Summary

Solves “intractable” identity and access technical problems using superior listening, analysis and (re)design skills. Works from the abstract conceptual level through to fine deployment details. Produces and presents reports to explain complex issues in ways understandable to diverse audiences. Partners effectively with C-level executives, marketers, engineers, technical writers, and customers. Has deep enterprise computing expertise along with good coding skills.

Expertise In:

Software architecture, security, privacy, identity management, federated systems, authentication and authorization, policy language for access control and privacy, OAUTH/OIDC, SAML, PKI (digital signatures and certificates), communications protocols, RFID, and the Common Criteria (a set of US government security standards).

Facility With:

REST APIs, Swagger, JSON, XML, LDAP, SQL, crypto systems, medical privacy (HIPAA), low-level networking tools, OAUTH/OIDC, servlets, HTTPD, provisioning, software implementation and deployment.

Career Highlights:

  • Architected Internet2’s Consent-informed Attribute Release (CAR) system, 2016
  • Co-created the SAML & Shibboleth Federated Identity Management standards, 2001
  • Published “RFID & Authenticity of Goods” in RFID: Applications, Security, and Privacy, 2005
  • Hacked two “highly secure” commercial systems by finding design flaws, and then provided ways to secure the systems (1992 and 2005)

Experience:

Internet2/InCommon/TIER

March 2016 - Present



a consortium of US universities and colleges
Architected a system (“CAR”) for consent-informed release of user info. CAR integrates institutional policies with user policies, and provides for fine-grained policy control over specific attributes. CAR is currently being deployed at a major research university, with release set for July 2017. Click here for more info on CAR.

  • Created the system architecture of three interacting services
  • Created the policy language at each of three services (with input from the implementation lead), including how to resolve policy conflicts. Created formal grammar for these languages (needed for the API.
  • Created the REST API for the services using Swagger.
  • Worked closely with implementation lead and UI designers.
  • Worked closely with product marketing, providing significant input on and review of marketing materials.
  • Contributed significantly to Internet2’s “Reference Architecture, ” providing a “C-Level” diagram, a “one-pager” about the reference architecture, and other materials.

Harvard University IT (HUIT)

2012 - 2016



Identity & Access Management team
Hired to worked on a variety of projects, especially those that were known to be difficult or lacking traction during earlier attempts. Key projects and outcomes included:

  • Architected a new set of services for enhanced person-finding and identifier assignment, providing architecture diagrams, extensive text discussions, and sequence diagrams. A variant of this system deployed in 2016.
  • Designed new tool to de-duplicate identifiers in six weeks using input from SMEs.
  • Deciphered an “undecipherable” body of code, database tables and stored procedures that formed the identity management system for Harvard Medical School.
  • Wrote secure code that integrated Harvard’s Shibboleth/SAML IdP with its legacy authentication system.
  • Created and presented talks on identity federation, authentication in the web, and communications protocols to various groups within Harvard IT, including a play on sessions and cookies.

Ozmott

Summer 2011

Consulted to CTO of company creating a mobile phone app with a social networking component:

  • Clarified the model of users, accounts, and phones.
  • Provided design and implementation recommendations to help enforce the model and protect both client and server resources. Recommendations covered authentication, authorization, crypto keys in support of authentication, and life-cycle management of users and keys

Resilient Networks

Winter 2010

Provided security consulting to C-level executives and senior staf f at this innovative healthcare startup. Topics included identity management, network architecture, and PKI.

Harvard Medical School (HMS)

Autumn 2009

HMS researchers needed to give scientists from other institutions (limited) access to HMS resources for collaboration and to meet grant requirements. Existing process was staff-intensive and slow, and the authentication of foreign users had some “issues.”

  • Created automated provisioning of new foreign users and authentication and authorization of these users, employing the Shibboleth/SAML federation standard in a novel way.

IBM/DataPower

2005 - 2008

Worked with senior technical staff members to successfully meet the requirements of an EAL4 Common Criteria (CC) evaluation of Datapower’s XML security gateways (XS40 and XI50). Performed technical analyses of the products, did deep code examination (C++) in support of the analyses, provided advice on security-related design and implementation decisions, created low-level protocol validation tests, served as point person for CC rule interpretation, and created/modified the CC-specified documents that serve as the basis for the evaluation.

Identity Associates

Autumn 2005

Analyzed use cases for an LDAP “adapter” that was part of a certificate management system. Systematized use case factors. Analyzed error conditions. Provided initial architecture and operational considerations for the adapter service. Found, and provided a solution for, a major security hole in the client’s current product.

Bank of America/Axis Technology

Winter 2004




Technical lead on Entitlements & Authorization project in the Information Delivery and Services group within the Wealth and Investment Management group.

  • Created initial security and privacy requirements surrounding a key cross-department information delivery initiative. Helped Bank personnel begin to model the distributing computing flows for this initiative.
  • Analyzed an existing Bank of America privacy project for applicability to needs of wealthy clients.
  • Performed data analysis/reduction, reducing 20 pages of individual access control rules into two single page access trees

IBM

1998 - 2004

Consultant working as a member of IBM’s security architecture team within both IBM and its Tivoli subsidiary.

  • Designed a solution for the security “bootstrapping” problem for turn-key RFID readers installed in retail stores.
  • Analyzed RFID-based loss prevention schemes.
  • Contributed to the SAML federation standard. SAML is now used worldwide by Google, MS, etc.
  • Initiated and co-authored the Shibboleth architecture document.
  • Analyzed and reviewed designs for a next-generation privacy system.
  • Reviewed/critiqued next-generation privacy policy language (EPAL)./li>

Tandem/Blackwatch

1996 - 1997



  • Provided architectural guidance related to extensions to an X.509-compliant PKI system.
  • Enhanced code base (in C++), providing for directory-independent cross-certification and handling of foreign users.

JavaSoft

Autumn 1996

Consultant to Development Team: performed a security analysis of the Java Virtual Machine (JVM) and Java Development Kit (JDK). Co-wrote The Java Security Reference Model, a plain-language discussion of security in Java.

Shiva Corporation

Spring & Summer 1996

Worked with management, marketing, and developers on Shiva’s on-going security plans.

Banyan Systems, a networking company

1993 - 1995

Served as Banyan’s security lead across the product line. Provided expertise on other enterprise computing issues (X.500, RPC, communications, licensing).

Fidelity Investments

Winter 1992

Consultant to Technical Architecture team. Advised team developing enterprise-wide computing strategy for Fidelity. Topics included security (Kerberos), transaction systems, naming, and interoperability.

HP/Apollo

1985 - 1992



  • Designed/implemented object activation and message handling (in C++) for a client-server system.
  • Co-designed a distributed object (discretionary) security system.
  • Coded thread-safe database access layer (in C).
  • Designed and implemented GUI-based configuration editor for an LU6.2 client-server protocol.

Publications:

Languages:

C++ C Java PowerShell assembler SQL Perl etc.

Patents:

Object-Oriented Distributed Computing System (co-holder) Patent # 5475817, 12/12/95.

Education:

Sc.B. (BS) in Electrical Engineering, Brown University, 1983.