Top Banner
Introduction: Identity Management – Our Perspective Henry Krasemann, Marit Hansen Unabhängiges Landeszentrum für Datenschutz // Independent Centre for Privacy Protection Schleswig-Holstein, Germany CACR, Toronto, October 2004
26

Introduction: Identity Management – Our Perspective

Jan 05, 2016

Download

Documents

Gomez Torres

Introduction: Identity Management – Our Perspective. Henry Krasemann, Marit Hansen Unabhängiges Landeszentrum für Datenschutz // Independent Centre for Privacy Protection Schleswig-Holstein, Germany CACR, Toronto, October 2004. Overview. Identity Management – More than Single sign-on?? - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Introduction: Identity Management – Our Perspective

Introduction:Identity Management – Our Perspective

Henry Krasemann, Marit Hansen

Unabhängiges Landeszentrum für Datenschutz //

Independent Centre for Privacy Protection

Schleswig-Holstein, Germany

CACR, Toronto, October 2004

Page 2: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Overview

• Identity Management – More than Single sign-on??

• Different Ways of Implementation – Different Properties of Solutions

• Outlook – A Glimpse into the Future

Page 3: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Identity Management –

More than Single Sign-on??

Page 4: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Category 1:“Account Management”

NOT

Employee

Company

Page 5: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Category 1:“Account Management”

Company

Employee

PersonnelData

NOT

Page 6: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Category 2:“Profiling”

Individuals,e.g. customers, citizens

NOT

Organization,e.g. company/

gov. administration

Page 7: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Category 2:“Profiling”

Individuals,e.g. customers, citizens

PII

NOT

Organization,e.g. company/

gov. administration

Page 8: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Category 2:“Profiling”

Organization,e.g. company/

gov. administrationIndividuals,

e.g. customers, citizens

PII

Customer relationship

NOT

Page 9: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Category 2:“Profiling”

Individuals,e.g. customers, citizens

NOT

Customer relationship

Organization,e.g. company/

gov. administration

Page 10: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Category 3:“Management of own identities”

User

Page 11: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Category 3:“Management of own identities”

Trustedarea

User

Page 12: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Category 3:“Management of own identities”

Context-dependent

pseudonyms

Trustedarea

User

Page 13: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Intermediate Result

Cat. 1 “Account Management”

by organization

Cat. 2 “Profiling” by organization

Cat. 3 “Management ofown

identities”

by user himself supported by

service providers

X

X

Page 14: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Different Ways of Implementation –

Different Properties of Solutions

Page 15: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Problem Solution Concept

Confusing and inconvenient handling of my different “identities”

Password Management;

Form Filler

Little knowledge of what others know about me

Anonymity as basis, on top:

Controllability of data flow and of privacy preferences;

Reputation Management

Little control about what I permit from the outside

Reachability Management

Little legal liability;

no protection against Identity Theft

Authenticity

Motivation

Page 16: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Problem Solution Concept

Confusing and inconvenient handling of my different “identities”

Password Management;

Form Filler

Little knowledge of what others know about me

Anonymity as basis, on top:

Controllability of data flow and of privacy preferences;

Reputation Management

Little control about what I permit from the outside

Reachability Management

Little legal liability;

no protection against Identity Theft

Authenticity

Motivation

Page 17: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Problem Solution Concept

Confusing and inconvenient handling of my different “identities”

Password Management;

Form Filler

Little knowledge of what others know about me

Anonymity as basis, on top:

Controllability of data flow and of privacy preferences;

Reputation Management

Little control about what I permit from the outside

Reachability Management

Little legal liability;

no protection against Identity Theft

Authenticity

Motivation

Page 18: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Problem Solution Concept

Confusing and inconvenient handling of my different “identities”

Password Management;

Form Filler

Little knowledge of what others know about me

Anonymity as basis, on top:

Controllability of data flow and of privacy preferences;

Reputation Management

Little control about what I permit from the outside

Reachability Management

Little legal liability;

no protection against Identity Theft

Authenticity

Motivation

Page 19: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Problem Solution Concept

Confusing and inconvenient handling of my different “identities”

Password Management;

Form Filler

Little knowledge of what others know about me

Anonymity as basis, on top:

Controllability of data flow and of privacy preferences;

Reputation Management

Little control about what I permit from the outside

Reachability Management

Little legal liability;

no protection against Identity Theft

Authenticity

Motivation

State of the Art

+

-

-

±

±

-

+

Page 20: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Key question:Who is in control?

Page 21: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Outlook –

A Glimpse into the Future

Page 22: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Source:Identity Management Systems (IMS):Identification and Comparison Study, September 2003

The Market of Identity Management Systems

Page 23: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

“A Toolkit for Usable Security Freiburg”

Page 24: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Page 25: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

IdentityManagementComponent:

Pseudonymous Delivery Service

In several countries:“Pickpoints”

at Gas Stations

Page 26: Introduction: Identity Management – Our Perspective

Identity Management – Our Perspective

Further Information

PRIME – Privacy and Identity Management for Europe(Aim: Prototype)

www.prime-project.eu.org

[email protected]

FIDIS – Future of Identity in the Information Society(Network of Excellence)

www.fidis.net

[email protected]

www.uld-i.de