randomize crypto-hash Input Graph 148.53 148.53 clear text 148.53 Privacy Graph apply policies obfuscate enforce policies de-obfuscate Privacy Algorithm management plane control plane data plane tokenized randomized crypto-hashed 429jQk1Mz9… 93742157.4126… We2B381H5… 429jQk1Mz9… {148.53} {dx72Fx92Ua…} {T62p2JsV9sI…} 429jQk1Mz9…T62p2JsV9sI…dx72Fx92Ua… Trust Authority Privacy Algorithms Privacy graph information can be resolved into clear text only after all of the trust criteria linked to all resources that contributed to creating it are enforced. • vastly better security and privacy (up to millions of times more secure) • unlimited aggregation and analysis with no loss of accuracy • precision access control (single attribute, single recipient, specified purpose, one-time) • no need to agree on trust criteria Privacy Network
  • 12. WebShield Inc.12 • Inherently neutral and open – can incorporate any standards or proprietary technologies - supports any data models, assessment methodologies, trust frameworks, audit standards, - supports any algorithms, software, technology infrastructure, etc. • Simultaneous enforcement of disparate policies & regulatory requirements - payment/licensing terms, privacy, security, authorized recipients, authorized purposes - HIPAA, CFR 42-2, GLBA, FERPA, IRS 6103, COPPA, FISMA, ISO-2701/2, EU GDPR, etc. - distributed governance by multiple stakeholders (including the subject of records) • Certification / accreditation of cloud-based shared services by neutral trust authorities - data sharing, cybersecurity, analytics, decision support, secure communication, etc. - FISMA/FedRAMP, EHNAC (18 accreditations programs), SAFE-BioPharma (FICAM), etc. Unified Trust Model
  • 13. Can dynamically combine any authentication services into a personalized many-factor authentication network that learns to recognize a user across devices and through time with an unprecedented combination of convenience, accuracy and privacy. WebShield Inc.13 Authentication SMS Touch IDVoice Authenticator Password Device ID Email ID Verification Privacy Network Genomic Exchange & Clearinghouse MPIs Online Device Profiles Insurance Claims Phone Registries Insurance Enrollment HR Payroll Government Records ERP/CRM Postal Database Security Directories Online Profiles In-Person Proofing EHR Records Labs Records Credit Bureau Online Device Profiles Public Records Practice Management Professional Licensing Trust Network Please enter your email address or mobile number: Mobile Phone - or - Email Address other options… * Protected by the Privacy Network ✅ Accept Privacy Policies explain CancelVerify my Identity* jonathan.hare@me.com Choose how to authenticate your identity: ◎ Message my Cell Phone AND send me Email ◎ Send me Email AND Google Authenticator ◎ Touch ID on my Cell Phone ` explainCancelAuthenticate Me Patient Record Request Digitally Signed Provider NPI Patient ID (at Provider) Deliver to (Direct Address) Patient Digital Signature Trust Network Certified / Accredited Authorization Credentials • Encrypted with intended recipient’s public key • Digitally signed by multiple trusted authorities • Attributes verified with unprecedented assurance • Linked to privacy-preserving trust authorities for cybersecurity, regulatory compliance, licensing, etc. • Eliminates identity theft and cyber-security fraud Supports convenient global single-sign-on and high-assurance authentication and authorization, with no need to remember usernames, passwords or account numbers. A diverse network of authoritative data sources, record-linking algorithms and consent and authorization services enables privacy-preserving precision identity and attribute proofing, record linking, resource discovery and access authorization – all without revealing any personal information to anyone.
  • 14. 14 WebShield Inc. treating clinicians & patient general public researchers & care managers Data and other resources can be shared, aggregated and analyzed in a virtual ‘data ocean’ without risking the regulatory compliance, privacy, security or commercial rights of any participants. trust authorities identity networks analytics networks data networks Data remains obfuscated until all trust criteria are satisfied for all inputs and all stakeholders, enforced with the finest-grained access control possible – individual attributes, a single recipient, a specified purpose, one time, on a trusted device Global Crowdsourcing Claims Records EHR Records Lab Records Pharmacy Records Genomic Data Practice Management Device Data Demographic Data Online Behavior Other Records trust frameworks & brands algorithms computing infrastructure software & cloud services schemas & data models Free crowdsourcing and value-added syndication via a virtual exchange and marketplace supports a self-funding network freely available to any participants….
  • 15. Child Teacher Clinician Colleague Friend Spouse any credential or relationship Trusted Social Networking Privacy Network WebShield Inc.* Brands shown are for illustration only any social media, messaging clients or websites any digital content general health education banking children online My Policies edit my polices JonathanHare cancel people devices security payments advertising messaging privacy general Users and organizations can link privacy and security policies directly to their content (documents, messages, pictures, videos, web pages, etc.), and freely share it through standard messaging clients, social media apps, websites and collaboration tools. Content is encrypted end-to-end until recipient is authenticated and authorized, and not revealed to apps or websites used for sharing. Neutral trust authorities independently verify the identities, credentials and relationships of recipients, enabling trusted social networking with built-in regulatory compliance (HIPAA, FERPA, COPPA, etc.) and rights management. 15
  • 16. Self-funding Network Each additional solution, person or organization pulls in more data, users, and ecosystem resources, creating a self-reinforcing network effect. Business Model Enabling global crowd-sourcing of privacy sensitive and proprietary resources translates into vastly lower costs, free access and unprecedented personalization and privacy. WebShield Inc.16 in-kind resources Individuals Enterprisesanonymised data, opt-ins, online engagement Consumers and enterprises “pay” for solutions with cash and/or in-kind resources. $ $ Solutions Vendors licensed resources 16
  • 17. privacy network data personalized education personalized entertainment identity fraud prevention virtual exchange & marketplace payment syndicate trust syndicate identity syndicate personalized healthcare 17 WebShield Inc. $ $ $$ $ $ $ $ $ $ $ Privacy Network Syndicates are virtual joint ventures whose members pool resources to create value-added services, receiving a share of resulting revenues and/or access to free services… revenues and in-kind resources generated by syndicates are allocated among their members based upon agreed-upon payment and syndication terms…. Enterprises Individuals
  • 18. eP3 Network Ecosystem has sweeping implications anywhere that privacy and trust matters 18 WebShield Inc. By empowering individuals and eliminating regulatory and commercial barriers to sharing resources, the eP3 Network cross-fertilizes previously disparate markets into a vast exchange and marketplace with a common underlying network of users, devices, computing infrastructure, trust authorities and data sources
  • 19. WebShield Inc. Merit-Based Incentive Payment System Alternative Payment Models OR MACRAMedicare Access and CHIP Reauthorization Act Moonshot to Cure Cancer Veterans Access Choice and Accountability Act fraud & abuse 19 eP3 Network for Personalized Healthcare
  • 20. Patient20 Hospital Radiology Imaging Center Labs Skilled Nursing Facility Pharmacy Genomics Consumer Devices & Apps Healthcare Clearinghouses Clinic Research Institutions Commercial Payers Federal Agencies Privacy Network Patient-Centered Health - On-demand, Privacy-Preserving, National Scale • comprehensive patient-centered longitudinal records • personalized care management & cost, quality and safety metrics • personalized prior authorization / pre-cert / e-referral management • patient-centered secure messaging, data access and care coordination • forgery proof audit trails, virtual audits, automated pre-emptive fraud prevention WebShield Inc.
  • 21. Patient21 Hospital Radiology Imaging Center Labs Skilled Nursing Facility Pharmacy Carebox VisionTree Genomics Consumer Devices & Apps Healthcare Clearinghouses Clinic Research Institutions Consumer Directed Exchange Network Commercial Payers Federal Agencies Identity and Authorization OpenID Connect OAuth 2.0, SAML UMA (User Managed Access) POET (Pre-OAuth Entity Trust) HEART Profile Data Exchange FHIR Direct Messaging eHealth Exchange Blue Button Privacy Network Open Standards WebShield Inc.
  • 22. web phone email tablet Privacy Network 22 Preemptive Fraud and Abuse Prevention • better identity screening and surveillance keeps “bad” guys out • forgery-proof audit trails keeps “good” guys honest and productive • analytics “connects dots” better, detects fraud and abuse before delivery or payment • Pre-payment Virtual Audits are self-funding, effective, fair, scalable • Trusted Provider Fast Track builds compliance into care coordination, flags and deters inappropriate utilization before it happens WebShield Inc.
  • 23. eP3 Network for Consumer Online and e-Commerce • Vastly better privacy and security for consumers, dramatically greater revenue for industry. • Privacy-preserving global single-sign-on and 1-click “Buy Button” enables trusted social commerce via any messaging client, social media app or website. • Precision anonymous personalization increases advertising revenue yield 500%+, opens new markets in personalized services and cross-organizational process optimization. • User-centric syndication gives consumers convenient access to content they want on any device at any time, while doubling online revenue for content owners. 23 WebShield Inc. Eliminating the conflict between privacy and personalization has sweeping implications
  • 24. Privacy Network Buy Season Pass $19.99 Watch Ad-Free for $1.99 Watch Free with Ads * Brands shown are for illustration only Watch Free with Ads Accept Privacy Protection Show Policies The Privacy Network uses information about you to authorize access to content, protect you from identity theft, and to enforce privacy policies on the use of your information and files. Cancel explain 1-click Privacy Protection opt-in First-time users must opt-in to privacy and cybersecurity protection in order to access protected content (e.g. a football game). Opt-in authorizes use of fully obfuscated data in order to anonymously: • authenticate user and verify attributes and relationships. • detect and verify user devices. • analyze obfuscated activity logs to detect identity theft & cyber-security fraud. • locate and authorize access to user’s records, accounts and digital media. • authorize 1-click payments. • enforce security, privacy and personalization policies of user and other stakeholders. better privacy, better security, better personalization • robust identity theft protection with multi-factor authentication, identity proofing and cyber-fraud detection. • user’s identity and personal data hidden from advertisers, content owners, apps and websites. • all user data and activity logging fully obfuscated and anonymised – no insider access by anyone. • personal information only revealed if authorized by user. • all payments information fully tokenized. The Privacy Network eliminates the conflict between privacy, personalization and convenience WebShield Inc.24
  • 25. Proving authorization without revealing any personal information to anyone Privacy Network Buy Season Pass $19.99 Watch Ad-Free for $1.99 Watch Free with Ads * Brands shown are for illustration only Watch Free with Ads Commercial Credit Bureaus Phone RegistriesProfessional Licensing Marketing Profiles Data Aggregators Fraud Analytics Enterprise Healthcare Records Security DirectoriesEmployer HR Retailer Affinity ProgramsSupply- Chain Insurance Databases Banking Records` CRM ERP Government Education Records Public Records DMV Records State & Local Records IRS Records Social Security Citizenship & Immigration Healthcare Data Sources (3) virtual database of obfuscated and anonymised data used to verify user’s identity, authorize access and derive authentication options. Accept Privacy Protection Show Policies Cancel explain Text my Cell Send me Email your phone your email- or - The Privacy Network does not recognize this device. To authorize access, please enter one of the following: other options verify device(415) 265-3250 verify device (Y4t) rG2-Ua91 xRs4Mw42dAk baX3yPEq7Nm (6) obfuscated log entries returned (5) User authenticated, which in turn: • verifies identity, authorizes access • validates privacy protection opt-in • registers device to enable subsequent no-login access and 1-click buy no personal information revealed to anyone E9ts S120Ls7V xRs4Mw42dAk baX3yPEq7Nm phone voice print password Authentication Services device fingerprint email fingerprint facial biometric (4) passes encrypted authentication parameters to neutral authentication services that satisfy authorization requirements. (415) 265-3250 jonathan.hare@me.com FaceBookID 2335135 Trust Authorities Y4trG2-Ua91 (2) attributes are obfuscated and anonymised by Privacy Network and submitted to Trust Authorities. Anonymised & Obfuscated Data Obfuscated Computation Unified Trust Model WebShield Inc.25 (1) for first-time users and unrecognized devices, user enters any attribute (phone, email, etc.) that specifies their identity.
  • 26. Individual users gain direct control of privacy and personalization policies Privacy Network Buy Season Pass $19.99 Watch Ad-Free for $1.99 Watch Free with Ads * Brands shown are for illustration only Watch Free with Ads Accept Privacy Protection Show Policies Cancel explain • Individuals control personal policies that are enforced globally on records and accounts held by any participating publisher, organization or online service. • Enables consumers to assert their legal rights to access and share their healthcare (HIPAA), educational (FERPA), financial and government records. • Consumer control with neutral governance of security, privacy and access control mitigates regulatory liability of participants. Accept Privacy Protection Show Policies general health education banking children online My Policies edit my polices Jonathan Hare cancel people devices security payments advertising messaging privacy general Retrieve my records for my personal health network: Healthcare providers can access my personal health network: o whenever they are treating me, as long as they are agree to enforce HIPAA. o only if they have my express consent. In an emergency, Emergency Room and Ambulance staff may: o access my complete personal health record network. o access only my critical health information (e.g. allergies, vaccinations, medications). o NOT access my personal health vault, even if my life is in jeopardy. I want to be notified whenever: o anyone accesses my health records. o my records are accessed by someone not on my list of authorized providers. o I do NOT want to be notified – just keep track so I can check later if I want to. Find and request copies of my health records and store them for me. Microsoft HealthVaultStore in: Welcome, Jonathan: You are now being protected by the Privacy Network: 26 WebShield Inc.
  • 27. 1-click purchasing anywhere, without privacy or security risks WebShield Inc. Privacy Network Buy Season Pass $19.99 Watch Ad-Free for $1.99 Watch Free with Ads * Brands shown are for illustration only27 • Embeddable “Buy Button” enables 1-click, no-login purchasing – can be linked to any digital content or online offer. • No need to reveal sensitive identity or credit card information to verify identity, log in, create accounts or authorize payments. • Eliminates identity fraud and cyber-security risks with multi-factor authentication and identity proofing, forgery-proof audit trails, and global ‘privatized’ fraud analytics.
  • 28. Precision-targeted advertising with “perfect privacy” 28 WebShield Inc. Privacy Network Buy Season Pass $19.99 Watch Ad-Free for $1.99 Watch Free with Ads • Enables 500%+ increase in online advertising revenue. • Anonymised advertising networks can be linked directly to any online content. Ads are personalized without login, and delivered via any social network, messaging app or website. • Ad-stream is embedded in content and can’t be detected or blocked by ad-blockers or non-participating websites or apps. * Brands shown are for illustration only
  • 29. Global single-sign-on – 1-click access on any registered user device, for any online content 29 WebShield Inc. Any Device Privacy Network • 1-click access to all purchases, subscriptions and ad-supported content from any participating retailers and publishers, on any user devices. • Devices can be provisioned on demand without remembering account names or passwords or revealing any sensitive information. • Seamless digital library management across all retailers and publishers. * Brands shown are for illustration only
  • 30. Any Device Any Online Channel User-centric social commerce and content distribution Privacy Network Buy Episode 1 $1.99 Buy Season 1 $15.99 Watch Free with Ads Hi, Jonathan My Policies Protected by Privacy Network Watch Free with Ads 30 WebShield Inc.* Brands shown are for illustration only • Digital content and e-commerce offers can be freely distributed through any social media apps, messaging clients or websites. • Digital content (and embedded ads) can be dynamically personalized without requiring user login or revealing any sensitive information to anyone. • Branded “Buy” or “Subscribe” buttons and advertising networks can be embedded in any online content, offering owners multi-channel distribution without losing control.
  • 31. Any Device Any Online Channel User-Centric Syndication: consumers create their own personal entertainment networks Privacy Network Any Content Movies Videos Games Digital Media Messaging Files TV Music Web Sites WebShield Inc.31 * Brands shown are for illustration only • Content owners more than double their online revenues via precision targeted anonymous ads, free social marketing, and frictionless conversion into purchases and paid subscriptions. • Consumers choose their own personal bundle of free ad-supported viewing, paid subscriptions and paid on-demand or purchases. • Online channels incorporate Privacy Network services to deliver faster performance and “native” user experience in exchange for a share of advertising and commerce revenues.
  • 32. WebShield Inc.32 April eP3 Network Ecosystem Stakeholder Meetings & Events April 25th in Washington DC: • Patient-Centered Data Liquidity and Regulatory Compliance • Sponsored by EHNAC, SAFE BioPharma Association, NH-ISAC April 26th in Washington DC: • Consumer Empowerment and Privacy Protection • Veterans Health, Education and Student Privacy, Child Safety, Identity & Privacy for BlockChain, Legislative Opportunities, etc. • Organized by moderators, speakers from IEEE, Society for Women’s Health, Future of Privacy Forum, Veterans Prostate Cancer Awareness, etc. April 27th - 28th in Washington DC: • Health Datapalooza Start-up Panel, Consumer Directed Exchange Exhibit Hall