pseudonymous authentication and authorization enhancing
play

Pseudonymous Authentication and Authorization enhancing ubiquitous - PowerPoint PPT Presentation

Pseudonymous Authentication and Authorization enhancing ubiquitous Identity Management Thomas Hildmann hildmann@prz.tu-berlin.de Berlin University of Technology (TUB) Content Motivation Advantages of pseudonymous A+A


  1. Pseudonymous Authentication and Authorization enhancing ubiquitous Identity Management Thomas Hildmann hildmann@prz.tu-berlin.de Berlin University of Technology (TUB)

  2. Content • Motivation – Advantages of pseudonymous A+A • Pseudonymous Authentication • Pseudonymous Authorization – ADFBlinder – Hiding of Structure-Application Mapping – Isolated ADF-Components • Summary

  3. Motivation – Works in B2B- • Ubiquitous A+A Environments (multi- – Just one (meta-) party A+A) database – Good for outsourcing – Effective, consistent – In case of an incident • Pseudonymity • Multilateral Security – Privacy Law – Principles and – Unions Methods are well- – Employees investigated – Insider attacks

  4. Pseudonymous Authentication • Implemented in Project „Campuskarte“ • Basic idea – Separation of Card-ID and User-ID – Card-ID revocation-lists – Knowledge is distributed between Application, Authentication-Server, Card- Database and Client-Computer

  5. Basic RBAC-Model UML-representation of simplified NIST RBAC model Derived model

  6. How to archive pseudonymity? • To authorize a person (s)he must be identified (may be pseudonymously). • Maintaining pseudonymity during the authorization-process. • This is possible by deploying necessary information: Initiator (subject), application/data (object), function (operation)

  7. Q ID A ADFBlinder-Architecture

  8. Hiding of Structure- Application-Mapping

  9. 2 2 1 1

  10. Hiding of Structure- User � SBR Application-Mapping SBR � ABR

  11. Isolated ADF-Components

  12. Comparing + simple cryptographic solution + no additional cryptography + just jails needed + mixes are well-investigated - RBAC-Metadirectory can - mixes must be driven track users Hiding of Structure- ADFBlinder-Architecture Application-Mapping + no additional crypto + no mixes - Metadir-Problem Isolated ADF-Components

  13. Summary • Advantages of ubiquitous IDM – Centralized structure / decentralized management – Homogeneous policy / fine grained customization – Users controlling their own identity • Disadvantages without pseudonymity – Traceability • Pseudonymous Authorization – Different implementation possible – We are implementing one

  14. Outlook – Use of modeling patterns • Implementation of (like programming RBAC-IDM System at patterns) Berlin University of – Pseudonymous Technology (TUB) Authentication and – Application Authorization comprehensive – Self administration and – Modeling of organization- delegation of rights and access-roles – Privacy suitable IDM – Distributed cross- organizational RBAC hildmann@prz.tu-berlin.de

Recommend


More recommend