1 / 15

International Authentication Activities

Joint Information Systems Committee. Norman Wiseman JISC Head of Programmes Presentation to JISC Authentication Concertation Day March 1999. International Authentication Activities. Joint Information Systems Committee. Joint Information Systems Committee. Programme.

callia
Download Presentation

International Authentication Activities

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Joint Information Systems Committee Norman WisemanJISC Head of ProgrammesPresentation to JISC Authentication Concertation DayMarch 1999 International Authentication Activities Joint Information Systems Committee

  2. Joint Information Systems Committee Programme Describe what is happening in (mostly) the USA in the authentication field: i) CNI ii) UCCAP iii) Internet 2 iv) IETF v) and next…? Joint Information Systems Committee

  3. History CNI - History Authentication White Paper (Cliff Lynch) Proxies IP source filtering Credential-based access management http://www.cni.org/projects/authentication/authentication-wp.html Workshop: Enabling Access in Digital Libraries April 1998, report published February 1999 http://www.clir.org/pubs/reports/arms-79/contents.html Joint Information Systems Committee

  4. CNI CNI Authentication Workshop Principles Identified: Simplicity - implementation, adoption, acceptability Privacy - no compromise Good Faith - reasonable barriers to abuse Trusted Intermediaries - recognise role Reasonable terms - access by need and for accidental discovery Joint Information Systems Committee

  5. CNI CNI Authentication Workshop(cont) Areas for Research: System Usability - user interaction need for new information types functionality of new types Economic models - assessing usage new pricing schemes Joint Information Systems Committee

  6. UCCAP UCCAPUniversity of CaliforniaCommon Authentication Project http://www.ucop.edu/irc/auth/work.html One of many in USA Campus similar in size to whole UK Following up CNI workshop Evaluation completed of different models (as proposed by Ira Fuchs of JSTOR) http://www.jstor.org/about/authentication.html Joint Information Systems Committee

  7. UCCAP UCCAP (cont) Components University Directory list every person ever associated with UC Public key infrastructure manage certificates using Netscape server hierarchical certificate architecture develop RFI/RFP for future technical development Authorisation Infrastructure gateway to database of user attributes associated query protocol Joint Information Systems Committee

  8. UCCAP UCCAP (cont) But….. Scalability Only for internal UC certificates Not addressing wider issues for some time Costs: University of Minnesota expects certificates to cost $1million per year Gartner group estimates $100 per user per year Joint Information Systems Committee

  9. Internet 2 Internet 2 Network, Applications and ‘Middleware’ Run by UCAID Network - Abilene Applications: Qbone Digital Video Network (DVN) Distributed Storage Infrastructure (DSI) http://www.internet2.edu Joint Information Systems Committee

  10. Internet 2 Internet 2 (cont)Network, Applications and ‘Middleware’ Middleware includes: Security Quality of Service Network Management Topology IPv6 Routing Working Groups to take each area forward Joint Information Systems Committee

  11. Internet 2 Internet 2 (cont) Working Group Objectives Identify technology Scalable and interoperable Standard API’s http://www.internet2.edu/html/working-groups.html JISC Involvement through MoU? Explanatory paper on JISC web pages soon Joint Information Systems Committee

  12. IETF Internet Protocols Request for Comment: General Authentication, Authorisation and Accounting Protocol http://www.merit.edu/working.group/documents/ Discusses underlying technology and protocols to allow services to work Joint Information Systems Committee

  13. Summary Where Next? International solution needed through joint efforts with US, Europe, Australia and Govt. How can we maintain awareness within technical/information community? What is the role of ATHENS? Processes to develop models and protocols? What are the human and organisational issues? Priorities and next steps for JISC? Joint Information Systems Committee

  14. Reprise Addresses CNI http://www.cni.org/projects/authentication/authentication-wp.html http://www.clir.org/pubs/reports/arms-79/contents.html UCCAP http://www.jstor.org/about/authentication.html http://www.ucop.edu/irc/auth/work.html Internet2 http://www.internet2.edu http://www.internet2.edu/html/working-groups.html IETF http://www.merit.edu/working.group/documents/ Joint Information Systems Committee

  15. Joint Information Systems Committee Joint Information Systems Committee Networks and Innovative Services for United Kingdom Education Joint Information Systems Committee

More Related