Risk
9/21/2012
02:26 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

NIST Funds Trusted Identity Pilot Programs

National Institute of Standards and Technology programs are intended to create a trustworthy online environment for consumers and businesses, and for institutional transactions.

The National Institute of Standards and Technology has announced plans to award $9 million to five pilot programs as part of its National Strategy for Trusted Identities in Cyberspace.

NSTIC seeks to create a secure "identity ecosystem" for online transactions. The newly funded programs aim to improve consumer confidence in online transactions, prevent identity theft, and give people more control over their personal information.

The investments "will help protect our citizens from identity theft and other types of fraud, while helping our businesses, especially small businesses, reduce their costs," said NIST director Patrick Gallagher in statement on the grants.

The American Association of Motor Vehicle Administrators will implement a program, called the Cross Sector Digital Identity Initiative, to establish a secure online identity ecosystem. Its partners include AT&T, Biometric Signature ID, CA Technologies, Microsoft, and the Virginia Department of Motor Vehicles.

[ Federal intelligence agencies' venture investment firm In-Q-Tel looks to 10gen for data analysis. Read more at Intelligence Agency Invests In Big Data Management. ]

A team of companies led by Criterion Systems will let consumers share shopping and other online preferences and information. The pilot will pull together Web services from identity service providers, online auction services, financial services from Broadridge, supply chain management capabilities from General Electric, and first-response management at government agencies and health care service providers.

Grant recipient Daon will develop an identity ecosystem for senior citizens and other consumers that supports trusted interactions among multiple parties online. The pilot will include "user-friendly" identity technologies for smartphones and tablets. AARP is a partner in the program.

Resilient Network Systems plans to show how an encrypted "trust network" can be used for health and education transactions. On the education side, the pilot will demonstrate secure access to online learning for children that is compliant with the Family Educational Rights and Privacy Act and the Children's Online Privacy Protection Act.

Another grant recipient, the University Corporation for Advanced Internet Development, known as Internet2, will spearhead a program to build a privacy infrastructure that can serve communities. Brown University, Carnegie Mellon, Massachusetts Institute of Technology, University of Texas, and University of Utah are participating.

Cybersecurity, continuity planning, and data records management top the list in our latest Federal IT Priorities Survey. Also in the new, all-digital Focus On The Foundation issue of InformationWeek Government: The FBI's next-gen digital case management system, Sentinel, is finally up and running. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web