SlideShare une entreprise Scribd logo
1  sur  58
Télécharger pour lire hors ligne
User-Managed Access: key to
Life Management Platform
Domenico Catalano, Oracle Italy	

Maciej Machulak, Cloud Identity Limited	

	

European Identity Conference 2014	

1
Agenda
Personal Data and EmergingTrends	

Life Management Platforms	

UMA Concepts	

Use Cases	

Demo	

Q&A
2
3
What is Personal Data…
Personal Data is the Life Blood of
the Information Age
3
What is Personal Data…
Personal Data is the Life Blood of
the Information Age
3
Personal Data is the New “Oil of
the Internet”
What is Personal Data…
Personal Data is the Life Blood of
the Information Age
3
Personal Data is the New “Oil of
the Internet”
Personal Data is the new currency
What is Personal Data…
Personal Data and new forms of
economic and social value
4
Big Data
Explosive growth
of Personal
Data
New forms
of economic
and social
value
Quantity and quality
Mobile
Computing
Social
Networking
Internet of
THINGS
How to measure the value of
Personal Data
•Market capitalization	

•Revenue per record/user	

•Market Price	

•Cost of data breach	

•Pay to protect
5
Streat address
Data of Birth
Social Number
Military record
0 10 20 30 40
Source: OECD (2013),“Exploring the Economics of Personal Data:A Survey of Methodologies for Measuring MonetaryValue”
$112 per user record
USD 1.7 per record
Data breach cost $171M
USD
Externalities: Socio-economic
impact
•Personal data to avoid duplicative testing/
misdiagnosis, etc., in healthcare.
6
Electronic Health Record
Financial BenefitsPatientValue SocialValue
Improved treatment Reduced Cost research into new drugs,
improved medical protocols
Source: OECD (2013),“Exploring the Economics of Personal Data:A Survey of Methodologies for Measuring MonetaryValue”
Risks about Personal Data
7
Individual Organization
“72% of European citizens are concerned that their personal data may be misused…”
Individuals have little visibility into the practices of the organizations they are putting
their trust in – until their data is breached or misused.
EU commission survey 2012
Risks: Loss of Trust
Personal Data
…t e n s i o n…
Challenges to mitigate Risks
• Protection and Security
‣ New approaches for decentralized and distributed network environment.	

• Accountability
‣ Who has data about you? Where is the data about you located?	

• Right and Responsibility for using personal data
‣ New approaches that help individuals understand how and when data is
collected.	

‣ How the data is being used and the implications of these actions.	

‣ Empower individual more effectively and efficiently.	

‣ Context aware.
8
Source:World Economic Forum 2013 Report: Unlocking theValue of Personal Data: From Collection to Usage
Personal Data Ecosystem
Emerging Trends: Data Lockers
9
Personal
Data Store
Personal Clouds
Life Management Platforms
Native Data Store
App App
Informed
Pull
Controlled
Push
Life Management Platforms
10
Life Management Platforms
•The concept of Life Management Platforms
(LMPs) was introduced in 2012 by Kuppinger-
Cole.
10
Life Management Platforms
•The concept of Life Management Platforms
(LMPs) was introduced in 2012 by Kuppinger-
Cole.
•LMP allows individual to consolidate all relevant
data from life, e.g. bank account information,
insurance information, health information, etc.
10
Life Management Platforms
•The concept of Life Management Platforms
(LMPs) was introduced in 2012 by Kuppinger-
Cole.
•LMP allows individual to consolidate all relevant
data from life, e.g. bank account information,
insurance information, health information, etc.
•The platform concept provides the tools to
manage the essential information of every
person’s life and making it usable for other
parties.
10
Life Management Platform: Key
features
11
AccessLMP
Requesting	

Party
Data	

Stores
Data	

Control
Informed Pull
Controlled Push
Data Sharing	

Policy
Individual	

ControlBank
healthcare
Home
Car
Life Management Platform: Key
features
11
AccessLMP
Requesting	

Party
Data	

Stores
Data	

Control
Informed Pull
Controlled Push
Data Sharing	

Policy
Individual	

ControlBank
healthcare
Home
Car
Secure Store 	

of Information
Life Management Platform: Key
features
11
AccessLMP
Requesting	

Party
Data	

Stores
Data	

Control
Informed Pull
Controlled Push
Data Sharing	

Policy
Individual	

ControlBank
healthcare
Home
Car
Secure Store 	

of Information
Information control	

remains with	

Individual
Life Management Platform: Key
features
11
AccessLMP
Requesting	

Party
Data	

Stores
Data	

Control
Informed Pull
Controlled Push
Data Sharing	

Policy
Individual	

ControlBank
healthcare
Home
Car
Secure Store 	

of Information
Information control	

remains with	

Individual
Granular Access Control	

for Data
Life Management Platform: Key
features
11
AccessLMP
Requesting	

Party
Data	

Stores
Data	

Control
Informed Pull
Controlled Push
Data Sharing	

Policy
Individual	

ControlBank
healthcare
Home
Car
Secure Store 	

of Information
Advanced	

Data Sharing	

Models
Information control	

remains with	

Individual
Granular Access Control	

for Data
User-Managed Access (UMA)
UMA defines how an individual can control
protected-resource access by clients operated by
arbitrary requesting parties, where the resources
reside on any number of resource servers, and
where a centralized authorization server governs
access based on individual policy.
12
tinyurl.com/umawg
UMA is...
• A web protocol that lets you control access by anyone to
all your online stuff from one place	

• A set of draft specifications, free for anyone to implement	

• Undergoing multiple implementation efforts	

• A Work Group of the Kantara Initiative, free for anyone to
join and contribute to	

• Simple, OAuth-based, identifier-agnostic, RESTful, modular,
generative, and developed rapidly	

• Contributed to the IETF for consideration:

draft-hardjono-oauth-umacore 	

• Currently undergoing interop testing and increased
OpenID Connect integration
13
UMA Architecture
14
User-Managed Access for LMP
15
AccessLMP
Requesting	

Party
Data	

Stores
Data	

Control
Informed Pull
Controlled Push
Data Sharing	

Policy
Individual	

ControlBank
healthcare
Home
Car
User-Managed Access for LMP
15
LMP Requesting	

Party
Data	

Stores
Bank
healthcare
Home
Car
User-Managed Access for LMP
15
LMP Requesting	

Party
Data	

Stores
Bank
healthcare
Home
Car
Resource	

Owner
Client
UMA AS
User-Managed Access for LMP
15
LMP Requesting	

Party
Data	

Stores
Bank
healthcare
Home
Car
Resource	

Owner
Client
manage
control
protect UMA AS
User-Managed Access for LMP
15
LMP Requesting	

Party
Data	

Stores
Bank
healthcare
Home
Car
Resource	

Owner
Client
manage
consentcontrol
protect negotiate
manage
UMA AS
User-Managed Access for LMP
15
LMP Requesting	

Party
Data	

Stores
Bank
healthcare
Home
Car
Resource	

Owner
Client
manage
consentcontrol
protect
authorize
negotiate
manage
access
UMA AS
UMA for LMP Use Cases
•Personal Loan (Informed Pull)	

•CV Sharing (Controlled Push)
16
UMA for LMP Use Case:
Informed Pull
•An Individual issues a request for information (RFI) to
a group of financial services to obtain the best offer
for a personal loan.	

•Life Connections represent the Individual’s Personal
Information requested (i.e Bank Account and Credit
Score), for issuing the RFI, protected by UMA AS.	

•LMP provides the Apps for typical Life events (i.e.
Personal Loan Request).
17
Informed Pull Model
18
LMP Financial	

Service
Bank
Credit Score
!
Request for Information
!
Authorize/Access
!
Offer
!
UMA-Enabled
Loan	

App
Life Connections Request
www.uma4lmp.com/am/informed_pull
Life Management Platform
Life ApplicationsRequest for Information
UMA4LMP: Informed Pull
19
Home
Bank
Healthcare
Car
Credit Score
Loan
Application
healthcare
Insurance
Drag request template here
Life Connections Request
www.uma4lmp.com/am/informed_pull
Life Management Platform
Life ApplicationsRequest for Information
UMA4LMP: Informed Pull
19
Home
Bank
Healthcare
Car
Credit Score
Loan
Application
healthcare
Insurance
Life Connections Request
www.uma4lmp.com/am/informed_pull
Life Management Platform
Life ApplicationsRequest for Information
UMA4LMP: Informed Pull
19
Home
Bank
Healthcare
Car
Credit Score
healthcare
Insurance
+ +
Bank Account Credit Score
Personal Information
Request Info
Loan amount:
Period:
Data sharing Policy
Claim-based authorization
Validity:
Cancel Run NowSave as Template
Data Purpose:
/ /
Requesting Party Marketing related use
Only for this request
Life Connections Request
www.uma4lmp.com/am/informed_pull
Life Management Platform
Life ApplicationsRequest for Information
UMA4LMP: Informed Pull
19
Home
Bank
Healthcare
Car
Credit Score
healthcare
Insurance
+ +
Bank Account Credit Score
Personal Information
Request Info
Loan amount:
Period:
Data sharing Policy
Claim-based authorization
Validity:
OnlineBank.com
Shareable Bank Account
Privacy impact: Medium
Data Access: Read
View Data
Cancel Run NowSave as Template
Data Purpose:
/ /
Requesting Party Marketing related use
Only for this request
Life Connections Request
www.uma4lmp.com/am/informed_pull
Life Management Platform
Life ApplicationsRequest for Information
UMA4LMP: Informed Pull
19
Home
Bank
Healthcare
Car
Credit Score
healthcare
Insurance
+ +
Bank Account Credit Score
Personal Information
Request Info
Loan amount:
Period:
Data sharing Policy
Claim-based authorization
Validity:
Cancel Run NowSave as Template
Data Purpose:
/ /
Requesting Party Marketing related use
Only for this request
Life Connections Request
www.uma4lmp.com/am/informed_pull
Life Management Platform
Life ApplicationsRequest for Information
UMA4LMP: Informed Pull
19
Home
Bank
Healthcare
Car
Credit Score
healthcare
Insurance
+ +
Bank Account Credit Score
Personal Information
Request Info
Loan amount:
Period:
Data sharing Policy
Claim-based authorization
Validity:
Cancel Run NowSave as Template
Data Purpose:
/ /
Requesting Party Marketing related use
Only for this request
Life Connections Request
www.uma4lmp.com/am/informed_pull
Life Management Platform
Life ApplicationsRequest for Information
UMA4LMP: Informed Pull
19
Home
Bank
Healthcare
Car
Credit Score
healthcare
Insurance
+ +
Bank Account Credit Score
Personal Information
Request Info
Loan amount:
Period:
Data sharing Policy
Claim-based authorization
Validity:
10000
24
Cancel Run NowSave as Template
Data Purpose:
/ /
Requesting Party Marketing related use
Only for this request
UMA4LMP: Informed Pull
20
Personal Loan App Results
www.uma4lmp.com/am/informed_pull
Life Management Platform
Vendor
10.000
10.000
Interest Rates
View details
View details
View details6.00%
5.30%
10.000
5.25%
OnlineLoan.com 5.1%
View details
Bestloan.com
FinancialOne.com 10.000
10.000
Amount
ConsumerBank.com
6.70%
Details
View detailsCreditMarket.com
UMA4LMP: Informed Pull
20
Personal Loan App Results
www.uma4lmp.com/am/informed_pull
Life Management Platform
Vendor
10.000
10.000
Interest Rates
View details
View details
View details6.00%
5.30%
10.000
5.25%
OnlineLoan.com 5.1%
View details
Bestloan.com
FinancialOne.com 10.000
10.000
Amount
ConsumerBank.com
6.70%
Details
View detailsCreditMarket.com
UMA for LMP Use Case:
Controlled Push
•A student interacts with online job
application system.	

•Student shares their exam marks, certificates
references, etc.	

•Data is stored at their various Higher
Education institution.	

•Employers can ask for additional information
to be provided during the application
process.
21
UMA4LMP: Controlled Push
22
UMA4LMP: Controlled Push
23
UMA4LMP: Controlled Push
24
Student, Job Seeker
UMA4LMP: Controlled Push
25
Student, Job Seeker
Employer
26
DEMO
Why UMA
•UMA provides a new approach to protect personal
information in a decentralized and distributed network.	

•UMA provides a new way to create a trust
relationship in a distributed environment.	

•UMA provides a new way to control of what is
happening to personal data.	

•UMA provides a new way to help individuals
understand how personal data is used.
27
Benefits of UMA applied to LMP
28
Authorize
Client Resource
Server
Authorization
Server
Protect
Access
(on behalf of
Requesting Party)
Resource
Owner
Protection and Security Accountability
Right and Responsibility	

for using personal data
Benefits of UMA applied to LMP
28
Authorize
Client Resource
Server
Authorization
Server
Protect
Access
(on behalf of
Requesting Party)
Resource
Owner
Individual protects the
distributed resource which is
collecting the personal data
with a centralized Authorization
Server.
Protection and Security Accountability
Right and Responsibility	

for using personal data
Benefits of UMA applied to LMP
28
Authorize
Client Resource
Server
Authorization
Server
Protect
Access
(on behalf of
Requesting Party)
Resource
Owner
Individual is active part of defining
the how the personal information
will be handled in the data sharing
process (Controlled Push or
Informed Pull).
Individual protects the
distributed resource which is
collecting the personal data
with a centralized Authorization
Server.
Protection and Security Accountability
Right and Responsibility	

for using personal data
Benefits of UMA applied to LMP
28
Authorize
Client Resource
Server
Authorization
Server
Protect
Access
(on behalf of
Requesting Party)
Resource
Owner
Individual is active part of defining
the how the personal information
will be handled in the data sharing
process (Controlled Push or
Informed Pull).
Individual is able to define
sharing policy for what
purposes the personal data is
shared (or collected)
Individual protects the
distributed resource which is
collecting the personal data
with a centralized Authorization
Server.
Protection and Security Accountability
Right and Responsibility	

for using personal data
Benefits of UMA applied to LMP
28
Authorize
Client Resource
Server
Authorization
Server
Protect
Access
(on behalf of
Requesting Party)
Resource
Owner
Individual is active part of defining
the how the personal information
will be handled in the data sharing
process (Controlled Push or
Informed Pull).
Individual is able to define
sharing policy for what
purposes the personal data is
shared (or collected)
Individual protects the
distributed resource which is
collecting the personal data
with a centralized Authorization
Server.
Protection and Security Accountability
Right and Responsibility	

for using personal data
Individual can selectively
share personal data with
Requesting Party through a
Claim-based authorization
system
Benefits of UMA applied to LMP
28
Authorize
Client Resource
Server
Authorization
Server
Protect
Access
(on behalf of
Requesting Party)
Resource
Owner
Individual is active part of defining
the how the personal information
will be handled in the data sharing
process (Controlled Push or
Informed Pull).
Individual is able to define
sharing policy for what
purposes the personal data is
shared (or collected)
Policy Enforcement Point at Resource
Server allows to intercept any request to
access to personal data
Individual protects the
distributed resource which is
collecting the personal data
with a centralized Authorization
Server.
Protection and Security Accountability
Right and Responsibility	

for using personal data
Individual can selectively
share personal data with
Requesting Party through a
Claim-based authorization
system
Questions?
29
30
Eve L. Maler	

UMA WG Chair	

emaler@forrester.com	

!
Thomas Hardjono	

UMA WG Specification Editor	

hardjono@mit.edu	

!
Members of the UMA WG
ThankYou /Acknowledgement
Thanks!
31
@UMAWG	

tinyurl.com/umawg |tinyurl.com/umafaq

Contenu connexe

Tendances

Cloud computing
Cloud computingCloud computing
Cloud computingAli Raza
 
Introduction to the HAT Microserver
Introduction to the HAT Microserver Introduction to the HAT Microserver
Introduction to the HAT Microserver Jonathan Holtby
 
Role Of Blockchain Technology In Healthcare Sector
Role Of Blockchain Technology In Healthcare SectorRole Of Blockchain Technology In Healthcare Sector
Role Of Blockchain Technology In Healthcare SectorTechugo
 
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...Alex G. Lee, Ph.D. Esq. CLP
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityNoreen Whysel
 
Speeding up Healthcare Application with HTTP/2
Speeding up Healthcare Application with HTTP/2Speeding up Healthcare Application with HTTP/2
Speeding up Healthcare Application with HTTP/2CitiusTech
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Harilal Punalur
 
IRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare RecordsIRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare RecordsIRJET Journal
 
Meander medical center dx
Meander medical center   dxMeander medical center   dx
Meander medical center dxGrace Bakuya
 
Smart card kantara pids presentation grey
Smart card kantara pids presentation greySmart card kantara pids presentation grey
Smart card kantara pids presentation greyDan Combs
 
Xanadu Based Blockchain Integration System Development
Xanadu Based Blockchain Integration System DevelopmentXanadu Based Blockchain Integration System Development
Xanadu Based Blockchain Integration System DevelopmentAlex G. Lee, Ph.D. Esq. CLP
 
Smart card kantara pids presentation w-blue background
Smart card kantara pids presentation w-blue backgroundSmart card kantara pids presentation w-blue background
Smart card kantara pids presentation w-blue backgroundDan Combs
 
Iaetsd cplm cloud facilitated privacy shielding leakage
Iaetsd cplm cloud facilitated privacy shielding leakageIaetsd cplm cloud facilitated privacy shielding leakage
Iaetsd cplm cloud facilitated privacy shielding leakageIaetsd Iaetsd
 
Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Edge Pereira
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law Priyanka Aash
 
BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf Mark Scrimshire
 
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...IJERA Editor
 
IRJET- Electronic Health Records
IRJET- Electronic Health RecordsIRJET- Electronic Health Records
IRJET- Electronic Health RecordsIRJET Journal
 
How blockchain technology works in healthcare industry
How blockchain technology works in healthcare industryHow blockchain technology works in healthcare industry
How blockchain technology works in healthcare industryStacey Roberts
 

Tendances (19)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction to the HAT Microserver
Introduction to the HAT Microserver Introduction to the HAT Microserver
Introduction to the HAT Microserver
 
Role Of Blockchain Technology In Healthcare Sector
Role Of Blockchain Technology In Healthcare SectorRole Of Blockchain Technology In Healthcare Sector
Role Of Blockchain Technology In Healthcare Sector
 
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
Xanadu Based 4th Industrial Revolution Key Technologies Integration Medical U...
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital Identity
 
Speeding up Healthcare Application with HTTP/2
Speeding up Healthcare Application with HTTP/2Speeding up Healthcare Application with HTTP/2
Speeding up Healthcare Application with HTTP/2
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
IRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare RecordsIRJET- Blockchain Technology for Securing Healthcare Records
IRJET- Blockchain Technology for Securing Healthcare Records
 
Meander medical center dx
Meander medical center   dxMeander medical center   dx
Meander medical center dx
 
Smart card kantara pids presentation grey
Smart card kantara pids presentation greySmart card kantara pids presentation grey
Smart card kantara pids presentation grey
 
Xanadu Based Blockchain Integration System Development
Xanadu Based Blockchain Integration System DevelopmentXanadu Based Blockchain Integration System Development
Xanadu Based Blockchain Integration System Development
 
Smart card kantara pids presentation w-blue background
Smart card kantara pids presentation w-blue backgroundSmart card kantara pids presentation w-blue background
Smart card kantara pids presentation w-blue background
 
Iaetsd cplm cloud facilitated privacy shielding leakage
Iaetsd cplm cloud facilitated privacy shielding leakageIaetsd cplm cloud facilitated privacy shielding leakage
Iaetsd cplm cloud facilitated privacy shielding leakage
 
Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
 
BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf BlueButton on FHIR @HXRconf
BlueButton on FHIR @HXRconf
 
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
 
IRJET- Electronic Health Records
IRJET- Electronic Health RecordsIRJET- Electronic Health Records
IRJET- Electronic Health Records
 
How blockchain technology works in healthcare industry
How blockchain technology works in healthcare industryHow blockchain technology works in healthcare industry
How blockchain technology works in healthcare industry
 

Similaire à User-Access Manager: Key to Life Management Platform

Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationcaniceconsulting
 
Sds 2015 midata.coop_20150612
Sds 2015 midata.coop_20150612Sds 2015 midata.coop_20150612
Sds 2015 midata.coop_20150612Andre Golliez
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureFacundo Mauricio
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
OPENi Privacy by design @Athens hackathon, September 2014
OPENi Privacy by design @Athens hackathon, September 2014OPENi Privacy by design @Athens hackathon, September 2014
OPENi Privacy by design @Athens hackathon, September 2014openi_ict
 
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
Anonos  FTC Comment Letter Big Data: A Tool for Inclusion or ExclusionAnonos  FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or ExclusionTed Myerson
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementVelrada
 
The Analyst's Dilemma: Matt Hatton, Machina Research at IoT14
The Analyst's Dilemma: Matt Hatton, Machina Research at IoT14The Analyst's Dilemma: Matt Hatton, Machina Research at IoT14
The Analyst's Dilemma: Matt Hatton, Machina Research at IoT14Business of Software Conference
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...Patrick McCormick
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Ted Myerson
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13mkeane
 
The Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance CapitalismThe Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance CapitalismJongseung Kim
 
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...MIT Startup Exchange
 
Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care Napier University
 
IOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerIOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerData Con LA
 

Similaire à User-Access Manager: Key to Life Management Platform (20)

Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Sds 2015 midata.coop_20150612
Sds 2015 midata.coop_20150612Sds 2015 midata.coop_20150612
Sds 2015 midata.coop_20150612
 
Uma webinar 2014 06-19
Uma webinar 2014 06-19Uma webinar 2014 06-19
Uma webinar 2014 06-19
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the future
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Citizen-consumer permission based data sharing | Dr Matt Stroud | January 2015
Citizen-consumer permission based data sharing | Dr Matt Stroud | January 2015Citizen-consumer permission based data sharing | Dr Matt Stroud | January 2015
Citizen-consumer permission based data sharing | Dr Matt Stroud | January 2015
 
Applications of Big Data
Applications of Big DataApplications of Big Data
Applications of Big Data
 
20 Business model examples #2
20 Business model examples #220 Business model examples #2
20 Business model examples #2
 
OPENi Privacy by design @Athens hackathon, September 2014
OPENi Privacy by design @Athens hackathon, September 2014OPENi Privacy by design @Athens hackathon, September 2014
OPENi Privacy by design @Athens hackathon, September 2014
 
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
Anonos  FTC Comment Letter Big Data: A Tool for Inclusion or ExclusionAnonos  FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
Anonos FTC Comment Letter Big Data: A Tool for Inclusion or Exclusion
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
 
The Analyst's Dilemma: Matt Hatton, Machina Research at IoT14
The Analyst's Dilemma: Matt Hatton, Machina Research at IoT14The Analyst's Dilemma: Matt Hatton, Machina Research at IoT14
The Analyst's Dilemma: Matt Hatton, Machina Research at IoT14
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13
 
The Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance CapitalismThe Crisis of Self Sovereignty in The Age of Surveillance Capitalism
The Crisis of Self Sovereignty in The Age of Surveillance Capitalism
 
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
 
Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care Trust and Governance in Health and Social Care
Trust and Governance in Health and Social Care
 
IOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry PowerIOT: The Evolving World of Realtime BigData by Jerry Power
IOT: The Evolving World of Realtime BigData by Jerry Power
 

Dernier

办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 

Dernier (11)

办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 

User-Access Manager: Key to Life Management Platform

  • 1. User-Managed Access: key to Life Management Platform Domenico Catalano, Oracle Italy Maciej Machulak, Cloud Identity Limited European Identity Conference 2014 1
  • 2. Agenda Personal Data and EmergingTrends Life Management Platforms UMA Concepts Use Cases Demo Q&A 2
  • 4. Personal Data is the Life Blood of the Information Age 3 What is Personal Data…
  • 5. Personal Data is the Life Blood of the Information Age 3 Personal Data is the New “Oil of the Internet” What is Personal Data…
  • 6. Personal Data is the Life Blood of the Information Age 3 Personal Data is the New “Oil of the Internet” Personal Data is the new currency What is Personal Data…
  • 7. Personal Data and new forms of economic and social value 4 Big Data Explosive growth of Personal Data New forms of economic and social value Quantity and quality Mobile Computing Social Networking Internet of THINGS
  • 8. How to measure the value of Personal Data •Market capitalization •Revenue per record/user •Market Price •Cost of data breach •Pay to protect 5 Streat address Data of Birth Social Number Military record 0 10 20 30 40 Source: OECD (2013),“Exploring the Economics of Personal Data:A Survey of Methodologies for Measuring MonetaryValue” $112 per user record USD 1.7 per record Data breach cost $171M USD
  • 9. Externalities: Socio-economic impact •Personal data to avoid duplicative testing/ misdiagnosis, etc., in healthcare. 6 Electronic Health Record Financial BenefitsPatientValue SocialValue Improved treatment Reduced Cost research into new drugs, improved medical protocols Source: OECD (2013),“Exploring the Economics of Personal Data:A Survey of Methodologies for Measuring MonetaryValue”
  • 10. Risks about Personal Data 7 Individual Organization “72% of European citizens are concerned that their personal data may be misused…” Individuals have little visibility into the practices of the organizations they are putting their trust in – until their data is breached or misused. EU commission survey 2012 Risks: Loss of Trust Personal Data …t e n s i o n…
  • 11. Challenges to mitigate Risks • Protection and Security ‣ New approaches for decentralized and distributed network environment. • Accountability ‣ Who has data about you? Where is the data about you located? • Right and Responsibility for using personal data ‣ New approaches that help individuals understand how and when data is collected. ‣ How the data is being used and the implications of these actions. ‣ Empower individual more effectively and efficiently. ‣ Context aware. 8 Source:World Economic Forum 2013 Report: Unlocking theValue of Personal Data: From Collection to Usage
  • 12. Personal Data Ecosystem Emerging Trends: Data Lockers 9 Personal Data Store Personal Clouds Life Management Platforms Native Data Store App App Informed Pull Controlled Push
  • 14. Life Management Platforms •The concept of Life Management Platforms (LMPs) was introduced in 2012 by Kuppinger- Cole. 10
  • 15. Life Management Platforms •The concept of Life Management Platforms (LMPs) was introduced in 2012 by Kuppinger- Cole. •LMP allows individual to consolidate all relevant data from life, e.g. bank account information, insurance information, health information, etc. 10
  • 16. Life Management Platforms •The concept of Life Management Platforms (LMPs) was introduced in 2012 by Kuppinger- Cole. •LMP allows individual to consolidate all relevant data from life, e.g. bank account information, insurance information, health information, etc. •The platform concept provides the tools to manage the essential information of every person’s life and making it usable for other parties. 10
  • 17. Life Management Platform: Key features 11 AccessLMP Requesting Party Data Stores Data Control Informed Pull Controlled Push Data Sharing Policy Individual ControlBank healthcare Home Car
  • 18. Life Management Platform: Key features 11 AccessLMP Requesting Party Data Stores Data Control Informed Pull Controlled Push Data Sharing Policy Individual ControlBank healthcare Home Car Secure Store of Information
  • 19. Life Management Platform: Key features 11 AccessLMP Requesting Party Data Stores Data Control Informed Pull Controlled Push Data Sharing Policy Individual ControlBank healthcare Home Car Secure Store of Information Information control remains with Individual
  • 20. Life Management Platform: Key features 11 AccessLMP Requesting Party Data Stores Data Control Informed Pull Controlled Push Data Sharing Policy Individual ControlBank healthcare Home Car Secure Store of Information Information control remains with Individual Granular Access Control for Data
  • 21. Life Management Platform: Key features 11 AccessLMP Requesting Party Data Stores Data Control Informed Pull Controlled Push Data Sharing Policy Individual ControlBank healthcare Home Car Secure Store of Information Advanced Data Sharing Models Information control remains with Individual Granular Access Control for Data
  • 22. User-Managed Access (UMA) UMA defines how an individual can control protected-resource access by clients operated by arbitrary requesting parties, where the resources reside on any number of resource servers, and where a centralized authorization server governs access based on individual policy. 12
  • 23. tinyurl.com/umawg UMA is... • A web protocol that lets you control access by anyone to all your online stuff from one place • A set of draft specifications, free for anyone to implement • Undergoing multiple implementation efforts • A Work Group of the Kantara Initiative, free for anyone to join and contribute to • Simple, OAuth-based, identifier-agnostic, RESTful, modular, generative, and developed rapidly • Contributed to the IETF for consideration:
 draft-hardjono-oauth-umacore • Currently undergoing interop testing and increased OpenID Connect integration 13
  • 25. User-Managed Access for LMP 15 AccessLMP Requesting Party Data Stores Data Control Informed Pull Controlled Push Data Sharing Policy Individual ControlBank healthcare Home Car
  • 26. User-Managed Access for LMP 15 LMP Requesting Party Data Stores Bank healthcare Home Car
  • 27. User-Managed Access for LMP 15 LMP Requesting Party Data Stores Bank healthcare Home Car Resource Owner Client UMA AS
  • 28. User-Managed Access for LMP 15 LMP Requesting Party Data Stores Bank healthcare Home Car Resource Owner Client manage control protect UMA AS
  • 29. User-Managed Access for LMP 15 LMP Requesting Party Data Stores Bank healthcare Home Car Resource Owner Client manage consentcontrol protect negotiate manage UMA AS
  • 30. User-Managed Access for LMP 15 LMP Requesting Party Data Stores Bank healthcare Home Car Resource Owner Client manage consentcontrol protect authorize negotiate manage access UMA AS
  • 31. UMA for LMP Use Cases •Personal Loan (Informed Pull) •CV Sharing (Controlled Push) 16
  • 32. UMA for LMP Use Case: Informed Pull •An Individual issues a request for information (RFI) to a group of financial services to obtain the best offer for a personal loan. •Life Connections represent the Individual’s Personal Information requested (i.e Bank Account and Credit Score), for issuing the RFI, protected by UMA AS. •LMP provides the Apps for typical Life events (i.e. Personal Loan Request). 17
  • 33. Informed Pull Model 18 LMP Financial Service Bank Credit Score ! Request for Information ! Authorize/Access ! Offer ! UMA-Enabled Loan App
  • 34. Life Connections Request www.uma4lmp.com/am/informed_pull Life Management Platform Life ApplicationsRequest for Information UMA4LMP: Informed Pull 19 Home Bank Healthcare Car Credit Score Loan Application healthcare Insurance Drag request template here
  • 35. Life Connections Request www.uma4lmp.com/am/informed_pull Life Management Platform Life ApplicationsRequest for Information UMA4LMP: Informed Pull 19 Home Bank Healthcare Car Credit Score Loan Application healthcare Insurance
  • 36. Life Connections Request www.uma4lmp.com/am/informed_pull Life Management Platform Life ApplicationsRequest for Information UMA4LMP: Informed Pull 19 Home Bank Healthcare Car Credit Score healthcare Insurance + + Bank Account Credit Score Personal Information Request Info Loan amount: Period: Data sharing Policy Claim-based authorization Validity: Cancel Run NowSave as Template Data Purpose: / / Requesting Party Marketing related use Only for this request
  • 37. Life Connections Request www.uma4lmp.com/am/informed_pull Life Management Platform Life ApplicationsRequest for Information UMA4LMP: Informed Pull 19 Home Bank Healthcare Car Credit Score healthcare Insurance + + Bank Account Credit Score Personal Information Request Info Loan amount: Period: Data sharing Policy Claim-based authorization Validity: OnlineBank.com Shareable Bank Account Privacy impact: Medium Data Access: Read View Data Cancel Run NowSave as Template Data Purpose: / / Requesting Party Marketing related use Only for this request
  • 38. Life Connections Request www.uma4lmp.com/am/informed_pull Life Management Platform Life ApplicationsRequest for Information UMA4LMP: Informed Pull 19 Home Bank Healthcare Car Credit Score healthcare Insurance + + Bank Account Credit Score Personal Information Request Info Loan amount: Period: Data sharing Policy Claim-based authorization Validity: Cancel Run NowSave as Template Data Purpose: / / Requesting Party Marketing related use Only for this request
  • 39. Life Connections Request www.uma4lmp.com/am/informed_pull Life Management Platform Life ApplicationsRequest for Information UMA4LMP: Informed Pull 19 Home Bank Healthcare Car Credit Score healthcare Insurance + + Bank Account Credit Score Personal Information Request Info Loan amount: Period: Data sharing Policy Claim-based authorization Validity: Cancel Run NowSave as Template Data Purpose: / / Requesting Party Marketing related use Only for this request
  • 40. Life Connections Request www.uma4lmp.com/am/informed_pull Life Management Platform Life ApplicationsRequest for Information UMA4LMP: Informed Pull 19 Home Bank Healthcare Car Credit Score healthcare Insurance + + Bank Account Credit Score Personal Information Request Info Loan amount: Period: Data sharing Policy Claim-based authorization Validity: 10000 24 Cancel Run NowSave as Template Data Purpose: / / Requesting Party Marketing related use Only for this request
  • 41. UMA4LMP: Informed Pull 20 Personal Loan App Results www.uma4lmp.com/am/informed_pull Life Management Platform Vendor 10.000 10.000 Interest Rates View details View details View details6.00% 5.30% 10.000 5.25% OnlineLoan.com 5.1% View details Bestloan.com FinancialOne.com 10.000 10.000 Amount ConsumerBank.com 6.70% Details View detailsCreditMarket.com
  • 42. UMA4LMP: Informed Pull 20 Personal Loan App Results www.uma4lmp.com/am/informed_pull Life Management Platform Vendor 10.000 10.000 Interest Rates View details View details View details6.00% 5.30% 10.000 5.25% OnlineLoan.com 5.1% View details Bestloan.com FinancialOne.com 10.000 10.000 Amount ConsumerBank.com 6.70% Details View detailsCreditMarket.com
  • 43. UMA for LMP Use Case: Controlled Push •A student interacts with online job application system. •Student shares their exam marks, certificates references, etc. •Data is stored at their various Higher Education institution. •Employers can ask for additional information to be provided during the application process. 21
  • 49. Why UMA •UMA provides a new approach to protect personal information in a decentralized and distributed network. •UMA provides a new way to create a trust relationship in a distributed environment. •UMA provides a new way to control of what is happening to personal data. •UMA provides a new way to help individuals understand how personal data is used. 27
  • 50. Benefits of UMA applied to LMP 28 Authorize Client Resource Server Authorization Server Protect Access (on behalf of Requesting Party) Resource Owner Protection and Security Accountability Right and Responsibility for using personal data
  • 51. Benefits of UMA applied to LMP 28 Authorize Client Resource Server Authorization Server Protect Access (on behalf of Requesting Party) Resource Owner Individual protects the distributed resource which is collecting the personal data with a centralized Authorization Server. Protection and Security Accountability Right and Responsibility for using personal data
  • 52. Benefits of UMA applied to LMP 28 Authorize Client Resource Server Authorization Server Protect Access (on behalf of Requesting Party) Resource Owner Individual is active part of defining the how the personal information will be handled in the data sharing process (Controlled Push or Informed Pull). Individual protects the distributed resource which is collecting the personal data with a centralized Authorization Server. Protection and Security Accountability Right and Responsibility for using personal data
  • 53. Benefits of UMA applied to LMP 28 Authorize Client Resource Server Authorization Server Protect Access (on behalf of Requesting Party) Resource Owner Individual is active part of defining the how the personal information will be handled in the data sharing process (Controlled Push or Informed Pull). Individual is able to define sharing policy for what purposes the personal data is shared (or collected) Individual protects the distributed resource which is collecting the personal data with a centralized Authorization Server. Protection and Security Accountability Right and Responsibility for using personal data
  • 54. Benefits of UMA applied to LMP 28 Authorize Client Resource Server Authorization Server Protect Access (on behalf of Requesting Party) Resource Owner Individual is active part of defining the how the personal information will be handled in the data sharing process (Controlled Push or Informed Pull). Individual is able to define sharing policy for what purposes the personal data is shared (or collected) Individual protects the distributed resource which is collecting the personal data with a centralized Authorization Server. Protection and Security Accountability Right and Responsibility for using personal data Individual can selectively share personal data with Requesting Party through a Claim-based authorization system
  • 55. Benefits of UMA applied to LMP 28 Authorize Client Resource Server Authorization Server Protect Access (on behalf of Requesting Party) Resource Owner Individual is active part of defining the how the personal information will be handled in the data sharing process (Controlled Push or Informed Pull). Individual is able to define sharing policy for what purposes the personal data is shared (or collected) Policy Enforcement Point at Resource Server allows to intercept any request to access to personal data Individual protects the distributed resource which is collecting the personal data with a centralized Authorization Server. Protection and Security Accountability Right and Responsibility for using personal data Individual can selectively share personal data with Requesting Party through a Claim-based authorization system
  • 57. 30 Eve L. Maler UMA WG Chair emaler@forrester.com ! Thomas Hardjono UMA WG Specification Editor hardjono@mit.edu ! Members of the UMA WG ThankYou /Acknowledgement