ATIS 0200008-2012 TRUSTED INFORMATION EXCHANGE (TIE).pdf
《ATIS 0200008-2012 TRUSTED INFORMATION EXCHANGE (TIE).pdf》由会员分享,可在线阅读,更多相关《ATIS 0200008-2012 TRUSTED INFORMATION EXCHANGE (TIE).pdf(19页珍藏版)》请在麦多课文档分享上搜索。
1、 ATIS-0200008 ATIS Standard on - TRUSTED INFORMATION EXCHANGE (TIE) As a leading technology and solutions development organization, ATIS brings together the top global ICT companies to advance the industrys most-pressing business priorities. Through ATIS committees and forums, nearly 200 companies a
2、ddress cloud services, device solutions, M2M communications, cyber security, ehealth, network evolution, quality of service, billing support, operations, and more. These priorities follow a fast-track development lifecyclefrom design and innovation through solutions that include standards, specifica
3、tions, requirements, business use cases, software toolkits, and interoperability testing. ATIS is accredited by the American National Standards Institute (ANSI). ATIS is the North American Organizational Partner for the 3rd Generation Partnership Project (3GPP), a founding Partner of oneM2M, a membe
4、r and major U.S. contributor to the International Telecommunication Union (ITU) Radio and Telecommunications sectors, and a member of the Inter-American Telecommunication Commission (CITEL). For more information, visit . Notice of Disclaimer 2. Describes service enablers required for implementation;
5、 3. Highlights the source of the rules to be included; and 4. Identifies gaps that must be closed for implementation. Much existing work has already been completed on this topic. These components will be identified and included as appropriate. Specific examples and references are included in the Inf
6、ormative and Normative References. 1.3 Application The solution will utilize a goal-oriented approach in managing the information lifecycle between the ecosystem of cloud service providers, end users, and other members of the services supply chain. The solution will include a formalized methodology
7、that precisely discovers risk areas and proposes subsequent mitigations. Enforcement will utilize a uniform, reusable means of encoding and automation across the industry to accelerate the delivery of privacy protection. The solution will also consider existing industry standardization work, service
8、 provider implementation plans, and existing tangential requirements from adjacent industries (e.g., finance, health care, and communications CPNI). ATIS-0200008 3 2 Normative References The following standards contain provisions which, through reference in this text, constitute provisions of this A
9、TIS Standard. At the time of publication, the editions indicated were valid. All standards are subject to revision, and parties to agreements based on this ATIS Standard are encouraged to investigate the possibility of applying the most recent editions of the standards indicated below. 1 An Open Mar
10、ket Solution for Online Identity Assurance, March 2010, OIX Corporation.12 Personal Levels of Assurance (PLOA) White Paper v1.01.23 Preliminary FTC Staff Report: Protecting Consumer Privacy in an Era of Rapid Change (December 2010).34 FTC Report: Protecting Consumer Privacy in an Era of Rapid Change
11、 (March 2012).43 Informative References The following standards or organizations are provided for informative purposes. They address related or similar areas to the ATIS Trusted Information Exchange. At the time of publication, the editions indicated were valid. All standards are subject to revision
12、. 1 W3C Do Not Track 2 IETF OAUTH 3 IETF Repute 4 Kantara (European) 5 OASIS Open Reputation Management Systems (ORMS) TC 7 OIX 6 OpenID 4 Definitions, Acronyms, and (2) support for tiered exchange of information based on level of trust. ATIS-0200008 9 9 High Level Architecture The following high le
13、vel architecture is a combination of enablers from the desired cloud service, OIX Trust Framework, IMS Subscriber Data Management, and DNS/ENUM address translation. The end user intends to initiate a cloud service such as telepresence with another party, but there are several layers of interaction r
14、equired for the service to be delivered: 1. Initial resolution of the desired terminating users service provider. Completing this resolution does not ensure that service delivery can occur. 2. Delivery of a service request to the terminating users service provider. 3. Establishment of trust between
15、the originating and terminating service providers defined by the OIX trust framework and implemented through a service federation, brokerage, or similar function. 4. Delivery or denial of the requested service based on the framework rules. This includes appropriate information handling through the r
16、elationship lifecycle. Each service provider plays multiple roles in this attribute exchange. It performs the identity service provider role for its own subscribers while participating as the relying party for receiving information about the other users in the service. Figure 9: Trusted Information
17、Exchange Architecture 10 Written Policy The TIE framework supports user-understandable transactions within an agreed-to framework. The written specification defining the trust framework is a multi-faceted document that requires securing sensitive attributes as well as correlations. Some examples of
18、sensitive information are listed below: 1. Attribute is sensitive (e.g., subscription and billing information). ATIS-0200008 10 2. Correlation is sensitive (e.g., person and ip address are public, but the correlation of an ip address to a specific person is sensitive). 3. Attribute and Correlation a
19、re both sensitive (e.g., sensitive user preferences and a sensitive subscription are correlated using a sensitive correlation). The written specification shall include acceptable terms and conditions for handling this information both within and between cloud services providers. The written specific
20、ation shall contain levels of granularity that provide flexibility to the service provider but are simple enough to be understandable to the user. The written specifications rules shall be transparent to all participants of the trust framework. The written specification shall provide balanced respec
21、t for the needs of the originator and terminator of a transaction or session. 10.1 Sources Simplified Choice for Businesses and Consumers: Give consumers the ability to make decisions about their data at a relevant time and context, including through a Do Not Track mechanism, while reducing the burd
22、en on businesses of providing unnecessary choices; and Greater Transparency: Make information collection and use practices transparent. Active areas of FTC work in 2012-2013 (pp v-vi): Do Not Track: International standard for Do Not Track being worked by W3C for browser based implementations. Mobile
23、: The focus is on making disclosures on mobile devices more meaningful considering the small screen. Data Brokers: The report calls for increased transparency and access to the information being held by these brokers. The report further recommends exploring a centralized website for consumer interac
24、tion with these brokers. Large Platform Providers: Large platforms such as ISPs and social media that intend to comprehensively track consumer behavior will be investigated in more detail. A public workshop will be conducted in the second half of 2012 to discuss this issue. Promoting Enforceable Sel
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ATIS02000082012TRUSTEDINFORMATIONEXCHANGETIEPDF

链接地址:http://www.mydoc123.com/p-540904.html