SlideShare une entreprise Scribd logo
1  sur  30
Télécharger pour lire hors ligne
Take control of your Personal Data
                         User-Managed Access (UMA)

                               Domenico Catalano


                                 22 June 2012




                                       1

Wednesday, June 27, 12
Agenda


                         Today’s Challenges
                         UMA Concepts and Benefits
                         Use cases
                         SmartAM.org Project
                         Trust Model
                         Q&A

                                               2

Wednesday, June 27, 12
Digital life

  “Everything
         you do in life
         leads to a
         digital slime
         trail"
       Boudreau, J. (2011, July 7). Pondering effects of the data deluge. The Los Angeles Times.   3
Wednesday, June 27, 12
Today’s Challenges



                   • Social Network
                   • Emerging Personal Cloud, PDS
                   • Participatory Personal data

                                       4
Wednesday, June 27, 12
Data Sharing in the Internet

                                                                     Are you in Control
                                                                     of your
                                                                     Personal Data?


                       What do
                    People Share
                         online?
       http://iservice-europa.eu/dataprotectionreform_infographic/     5
Wednesday, June 27, 12
Emerging Personal Data Store
                                                                                         A Cloud Service for storing
                                                                                                   personal life bits


                                                                                               Under the complete
                                                                                             control of an individual


                                                                                               Provide portability of
                                                                                           personal data across PDS



     http://www.ftc.gov/bcp/workshops/privacyroundtables/personalDataEcosystem.pdf   6
Wednesday, June 27, 12
Participatory Personal Data
                      • Participatory personal
                               data refers to aggregation
                               of representations of
                               measurements collected
                               by people, about people.
                      • These data are part of a
                               coordinated activity;
                      • Captured, processed,
                               analyzed, displayed and
                               shared.
      Participatory Personal Data:
      An Emerging Research Challenge for the Information Sciences   7
Wednesday, June 27, 12
Agenda


                         Introduction and Business Driver
                         UMA Concepts and Benefits
                         Use cases
                         SmartAM.org Project
                         Trust Model
                         Q&A

                                                 8

Wednesday, June 27, 12
Privacy is not about secrecy


“  The goal of a flexible, user-centric identity
   management infrastructure must be to
   allow the user to quickly determine what
   information will be revealed to which
   parties and for what purposes, how
   trustworthy those parties are and how they
   will handle the information, and what the
   consequences of sharing their information
   will be” – Ann Cavoukian, Information and Privacy Commissioner of Ontario,
                                                    Privacy in the Clouds paper




            It’s about context, control, choice, and respect

                                                                 9

Wednesday, June 27, 12
UMA enables
 you to manage
 sharing and
 protect access
 from a single
 hub




                         10
Wednesday, June 27, 12
UMA enables
 you to manage
 sharing and
 protect access
 from a single
 hub
   Historical
   Biographical
   Reputation
   Vocational
   Artistic/user-generated
   Social
   Location/geolocation
   Computational
   Genealogical
   Biological/health
   Legal
   ...
                             10
Wednesday, June 27, 12
UMA enables                      I want to share this stuff
                                  selectively!
 you to manage                    •Among my own apps
                                  •With family and friends
 sharing and                      •With organizations
 protect access
 from a single
 hub
   Historical
   Biographical
   Reputation
   Vocational
   Artistic/user-generated
   Social
   Location/geolocation
   Computational
   Genealogical
   Biological/health
   Legal
   ...
                             10
Wednesday, June 27, 12
UMA enables                      I want to share this stuff
                                  selectively!
 you to manage                    •Among my own apps
                                  •With family and friends
 sharing and                      •With organizations
 protect access
 from a single                    I want to protect this
                                  stuff from being seen by

 hub                              everyone in the world!


   Historical
   Biographical
   Reputation
   Vocational
   Artistic/user-generated
   Social
   Location/geolocation
   Computational
   Genealogical
   Biological/health
   Legal
   ...
                             10
Wednesday, June 27, 12
UMA is...
                   •     A web protocol that lets you control access by anyone to
                         all your online stuff from one place

                   •     A set of draft specifications, free for anyone to implement

                   •     Undergoing multiple implementation efforts

                   •     A Work Group of the Kantara Initiative, free for anyone
                         to join and contribute to

                   •     Simple, OAuth-based, identifier-agnostic, RESTful,
                         modular, generative, and developed rapidly

                   •     Contributed to the IETF for consideration:
                         draft-hardjono-oauth-umacore
                   •     Currently undergoing interop testing and increased
                         OpenID Connect integration
          tinyurl.com/umawg                       11

Wednesday, June 27, 12
UMA and Privacy Controls benefits




                                        12
Wednesday, June 27, 12
UMA and Privacy Controls benefits
                             •Subject registers the resource which is collecting the personal
                              data with a centralized Authorization Manager.
                             •It allows to maintain a centralized view of what data is being
                              collected.




                                                  12
Wednesday, June 27, 12
UMA and Privacy Controls benefits
                             •Subject registers the resource which is collecting the personal
                              data with a centralized Authorization Manager.
                             •It allows to maintain a centralized view of what data is being
                              collected.


                             •Individuals are an active part of defining the how the personal
                              information will be handled in the data sharing process.
                             •A sharing policy (or connection) defines for what purposes
                              personal data is shared.
                             •Possibility to disable or cancel any connection at any time.




                                                  12
Wednesday, June 27, 12
UMA and Privacy Controls benefits
                             •Subject registers the resource which is collecting the personal
                              data with a centralized Authorization Manager.
                             •It allows to maintain a centralized view of what data is being
                              collected.


                             •Individuals are an active part of defining the how the personal
                              information will be handled in the data sharing process.
                             •A sharing policy (or connection) defines for what purposes
                              personal data is shared.
                             •Possibility to disable or cancel any connection at any time.

                             •Policy Enforcement Point at Host site allows to intercept any
                              request to access to personal data.
                             •Explicit User consent.
                             •Trusted Claims allow to discriminate the Requesting Party.
                                                  12
Wednesday, June 27, 12
Maintain control on Information that will
                               be revealed

                                                               Prof                  Class


                                                                University                               Business

                                               Friend                                Personal Data
                                                            Collab                                   Professional MySelf

                                         ProjectA
                                                                        Self-Registration


                                                                                                MySelf




                         Human Interface study for SmartAM at Newcastle University




                                                                                      13
Wednesday, June 27, 12
Protecting electronic health records

                                                               Hospital
                                                                                                 Laboratory
                                                                                                 Research




                                                Partner                    AM
                                                                                                              Contact
                                                                                                              Center

                                        Diagnostic
                                                                                    Healthcare
                                                                                     Provider


           EHRs need high security and
           third-party access and dynamic
           introduction of parties.
                                                                          Patient




        http://www.projecthdata.org/                      14
Wednesday, June 27, 12
Agenda


                         Introduction and Business Driver
                         UMA Concepts and Benefits
                         Use cases
                         SmartAM Project
                         Trust Model
                         Q&A

                                                 15

Wednesday, June 27, 12
SmartAM Project
                   • User-Managed Access in Higher Education -
                         Project conducted at Newcastle University.
                   • Reference UMA Implementation in Java.
                   • Smart Authorization Manager.
                   • UMA/j and PUMA (Python) framework for
                         building UMA-enabled application.
                   • To be deployed at Newcastle and integrated
                         with UK Federation.
                   • https://smartjisc.wordpress.com
                                               16
Wednesday, June 27, 12
The SMARTAM project




                         See also the SMARTAM implementation FAQ
          tinyurl.com/umawg                17
Wednesday, June 27, 12
The SMARTAM project




                                                The “Polish Gang of Four”...plus one


                         See also the SMARTAM implementation FAQ
          tinyurl.com/umawg                17
Wednesday, June 27, 12
Agenda


                         Introduction and Business Driver
                         UMA Concepts and Benefits
                         Use cases
                         SmartAM.org Project
                         Trust Model
                         Q&A

                                                 18

Wednesday, June 27, 12
Trust in a distributed Authorization
                                        System

            Build a trusted
            ecosystem among                                                                    UMA Trust Model
            Individual, Service                                                                http://tinyurl/umatrust
            Providers and
            Requester
            services.                       Requester
                             (on behalf of Requesting Party)             Access
                                                                                            Host



                                                                        Authorizing
                                                                           User
                                                               Au




                                                                                       ct
                                                               tho




                                                                                      ote
                                                                ri z




                                                                                      Pr
                                                                    e




                                                                           AM




                                                                            19
Wednesday, June 27, 12
Trust in a distributed Authorization
                                        System

            Build a trusted
            ecosystem among                                                                            UMA Trust Model
            Individual, Service                                                                        http://tinyurl/umatrust
            Providers and
            Requester
            services.                       Requester
                             (on behalf of Requesting Party)             Access
                                                                                                  Host



                                                                        Authorizing
                                                                           User
                                                               Au




                                                                                       ct
                                                               tho




                                                                                      ote
                                                                ri z




                                                                                      Pr

                                                                                            Registration
                                                                    e




                                                                           AM                                  Trustworthiness
                                                                                                               Accreditation System




                                                                            19
Wednesday, June 27, 12
Trust in a distributed Authorization
                                         System

            Build a trusted
            ecosystem among                                                                                              UMA Trust Model
            Individual, Service                                                                                          http://tinyurl/umatrust
            Providers and
            Requester
            services.                                     Requester
                                           (on behalf of Requesting Party)                 Access
                                                                                                                    Host



                                                                                          Authorizing
                                                                                             User
                                                                                 Au




                                                                                                         ct
                                                                                 tho




                                                                                                        ote
                                                                                  ri z




                                                                                                        Pr

                                                                                                              Registration
                                                                                      e




                                                                Trusted Claims




                         Identity Assurance                                                  AM                                  Trustworthiness
                         Trust Framework                                                                                         Accreditation System
                         ISO 29115




                                                                                              19
Wednesday, June 27, 12
Trust in a distributed Authorization
                                         System
                                                                                          Trust Chain

            Build a trusted
            ecosystem among                                                                                              UMA Trust Model
            Individual, Service                                                                                          http://tinyurl/umatrust
            Providers and
            Requester                                                                     Delegation


            services.                                     Requester
                                           (on behalf of Requesting Party)                 Access
                                                                                                                    Host



                                                                                          Authorizing
                                                                                             User
                                                                                 Au




                                                                                                         ct
                                                                                 tho




                                                                                                        ote
                                                                                  ri z




                                                                                                        Pr

                                                                                                              Registration
                                                                                      e




                                                                Trusted Claims




                         Identity Assurance                                                  AM                                  Trustworthiness
                         Trust Framework                                                                                         Accreditation System
                         ISO 29115




                                                                                              19
Wednesday, June 27, 12
Thanks
                             Become an UMAnitarian!


                         Thanks to Eve Maler and Maciej Machulak for their assistance




                                                     20

Wednesday, June 27, 12

Contenu connexe

Tendances

Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyersNicole Black
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Updatekantarainitiative
 
Accenture-Informed-Consent-Data-Motion
Accenture-Informed-Consent-Data-MotionAccenture-Informed-Consent-Data-Motion
Accenture-Informed-Consent-Data-MotionSteven Tiell
 
Blockchain & Pharma
Blockchain & PharmaBlockchain & Pharma
Blockchain & PharmaCraig Ford
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
 
Blockchain in Healthcare: An Overview
Blockchain in Healthcare: An OverviewBlockchain in Healthcare: An Overview
Blockchain in Healthcare: An OverviewDebut Infotech
 
A.Schumacher (2017) Blockchain & Healthcare: A Strategy Guide
A.Schumacher (2017) Blockchain & Healthcare:  A Strategy GuideA.Schumacher (2017) Blockchain & Healthcare:  A Strategy Guide
A.Schumacher (2017) Blockchain & Healthcare: A Strategy GuideGalen Growth
 
Blockchain in Healthcare
Blockchain in HealthcareBlockchain in Healthcare
Blockchain in HealthcareBirthVenue
 
Building trust and accountability - the role User Experience design can play ...
Building trust and accountability - the role User Experience design can play ...Building trust and accountability - the role User Experience design can play ...
Building trust and accountability - the role User Experience design can play ...Pistoia Alliance
 
The Pulse of Liquid Health Data
The Pulse of Liquid Health DataThe Pulse of Liquid Health Data
The Pulse of Liquid Health DataBrian Ahier
 
Keynote Session : Emerging Healthcare Tech & Future Security Impact
Keynote Session : Emerging Healthcare Tech & Future Security ImpactKeynote Session : Emerging Healthcare Tech & Future Security Impact
Keynote Session : Emerging Healthcare Tech & Future Security ImpactPriyanka Aash
 
Top 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare securityTop 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare securityBlockchain Council
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 kantarainitiative
 
Blockchain + Healthcare Innovation
Blockchain + Healthcare Innovation Blockchain + Healthcare Innovation
Blockchain + Healthcare Innovation Jeff Brandt
 
Developing a Healthcare Blockchain Solution
Developing a Healthcare Blockchain SolutionDeveloping a Healthcare Blockchain Solution
Developing a Healthcare Blockchain SolutionLeewayHertz
 
My Data - A Nordic Model for human-centered personal data management and proc...
My Data - A Nordic Model for human-centered personal data management and proc...My Data - A Nordic Model for human-centered personal data management and proc...
My Data - A Nordic Model for human-centered personal data management and proc...Joonas Pekkanen
 
How to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHow to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHellmuth Broda
 

Tendances (20)

Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Update
 
Accenture-Informed-Consent-Data-Motion
Accenture-Informed-Consent-Data-MotionAccenture-Informed-Consent-Data-Motion
Accenture-Informed-Consent-Data-Motion
 
Blockchain & Pharma
Blockchain & PharmaBlockchain & Pharma
Blockchain & Pharma
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 
Blockchain in Healthcare: An Overview
Blockchain in Healthcare: An OverviewBlockchain in Healthcare: An Overview
Blockchain in Healthcare: An Overview
 
A.Schumacher (2017) Blockchain & Healthcare: A Strategy Guide
A.Schumacher (2017) Blockchain & Healthcare:  A Strategy GuideA.Schumacher (2017) Blockchain & Healthcare:  A Strategy Guide
A.Schumacher (2017) Blockchain & Healthcare: A Strategy Guide
 
Blockchain in Healthcare
Blockchain in HealthcareBlockchain in Healthcare
Blockchain in Healthcare
 
Building trust and accountability - the role User Experience design can play ...
Building trust and accountability - the role User Experience design can play ...Building trust and accountability - the role User Experience design can play ...
Building trust and accountability - the role User Experience design can play ...
 
The Pulse of Liquid Health Data
The Pulse of Liquid Health DataThe Pulse of Liquid Health Data
The Pulse of Liquid Health Data
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
Keynote Session : Emerging Healthcare Tech & Future Security Impact
Keynote Session : Emerging Healthcare Tech & Future Security ImpactKeynote Session : Emerging Healthcare Tech & Future Security Impact
Keynote Session : Emerging Healthcare Tech & Future Security Impact
 
IoT healthcare monitoring using blockchain
IoT healthcare monitoring using blockchainIoT healthcare monitoring using blockchain
IoT healthcare monitoring using blockchain
 
Top 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare securityTop 10 companies using blockchain for healthcare security
Top 10 companies using blockchain for healthcare security
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016
 
Blockchain + Healthcare Innovation
Blockchain + Healthcare Innovation Blockchain + Healthcare Innovation
Blockchain + Healthcare Innovation
 
Developing a Healthcare Blockchain Solution
Developing a Healthcare Blockchain SolutionDeveloping a Healthcare Blockchain Solution
Developing a Healthcare Blockchain Solution
 
My Data - A Nordic Model for human-centered personal data management and proc...
My Data - A Nordic Model for human-centered personal data management and proc...My Data - A Nordic Model for human-centered personal data management and proc...
My Data - A Nordic Model for human-centered personal data management and proc...
 
How to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' DataHow to Organize Patient Information to Protect Patients' Data
How to Organize Patient Information to Protect Patients' Data
 
180926 ihan webinar 2
180926 ihan webinar 2180926 ihan webinar 2
180926 ihan webinar 2
 

En vedette

Microsoft® Outlook® Tips Hints For Admins
Microsoft® Outlook® Tips Hints For AdminsMicrosoft® Outlook® Tips Hints For Admins
Microsoft® Outlook® Tips Hints For Adminspses12
 
Open badgesmarch2014
Open badgesmarch2014Open badgesmarch2014
Open badgesmarch2014Martin Cooke
 
Tep business planning in tourism
Tep   business planning in tourismTep   business planning in tourism
Tep business planning in tourismled4lgus
 
Comandos spanning tree
Comandos spanning treeComandos spanning tree
Comandos spanning tree1 2d
 
Dating Pro Installation Instructions
Dating Pro Installation InstructionsDating Pro Installation Instructions
Dating Pro Installation InstructionsPilot Group Ltd
 
Web application security for java (XSS,Session Fixation)
Web application security for java (XSS,Session Fixation)Web application security for java (XSS,Session Fixation)
Web application security for java (XSS,Session Fixation)Ritesh Raushan
 
Newsletter nr 11_noiembrie_2014
Newsletter nr 11_noiembrie_2014Newsletter nr 11_noiembrie_2014
Newsletter nr 11_noiembrie_2014Vochescu Alexandru
 
SolarWinds Mobile Admin: A Powerful Productivity Tool for Your Whole Team
SolarWinds Mobile Admin: A Powerful Productivity Tool for Your Whole TeamSolarWinds Mobile Admin: A Powerful Productivity Tool for Your Whole Team
SolarWinds Mobile Admin: A Powerful Productivity Tool for Your Whole TeamSolarWinds
 
Introduction of flying - Chapter 1
Introduction of flying - Chapter 1Introduction of flying - Chapter 1
Introduction of flying - Chapter 1junio_oliveira
 
How to Trace an E-mail Part 2
How to Trace an E-mail Part 2How to Trace an E-mail Part 2
How to Trace an E-mail Part 2Lebowitzcomics
 
ARIN 36 Registration Services Report
ARIN 36 Registration Services ReportARIN 36 Registration Services Report
ARIN 36 Registration Services ReportARIN
 

En vedette (20)

Microsoft® Outlook® Tips Hints For Admins
Microsoft® Outlook® Tips Hints For AdminsMicrosoft® Outlook® Tips Hints For Admins
Microsoft® Outlook® Tips Hints For Admins
 
Open badgesmarch2014
Open badgesmarch2014Open badgesmarch2014
Open badgesmarch2014
 
2010 DOE Directory
2010 DOE Directory2010 DOE Directory
2010 DOE Directory
 
Tep business planning in tourism
Tep   business planning in tourismTep   business planning in tourism
Tep business planning in tourism
 
Comandos spanning tree
Comandos spanning treeComandos spanning tree
Comandos spanning tree
 
Dating Pro Installation Instructions
Dating Pro Installation InstructionsDating Pro Installation Instructions
Dating Pro Installation Instructions
 
Web application security for java (XSS,Session Fixation)
Web application security for java (XSS,Session Fixation)Web application security for java (XSS,Session Fixation)
Web application security for java (XSS,Session Fixation)
 
Email is Media
Email is MediaEmail is Media
Email is Media
 
Newsletter nr 11_noiembrie_2014
Newsletter nr 11_noiembrie_2014Newsletter nr 11_noiembrie_2014
Newsletter nr 11_noiembrie_2014
 
DNSSEC for Registrars by .ORG & Afilias
DNSSEC for Registrars by .ORG & AfiliasDNSSEC for Registrars by .ORG & Afilias
DNSSEC for Registrars by .ORG & Afilias
 
ROBOTS: SERIAL KILLER BOYDEN GRAY
ROBOTS: SERIAL KILLER BOYDEN GRAYROBOTS: SERIAL KILLER BOYDEN GRAY
ROBOTS: SERIAL KILLER BOYDEN GRAY
 
Innovation & Marketing at 50+
Innovation & Marketing at 50+Innovation & Marketing at 50+
Innovation & Marketing at 50+
 
Test title
Test titleTest title
Test title
 
SolarWinds Mobile Admin: A Powerful Productivity Tool for Your Whole Team
SolarWinds Mobile Admin: A Powerful Productivity Tool for Your Whole TeamSolarWinds Mobile Admin: A Powerful Productivity Tool for Your Whole Team
SolarWinds Mobile Admin: A Powerful Productivity Tool for Your Whole Team
 
USER & USAGE GEO.ADMIN.CH (OKCon 2013)
USER & USAGE GEO.ADMIN.CH (OKCon 2013)USER & USAGE GEO.ADMIN.CH (OKCon 2013)
USER & USAGE GEO.ADMIN.CH (OKCon 2013)
 
Introduction of flying - Chapter 1
Introduction of flying - Chapter 1Introduction of flying - Chapter 1
Introduction of flying - Chapter 1
 
How to Trace an E-mail Part 2
How to Trace an E-mail Part 2How to Trace an E-mail Part 2
How to Trace an E-mail Part 2
 
What is doe level 6
What is doe level 6What is doe level 6
What is doe level 6
 
Educator Effectiveness in Wisconsin (DPI)
Educator Effectiveness in Wisconsin (DPI)Educator Effectiveness in Wisconsin (DPI)
Educator Effectiveness in Wisconsin (DPI)
 
ARIN 36 Registration Services Report
ARIN 36 Registration Services ReportARIN 36 Registration Services Report
ARIN 36 Registration Services Report
 

Similaire à Uma sec council_june_22_v4

The Modern Columbian Exchange: Biovision 2012 Presentation
The Modern Columbian Exchange: Biovision 2012 PresentationThe Modern Columbian Exchange: Biovision 2012 Presentation
The Modern Columbian Exchange: Biovision 2012 PresentationMerck
 
Pratt SILS Knowledge Organization Spring 2010
Pratt SILS Knowledge Organization Spring 2010Pratt SILS Knowledge Organization Spring 2010
Pratt SILS Knowledge Organization Spring 2010PrattSILS
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Lauri Eloranta
 
Repository Federation: Towards Data Interoperability
Repository Federation: Towards Data InteroperabilityRepository Federation: Towards Data Interoperability
Repository Federation: Towards Data InteroperabilityRobert H. McDonald
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingMicah Altman
 
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...summersocialwebshop
 
Creating Impact with Open Data
Creating Impact with Open DataCreating Impact with Open Data
Creating Impact with Open DataePSI Platform
 
Big Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionBig Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionThe Rockefeller Foundation
 
Data Science For Social Good: Tackling the Challenge of Homelessness
Data Science For Social Good: Tackling the Challenge of HomelessnessData Science For Social Good: Tackling the Challenge of Homelessness
Data Science For Social Good: Tackling the Challenge of HomelessnessAnita Luthra
 
Driving Innovation with Knowledge Sharing and Open Data
Driving Innovation with Knowledge Sharing and Open DataDriving Innovation with Knowledge Sharing and Open Data
Driving Innovation with Knowledge Sharing and Open DataJeanne Holm
 
Social Intelligence Systems for Wicked Problems
Social Intelligence Systems for Wicked ProblemsSocial Intelligence Systems for Wicked Problems
Social Intelligence Systems for Wicked ProblemsSimon Buckingham Shum
 
Issues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human BehaviorIssues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human Behaviorgloriakt
 
A Western View of China's Internal and External Innovation Ecosystem - ICT Se...
A Western View of China's Internal and External Innovation Ecosystem - ICT Se...A Western View of China's Internal and External Innovation Ecosystem - ICT Se...
A Western View of China's Internal and External Innovation Ecosystem - ICT Se...Martha Russell
 
Data Policy for Open Science
Data Policy for Open ScienceData Policy for Open Science
Data Policy for Open ScienceMark Parsons
 
Trends in Human-Computer Interaction in Information Seeking
Trends in Human-Computer Interaction in Information SeekingTrends in Human-Computer Interaction in Information Seeking
Trends in Human-Computer Interaction in Information SeekingRich Miller
 
UX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App ServicesUX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App ServicesJunie Kwon
 

Similaire à Uma sec council_june_22_v4 (20)

The Modern Columbian Exchange: Biovision 2012 Presentation
The Modern Columbian Exchange: Biovision 2012 PresentationThe Modern Columbian Exchange: Biovision 2012 Presentation
The Modern Columbian Exchange: Biovision 2012 Presentation
 
Pratt SILS Knowledge Organization Spring 2010
Pratt SILS Knowledge Organization Spring 2010Pratt SILS Knowledge Organization Spring 2010
Pratt SILS Knowledge Organization Spring 2010
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
 
Repository Federation: Towards Data Interoperability
Repository Federation: Towards Data InteroperabilityRepository Federation: Towards Data Interoperability
Repository Federation: Towards Data Interoperability
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
 
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
 
Creating Impact with Open Data
Creating Impact with Open DataCreating Impact with Open Data
Creating Impact with Open Data
 
Big Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for ActionBig Data, Communities and Ethical Resilience: A Framework for Action
Big Data, Communities and Ethical Resilience: A Framework for Action
 
120307 lifelonglearningpotsdam
120307 lifelonglearningpotsdam120307 lifelonglearningpotsdam
120307 lifelonglearningpotsdam
 
Data Science For Social Good: Tackling the Challenge of Homelessness
Data Science For Social Good: Tackling the Challenge of HomelessnessData Science For Social Good: Tackling the Challenge of Homelessness
Data Science For Social Good: Tackling the Challenge of Homelessness
 
Personal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy WorkshopPersonal Data Ecosystem - NSTIC Privacy Workshop
Personal Data Ecosystem - NSTIC Privacy Workshop
 
Driving Innovation with Knowledge Sharing and Open Data
Driving Innovation with Knowledge Sharing and Open DataDriving Innovation with Knowledge Sharing and Open Data
Driving Innovation with Knowledge Sharing and Open Data
 
Social Intelligence Systems for Wicked Problems
Social Intelligence Systems for Wicked ProblemsSocial Intelligence Systems for Wicked Problems
Social Intelligence Systems for Wicked Problems
 
Issues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human BehaviorIssues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human Behavior
 
Internal and External Innovation Ecosystems in China 2.0
Internal and External Innovation Ecosystems in China 2.0Internal and External Innovation Ecosystems in China 2.0
Internal and External Innovation Ecosystems in China 2.0
 
A Western View of China's Internal and External Innovation Ecosystem - ICT Se...
A Western View of China's Internal and External Innovation Ecosystem - ICT Se...A Western View of China's Internal and External Innovation Ecosystem - ICT Se...
A Western View of China's Internal and External Innovation Ecosystem - ICT Se...
 
Data Policy for Open Science
Data Policy for Open ScienceData Policy for Open Science
Data Policy for Open Science
 
Data Policy for Open Science
Data Policy for Open ScienceData Policy for Open Science
Data Policy for Open Science
 
Trends in Human-Computer Interaction in Information Seeking
Trends in Human-Computer Interaction in Information SeekingTrends in Human-Computer Interaction in Information Seeking
Trends in Human-Computer Interaction in Information Seeking
 
UX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App ServicesUX Study on Collective Spatial Intelligence Based Urban App Services
UX Study on Collective Spatial Intelligence Based Urban App Services
 

Dernier

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Dernier (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Uma sec council_june_22_v4

  • 1. Take control of your Personal Data User-Managed Access (UMA) Domenico Catalano 22 June 2012 1 Wednesday, June 27, 12
  • 2. Agenda Today’s Challenges UMA Concepts and Benefits Use cases SmartAM.org Project Trust Model Q&A 2 Wednesday, June 27, 12
  • 3. Digital life “Everything you do in life leads to a digital slime trail" Boudreau, J. (2011, July 7). Pondering effects of the data deluge. The Los Angeles Times. 3 Wednesday, June 27, 12
  • 4. Today’s Challenges • Social Network • Emerging Personal Cloud, PDS • Participatory Personal data 4 Wednesday, June 27, 12
  • 5. Data Sharing in the Internet Are you in Control of your Personal Data? What do People Share online? http://iservice-europa.eu/dataprotectionreform_infographic/ 5 Wednesday, June 27, 12
  • 6. Emerging Personal Data Store A Cloud Service for storing personal life bits Under the complete control of an individual Provide portability of personal data across PDS http://www.ftc.gov/bcp/workshops/privacyroundtables/personalDataEcosystem.pdf 6 Wednesday, June 27, 12
  • 7. Participatory Personal Data • Participatory personal data refers to aggregation of representations of measurements collected by people, about people. • These data are part of a coordinated activity; • Captured, processed, analyzed, displayed and shared. Participatory Personal Data: An Emerging Research Challenge for the Information Sciences 7 Wednesday, June 27, 12
  • 8. Agenda Introduction and Business Driver UMA Concepts and Benefits Use cases SmartAM.org Project Trust Model Q&A 8 Wednesday, June 27, 12
  • 9. Privacy is not about secrecy “ The goal of a flexible, user-centric identity management infrastructure must be to allow the user to quickly determine what information will be revealed to which parties and for what purposes, how trustworthy those parties are and how they will handle the information, and what the consequences of sharing their information will be” – Ann Cavoukian, Information and Privacy Commissioner of Ontario, Privacy in the Clouds paper It’s about context, control, choice, and respect 9 Wednesday, June 27, 12
  • 10. UMA enables you to manage sharing and protect access from a single hub 10 Wednesday, June 27, 12
  • 11. UMA enables you to manage sharing and protect access from a single hub Historical Biographical Reputation Vocational Artistic/user-generated Social Location/geolocation Computational Genealogical Biological/health Legal ... 10 Wednesday, June 27, 12
  • 12. UMA enables I want to share this stuff selectively! you to manage •Among my own apps •With family and friends sharing and •With organizations protect access from a single hub Historical Biographical Reputation Vocational Artistic/user-generated Social Location/geolocation Computational Genealogical Biological/health Legal ... 10 Wednesday, June 27, 12
  • 13. UMA enables I want to share this stuff selectively! you to manage •Among my own apps •With family and friends sharing and •With organizations protect access from a single I want to protect this stuff from being seen by hub everyone in the world! Historical Biographical Reputation Vocational Artistic/user-generated Social Location/geolocation Computational Genealogical Biological/health Legal ... 10 Wednesday, June 27, 12
  • 14. UMA is... • A web protocol that lets you control access by anyone to all your online stuff from one place • A set of draft specifications, free for anyone to implement • Undergoing multiple implementation efforts • A Work Group of the Kantara Initiative, free for anyone to join and contribute to • Simple, OAuth-based, identifier-agnostic, RESTful, modular, generative, and developed rapidly • Contributed to the IETF for consideration: draft-hardjono-oauth-umacore • Currently undergoing interop testing and increased OpenID Connect integration tinyurl.com/umawg 11 Wednesday, June 27, 12
  • 15. UMA and Privacy Controls benefits 12 Wednesday, June 27, 12
  • 16. UMA and Privacy Controls benefits •Subject registers the resource which is collecting the personal data with a centralized Authorization Manager. •It allows to maintain a centralized view of what data is being collected. 12 Wednesday, June 27, 12
  • 17. UMA and Privacy Controls benefits •Subject registers the resource which is collecting the personal data with a centralized Authorization Manager. •It allows to maintain a centralized view of what data is being collected. •Individuals are an active part of defining the how the personal information will be handled in the data sharing process. •A sharing policy (or connection) defines for what purposes personal data is shared. •Possibility to disable or cancel any connection at any time. 12 Wednesday, June 27, 12
  • 18. UMA and Privacy Controls benefits •Subject registers the resource which is collecting the personal data with a centralized Authorization Manager. •It allows to maintain a centralized view of what data is being collected. •Individuals are an active part of defining the how the personal information will be handled in the data sharing process. •A sharing policy (or connection) defines for what purposes personal data is shared. •Possibility to disable or cancel any connection at any time. •Policy Enforcement Point at Host site allows to intercept any request to access to personal data. •Explicit User consent. •Trusted Claims allow to discriminate the Requesting Party. 12 Wednesday, June 27, 12
  • 19. Maintain control on Information that will be revealed Prof Class University Business Friend Personal Data Collab Professional MySelf ProjectA Self-Registration MySelf Human Interface study for SmartAM at Newcastle University 13 Wednesday, June 27, 12
  • 20. Protecting electronic health records Hospital Laboratory Research Partner AM Contact Center Diagnostic Healthcare Provider EHRs need high security and third-party access and dynamic introduction of parties. Patient http://www.projecthdata.org/ 14 Wednesday, June 27, 12
  • 21. Agenda Introduction and Business Driver UMA Concepts and Benefits Use cases SmartAM Project Trust Model Q&A 15 Wednesday, June 27, 12
  • 22. SmartAM Project • User-Managed Access in Higher Education - Project conducted at Newcastle University. • Reference UMA Implementation in Java. • Smart Authorization Manager. • UMA/j and PUMA (Python) framework for building UMA-enabled application. • To be deployed at Newcastle and integrated with UK Federation. • https://smartjisc.wordpress.com 16 Wednesday, June 27, 12
  • 23. The SMARTAM project See also the SMARTAM implementation FAQ tinyurl.com/umawg 17 Wednesday, June 27, 12
  • 24. The SMARTAM project The “Polish Gang of Four”...plus one See also the SMARTAM implementation FAQ tinyurl.com/umawg 17 Wednesday, June 27, 12
  • 25. Agenda Introduction and Business Driver UMA Concepts and Benefits Use cases SmartAM.org Project Trust Model Q&A 18 Wednesday, June 27, 12
  • 26. Trust in a distributed Authorization System Build a trusted ecosystem among UMA Trust Model Individual, Service http://tinyurl/umatrust Providers and Requester services. Requester (on behalf of Requesting Party) Access Host Authorizing User Au ct tho ote ri z Pr e AM 19 Wednesday, June 27, 12
  • 27. Trust in a distributed Authorization System Build a trusted ecosystem among UMA Trust Model Individual, Service http://tinyurl/umatrust Providers and Requester services. Requester (on behalf of Requesting Party) Access Host Authorizing User Au ct tho ote ri z Pr Registration e AM Trustworthiness Accreditation System 19 Wednesday, June 27, 12
  • 28. Trust in a distributed Authorization System Build a trusted ecosystem among UMA Trust Model Individual, Service http://tinyurl/umatrust Providers and Requester services. Requester (on behalf of Requesting Party) Access Host Authorizing User Au ct tho ote ri z Pr Registration e Trusted Claims Identity Assurance AM Trustworthiness Trust Framework Accreditation System ISO 29115 19 Wednesday, June 27, 12
  • 29. Trust in a distributed Authorization System Trust Chain Build a trusted ecosystem among UMA Trust Model Individual, Service http://tinyurl/umatrust Providers and Requester Delegation services. Requester (on behalf of Requesting Party) Access Host Authorizing User Au ct tho ote ri z Pr Registration e Trusted Claims Identity Assurance AM Trustworthiness Trust Framework Accreditation System ISO 29115 19 Wednesday, June 27, 12
  • 30. Thanks Become an UMAnitarian! Thanks to Eve Maler and Maciej Machulak for their assistance 20 Wednesday, June 27, 12