Physical Services Virtual Services Yourself Internet Any place Any time Just for Some Services Staff...

Post on 18-Dec-2015

212 views 0 download

Tags:

Transcript of Physical Services Virtual Services Yourself Internet Any place Any time Just for Some Services Staff...

Physical Services Virtual Services

YourselfInternet

Any placeAny time

Just for Some Services

StaffInternet/ Intranet Specific placeSpecific time

For other Some Services

Government Services

Banking Services

Government Office

Government Office

Hi ! I am Jone! I need to do a government

Service

Hi ! I am Jone! I need to do a government

Service

To prove your identity, you should have

your National ID Card

To prove your identity, you should have

your National ID Card

Oh! I forget it, But I have

other cards, passport… etc

Oh! I forget it, But I have

other cards, passport… etc

I’m afraid, I cannot prove your identity

with these!

I’m afraid, I cannot prove your identity

with these!

Inte

rope

rabi

lity

Inte

rope

rabi

lity

Issues

Physical identity management systems

Virtualidentity management systems

Acceptability User Experience

Security

Banking Services

Health Services

Government Services

Hi ! I am Jone! I need to do a government

Service

Hi ! I am Jone! I need to do a government

Service

What are the Identity tools that you have

now?

What are the Identity tools that you have

now?

I forget my National ID,

but I have my heath card,

and Visa Card

I forget my National ID,

but I have my heath card,

and Visa Card

Great! Just a minute

Great! Just a minute

Are these cards for the user name:

Jone?

Are these cards for the user name:

Jone?

Yes!Yes!

Yes!Yes!

Welcome Jone, I am doing the government

service!

Welcome Jone, I am doing the government

service!

Do you want to save your identity tools in our server,

your mobile, USB ..etc?

Do you want to save your identity tools in our server,

your mobile, USB ..etc?

Yes.. I want it in my USB

Yes.. I want it in my USB

SecureSessionSecureSession

Interface LayerInterface Layer

Stan

dard

sSt

anda

rds

Authentication ModesAuthentication Modes

Relying Party

Stan

dard

sSt

anda

rds

Services TypesServices Types

Sectors/ AgenciesSectors/ Agencies

Service Providers

Stan

dard

sSt

anda

rds

Send/Check IdentitySend/Check Identity

Physical/ Virtual ServicePhysical/ Virtual Service

Accessibility Settings/ Privacy Settings

Trus

t Rel

ation

ship

Database

Database

Get/ Return Data

Architectural Modeling

Architectural Modeling – Authentication Modes

Architectural Modeling – Standards

a

b

b

c d e

fg

fg

fg

The Security Attributes are enlisted with the following numbers:a. Two factor authentication

b. Nounce-based authentication

c. User Anonymity

d. Control of information

e. Conceal Information

f. Security Certificates

g. WS Federation Specification

b

The Acceptability Attributes are enlisted with the following numbers:h. Incremental Learning

i. Linearity

j. Scaffolding

k. Learning Control

L. Accommodating to the learner’s style

m. Intermittent feedback

mLkj

ih

mLkjih

j

The User Experience Attributes are enlisted with the following numbers:

n

n

n

OP

P

P

nOq

t

rsvu

rs vu

r svu

X Y w

z

ccaadd

bb

ff

ee

n. User Diversityo. Controllabilityp. Aestheticsq. Technology Varietyr. Attitudes. Consistencyt. Multiple Language Supportu. Effectivenessv. Efficiencyw. Helpfulnessx. Learnabilityy. Memorabilityz. Robustnessaa. Simplicitybb. Self-Descriptivenesscc. Perceived affordancedd. Mappingsee. Constraintsff. Conventions

Relational factorsRelational factorsFacilitation for learningFacilitation for learningSecurity StandardsSecurity Standards

PrivacyPrivacy

Authentication MechanismAuthentication Mechanism

Structure of the IAMS framework

a b

c d e

fg

Ease of learningEase of learning

ih

Cultural AspectsCultural Aspects

P nOq ff

Nature of ContentNature of Contentrs

Performance measuresPerformance measuresu v z

Ease of InteractionEase of InteractiontX

Effective operabilityEffective operability

w Y

aa bb ccddee

Security and Identity Acceptability/Accessibility User experience/ Usability

1 -List unique components "attributes" 2 -Group components with similar themes3 -Reclassify components 4 -Construct the framework

mLkj

IAMS Framework

Measure experts' agreement Measure experts' agreement on the components of the on the components of the

IAMS FrameworkIAMS Framework ! !

By: SARA ALOTAIBI DR.MIKE WALD

School of Electronics and Computer Science, University of Southampton, UK

sja2g09@soton.ac.uk