towards an economic valuation of telco based valuation of
play

Towards an Economic Valuation of Telco-based Valuation of Telco - PowerPoint PPT Presentation

Towards an Economic Valuation of Telco-based Valuation of Telco based Identity Management Enablers Enablers PrimeLife/IFIP Summer School 2010 Helsingborg, 2010-08-04 Kai Rannenberg, S ascha Koschinat, Andreas Albers, Gkhan


  1. …… …… Towards an Economic Valuation of Telco-based Valuation of Telco based Identity Management Enablers Enablers PrimeLife/IFIP Summer School 2010 Helsingborg, 2010-08-04 Kai Rannenberg, S ascha Koschinat, Andreas Albers, Gökhan Bal, Marvin Hegen, Christian Weber T-Mobile Chair of Mobile Business & Multilateral S ecurity Institute of Business Informatics ... ... Goethe University Frankfurt www.m-chair.net

  2. …… …… Agenda … 1 1. Identity Management in IS Id tit M t i IS O/ IEC O/ IEC S tandardisation 2. Multilateral S 2 M ltil t l S ecurity it 3. The Identity Management Enabler Concept 4. Motivating the Provision of IdM Enablers by Telecoms 5. Evaluation Approach for IdM Enablers 6. Economic Evaluation of exemplary IdM Enabler “ Age Verification” 7. Conclusion and questions for discussion ... ... 2

  3. …… …… Agenda … 1 1. Identity Management in IS Id tit M t i IS O/ IEC JTC 1 O/ IEC JTC 1 S tandardisation 2. Multilateral S 2 M ltil t l S ecurity it 3. The Identity Management Enabler Concept 4. Motivating the Provision of IdM Enablers by Telecoms 5. Evaluation Approach for IdM Enablers 6. Economic Evaluation of exemplary IdM Enabler “ Age Verification” 7. Conclusion and questions for discussion ... ... 3

  4. WGs within ISO/IEC JTC 1/SC 27 – IT Security Techniques IT Security Techniques ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies WG 3 WG 3 WG 1 WG 1 Assessment Security Evaluation ISMS WG 4 WG 4 Guidelines Security Controls & Services WG 5 WG 2 Identity Management Cryptography & & Privacy Technologies Techniques Security Mechanisms Process Environment Product System 4

  5. WG 5 Identity Management & Privacy Technologies History y ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies October 2003 JTC 1 Plenary established  JTC 1 Study Group on Privacy Technologies (SGPT) JTC 1 St d G P i T h l i (SGPT)  for one year period of time (until October 2004) to identify standardization needs October 2004 JTC 1 Pl JTC 1 Plenary resolved to l d t  disband SGPT  assign to SC 27 further activities in the Privacy Technologies area such as  a further inventory  a report back to the November 2006 JTC 1 Plenary 5

  6. WG 5 Identity Management & Privacy Technologies History y ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SC 27 SC 27 activities (in response to JTC 1‘s request ti iti (i t JTC 1‘ t from October 2004)  October 2004  Study Period on Identity Management established  May 2005  Study Period on Privacy established  Study Period on Privacy established  New Work Item Proposal: A framework for identity management (ISO/IEC 24760)  May 2006 M 2006  New Working Group 5 on Identity Management and Privacy Technologies established  Two new Work Item Proposals T W k I P l  A privacy framework (ISO/IEC 29100)  A privacy reference architecture (ISO/IEC 29101) 6

  7. Identity Management (IdM) An early approach ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies  „Fear not, for I have redeemed you; Fear not for I have redeemed you; I have called you by name: you are mine.” [Isaiah 43:1]  „ Μη φοβου· διοτι εγω σε ελυτρωσα , σε εκαλεσα με το ονομα σου· εμου εισαι “ [ Ησαιαν 43:1] [ Ησαιαν 43:1]  „No temas, porque yo te he redimido, te he llamado por tu nombre; mío eres tú.“ t h ll d t b í tú “ [Isaías 43 1 ]  „Fürchte dich nicht, denn ich habe dich erlöst; ich habe dich bei deinem Namen gerufen; du bist mein!“ [Jesaja 43,1] 7

  8. Identity Management (IdM) 2 sides of a medal with enormous economic potential ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies  Organisations aim to sort out  People live their life  User Accounts in different IT  in different roles (professional, systems private, volunteer)  Authentication  using different identities (pseudonyms): email accounts,  Rights management g s a age e SIM cards, eBay trade names, SIM d B d  Access control chat names, 2ndLife names, …)  Differentiated identities  Unified identities  Unified identities help to help to  protect  ease administration  privacy, especially anonymity  manage customer relations  personal security/safety p y y  enable reputation building at the same time  Identity management  Identity management systems systems systems  support users using role based  support users using role based  ease single-sign-on by unify identities accounts  help to present the “right” identity  solve the problems of multiple in the right context passwords passwords 8

  9. Identity Management (IdM) 2 sides of a medal with enormous economic potential ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies  People live their life  Organisations aim to sort out  in different roles (professional,  User Accounts in different IT private, volunteer) systems  using different identities  Authentication (pseudonyms): email  Rights management g s a age e accounts, SIM cards, eBay SIM d B  Access control trade names, chat names, 2ndLife names, …)  Unified identities  Unified identities  Differentiated identities Diff ti t d id titi help to help to  ease administration  protect  manage customer relations  privacy, especially anonymity p y p y y y  personal security/safety  enable reputation building at the same time  Identity management  Identity management Identity management Identity management systems systems  support users using role based  ease single-sign-on by unify identities accounts  help to present the “right”  help to present the right  solve the problems of multiple  solve the problems of multiple identity in the right context passwords 9

  10. WG 5 Identity Management & Privacy Technologies Scope p ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies  Development and maintenance of D l t d i t f standards and guidelines addressing security aspects of  Identity management Identity management  Biometrics and  Privacy P i 10

  11. WG 5 Identity Management & Privacy Technologies Programme of Work ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies Frameworks & Architectures  A Framework for Identity Management (ISO/IEC 24760, CD)  Privacy Framework (ISO/IEC 29100, CD)  Privacy Reference Architecture (ISO/IEC 29101, CD) P i R f A hit t (ISO/IEC 29101 CD)  Entity Authentication Assurance Framework (ISO/IEC 29115 / ITU-T X.eaa, CD)  A Framework for Access Management (ISO/IEC 29146 WD)  A Framework for Access Management (ISO/IEC 29146, WD) Protection Concepts  Biometric information protection (ISO/IEC 24745 FCD)  Biometric information protection (ISO/IEC 24745, FCD)  Requirements on relative anonymity with identity escrow – model for authentication and authorization using group signatures (ISO/IEC 29191, WD) Guidance on Context and Assessment  Authentication Context for Biometrics (ISO/IEC 24761, IS)  Privacy Capability Assessment Model (ISO/IEC 29190, WD) 11

  12. WG 5 Identity Management & Privacy Technologies Roadmap ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies 12

  13. …… …… Agenda … 1 1. Identity Management in IS Id tit M t i IS O/ IEC O/ IEC S tandardisation 2. Multilateral S 2 M ltil t l S ecurity it 3. The Identity Management Enabler Concept 4. Motivating the Provision of IdM Enablers by Telecoms 5. Evaluation Approach for IdM Enablers 6. Economic Evaluation of exemplary IdM Enabler “ Age Verification” 7. Conclusion and questions for discussion ... ... 13

  14. …… …… Different parties with different … interests in communication networks interests in communication networks Service Service Provider Subscriber Network Operator Other examples  Customers/ Merchants Subscriber  Communication partners  Citizens/ ... Administration ... ... 14

  15. …… …… … in E/ M-commerce … in a world of consortia in a world of consortia …  more partners  more complex more complex Service Service Provider relations Subscriber Network Operator Subscriber Content Content Provider ... ... 15

  16. …… …… Multilateral S Mult late al S ecurity ecu ty … R Respecting ti Supporting Interests Sovereignty Protection of different parties and their interests Considering Conflicts ... ... 16

  17. …… …… Multilateral S ecurity … considers conflicts considers conflicts Supporting Sovereignty Respecting Interests  Requiring each party to  Parties can define their only minimally trust in only minimally trust in own interests . own interests the honesty of others  Conflicts can be  Requiring only minimal or q g y recognised and recognised and no trust in technology of negotiated . others  Negotiated results can be g reliably enforced . ... ... Protection of different parties and their interests 17

  18. …… …… A simplified model … for this presentation for this presentation Service Service Provider Subscriber Network Operator Subscriber ... ... ... 18

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend