ITU Home Page International Telecommunication Union Français | Español 
Print Version 
ITU Home Page
Home : ITU-T Home : Workshops and Seminars : Workshops on NGN
 ITU-T Workshop on Digital Identity for NGN
 Abstracts  
ITU-T Workshop on Digital Identity for NGN
Geneva, 05 December 2006

Contact: tsbworkshops@itu.int
Webcast: http://www.itu.int/ibs/ITU-T/200612ngn/index.html (audio only)
Speaker: Susumu YONEDA, Softbank Telecom Corp.
Session: 1 - Why do Operators need Digital Identities?
Title of Presentation: Network ID Management and ICT Platform

In this presentation, the concept and work of Network ID are briefly introduced. Network ID management based on ICT platform is discussed, and this type of platform service could be one of future business extensions for operators. In particular, for public network and platform, ITU as well as operators would have a significant role.
 
Speaker: Sangrae CHO, ETRI
Session: 1 - Why do Operators need Digital Identities?
Title of Presentation: Present and Future Trend of Digital Identity Technology in Korea


In this presentation, we will briefly explain how digital identity technology in Korea started in the first place, how it has been evolved over the past several years and where it is actually heading for right now. In the beginning, we will explain that what kind of problems we have tried to solve using digital identity management technology and how we have utilized existing standards and technologies of digital identity to develop new set of digital identity management solutions. After that, we will present two cases that how the developed digital identity technologies have been applied for the real world solutions. Towards the end, we will suggest what kind of digital identity technology is best suitable for next generation network.
 
Speaker: Jiwei WEI, Huawei
Session: 2 - Approaches to Digital Identities in NGN
Title of Presentation: Digital Identity Management Towards Ultimate Network Security


Using digital identifiers for trace back to an network attacker maybe the last solution for information and network security in the cyber world. A digital identity management meta-infrastructure, which provides management of miscellaneous digital identifiers including both users/persons and devices/entities in the telecommunications network, can be an analog to the identity card system in the real world which is the infrastructure for the public security applying to all people in a country despite their occupation, sex, age, social roles, business etc.

These slides briefly give description of security threats to the legitimate Internet and telecommunication networks, summarize possible countermeasure technologies from traditional Firewalls, Intrusion Detection System (IDS) to the latest security mechanisms employed in large scale network such as NGN or 3G networks. In the description, there is point of view on how the various identifiers play an fundamental role in these security techniques. Through above analysis, we try further to formation the concept of the future digital identity management meta-infrastructure for network security.
 
Speaker: Hemma PRAFULLCHANDRA, VeriSign Inc
Session: 3 - Bridging the Digital Identities Gap from Enterprise/Internet Applications to Networks
Title of Presentation: Identity Management Eco-system: Requirements for the Youth

In this era of "Any":
  • ANY time (information/content is always available)
  • ANY where (being able to access from anywhere - mobility)
  • With ANY device (PC, handheld, TV, …)
  • Across ANY network (internet, wireless, broadband)
  • For Any Me (support various Lifestyles and personal preferences)
It is critical that Users have control over their Identity and Profile information, from what it is to how it is being protected to who has access. But, the Youth today have different expectations and clearly behaviors and characteristics from that of the current and past generations.

In this session we cover the trends of the Youth in this “Any” era and describe the requirements of an identity and profile management system. As Internet/Mobile applications continue to evolve toward content personalization, social networks and citizen’s media, there is a growing need for lightweight, flexible identity frameworks that can integrate and unify user experiences and applications.

We will briefly touch on one framework that provides a solid foundation to addressing the identified requirements.
 
Speaker: Anthony NADALIN, IBM
Session: 3 - Bridging the Digital Identities Gap from Enterprise/Internet Applications to Networks
Title of Presentation: Enabling productivity, interoperability, and new end user experiences by integrating identity, profile, and relationship data

The future of identity management is heavily influenced by the user-centricity paradigm and the need for electronic identification in a plethora of environments which means that identity management will be driven by the client side. Due to the plethora of environments there will be a need for integration of traditional identity management systems, user-centric ones, and privacy-enhanced identity management. This will involve cross-system delegation, revocation, reputation, etc.
 
Speaker: Göran SELANDER, Ericsson Research
Session: 4 -  Projects on Digital Identities for Next Generation Networks
Title of Presentation: Securing Management and Interaction of Nodes and Networks using Cryptographic Identifiers

Public key certificates are commonly used to assert an identity or an attribute of the owner of a cryptographic public key. The signer of the certificate provides an alternative trusted party, if the asserted public key is not known to be trusted, but it does not replace the trust assumption – it just shifts it from one public key to another. In several protocols and applications, public keys (or functions thereof) can be directly used as identifiers of users or devices, e.g. PGP, SSH, HIP. In the Ambient Networks project we employ cryptographic identifiers to nodes and networks/domains i.e. groups of nodes with a common authority and a specified security policy.

The use of cryptographic network IDs provides a natural and secure handle for interaction between personal and/or enterprise networks, to secure advertisement and discovery and for various aspects of network management.
 
Speaker: Jan CAMENISH, IBM Research Zurich
Session: 4 -  Projects on Digital Identities for Next Generation Networks
Title of Presentation: PRIME: Privacy and Identity Management for Europe

All social and economic interactions between human beings in modern civilization require the exchange of some personal data. The decision what data to make available is made intuitively in normal life, so for instance, the one of whether or not to state your name when shaking hands.
In the online world, every person has to handle numerous accounts and data sets. These so-called "partial identities" will increasingly play a key role in future electronic services as well as in public security (e.g., border controls). They may very well convey sensitive personal data, such as patient health data, employee data, credit card data, etc.
This talk reports on PRIME an EU funded project involving 20 partners form academia and industry. PRIME focuses on solutions for privacy-enhancing identity management that supports end-users' sovereignty over their private sphere and enterprises' privacy-compliant data processing. PRIME also aims to develop a working prototype of a privacy-enhancing Identity Management System. To foster market adoption, novel solutions for managing identities will be demonstrated in
challenging real-world scenarios, e.g., from Internet Communication, Airline and Airport Passenger Processes, Location-Based Services and Collaborative e-Learning.

http://www.prime-project.eu
 
Speaker: Joao GIRAO & NEC Europe Ltd. (on behalf of the Daidalos Project), 
Session: 4 -  Projects on Digital Identities for Next Generation Networks
Title of Presentation: Virtual Identities in a Heterogeneous Environment

The Internet is today’s most used tool for work and leisure. Identity is no longer a matter of who you are but also of the use you are giving to a service or even just network connection. As a result, the unprepared architectures of today need to support users at service level and usually tend to create situations where the privacy of the user is in danger. Our proposal is that the user’s real identity is never revealed to the network. Instead, the users’ interests and personalities are split and never intersected by the architecture, providing a framework in which the users’ control on their information is predominant. The Virtual Identity framework has as its main objectives the privacy of the users’ data, the unification and uniformity of how the users’ data is accessed and the vertical approach to identity in network architectures.
 
Speaker: Elisa BERTINO,  Purdue University, West Lafayette IN, USA
Session: 4 -  Projects on Digital Identities for Next Generation Networks
Title of Presentation: Digital Identity Management – Techniques and Policies

Digital identity corresponds to the electronic information associated generally with an individual in a particular identity system. Identity systems are used by online service providers to authenticate and authorize users to services protected by access policies. Having good identity systems can enable individuals to use effectively and extensively electronic transactions in a secure yet privacy preserving manner. With the advent of distributed computing models such as web services, the current trend is to focus on inter-organization and inter-dependent management of identity information, rather than identity management solutions for internal use. This is referred to as federated identity management.
In this talk we first present an overview of the Federated Digital Identity Management (FDIM) project funded by the US NSF and current underway at the Center for Education and Research in Information Assurance and Security (CERIAS) of Purdue University. We then illustrate selected results from the project, including: (a) an approach to the verification of identity attributes based on the notion of multi-factor verification; (b) the notion of authentication policies based on multiple factors and quality-based authentication; (c) policies for the management of digital identity in federated organizations.
 
Speaker: Hidehito GOMI,  NEC Corporation
Session: 4 -  Projects on Digital Identities for Next Generation Networks
Title of Presentation: Identity Convergence for NGN Platform and Business

Today digital identities of users are managed at different platforms independently in different security domains on the Internet, which causes "identity fragmentation". This problem leads users to have their inconvenient and inconsistent experience when they enjoy IT/network services.

In this presentation, we explain an identity management framework for NGN, and introduce a concept "identity convergence" that builds bridges between isolated user identities on different platforms and filters identity information when crossing the bridges. This concept enables identity management requirements crucial for NGN services in order to solve the above fragmentation problem.

We then describe several fundamental technologies as instances for enabling identity convergence. Finally we explain some expectation that identity convergence will enable the orchestration of multiple services publicized by operators or 3rd party providers and that the orchestrated services will bring about tremendous value and profits for NGN business.
 
Speaker: David-Olivier JAQUET-CHIFFELLE,  Prof. Dr., VIP, University of Applied Sciences of Bern and ESC, University of Lausanne
Session: 4 -  Projects on Digital Identities for Next Generation Networks
Title of Presentation: FIDIS, a FP6 European Network of Excellence, “Future of Identity in the Information Society”

The European Information Society (EIS) requires technologies which address trust and security yet also preserve the privacy of individuals. As the EIS develops, the increasingly digital representation of personal characteristics changes our way of identifying individuals. Supplementary digital identities, so-called virtual identities, embodying concepts such as pseudonymity and anonymity, are being created for security, profit, convenience or even for fun. These new identities are feeding back into the world of social and business affairs, offering a mix of plural identities and challenging traditional notions of identity. At the same time, European states manage identities in very different ways. FIDIS objectives are shaping the requirements for the future management of identity in the EIS and contributing to the technologies and infrastructures needed.

As a multidisciplinary and multinational NoE FIDIS, appropriately, comprises different country research experiences with heterogeneous focuses, and integrates European expertise around a common set of activities. Additionally, all relevant stakeholders are addressed to ensure that the requirements are considered from different levels. FIDIS overcomes the extreme fragmentation of research into the future of identity by consolidating and fostering joint research in this area. Research results will be made accessible to European citizens, researchers and in particular to SMEs.
 
Speaker: Dimitris M. KYRIAZANOS,  PhD Student, National Technical University of Athens
Session: 4 -  Projects on Digital Identities for Next Generation Networks
Title of Presentation: MAGNET identity management proposal for Personal Networks

Identity management is the complex process that ensures secure creation, storage, exchange and update of digital identity, as defined in [Camp 2004]. In its simplest form, identity management involves secure consolidation, management and exchange of user identity information also known as digital identity, discussed below, enabling accurate, reliable and secure services provided to clients over a distributed network architecture. The aim of Identity Management in MAGNET Beyond is to come out with a universal framework, encompassing all access control aspects (authentication, authorization and accountability) while preserving user privacy. These two requirements are usually antagonist, that’s why the framework described below is a trade-off between both.
 
Speaker: Mike PLUKE, ETSI Specialist Task Force STF302
Session: 5 - Standards Activities on Digital Identities
Title of Presentation: The Universal Communications Identifier (UCI) – Trusted, meaningful identification


Current identifiers attempt to:
  • identify the end-points between which communication systems provide service;
  • be meaningful to end-users so that they can identify the source of incoming communications (e.g. email addresses) or confirm the identity of remote end-points (e.g. urls).
Failure to satisfy the first function results in system failure and no service to end-users. To ensure that this can't happen, precise rules about communication identifier content and formatting have to be enforced.

Current identifiers use either wholly numeric schemes (e.g. E.164 telephone numbers) or alphanumeric schemes using Latin alphabets (e.g. current e-mail addresses). With the growth of ICT markets in countries that don't use either Latin alphabets or scripts, having a single communication identifier properly perform both of the above functions becomes impossible.

ETSI's Universal Communications Identifier (UCI) uses two separate entities each optimized for one of the above identification functions.

Traditional identifiers are bound to communication services (e.g. E.164 numbers to telephony services and e-mail addresses to e-mail service providers). UCIs are bound to Personal User Agents (PUAs) that negotiate with other PUAs to deliver communication services configured to the needs of both parties.

With UCI, people can exert fine control over how they handle unsolicited communication.
 
Speaker: Hal LOCKHART, OASIS
Session: 5 - Standards Activities on Digital Identities
Title of Presentation: Federated Identity Standards at OASIS

A number of technical committees at OASIS have developed specifications relevant to Digital Identity in general and Identity Federation in particular. This presentation briefly overviews their functional capabilities and current state of standardization. The Security Assertion Markup Language (SAML) Version 2.0 will be described as well as its relationship to the eXtensible Access Control Markup Language (XACML) Version 2.0 and Web Services Security version 1.1. The functional capabilities of the Service Provisioning Markup Language (SPML) Version 2.0 will also be described. Related and currently ongoing work in Web Services security, including WS-SecureConversation and WS- Trust will also be discussed.
 
Speaker: Dr. Hellmuth Broda, CTO Global Government Strategy, Sun Microsystems Inc.
Session: 5 - Standards Activities on Digital Identities
Title of Presentation: Privacy, Security, and Trust with Federated Identity Management

Today the public and private sector are facing new challenges from demands regarding security, compliance and privacy. Simultaneously demands for an open and communicative information infrastructure have to be met and will give rise to new opportunities and business models. The paper will discuss how professional Identity Management is the prerequisite for solving these issues.

An open federated approach for Network Identity and Trust Management that would also guarantee privacy and security of the consumer's information could help the public to gain trust into these systems and finally increase the acceptance for network delivered services.

The Liberty Alliance (http://www.projectliberty.org), a large multi-industry business alliance covering the public and private sector with over 150 members has been defining such interoperability specifications and standards. The goals and workings of the alliance will be presented as well as the advantages of a membership. Such an identity/authentication/authorization framework will help meet the demands outlined aboce and create new business opportunities.
 
Speaker: Pierre-André PROBST, 
Session: 5 - Standards Activities on Digital Identities
Title of Presentation: JCA-NID: an ITU-T initiative towards Global Standards on Network Aspects of Identification systems


Within ITU-T, since 2005 several Study Groups has started to work on network aspects of identification systems within their mandates.

In parallel, under the Technology Watch initiative, a correspondence group of TSAG investigated the network aspects on identification systems based on RFID technology and their impact on ITU-T standardization work.

A comprehensive analysis of business models and service scenarios has been performed and proposals for an ITU-T strategy in this area were developed by this group.

Recognizing the complexity of the issues to to be addressed and the fact that a large number of key players are already developing standards, TSAG created in July 2005 a Joint Coordination Activity on NID (JCA-NID). The overall objective is to coordinate the work in and outside ITU-T. In addition, it has also been recognized that a generic approach to the standardization of network aspects of identification systems is necessary, since RFID represents one technology among others.

After a short history of the work in ITU-T, the presentation will describe how the JCA-NID intends to perform his coordination task and will give an update of the present and future activities of the JCA-NID.
 
Speaker: Marco CARUGI, Nortel
Session: 5 - Standards Activities on Digital Identities
Title of Presentation: Identity Requirements in NGN: overview of ITU-T NGN GSI related work

The presentation will provide an overview of the ongoing work inside ITU-T NGN GSI (SG13 in particular) in the area of Identification requirements and Identity Management.

Q.2/13, dealing with requirements, services and implementation scenarios in NGN environment, has developed high-level requirements and capabilities for NGN Release 1 (Y.2201, determined in July 2006).

Q.15/13, dealing with NGN security, has ongoing work on Identity Management Security (draft recommendation Y.IdMsec).

NOTE: some backup material of this presentation provides the current NGN deliverable status inside ITU-T NGN GSI (SG13).
 
Speaker: Abbie BABIR, ETSI Specialist Task Force STF302
Session: 5 - Standards Activities on Digital Identities
Title of Presentation: A Review of Security Activities in ITU-T SG 17


The talk will provide an overview of security activities at the ITU-T SG 17 and pinpoints the important role that SG 17 play as the lead study group in the security area. The role of SG 17 in coordination and prioritization of security efforts across all study groups is discussed. The talk emphasizes the crucial role of SG 17 in the development of core security Recommendations to be used by other groups. The need of collaboration with other standardization bodies in the Identity Management and other security areas is discussed.

 

Top -  Feedback -  Contact Us -  Copyright © ITU 2007 All Rights Reserved
Contact for this page : TSB EDH
Updated : 2006-12-05