[PET] Call for Participation: IFIP IDMAN 2010

Lothar Fritsch Lothar.Fritsch at NR.no
Wed Sep 15 09:53:59 BST 2010


Call for Participation

IFIP IDMAN 2010 Conference, Oslo, Norway, November 18-19, 2010


The IDMAN 2010 conference will be held on Nov. 18-19, 2010 in Oslo, Norway,
at The Norwegian Computing Center. Further Information is available at the
IDMAN 2010 conference venue at http://ifipidman2010.nr.no.


Please register at the Participant Registration page at
http://ifipidman2010.nr.no. Early bird registration ends on Sep. 15, 2010.



The world of the 21st century is, more than ever, global and impersonal.
Criminal and terrorist threats, both physical and on the internet, increase
by the day. The demand for better methods of identification is growing, not
only in companies and organisations but also in the world at large.

Identity management is put under pressure, due to the growing number of
frauds who want to hide their true identity. Identity management challenges
the information security research community to focus on interdisciplinary
and holistic approaches while retaining the benefits of previous research
efforts.

As part of this tendency, surveillance and monitoring are more prominently
present in society, both in the public and private domain. The original
intention being to contribute to security and safety, surveillance and
monitoring might, in some cases, have unintended or even contradictory
effects. Besides, the omnipresence of surveillance and monitoring systems
might be at daggers drawn with public and democratic liberties.


Key note speakers
------------------



Caspar Bowden, Chief Privacy Advisor at Microsoft


The Microsoft roadmap for U-Prove and identity architecture: U-Prove is a
cryptographic technology that enables the issuance and presentation of
cryptographically protected claims in a manner that provides multi-party
security: issuing organizations, users, and relying parties can protect
themselves not just against outsider attacks but also against attacks
originating from each other. At the same time, the U-Prove technology
enables any desired degree of privacy (including authenticated anonymity and
pseudonymity) without contravening multi-party security. These user-centric
aspects make the U-Prove technology ideally suited to create the digital
equivalent of paper-based credentials and the plastic cards in one's wallet.
This talk will present the roadmap for U-Prove and identity architectures at
Microsoft.



Prof. Audun Jøsang, University Graduate College, University of Oslo


Authentication Assurance with Identity Management Models: There is a strong
push towards implementing and deploying identity management solutions for
open environments, e.g. in the form of OpenID, CardSpace or various
implementations of the SAML standard. The level of authentication assurance
that can be achieved depends on the technology used as well as on the level
of trust between the involved parties. This talk discusses the factors that
influence the authentication assurance level that can be provided with
contemporary identity management models.



Tutorials
----------


Inclusive Identity Mangament - Usability perspectives on IDM


Kristin S. Fuglerud, Norwegian Computing Center


Users with disabilities are continuously confronted with barriers to use
everyday ICT-pro¬ducts and -services. The first barrier is often
registration and authen¬tication. Common authentication methods include
passwords and PINs, tokens, bio¬metry, smart cards, and 3rd-party channels
such as one-time codes from tokens or code generators. Studying these
barriers provides insights that are relevant for all types of users.


By universal design (UD), all potential users with different skills,
know¬ledge, age, gender, (dis)abilities and literacy, can be included. A
central issue in universal design of ICTs is flexible multimodal user
interfaces (UI) that can meet different users’ needs, abilities, situations,
preferences and devices. Systems that can adapt to users needs and
preferences are called for. However, adaptive, dynamic profiling systems
introduce new privacy threats.


This lecture will sketch the problem area, and introduce the technique of
Universal Design and its application to electronic services with Identity
Management.
ISO Identity Managament Standardization - insights from PrimeLife


Hans Hedbom, Karlstad University and Rigo Wenning, W3C


ISO/IEC is currently developing standards within the identity management
area. This session is aimed at discussing and presenting this effort. The
session is not an official ISO/IEC session. However, the presenters
represents the EU FP7 PrimeLife project which have a liaison towards ISO/IEC
JTC 1/SC 27/WG 5 so views expressed might influence the comments made to the
working group through this liaison.
Presentation abstracts



Scientific program
-------------------


10 of the submitted scientific articles were accepted by the reviewers.
Please find the presentation abstracts below.




Patrik Bichsel and Jan Camenisch, IBM Research Switzerland: Mixing
Identities Made Easy


Anonymous credential systems are a key ingredient for a secure and privacy
protecting electronic world. In their full-fledged form, they offer a wide
range of features and allow one to address the requirements of almost any
authentication system. However, these many features result in a complex
system that can be difficult to use. In this paper, we aim to make
credential systems easier to employ by providing an architecture and
high-level specifications for the different components, transactions and
features of the identity mixer anonymous credential system. The
specifications abstract away the cryptographic details but they are still
sufficiently concrete to enable all functionalities. We demonstrate the use
of our framework by applying it an e-cash scenario.




Haitham Al-sinani and Chris Mitchell, Royal Holloway, University of London:
Using CardSpace as a Password Manager


In this paper we propose a scheme that allows Windows CardSpace to be used
as a password manager, thereby both improving the usability and security of
password use and potentially encouraging CardSpace adoption. Usernames and
passwords are stored in personal cards, and these cards can be used to sign
on transparently to corresponding websites. The scheme does not require any
changes to login servers or to the CardSpace identity selector and, in
particular, it does not require websites to support CardSpace. We describe
how the scheme operates, and give details of a proof-of-concept prototype.
Security and usability analyses are also provided.




Klaus Stranacher and Mario Ivkovic, E-Government Innovation Center (EGIZ),
Austria: Foreign Identities in the Austrian E-Government - An interoperable
eID Solution


With the revision of the Austrian E-Government Act in the year 2008, the
legal basis for a full integration of foreign persons in the Austrian
e-government, has been created. Additionally, the E-Government Equivalence
Decree will be published in spring 2010. This decree clarifies which foreign
electronic identities are considered to be equivalent to Austrian identities
and can be electronically registered within the Austrian identity register.
Based on this legal framework a concept has been developed which allows
non-Austrian citizens to log in to Austrian online administrative procedures
using their foreign identity. A solution resting upon this concept has been
developed and successfully tested. This solution will become operative when
the E-Government Equivalence Decree comes into force.




Anssi Hoikkanen et al, European Commission / JRC: Understanding the
Economics of Electronic Identity: Theoretical Approaches and Case Studies


This paper discusses the economics of electronic identity (eIdentity) from
both theoretical and practical perspectives. Personal identity data are
becoming increasingly important in online transactions, and they have never
been monetised to the extent they are today. Consequently, there is a need
for an improved understanding of the economic externalities resulting from
the electronic use of identities in transactions. In this context, we
distinguish four main theoretical approaches for understanding economics of
identity: identity as a consumption good, identity as a capital asset,
identity as a social good, and identity as a cost. We analyse each of these
approaches in terms of their benefits to understanding economics of
identity, their drawbacks, and the bearer of the cost of identity provision.
After the theoretical part, we go on to discuss three case studies, BBS,
eBay and IdenTrust, and apply an appropriate concept if economics of
identity to analyse each business case. Finally, we conclude the paper by
discussing the implications that each of the different concepts of economics
of identity has for policymakers.



John Borking, Borking Consultancy: Profitable Investments Mitigating Privacy
Risks


Article 17 (1) of the Directive 95/46/EC (DPD) requires that the controller
must implement appropriate technical and organizational measures to protect
personal data. ICT offers solutions in the shape of privacy protection for
users, consumers and citizens. The application of ICT to protect privacy has
become widely known under the name Privacy-Enhancing Technologies (PET or
PETs). This paper points out that a positive business case for the economic
justification of investments in PETs is needed before a positive decision on
the investment will be taken. From a business perspective an investment in
PETs implies that the investment has to be measured in Euros saved as a
result of reduced costs, or in additional revenues and profits from new
activities that would not have occurred without the investment. In the risk
and financial management literature a number of equations can be found
measuring security risks and the return on investment on security
investments, some of which apply to investments necessary to reduce privacy
risks. In the paper will be highlighted equations as ROSI, ROIPI and Net
Present Value (NPV) and subsequently applied on two case studies Ixquick, a
meta search machine, and ViTTS (Dutch Victim Tracking and Tracing System)




Bendik Mjaaland, Accenture Technology Consulting, Norway: The Plateau:
Imitation Attack Resistance of Gait Biometrics


Biometric technology is rapidly evolving, and recently it has been shown
that the human gait, or walk, can be used to establish the identity of
individuals. Constituting a new branch within biometrics, gait biometrics
needs to be extensively tested and analyzed to determine its level of fraud
resistance. Previous results from the attack resistance testing of gait
authentication systems show that imitation, or mimicking of gait is a
venerable challenge. Although mimicking attacks are intuitive and easy to
perform, improving ones mimicking skills seems to be very difficult. This
paper presents an experiment where participants are extensively trained to
become skilled gait mimickers, or imitators. Results show that our
physiological characteristics tend to work against us when we try to change
something as fundamental as the way we walk. Simple gait details can be
adopted, but if the imitator changes several characteristics at once, the
walk is likely to become uneven and mechanical. The participants showed few
indications of learning, and the results of most attackers even worsened
over time, showing that training did nothing to help them succeed. With
extensive training an impostor's performance can change, but this change
seems to meet a natural boundary, a limit. This paper introduces the
plateau, a physiologically predetermined limit to performance, forcing
imitators back whenever they attempt to improve further. The location of
this plateau determines the outcome of an attack; for success it has to lie
below the acceptance threshold corresponding to the Equal Error Rate (EER).




Bart van Delft, Radbound University and Martijn Oostdijk, Novay: A Security
Analysis of OpenID


OpenID, a standard forWeb single sign on, has been gaining popularity both
with Identity Providers, Relying Parties, and users. This paper collects the
security issues in OpenID found by others, occasionally extended by the
authors, and presents them in a uniform way. It attempts to combine the
shattered knowledge into a clear overview. The aim of this paper is to raise
awareness about security issues surrounding OpenID and similar standards and
help shape opinions on what (not) to expect from OpenID when deployed in a
not-so-friendly context.




Jan Camenisch, Thomas Gross, Peter Hladky and Christian Hoertnagl, FP7
PrimeLife Project: Privacy-friendly Incentives and their Application to
Wikipedia


Double-blind peer review is a powerful method to achieve high quality and
thus trustworthiness of user-contributed content. Facilitating such reviews
requires incentives as well as privacy protection for the reviewers. In this
paper, we present the concept of privacy-friendly incentives and discuss the
properties required from it. We then propose a concrete cryptographic
realization based on ideas from anonymous e-cash and credential systems.
Finally, we report on our software's integration into the MediaWiki
software.
Jonathan Scudder and Audun Jøsang, University of Oslo: Personal federation
control with the Identity Dashboard


Current federated identity management solutions for open networks do not
solve the scalability problems for users. In some cases, federation might
even increase the identity management complexity that users need to handle.
Solutions should empower users to actively participate in making decisions
about their identity, but this is far from the current situation. This paper
proposes the Identity Dashboard as a user-centric control component,
providing users with tools they need to effectively partake in managing
their own identities.




Hidehito Gomi, Yahoo Research Japan: Policy Provisioning for Distributed
Identity Management Systems


A policy provisioning framework is described for supporting the lifecycle
management of identity information with its handling policies beyond
security domains. A model for managing and sharing a capsule of identity
information and its handling policies is presented. Based on the model,
algorithms for policy integration and provisioning with identity information
is also described. This framework enables the secure management and flexible
utilization of identity information reflecting the intention of its system
administrator from a viewpoint of security and privacy.




Conference dinner event


The conference dinner will happen at Månefisken - a café and event location
in the historic Akerselva industrial complex of the Akerselva river. The
river is, these days, managed as a park of eight kilometers, providing an
enjoyable walk from the Maridalen lake in the northern hills down to the new
opera house of Oslo, where Akerselva meets the fjord.






More information about the PET mailing list