towards an economic valuation of telco based valuation of
play

Towards an Economic Valuation of Telco-based Valuation of Telco - PowerPoint PPT Presentation

Towards an Economic Valuation of Telco-based Valuation of Telco based Identity Management Enablers Enablers PrimeLife/IFIP Summer School 2010 Helsingborg, 2010-08-04 Kai Rannenberg, S ascha Koschinat, Andreas Albers, Gkhan


  1. …… …… Towards an Economic Valuation of Telco-based Valuation of Telco based Identity Management Enablers Enablers PrimeLife/IFIP Summer School 2010 Helsingborg, 2010-08-04 Kai Rannenberg, S ascha Koschinat, Andreas Albers, Gökhan Bal, Marvin Hegen, Christian Weber T-Mobile Chair of Mobile Business & Multilateral S ecurity Institute of Business Informatics ... ... Goethe University Frankfurt www.m-chair.net

  2. …… …… Agenda … 1 1. Identity Management in IS Id tit M t i IS O/ IEC O/ IEC S tandardisation 2. Multilateral S 2 M ltil t l S ecurity it 3. The Identity Management Enabler Concept 4. Motivating the Provision of IdM Enablers by Telecoms 5. Evaluation Approach for IdM Enablers 6. Economic Evaluation of exemplary IdM Enabler “ Age Verification” 7. Conclusion and questions for discussion ... ... 2

  3. …… …… Agenda … 1 1. Identity Management in IS Id tit M t i IS O/ IEC JTC 1 O/ IEC JTC 1 S tandardisation 2. Multilateral S 2 M ltil t l S ecurity it 3. The Identity Management Enabler Concept 4. Motivating the Provision of IdM Enablers by Telecoms 5. Evaluation Approach for IdM Enablers 6. Economic Evaluation of exemplary IdM Enabler “ Age Verification” 7. Conclusion and questions for discussion ... ... 3

  4. WGs within ISO/IEC JTC 1/SC 27 – IT Security Techniques IT Security Techniques ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies WG 3 WG 3 WG 1 WG 1 Assessment Security Evaluation ISMS WG 4 WG 4 Guidelines Security Controls & Services WG 5 WG 2 Identity Management Cryptography & & Privacy Technologies Techniques Security Mechanisms Process Environment Product System 4

  5. WG 5 Identity Management & Privacy Technologies History y ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies October 2003 JTC 1 Plenary established  JTC 1 Study Group on Privacy Technologies (SGPT) JTC 1 St d G P i T h l i (SGPT)  for one year period of time (until October 2004) to identify standardization needs October 2004 JTC 1 Pl JTC 1 Plenary resolved to l d t  disband SGPT  assign to SC 27 further activities in the Privacy Technologies area such as  a further inventory  a report back to the November 2006 JTC 1 Plenary 5

  6. WG 5 Identity Management & Privacy Technologies History y ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SC 27 SC 27 activities (in response to JTC 1‘s request ti iti (i t JTC 1‘ t from October 2004)  October 2004  Study Period on Identity Management established  May 2005  Study Period on Privacy established  Study Period on Privacy established  New Work Item Proposal: A framework for identity management (ISO/IEC 24760)  May 2006 M 2006  New Working Group 5 on Identity Management and Privacy Technologies established  Two new Work Item Proposals T W k I P l  A privacy framework (ISO/IEC 29100)  A privacy reference architecture (ISO/IEC 29101) 6

  7. Identity Management (IdM) An early approach ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies  „Fear not, for I have redeemed you; Fear not for I have redeemed you; I have called you by name: you are mine.” [Isaiah 43:1]  „ Μη φοβου· διοτι εγω σε ελυτρωσα , σε εκαλεσα με το ονομα σου· εμου εισαι “ [ Ησαιαν 43:1] [ Ησαιαν 43:1]  „No temas, porque yo te he redimido, te he llamado por tu nombre; mío eres tú.“ t h ll d t b í tú “ [Isaías 43 1 ]  „Fürchte dich nicht, denn ich habe dich erlöst; ich habe dich bei deinem Namen gerufen; du bist mein!“ [Jesaja 43,1] 7

  8. Identity Management (IdM) 2 sides of a medal with enormous economic potential ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies  Organisations aim to sort out  People live their life  User Accounts in different IT  in different roles (professional, systems private, volunteer)  Authentication  using different identities (pseudonyms): email accounts,  Rights management g s a age e SIM cards, eBay trade names, SIM d B d  Access control chat names, 2ndLife names, …)  Differentiated identities  Unified identities  Unified identities help to help to  protect  ease administration  privacy, especially anonymity  manage customer relations  personal security/safety p y y  enable reputation building at the same time  Identity management  Identity management systems systems systems  support users using role based  support users using role based  ease single-sign-on by unify identities accounts  help to present the “right” identity  solve the problems of multiple in the right context passwords passwords 8

  9. Identity Management (IdM) 2 sides of a medal with enormous economic potential ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies  People live their life  Organisations aim to sort out  in different roles (professional,  User Accounts in different IT private, volunteer) systems  using different identities  Authentication (pseudonyms): email  Rights management g s a age e accounts, SIM cards, eBay SIM d B  Access control trade names, chat names, 2ndLife names, …)  Unified identities  Unified identities  Differentiated identities Diff ti t d id titi help to help to  ease administration  protect  manage customer relations  privacy, especially anonymity p y p y y y  personal security/safety  enable reputation building at the same time  Identity management  Identity management Identity management Identity management systems systems  support users using role based  ease single-sign-on by unify identities accounts  help to present the “right”  help to present the right  solve the problems of multiple  solve the problems of multiple identity in the right context passwords 9

  10. WG 5 Identity Management & Privacy Technologies Scope p ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies  Development and maintenance of D l t d i t f standards and guidelines addressing security aspects of  Identity management Identity management  Biometrics and  Privacy P i 10

  11. WG 5 Identity Management & Privacy Technologies Programme of Work ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies Frameworks & Architectures  A Framework for Identity Management (ISO/IEC 24760, CD)  Privacy Framework (ISO/IEC 29100, CD)  Privacy Reference Architecture (ISO/IEC 29101, CD) P i R f A hit t (ISO/IEC 29101 CD)  Entity Authentication Assurance Framework (ISO/IEC 29115 / ITU-T X.eaa, CD)  A Framework for Access Management (ISO/IEC 29146 WD)  A Framework for Access Management (ISO/IEC 29146, WD) Protection Concepts  Biometric information protection (ISO/IEC 24745 FCD)  Biometric information protection (ISO/IEC 24745, FCD)  Requirements on relative anonymity with identity escrow – model for authentication and authorization using group signatures (ISO/IEC 29191, WD) Guidance on Context and Assessment  Authentication Context for Biometrics (ISO/IEC 24761, IS)  Privacy Capability Assessment Model (ISO/IEC 29190, WD) 11

  12. WG 5 Identity Management & Privacy Technologies Roadmap ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies 12

  13. …… …… Agenda … 1 1. Identity Management in IS Id tit M t i IS O/ IEC O/ IEC S tandardisation 2. Multilateral S 2 M ltil t l S ecurity it 3. The Identity Management Enabler Concept 4. Motivating the Provision of IdM Enablers by Telecoms 5. Evaluation Approach for IdM Enablers 6. Economic Evaluation of exemplary IdM Enabler “ Age Verification” 7. Conclusion and questions for discussion ... ... 13

  14. …… …… Different parties with different … interests in communication networks interests in communication networks Service Service Provider Subscriber Network Operator Other examples  Customers/ Merchants Subscriber  Communication partners  Citizens/ ... Administration ... ... 14

  15. …… …… … in E/ M-commerce … in a world of consortia in a world of consortia …  more partners  more complex more complex Service Service Provider relations Subscriber Network Operator Subscriber Content Content Provider ... ... 15

  16. …… …… Multilateral S Mult late al S ecurity ecu ty … R Respecting ti Supporting Interests Sovereignty Protection of different parties and their interests Considering Conflicts ... ... 16

  17. …… …… Multilateral S ecurity … considers conflicts considers conflicts Supporting Sovereignty Respecting Interests  Requiring each party to  Parties can define their only minimally trust in only minimally trust in own interests . own interests the honesty of others  Conflicts can be  Requiring only minimal or q g y recognised and recognised and no trust in technology of negotiated . others  Negotiated results can be g reliably enforced . ... ... Protection of different parties and their interests 17

  18. …… …… A simplified model … for this presentation for this presentation Service Service Provider Subscriber Network Operator Subscriber ... ... ... 18

Recommend


More recommend