1 / 40

Trust in Digital Life Trustworthy ICT leading to innovation and growth in Europe

Trust in Digital Life Trustworthy ICT leading to innovation and growth in Europe. General presentation. 1. TDL at a glance. 2. 5. TDL Goals and objectives. Reasons to become a member. 3. 6. Working group charters. Calendar 2014. 7. 8. 4. TDL Governance.

Download Presentation

Trust in Digital Life Trustworthy ICT leading to innovation and growth in Europe

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Trust in Digital Life Trustworthy ICT leading to innovation and growth in Europe

  2. General presentation 1 TDL at a glance 2 5 TDL Goals and objectives Reasons to become a member 3 6 Working group charters Calendar 2014 7 8 4 TDL Governance Membership process & TDL partners Frequentlyaskedquestions & contact information

  3. Industry and Expert network Research - Trust framework design - Project sprints - Business development - Demonstrations- Trust in Digital World event - Public opinion - Innovation agenda

  4. TDL and its members Consortium founded in 2009 by Nokia, Microsoft, Gemalto and Philips Legal entity TDKL VzW founded in 2013, Brussels Mix between global industry leaders, SME’s and knowledge institutes

  5. TDL Mission Realizing that trust is an essential pre-requisite for connecting people in effective human and enterprise transactions, TDL focuses on: • A vibrant digital single market: Build digital confidence among consumers by creating tools for consumers to address their concerns regarding privacy and security. • Interoperability and standards: Ensure interoperability between trust, privacy and security technologies across member states. • Trust and Security: Help technology developers build their technologies to enhance trust, to give Europeans the ability to embrace digital opportunities with confidence.

  6. Changes in the Digital World all around us HR Social Networks Games CRM Shopping Entertainment Documentmanagement Small to large players need to move fast to survive in the market Communication Need to provide cheap if not free services usersperceivethisas normal

  7. The worldtoday MultinationalsgoCloud Start-ups take Niches open closed SME andconsumersuse more services CloudEcosystem Web presence Hotspot FinancialSW HR SW Datastorage Shopping

  8. Innovative ICT leading to innovation and growth Too many incidents notrespected Fundamental rights Europe can develop a more productive, innovative and competitive economy that provides its people with more knowledge than ever before * BUT BUT * Eurobarometer on Attitudes on Data Protection and Electronic Identity

  9. Trustworthy ICT • Trust is an essential pre-requisite for connecting people in effective human and enterprise transactions. • Trust builds on elements like security, privacy, transparency, accountability and reputation. • No common understanding on trustworthiness, no industry recommendation on how to generate trust in digital services. • European strategy aims at a strong competitive position in producing innovative trustworthiness solutions. • In this context, it is essential to recognize the importance of the rule of law, security, and privacy and other core democratic freedoms.

  10. The business case for trustworthy ICT

  11. The Net User Value of Trustworthy ICT Increase the net user value for trustworthy ICT

  12. The Net User Value of Trustworthy ICT b) Negative scenario a) Positive scenario

  13. The Need for a Paradigm Shift b) Negative scenario a) Positive scenario

  14. Enablers for the Paradigm Shift • Awareness and transparency of incidents • Perceived user’s need for trustworthy ICT • Realize security and privacy as business enabler • Willingness to pay for trustworthy ICT solutions • Regulations enforcing privacy and security by design • Transparency of Business models and behavior?

  15. Membership objectives

  16. Membership objectives • A multidisciplinary open research community • Broad support to the research roadmaps • Active participation in the Working Group charters • Development & implementation of the SRA & Work plan • Development of a balanced research project portfolio • Incubation of collaborative development innovative products / services • International recognition of TDL 16

  17. Participating in working groups • Four interdependent working group charters develop relevant content for the strategic research agenda, business development and sprints: • Charter Trust Innovation Funnel & Impact Assessment • Charter Validation & Awareness • Charter Interoperability & Standardisation • Charter Industry Recommendations • Face-to –face working group meetings are held every quarter and teleconference meetings in between. • Working groups produce content; papers and publications, sprint projects • Parties can join one or more working groups • Willingness to exchange knowledge and experience, sharing customer & market insights, commitments for joint research and cross sector development trajectories are key success factors.

  18. TDL sprints Identify – Plan – Act - Disseminate Working groups Cyber Security Strategy NIS platform

  19. The TDL Framework Research and Innovation building blocks

  20. TDL generic Test Bed (ATTPS) Applications Experiments Service element A Service Element B Service Element C Test bed Service Level Agreement Testbed components Component y Component Z Component X Interface layer Test bed building blocks Management, monitoring and data collection Management elements 1, 2, .. Testing elements 1,2, … Monitoring/data collection elements 1,2,..

  21. TDL LIVING APPLICATION LAB Access 365 with legal claim TDL generic Test Bed (ATTPS) with TDL use cases Mobile Wallet E-signature TDL agreement Audio Authentication Federated ID FLIGHTMAP Cross boarder E-ID Mobile Loyalty Federated ID E-health Mobile Shopping Intrusion incident reporting Mobile SEPA Student Loyalty program Mobile EMV API layer Test bed Service Level Agreement (appointments technology providers) TDL TEST BED INFRASTRUCTURE Security monitoring Mobile security mgt Intrusion topology TDL Digital platform M-PKI Keys Cyber security Privacy in the Cloud Strong authentication Mobile platform & services Provider agent techn. Risk assessment Mobile E-commerce E-signature Breach detection Vulnerability scanner Authentication Claim based ID Security SOC User consent ~ agreem. Service integrIty Interface layer Test bed building blocks

  22. The Roadmap for Horizon 2020

  23. Achievements

  24. Achievements • Publication: Strategic research agenda (2012) • Publication:Use cases • Publication:Trust framework architecture serving complex identity infrastructures • Sprints: More than 6 technology validation sprints • Dissemination: 2nd Trust in Digital Life event with more than >250 registrations • EU project: Technology Testbed and living lab (ATTPS) • EU Project: AU2EU STREP (Identity management) • Incubation: COSTAR Managed service for Cyber Security • Recognition: TDL in the EU Cyber security strategy • Recognition: Inclusion in Network and Information Security (NIS) Public-Private Platform http://ec.europa.eu/digital-agenda/en/news/nis-public-private-platform-%E2%80%93-call-expression-interest

  25. TDL Governance & Social Media

  26. TDL Governance Structure Permanent seats for founding partners: Gemalto; Microsoft; Nokia and Philips Elections at the general assembly Experts from industry, government and knowledge institutes Secretary & membership mgt Editing vision and SRA

  27. Social media • TDL Blog • Subject related to TDL and members • New post once every 3 months • Link: http://tdloffice.wordpress.com/ • Twitter • Short announcements about TDL • Linkedin • Used internally • Information by TDL members for TDL members

  28. Calendar 2014

  29. Regular meeting schedule

  30. Trust in the Digital World Event - 2014 Trust in the Digital World congress– Enabling the Economics of Trust Hosted by the Austrian Economic Chamber – 07-08 April 2014, Vienna, Austria • Detailed information and registration: http://www.trustindigitallife.eu/trust-in-the-digital-world.html

  31. Membership TDL

  32. Membership process

  33. 5 reasons to join TDL • Influence the European state-of-the-art vision on Trust in Digital Life • Share and enrich your knowledge and insights on law, markets and technology with complementary leading edge industry parties, knowledge institutes and policy makers • Create promising opportunities for public-private research projects in European frame work programs • Inside out: Identify yourselves with high quality content and papers • Outside in: Validate and improve your (business) strategy

  34. Frequently asked questions

  35. TDL office for practical matters • A professional organised secretary to support you with all your questions and idea’s • A promising program with inspiring keynote speakers to address different perspectives • Operational support for working group leaders to organise meetings • Active dissemination of results and stimulation of interaction between working groups • Organisation of the yearly event and seminar

  36. More information can be found on www.trustindigitallife.eu Contact TDL at contact@trustindigitallife.eu

  37. Authentication pilot EXAMPLE TDL RESULT

  38. White Paper Goals • The paper is intended to provide the bigger picture when addressing Identity • Technologies are available from multiple vendors and OSS • Open standards • Provide a blueprint to build more scalable, secure services with respect to privacy • What are the key points to reflect on when adding authentication infrastructures • And what can go wrong if you don’t reflect on these points • Define general principles for designing authentication infrastructures on a global scale

  39. T r u s t F r a m e w o r k P r o v i d e r Service Providers (Relying Parties) User Identity Agent Provider Attribute Providers IP User Identity Agent Service 4. Obtain token(s) Commercial Attribute Providers Government Attribute Providers IP IP Identity Providers 3. Evaluate Policy 6. Return claim set Government Portal Client 2. Return Access Policy Computing Devices 1. Request for Access 8. Access to web site AP AP AP AP 5. User consent 7. Validate token(s) Government Identity Providers Commercial Identity Providers Relying Party STS Online Physical World Authentication Device Providers Identity “Proofing” Cloud Services Consumer Sites Commercial Service Government Service User

  40. Current demonstrators Service Providers (Relying Parties) User Identity Agent Provider Attribute Providers IP User Identity Agent 4. Obtain token(s) Consumer Sites Commercial Attribute Providers Government Attribute Providers IP IP Identity Providers 3. Evaluate Policy 6. Return claim set Government Portal Client 2. Return Access Policy Computing Devices 1. Request for Access 8. Access to web site AP AP AP AP 5. User consent 7. Validate token(s) Government Identity Providers Commercial Identity Providers Relying Party STS Online Physical World Authentication Device Providers Identity “Proofing” Cloud Services Commercial Service Government Service User

More Related