SlideShare a Scribd company logo
1 of 32
Download to read offline
Shibboleth: Open Source Distributed 
Authentication and Authorization


 Glen Newton
 Head, Research
 glen.newton@nrc-cnrc.gc.ca
 GTEC: Open Source Security
 Strategy
 Ottawa Oct 20 2004
Outline
• Introduction and Preliminaries
   – Authentication and Authorization
   – Authentication models
   – Identity and Privacy
• Shibboleth
• Other closed alternatives
   – Liberty Alliance
   – Others (MS­Passport)


                                        2
Resource Owners and 
Resource Users
• Resource Owner: the owner, producer or 
  distributor of resource. The (or one of the) 
  legal holders and gatekeepers of the 
  resource.
• Resource user: an entity which accesses 
  a resource. Can be an individual, a group, 
  a company, an agent, a system etc. 




                                            3
Authentication and 
Authorization
• Authentication: verifying who you are & 
  associated attributes.
• Authorization: verifying that you are 
  allowed access to a resource (room, web 
  page, file, equipment, etc); assumes 
  authentication.
• Traditionally in the library world, the 
  distinctions between these two concepts 
  are conflated.


                                        4
Authorization Models
• Identity­based
   – The identity is passed to the resource 
     owner who decides whether to grant 
     access: Privacy issues
• Attribute­based
   – Enough attributes are passed to the 
     resource owner to allow access: no or 
     limited Privacy issues.



                                           5
Identity and Privacy: 
Identity
• Identity management: in the physical 
  world: passports; birth certificates; driver’s 
  licenses; national identity cards; SIN; etc. 
• Used by others (government, police, 
  banks, etc.) to verify ID
• In the Internet age, much more difficult 
  problem “Like nailing jello to a wall…”
• For individuals: 
    – proliferation of userids and passwords
    – some digital certificates
    – security smart cards                    6
Identity and Privacy: 
Identity (cont.)
• For organizations
   – Costly management of userids
   – Costly and complex management of 
     relationships with resource owners
   – Security issues
   – Poor general solutions (i.e. access by 
     organizations IP address ranges; etc)




                                           7
Identity and Privacy: 
Privacy
• Privacy has different dimensions:
   – “privacy of the person:… integrity of the 
     individuals body”
   – “privacy of personal behaviour ­ sexual 
     preferences and habits, political 
     activities and religious practices” 
   – “privacy of personal communications:... 
     able to … without routine monitoring of 
     their communications… ”
   – “privacy of personal data”
  From Clarke, 1999
                                            8
Identity and Privacy: 
Privacy (cont.)
• Electronic records, networks, electronic 
  transactions: not just telephone anymore
• A range of expectations: some people are 
  willing to give up more rights in 
  Cyberspace; others expect similar to “real 
  world”
• Canadian legislation: Personal Information 
  Protection and Electronic Documents Act 
  (PIPEDA)


                                          9
Shibboleth
• Intro to Shibboleth
   – What is Shibboleth?
   – What issues does Shibboleth address?
   – Shibboleth architecture
   – How does it work?
   – Who is using it?
• Shibboleth at CISTI



                                       10
What is Shibboleth?
• “Inter­realm attribute­based authorization 
  for Web Services” – Shibboleth web page
   – Architecture and technology to support 
     inter­institutional sharing of resources 
     (middleware)
   – Based on a federated administration 
     trust framework
   – Controlled dissemination of attribute 
     information, based on administration 
     defaults and user preferences

                                           11
What is Shibboleth?
• Internet2/MACE Project; NSF 
  Middleware initiative component
• Players: IBM, Brown U, Ohio State, 
  MIT, CMU, Stanford




                                        12
What is Shibboleth? (cont.)
• Founding assumptions:
   – Federated administration
   – Lightweight mechanisms: disturb as 
     little as possible of existing 
     infrastructure as possible
   – Leverage vendor and standards activity 
     wherever possible




                                         13
What is Shibboleth? (cont.)
• Key concepts:
   – Federated Administration 
   – Access Control Based On Attributes 
   – Active Management of Privacy 
   – Standards Based 
   – A Framework for Multiple, Scaleable 
     Trust and Policy Sets (Federations) 



                                            14
What is Shibboleth? (cont.)
• What issues does Shibboleth address?
  – Resource user:
     • Access from on­campus
     • Access from off­campus
     • User account proliferation
     • Increased privacy
     • Single sign­on/sign­off across 
       domains!!


                                         15
What is Shibboleth? (cont.)
• What issues does Shibboleth address? 
  (cont.)
   – Resource user’s organization:
      • Single authentication database
      • No IP management
      • If previously using IP access, better 
        reporting




                                            16
What is Shibboleth? (cont.)
• What issues does Shibboleth address? 
  (cont.):
   – Resource owner:
      • Ends management of either 
        userid/password or IP address 
        ranges 
      • Security
      • Reporting granularity



                                          17
Shib: How does it work?
1. User requests resource from resource 
   owner
2. User is asked to self­identify their 
   organization
3. User is redirected to her organizations 
   Shib origin instance + authenticates
4. User attributes are transferred to 
   resource owners instance of Shib target 
5. Resource owner compares attributes to 
   Policy associated with user’s 
   organization
6. User gets access to resource           18
Shib: How does it work?




                          19
Shibboleth is:
• “NOT an authentication scheme (relies on 
  home site infrastructure to do this)”
• “NOT an authorisation scheme (leaves 
  this to the resource owner)”.
• “BUT an open, standards based protocol 
  for securely transferring attributes 
  between home site and resource site”.
• “Also provided as an OpenSource 
  reference software implementation”.
   After Paschoud, 
   2004                                 20
Shibboleth
• Who is using it?
  – JISC (UK Joint Information Systems 
    Committee), EBSCO,  Elsevier, OCLC, 
    Sfx (Ex libris), JSTOR, McGraw Hill , 
    Books, Innovative, WebCT, Blackboard, 
    Swiss Education and Research 
    Network (SWITCH), National Science 
    Digital Library (NSDL), more…
  – Carnegie Mellon, Columbia, Dartmouth, 
    Georgetown, London School of 
    Economics, NYU, Ohio State, more…
                                      21
Shibboleth at CISTI
• Prototyped the user owner end of 
  Shibboleth (Target) for 3 NRC 
  Research Press Journals
• Evaluated use within NRC Virtual 
  Library
• Developed code for MySQL db lookup; 
  submitted code to Shibboleth project
• Next steps dependent on adoption by 
  resource producers (for VL) and 
  resource users (for NRC Research 
  Press)                               22
Competing Federated ID 
Stacks




From Blum, 2003           23
Alternatives: 
Liberty Alliance
• Intro to the Liberty Alliance
   – What is the Liberty Alliance?
   – How is the Liberty Alliance different 
     from Shibboleth?
   – Players
   – Future




                                              24
Liberty Alliance
• What is the Liberty Alliance?
  – More commercially oriented than Shib
  – Members include: Sun, Sony, Ericson, 
    GM, Novell, NEC, Oracle, SAP, NTT, 
    Entrust, HP, AmEx.
  – However, Microsoft and IBM have 
    refused to join!




                                       25
Liberty Alliance
• Architecture
   – Very similar to Shibboleth, but more 
     commercially oriented, with special 
     features oriented around mobile device, 
     etc.
   – Less focus on user mediated privacy
   – More reporting




                                         26
Liberty Alliance




                   27
Other Technologies
• Microsoft Passport
  – Centralized database (not Federated)
  – Not standards­based
• Others: Sesame, PAPI, PERMIS




                                       28
What to Adopt?
• Likely adoption of Shibboleth features in 
  Liberty v2, with SAML 2.0
• Interoperability discussions on­going
• Either or both: Liberty more commercial, 
  Shibboleth more 
  library/academic/publisher oriented




                                           29
Questions?
• Glen Newton, CISTI 
  glen.newton@nrc­cnrc.gc.ca




                               30
References
• Blum,  D. 2003. 
  Federating Identity Management: Standards, T
  .
• Blum, D. 2004. 
  Federated Identity: Extending Authentication an
  .
• Clarke, R. 1999. Introduction to
   Dataveillance
   and Information Privacy, and Definitions of Ter
• Lacey, D. 2003. 
  Current Privacy Research and Frameworks
  . SecureWorld Expo.                     31
References (cont.)
• Liberty Alliance Web Site.
• Paschoud. J. 2004. 
  The (now… then…) next of Authentication:Shib
   ALPSP Effective Customer Authentication
• Rapoza, J. 2003. 
  Liberty Alliance Has Missed the Point. 
  eWeek November 24. 
• Shibboleth Project. 
• Weil, N. 2004. 
  NSF middleware initiative goes beyond science
  . InfoWorld May. 
                                       32

More Related Content

What's hot

WTF for businesses for Blockchain
WTF for businesses for BlockchainWTF for businesses for Blockchain
WTF for businesses for BlockchainConrad Dias
 
Law w04-global cybersecurity-laws_regulations_and_liability
Law w04-global cybersecurity-laws_regulations_and_liabilityLaw w04-global cybersecurity-laws_regulations_and_liability
Law w04-global cybersecurity-laws_regulations_and_liabilityJoão Rufino de Sales
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_ProvidersJon-Michael C. Brook, CISSP
 
WAPWG 16 Jan Thomson holdslide
WAPWG 16 Jan Thomson holdslideWAPWG 16 Jan Thomson holdslide
WAPWG 16 Jan Thomson holdslideSara Day Thomson
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management Endcode_org
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationShauna_Cox
 
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...Michael Torres
 
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...gallowayandcollens
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference Endcode_org
 
Liberty-Search Strategy Analysis
Liberty-Search Strategy AnalysisLiberty-Search Strategy Analysis
Liberty-Search Strategy AnalysisToni Liberty
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends Endcode_org
 

What's hot (16)

Darwin
DarwinDarwin
Darwin
 
WTF for businesses for Blockchain
WTF for businesses for BlockchainWTF for businesses for Blockchain
WTF for businesses for Blockchain
 
Law w04-global cybersecurity-laws_regulations_and_liability
Law w04-global cybersecurity-laws_regulations_and_liabilityLaw w04-global cybersecurity-laws_regulations_and_liability
Law w04-global cybersecurity-laws_regulations_and_liability
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
 
WAPWG 16 Jan Thomson holdslide
WAPWG 16 Jan Thomson holdslideWAPWG 16 Jan Thomson holdslide
WAPWG 16 Jan Thomson holdslide
 
Semantic Web
Semantic WebSemantic Web
Semantic Web
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
 
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
 
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
 
Dressler Kristof The Right to be Forgotten and Digital Collections
Dressler Kristof The Right to be Forgotten and Digital CollectionsDressler Kristof The Right to be Forgotten and Digital Collections
Dressler Kristof The Right to be Forgotten and Digital Collections
 
Murray Privacy in the Context of Content Platforms & Discovery Tools
Murray Privacy in the Context of Content Platforms & Discovery ToolsMurray Privacy in the Context of Content Platforms & Discovery Tools
Murray Privacy in the Context of Content Platforms & Discovery Tools
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
Liberty-Search Strategy Analysis
Liberty-Search Strategy AnalysisLiberty-Search Strategy Analysis
Liberty-Search Strategy Analysis
 
IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends IAB Online Content Regulation: Trends
IAB Online Content Regulation: Trends
 

Viewers also liked

WITDOM presentation at Net Futures 2016
WITDOM presentation at Net Futures 2016WITDOM presentation at Net Futures 2016
WITDOM presentation at Net Futures 2016Elsa Prieto
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overviewElsa Prieto
 
Intro to AppExchange - Building Composite Apps
Intro to AppExchange - Building Composite AppsIntro to AppExchange - Building Composite Apps
Intro to AppExchange - Building Composite Appsdreamforce2006
 
Shibboleth 2.0 IdP slides - Installfest (Edited)
Shibboleth 2.0 IdP slides - Installfest (Edited)Shibboleth 2.0 IdP slides - Installfest (Edited)
Shibboleth 2.0 IdP slides - Installfest (Edited)JISC.AM
 
04 Wa 2 Soq Booklet Amec
04 Wa 2 Soq Booklet Amec04 Wa 2 Soq Booklet Amec
04 Wa 2 Soq Booklet AmecLes1238
 
Kennedy Power PointChapter 50
Kennedy Power PointChapter 50Kennedy Power PointChapter 50
Kennedy Power PointChapter 50Rachel King
 
Taller iglekids 1
Taller iglekids 1Taller iglekids 1
Taller iglekids 1adelisj
 
2016/01/04付 オリジナルiTunes週間トップソングトピックス
2016/01/04付 オリジナルiTunes週間トップソングトピックス2016/01/04付 オリジナルiTunes週間トップソングトピックス
2016/01/04付 オリジナルiTunes週間トップソングトピックスThe Natsu Style
 
Welcome and MAX Keynotes - Dave Sobel and Alistair Forbes
Welcome and MAX Keynotes   - Dave Sobel and Alistair ForbesWelcome and MAX Keynotes   - Dave Sobel and Alistair Forbes
Welcome and MAX Keynotes - Dave Sobel and Alistair ForbesMAXfocus
 
料理研究一家「古川家」を支えるツールと技術 | CPI MEGA MIX 2015
料理研究一家「古川家」を支えるツールと技術 | CPI MEGA MIX 2015料理研究一家「古川家」を支えるツールと技術 | CPI MEGA MIX 2015
料理研究一家「古川家」を支えるツールと技術 | CPI MEGA MIX 2015Masaya Kogawa
 

Viewers also liked (19)

Introduzione a Scrum
Introduzione a ScrumIntroduzione a Scrum
Introduzione a Scrum
 
WITDOM presentation at Net Futures 2016
WITDOM presentation at Net Futures 2016WITDOM presentation at Net Futures 2016
WITDOM presentation at Net Futures 2016
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
 
Intro to AppExchange - Building Composite Apps
Intro to AppExchange - Building Composite AppsIntro to AppExchange - Building Composite Apps
Intro to AppExchange - Building Composite Apps
 
Meri_dliny1
Meri_dliny1Meri_dliny1
Meri_dliny1
 
Shibboleth 2.0 IdP slides - Installfest (Edited)
Shibboleth 2.0 IdP slides - Installfest (Edited)Shibboleth 2.0 IdP slides - Installfest (Edited)
Shibboleth 2.0 IdP slides - Installfest (Edited)
 
04 Wa 2 Soq Booklet Amec
04 Wa 2 Soq Booklet Amec04 Wa 2 Soq Booklet Amec
04 Wa 2 Soq Booklet Amec
 
Us studies
Us studiesUs studies
Us studies
 
Kennedy Power PointChapter 50
Kennedy Power PointChapter 50Kennedy Power PointChapter 50
Kennedy Power PointChapter 50
 
Taller iglekids 1
Taller iglekids 1Taller iglekids 1
Taller iglekids 1
 
88L10 MARINE CERT
88L10 MARINE CERT88L10 MARINE CERT
88L10 MARINE CERT
 
JJO NEWS #1
JJO NEWS #1JJO NEWS #1
JJO NEWS #1
 
2016/01/04付 オリジナルiTunes週間トップソングトピックス
2016/01/04付 オリジナルiTunes週間トップソングトピックス2016/01/04付 オリジナルiTunes週間トップソングトピックス
2016/01/04付 オリジナルiTunes週間トップソングトピックス
 
Moodboards
MoodboardsMoodboards
Moodboards
 
ACICARE VA
ACICARE VAACICARE VA
ACICARE VA
 
Welcome and MAX Keynotes - Dave Sobel and Alistair Forbes
Welcome and MAX Keynotes   - Dave Sobel and Alistair ForbesWelcome and MAX Keynotes   - Dave Sobel and Alistair Forbes
Welcome and MAX Keynotes - Dave Sobel and Alistair Forbes
 
料理研究一家「古川家」を支えるツールと技術 | CPI MEGA MIX 2015
料理研究一家「古川家」を支えるツールと技術 | CPI MEGA MIX 2015料理研究一家「古川家」を支えるツールと技術 | CPI MEGA MIX 2015
料理研究一家「古川家」を支えるツールと技術 | CPI MEGA MIX 2015
 
A viagem
A viagemA viagem
A viagem
 
El amor para zayn malik
El amor para zayn malikEl amor para zayn malik
El amor para zayn malik
 

Similar to Shibboleth: Open Source Distributed Authentication and Authorization

Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsSloan Carne
 
Fund Raisin Digital Pops breakfast event with Charles Russell - 24.10.12
Fund Raisin Digital Pops breakfast event with Charles Russell - 24.10.12Fund Raisin Digital Pops breakfast event with Charles Russell - 24.10.12
Fund Raisin Digital Pops breakfast event with Charles Russell - 24.10.12Chameleon
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyMicah Altman
 
Keith prabhu global high on cloud summit
Keith prabhu  global high on cloud summitKeith prabhu  global high on cloud summit
Keith prabhu global high on cloud summitadministrator_confidis
 
Enterprise social networking v1.2
Enterprise social networking v1.2Enterprise social networking v1.2
Enterprise social networking v1.2James Sutter
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacyPECB
 
Building Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media AnalysisBuilding Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media AnalysisOpen Analytics
 
OpenDataCourse-02-WhatIsOpenData
OpenDataCourse-02-WhatIsOpenDataOpenDataCourse-02-WhatIsOpenData
OpenDataCourse-02-WhatIsOpenDataroutetopa
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksLiming Zhu
 
INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...
INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...
INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...Micah Altman
 
From Cryptoequity to Cryptocommons
From Cryptoequity to CryptocommonsFrom Cryptoequity to Cryptocommons
From Cryptoequity to CryptocommonsRaffaele Mauro
 
Legal, Policy & the Blockchain
Legal, Policy & the BlockchainLegal, Policy & the Blockchain
Legal, Policy & the BlockchainTudor Stanciu
 
SharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and ComplianceSharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and ComplianceMatthew R. Barrett
 
What is federated single sign-on?
What is federated single sign-on?What is federated single sign-on?
What is federated single sign-on?OpenAthens
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOAPeter Henley
 

Similar to Shibboleth: Open Source Distributed Authentication and Authorization (20)

Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Fund Raisin Digital Pops breakfast event with Charles Russell - 24.10.12
Fund Raisin Digital Pops breakfast event with Charles Russell - 24.10.12Fund Raisin Digital Pops breakfast event with Charles Russell - 24.10.12
Fund Raisin Digital Pops breakfast event with Charles Russell - 24.10.12
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
Lecture4 Social Web
Lecture4 Social Web Lecture4 Social Web
Lecture4 Social Web
 
Emerging Applications of Blockchain for Supply Chains
Emerging Applications of Blockchain for Supply ChainsEmerging Applications of Blockchain for Supply Chains
Emerging Applications of Blockchain for Supply Chains
 
Keith prabhu global high on cloud summit
Keith prabhu  global high on cloud summitKeith prabhu  global high on cloud summit
Keith prabhu global high on cloud summit
 
Blockchain
Blockchain Blockchain
Blockchain
 
Enterprise social networking v1.2
Enterprise social networking v1.2Enterprise social networking v1.2
Enterprise social networking v1.2
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacy
 
Building Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media AnalysisBuilding Effective Frameworks for Social Media Analysis
Building Effective Frameworks for Social Media Analysis
 
OpenDataCourse-02-WhatIsOpenData
OpenDataCourse-02-WhatIsOpenDataOpenDataCourse-02-WhatIsOpenData
OpenDataCourse-02-WhatIsOpenData
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risks
 
INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...
INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...
INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...
 
From Cryptoequity to Cryptocommons
From Cryptoequity to CryptocommonsFrom Cryptoequity to Cryptocommons
From Cryptoequity to Cryptocommons
 
Legal, Policy & the Blockchain
Legal, Policy & the BlockchainLegal, Policy & the Blockchain
Legal, Policy & the Blockchain
 
SharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and ComplianceSharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and Compliance
 
Here Comes Everything
Here Comes EverythingHere Comes Everything
Here Comes Everything
 
What is federated single sign-on?
What is federated single sign-on?What is federated single sign-on?
What is federated single sign-on?
 
A trust aggregation portal
A trust aggregation portalA trust aggregation portal
A trust aggregation portal
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 

Recently uploaded

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Recently uploaded (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

Shibboleth: Open Source Distributed Authentication and Authorization