SlideShare une entreprise Scribd logo
1  sur  8
Security and privacy
Background
 webinos creates networks of personal
  devices and exposes them to web
  applications.
  – Potential attack vector for malware
  – Potential for a loss of privacy
 webinos must be designed to protect
  stakeholders (primarily users) and be
  implemented securely
This presentation
1. Goals for security and privacy in webinos
2. Focus on:
  1. One device
  2. The personal zone
  3. Inter-user security and privacy
3. Conclusions and future directions
Goals
1. Protect user data, devices and services
2. Balance security mechanisms against
   control and freedom
3. Provide a consistent user experience
4. Allow for management of applications,
   data and devices
5. Take into consideration other
   stakeholders
Security and privacy on
one device
 API access mediated by an XACML-based
  security policy architecture
  – Based on WAC and BONDI
  – Extended for multi-device scenarios
  – Extended with privacy controls (TBD)
 Application signing
  – Widgets – based on WAC and W3C
    drafts/standards
  – Websites – SSL certificates
 Local authentication
Personal zones
 Device authentication
    – Public key infrastructure for every device
    – PZH acts as a certificate authority
    – Enrolment of new devices
   Secure communication
   OpenID authentication of users
   Policy synchronisation
   PZH interface to manage zones
Communication between
users
 Personal zones can be bridged for inter-
  user communication
 Authentication
  – User identity expressed through OpenID /
    WebFinger / social network
  – Enables certificate exchange
 Authorisation
  – Policies mediate access to APIs and services
Conclusion
 Consistent, straightforward security
  framework
 Building on existing work, introducing
  personal zones
 In the future:
  – Interfaces
  – Better privacy management, expression
  – Integration of secure hardware?
  – More tools for users and developers

Contenu connexe

Tendances

cisco security training
cisco security trainingcisco security training
cisco security trainingqosnetworking
 
Security Architecture
Security ArchitectureSecurity Architecture
Security ArchitectureJoben Domingo
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructureKerry Cole
 
Generic threats to mobile application
Generic threats to mobile applicationGeneric threats to mobile application
Generic threats to mobile applicationVikrant Kansal
 
Mule anypointenterprisesecurity
Mule anypointenterprisesecurityMule anypointenterprisesecurity
Mule anypointenterprisesecurityhimajareddys
 
Ip securtiy ppt N.PRAMEELA II MSC COMPUTER SCIENCE BON SECOUR
Ip securtiy ppt N.PRAMEELA II MSC COMPUTER SCIENCE BON SECOURIp securtiy ppt N.PRAMEELA II MSC COMPUTER SCIENCE BON SECOUR
Ip securtiy ppt N.PRAMEELA II MSC COMPUTER SCIENCE BON SECOURprameelapramee
 
Multilevel
MultilevelMultilevel
MultilevelRee Tu
 
Cloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challengesCloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challengesVaibhav Khanna
 
A New Research and Design for Grid Portal Security System
A New Research and Design for Grid Portal Security SystemA New Research and Design for Grid Portal Security System
A New Research and Design for Grid Portal Security Systemijfcstjournal
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanismspriya_trehan
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhyasandeepsandy75
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)ijfcst journal
 
Mule anypoint enterprise security
Mule anypoint enterprise securityMule anypoint enterprise security
Mule anypoint enterprise securityD.Rajesh Kumar
 
Anypoint enterprise security
Anypoint enterprise securityAnypoint enterprise security
Anypoint enterprise securityD.Rajesh Kumar
 
Duo MFA integration with CoinJar Bitcoin Wallet
Duo MFA integration with CoinJar Bitcoin WalletDuo MFA integration with CoinJar Bitcoin Wallet
Duo MFA integration with CoinJar Bitcoin WalletAmir Yunas
 

Tendances (20)

Electronic Security
Electronic SecurityElectronic Security
Electronic Security
 
Data encryption-ciphers
Data encryption-ciphersData encryption-ciphers
Data encryption-ciphers
 
Security
SecuritySecurity
Security
 
cisco security training
cisco security trainingcisco security training
cisco security training
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
Generic threats to mobile application
Generic threats to mobile applicationGeneric threats to mobile application
Generic threats to mobile application
 
Mule anypointenterprisesecurity
Mule anypointenterprisesecurityMule anypointenterprisesecurity
Mule anypointenterprisesecurity
 
Ip securtiy ppt N.PRAMEELA II MSC COMPUTER SCIENCE BON SECOUR
Ip securtiy ppt N.PRAMEELA II MSC COMPUTER SCIENCE BON SECOURIp securtiy ppt N.PRAMEELA II MSC COMPUTER SCIENCE BON SECOUR
Ip securtiy ppt N.PRAMEELA II MSC COMPUTER SCIENCE BON SECOUR
 
Multilevel
MultilevelMultilevel
Multilevel
 
Cloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challengesCloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challenges
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
A New Research and Design for Grid Portal Security System
A New Research and Design for Grid Portal Security SystemA New Research and Design for Grid Portal Security System
A New Research and Design for Grid Portal Security System
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Network security by sandhya
Network security by sandhyaNetwork security by sandhya
Network security by sandhya
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Ijisa
IjisaIjisa
Ijisa
 
Mule anypoint enterprise security
Mule anypoint enterprise securityMule anypoint enterprise security
Mule anypoint enterprise security
 
Anypoint enterprise security
Anypoint enterprise securityAnypoint enterprise security
Anypoint enterprise security
 
Duo MFA integration with CoinJar Bitcoin Wallet
Duo MFA integration with CoinJar Bitcoin WalletDuo MFA integration with CoinJar Bitcoin Wallet
Duo MFA integration with CoinJar Bitcoin Wallet
 

En vedette

IoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - LyleIoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - Lylewebinos project
 
webinos Architecture Overview
webinos Architecture Overviewwebinos Architecture Overview
webinos Architecture Overviewwebinos project
 
iotmashup - Webinos architecture 101 - baldwin
iotmashup - Webinos architecture 101 - baldwiniotmashup - Webinos architecture 101 - baldwin
iotmashup - Webinos architecture 101 - baldwinwebinos project
 
IoT Mashup - Webinos architecture 101 - Baldwin
IoT Mashup - Webinos architecture 101 - BaldwinIoT Mashup - Webinos architecture 101 - Baldwin
IoT Mashup - Webinos architecture 101 - Baldwinwebinos project
 
iotmashup - intro - allott
iotmashup - intro - allottiotmashup - intro - allott
iotmashup - intro - allottwebinos project
 
IoT Mashup - webinos APIs - Nilsson
IoT Mashup - webinos APIs - NilssonIoT Mashup - webinos APIs - Nilsson
IoT Mashup - webinos APIs - Nilssonwebinos project
 
webinos - Architecture and Strategy
webinos  - Architecture  and Strategywebinos  - Architecture  and Strategy
webinos - Architecture and Strategywebinos project
 
webinos Use Cases - Open Day
webinos Use Cases - Open Daywebinos Use Cases - Open Day
webinos Use Cases - Open Daywebinos project
 
webinos and Open Ecosystems Open Governance
webinos and Open Ecosystems Open Governancewebinos and Open Ecosystems Open Governance
webinos and Open Ecosystems Open Governancewebinos project
 
IoT Mashup - webinos iot and m2m - Allott
IoT Mashup - webinos iot and m2m - AllottIoT Mashup - webinos iot and m2m - Allott
IoT Mashup - webinos iot and m2m - Allottwebinos project
 
IoT Mashup - Webinos iot-2013-07-23 Raggett
IoT Mashup - Webinos iot-2013-07-23 RaggettIoT Mashup - Webinos iot-2013-07-23 Raggett
IoT Mashup - Webinos iot-2013-07-23 Raggettwebinos project
 
iotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottiotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottwebinos project
 
webinos Open Day Introduction
webinos Open Day Introductionwebinos Open Day Introduction
webinos Open Day Introductionwebinos project
 
[Hello world]git internal
[Hello world]git internal[Hello world]git internal
[Hello world]git internalNAVER D2
 

En vedette (18)

IoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - LyleIoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - Lyle
 
webinos Architecture Overview
webinos Architecture Overviewwebinos Architecture Overview
webinos Architecture Overview
 
iotmashup - Webinos architecture 101 - baldwin
iotmashup - Webinos architecture 101 - baldwiniotmashup - Webinos architecture 101 - baldwin
iotmashup - Webinos architecture 101 - baldwin
 
IoT Mashup - Webinos architecture 101 - Baldwin
IoT Mashup - Webinos architecture 101 - BaldwinIoT Mashup - Webinos architecture 101 - Baldwin
IoT Mashup - Webinos architecture 101 - Baldwin
 
iotmashup - intro - allott
iotmashup - intro - allottiotmashup - intro - allott
iotmashup - intro - allott
 
IoT Mashup - webinos APIs - Nilsson
IoT Mashup - webinos APIs - NilssonIoT Mashup - webinos APIs - Nilsson
IoT Mashup - webinos APIs - Nilsson
 
webinos - Architecture and Strategy
webinos  - Architecture  and Strategywebinos  - Architecture  and Strategy
webinos - Architecture and Strategy
 
webinos Use Cases - Open Day
webinos Use Cases - Open Daywebinos Use Cases - Open Day
webinos Use Cases - Open Day
 
webinos APIs
webinos APIswebinos APIs
webinos APIs
 
webinos and Open Ecosystems Open Governance
webinos and Open Ecosystems Open Governancewebinos and Open Ecosystems Open Governance
webinos and Open Ecosystems Open Governance
 
IoT Mashup - webinos iot and m2m - Allott
IoT Mashup - webinos iot and m2m - AllottIoT Mashup - webinos iot and m2m - Allott
IoT Mashup - webinos iot and m2m - Allott
 
Iot mashup intro
Iot mashup introIot mashup intro
Iot mashup intro
 
IoT Mashup - Webinos iot-2013-07-23 Raggett
IoT Mashup - Webinos iot-2013-07-23 RaggettIoT Mashup - Webinos iot-2013-07-23 Raggett
IoT Mashup - Webinos iot-2013-07-23 Raggett
 
IoT Mashup - Welcome
IoT Mashup - WelcomeIoT Mashup - Welcome
IoT Mashup - Welcome
 
iotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottiotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allott
 
webinos Open Day Introduction
webinos Open Day Introductionwebinos Open Day Introduction
webinos Open Day Introduction
 
[Hello world]git internal
[Hello world]git internal[Hello world]git internal
[Hello world]git internal
 
Getting Git
Getting GitGetting Git
Getting Git
 

Similaire à webinos Security privacy

FIA Dublin Presentations: The role of APIs in exposing cross-device functiona...
FIA Dublin Presentations: The role of APIs in exposing cross-device functiona...FIA Dublin Presentations: The role of APIs in exposing cross-device functiona...
FIA Dublin Presentations: The role of APIs in exposing cross-device functiona...openi_ict
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhdVAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhdVAIBHAVSAHU55
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
FIWARE Overview of Generic Enablers
FIWARE Overview of Generic EnablersFIWARE Overview of Generic Enablers
FIWARE Overview of Generic EnablersMiguel González
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
Datasheet over privileged_users
Datasheet over privileged_usersDatasheet over privileged_users
Datasheet over privileged_usersCristian Garcia G.
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsPalani Kumar
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application PlatformNugroho Gito
 
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...Pôle Systematic Paris-Region
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
 

Similaire à webinos Security privacy (20)

FIA Dublin Presentations: The role of APIs in exposing cross-device functiona...
FIA Dublin Presentations: The role of APIs in exposing cross-device functiona...FIA Dublin Presentations: The role of APIs in exposing cross-device functiona...
FIA Dublin Presentations: The role of APIs in exposing cross-device functiona...
 
Sangfor SSL VPN Datasheet
Sangfor SSL VPN DatasheetSangfor SSL VPN Datasheet
Sangfor SSL VPN Datasheet
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhdVAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
FIWARE Generic Enablers introduction
FIWARE Generic Enablers introductionFIWARE Generic Enablers introduction
FIWARE Generic Enablers introduction
 
FIWARE Overview of Generic Enablers
FIWARE Overview of Generic EnablersFIWARE Overview of Generic Enablers
FIWARE Overview of Generic Enablers
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Datasheet over privileged_users
Datasheet over privileged_usersDatasheet over privileged_users
Datasheet over privileged_users
 
IT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_ChannelsIT8005_EC_Unit_III_Securing_Communication_Channels
IT8005_EC_Unit_III_Securing_Communication_Channels
 
Firewalls
FirewallsFirewalls
Firewalls
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
Cloud
CloudCloud
Cloud
 
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
 
Another proposal
Another proposalAnother proposal
Another proposal
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 

Dernier

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Dernier (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

webinos Security privacy

  • 2. Background  webinos creates networks of personal devices and exposes them to web applications. – Potential attack vector for malware – Potential for a loss of privacy  webinos must be designed to protect stakeholders (primarily users) and be implemented securely
  • 3. This presentation 1. Goals for security and privacy in webinos 2. Focus on: 1. One device 2. The personal zone 3. Inter-user security and privacy 3. Conclusions and future directions
  • 4. Goals 1. Protect user data, devices and services 2. Balance security mechanisms against control and freedom 3. Provide a consistent user experience 4. Allow for management of applications, data and devices 5. Take into consideration other stakeholders
  • 5. Security and privacy on one device  API access mediated by an XACML-based security policy architecture – Based on WAC and BONDI – Extended for multi-device scenarios – Extended with privacy controls (TBD)  Application signing – Widgets – based on WAC and W3C drafts/standards – Websites – SSL certificates  Local authentication
  • 6. Personal zones  Device authentication – Public key infrastructure for every device – PZH acts as a certificate authority – Enrolment of new devices  Secure communication  OpenID authentication of users  Policy synchronisation  PZH interface to manage zones
  • 7. Communication between users  Personal zones can be bridged for inter- user communication  Authentication – User identity expressed through OpenID / WebFinger / social network – Enables certificate exchange  Authorisation – Policies mediate access to APIs and services
  • 8. Conclusion  Consistent, straightforward security framework  Building on existing work, introducing personal zones  In the future: – Interfaces – Better privacy management, expression – Integration of secure hardware? – More tools for users and developers

Notes de l'éditeur

  1. Notes:Primarily protecting against malware and malicious usersWe don’t want to put users at the risk of malware, but we don’t want to create a closed system like AppleUsability:An advantage webinos has is that it can present the same controls and interfaces across different devices. We’re still working on what these will be, but having a common policy model will be essential. Furthemore, the common policy model means users only need to define things once in some casesWe’ve implemented various design techniques to elicit misuse cases and misusability cases, which we hope will help us align user goals and security and privacy issuesInter-user, inter-device and inter-application communication can be managed. Management can be done on the most suitable device. Remote management of settings plannedIt would be easy to say ‘no’ to things like analytics, payment, etc. However, we’re trying to make a pragmatic system which provides a sensible trade-off.
  2. OpenID Authentication – users authenticate by logging into their PZH through an OpenID provider. This avoids the need for any new passwords or identities for those users (we hope). It also provides a means for users to authentication outside of the personal zone.