pseudonymous authentication and authorization enhancing
play

Pseudonymous Authentication and Authorization enhancing ubiquitous - PowerPoint PPT Presentation

Pseudonymous Authentication and Authorization enhancing ubiquitous Identity Management Thomas Hildmann hildmann@prz.tu-berlin.de Berlin University of Technology (TUB) Content Motivation Advantages of pseudonymous A+A


  1. Pseudonymous Authentication and Authorization enhancing ubiquitous Identity Management Thomas Hildmann hildmann@prz.tu-berlin.de Berlin University of Technology (TUB)

  2. Content • Motivation – Advantages of pseudonymous A+A • Pseudonymous Authentication • Pseudonymous Authorization – ADFBlinder – Hiding of Structure-Application Mapping – Isolated ADF-Components • Summary

  3. Motivation – Works in B2B- • Ubiquitous A+A Environments (multi- – Just one (meta-) party A+A) database – Good for outsourcing – Effective, consistent – In case of an incident • Pseudonymity • Multilateral Security – Privacy Law – Principles and – Unions Methods are well- – Employees investigated – Insider attacks

  4. Pseudonymous Authentication • Implemented in Project „Campuskarte“ • Basic idea – Separation of Card-ID and User-ID – Card-ID revocation-lists – Knowledge is distributed between Application, Authentication-Server, Card- Database and Client-Computer

  5. Basic RBAC-Model UML-representation of simplified NIST RBAC model Derived model

  6. How to archive pseudonymity? • To authorize a person (s)he must be identified (may be pseudonymously). • Maintaining pseudonymity during the authorization-process. • This is possible by deploying necessary information: Initiator (subject), application/data (object), function (operation)

  7. Q ID A ADFBlinder-Architecture

  8. Hiding of Structure- Application-Mapping

  9. 2 2 1 1

  10. Hiding of Structure- User � SBR Application-Mapping SBR � ABR

  11. Isolated ADF-Components

  12. Comparing + simple cryptographic solution + no additional cryptography + just jails needed + mixes are well-investigated - RBAC-Metadirectory can - mixes must be driven track users Hiding of Structure- ADFBlinder-Architecture Application-Mapping + no additional crypto + no mixes - Metadir-Problem Isolated ADF-Components

  13. Summary • Advantages of ubiquitous IDM – Centralized structure / decentralized management – Homogeneous policy / fine grained customization – Users controlling their own identity • Disadvantages without pseudonymity – Traceability • Pseudonymous Authorization – Different implementation possible – We are implementing one

  14. Outlook – Use of modeling patterns • Implementation of (like programming RBAC-IDM System at patterns) Berlin University of – Pseudonymous Technology (TUB) Authentication and – Application Authorization comprehensive – Self administration and – Modeling of organization- delegation of rights and access-roles – Privacy suitable IDM – Distributed cross- organizational RBAC hildmann@prz.tu-berlin.de

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend