<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=AnnElizabeth+Racuya-Robbins</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=AnnElizabeth+Racuya-Robbins"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/AnnElizabeth_Racuya-Robbins"/>
		<updated>2026-05-03T19:31:56Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=204590</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=204590"/>
				<updated>2015-12-04T16:48:29Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday August 31, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions &lt;br /&gt;
** KBA Performance Metrics v7 Luis &lt;br /&gt;
** Followup on Remote First Use KBA. Is this wanted and needed?&lt;br /&gt;
** In a Mobile Context, Public Safety&lt;br /&gt;
** What role does Uncertainty play? The GUM?&lt;br /&gt;
** Follow on Questions for Healthcare Providers who use KBA&lt;br /&gt;
** How do we make individuals or entities take risks? Ways Forward for KBA-PMP&lt;br /&gt;
** Its time to ask for resources to support our project. Lets discuss.&lt;br /&gt;
** KBA-PMP Data Collection if ready.&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=204589</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=204589"/>
				<updated>2015-12-04T16:46:02Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday August 31, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions &lt;br /&gt;
** KBA Performance Metrics v7 Luis &lt;br /&gt;
** Followup on Remote First Use KBA. Is this wanted and needed?&lt;br /&gt;
** In a Mobile Context, Public Safety&lt;br /&gt;
** What role does Uncertainty play? The GUM?&lt;br /&gt;
** Follow on Questions for Healthcare Providers who use KBA&lt;br /&gt;
** How do we make individuals or entities take risks? Ways Forward for KBA-PMP&lt;br /&gt;
** Its time to ask for resources to support our project. Lets discuss.&lt;br /&gt;
** KBA-PMP Data Collection if ready.&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=204587</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=204587"/>
				<updated>2015-12-04T16:44:38Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday August 31, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions &lt;br /&gt;
** KBA Performance Metrics v7 Luis &lt;br /&gt;
** Followup on Remote First Use KBA. Is this wanted and needed?&lt;br /&gt;
** In a Mobile Context, Public Safety&lt;br /&gt;
** What role does Uncertainty play? The GUM?&lt;br /&gt;
** Follow on Questions for Healthcare Providers who use KBA&lt;br /&gt;
** How do we make individuals or entities take risks? Ways Forward for KBA-PMP&lt;br /&gt;
** Its time to ask for resources to support our project. Lets discuss.&lt;br /&gt;
** KBA-PMP Data Collection if ready.&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=204586</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=204586"/>
				<updated>2015-12-04T16:43:06Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Project Leaders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday August 31, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions &lt;br /&gt;
** KBA Performance Metrics v7 Luis &lt;br /&gt;
** Followup on Remote First Use KBA. Is this wanted and needed?&lt;br /&gt;
** In a Mobile Context, Public Safety&lt;br /&gt;
** What role does Uncertainty play? The GUM?&lt;br /&gt;
** Follow on Questions for Healthcare Providers who use KBA&lt;br /&gt;
** How do we make individuals or entities take risks? Ways Forward for KBA-PMP&lt;br /&gt;
** Its time to ask for resources to support our project. Lets discuss.&lt;br /&gt;
** KBA-PMP Data Collection if ready.&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=199723</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=199723"/>
				<updated>2015-08-31T15:01:39Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Our Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday August 31, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions &lt;br /&gt;
** KBA Performance Metrics v7 Luis &lt;br /&gt;
** Followup on Remote First Use KBA. Is this wanted and needed?&lt;br /&gt;
** In a Mobile Context, Public Safety&lt;br /&gt;
** What role does Uncertainty play? The GUM?&lt;br /&gt;
** Follow on Questions for Healthcare Providers who use KBA&lt;br /&gt;
** How do we make individuals or entities take risks? Ways Forward for KBA-PMP&lt;br /&gt;
** Its time to ask for resources to support our project. Lets discuss.&lt;br /&gt;
** KBA-PMP Data Collection if ready.&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=199722</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=199722"/>
				<updated>2015-08-31T14:59:17Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Monday August 3, 2015 at 11:00 AM - 12:30 PM US Eastern Time */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday August 31, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions &lt;br /&gt;
** KBA Performance Metrics v7 Luis &lt;br /&gt;
** Followup on Remote First Use KBA. Is this wanted and needed?&lt;br /&gt;
** Follow on Questions for Healthcare Providers who use KBA&lt;br /&gt;
** How do we make individuals or entities take risks? Ways Forward for KBA-PMP&lt;br /&gt;
** Its time to ask for resources to support our project. Lets discuss.&lt;br /&gt;
** KBA-PMP Data Collection if ready.&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=198305</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=198305"/>
				<updated>2015-08-02T23:17:47Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* AGENDA */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday August 3, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions &lt;br /&gt;
** KBA Performance Metrics v7 Luis &lt;br /&gt;
** Followup on Remote First Use KBA. Is this wanted and needed?&lt;br /&gt;
** Follow on Questions for Healthcare Providers who use KBA&lt;br /&gt;
** How do we make individuals or entities take risks? Ways Forward for KBA-PMP&lt;br /&gt;
** Its time to ask for resources to support our project. Lets discuss.&lt;br /&gt;
** KBA-PMP Data Collection if ready.&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=197948</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=197948"/>
				<updated>2015-07-27T17:48:32Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday August 3, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Questions and Processes Healthcare Providers who use KBA)&lt;br /&gt;
** Ways Forward for KBA-PMP&lt;br /&gt;
** Its time to ask for resources to support our project. Lets discuss.&lt;br /&gt;
** KBA-PMP Data Collection if ready.&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=197867</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=197867"/>
				<updated>2015-07-24T15:14:27Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday July 27, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Questions and Processes Healthcare Providers who use KBA)&lt;br /&gt;
** Ways Forward for KBA-PMP&lt;br /&gt;
** Its time to ask for resources to support our project. Lets discuss.&lt;br /&gt;
** KBA-PMP Data Collection if ready.&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=197595</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=197595"/>
				<updated>2015-07-19T20:45:55Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Our Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday July 20, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Questions and Processes Healthcare Providers who use KBA)&lt;br /&gt;
** Ways Forward for KBA-PMP&lt;br /&gt;
** Its time to ask for resources to support our project. Lets discuss.&lt;br /&gt;
** KBA-PMP Data Collection if ready.&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=197154</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=197154"/>
				<updated>2015-07-07T21:16:45Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* AGENDA */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday July 13, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Questions and Processes Healthcare Providers who use KBA)&lt;br /&gt;
** Ways Forward for KBA-PMP&lt;br /&gt;
** Its time to ask for resources to support our project. Lets discuss.&lt;br /&gt;
** KBA-PMP Data Collection if ready.&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=197153</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=197153"/>
				<updated>2015-07-07T21:15:30Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday July 13, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Questions for Conversation with Healthcare Providers who use KBA)&lt;br /&gt;
** Ways Forward for KBA-PMP&lt;br /&gt;
** Its time to ask for resources to support our project. Lets discuss.&lt;br /&gt;
** KBA-PMP Data Collection if ready.&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=197020</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=197020"/>
				<updated>2015-07-05T21:24:26Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* AGENDA */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday July 6 29, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Questions for Conversation with Healthcare Providers who use KBA)&lt;br /&gt;
** Ways Forward for KBA-PMP&lt;br /&gt;
** Its time to ask for resources to support our project. Lets discuss.&lt;br /&gt;
** KBA-PMP Data Collection if ready.&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=197019</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=197019"/>
				<updated>2015-07-05T19:43:06Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday July 6 29, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=196479</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=196479"/>
				<updated>2015-06-22T17:09:56Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Our Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 29, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195900</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195900"/>
				<updated>2015-06-08T15:00:16Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- =='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 15, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195854</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195854"/>
				<updated>2015-06-07T14:29:03Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Our Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''==&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 15, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195652</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195652"/>
				<updated>2015-06-02T15:28:34Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Related Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''==&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet] Choosing and Using Security Questions Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195651</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195651"/>
				<updated>2015-06-02T15:27:32Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Related Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''==&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
[[https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet]]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195650</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195650"/>
				<updated>2015-06-02T15:25:37Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Related Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''==&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ASVS]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195649</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195649"/>
				<updated>2015-06-02T15:23:34Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Related Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''==&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
ASVS&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195648</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195648"/>
				<updated>2015-06-02T15:22:32Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''==&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;!-- OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195647</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195647"/>
				<updated>2015-06-02T15:19:28Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''==&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195474</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195474"/>
				<updated>2015-05-28T19:43:15Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* http://www.kba-pmp.org/dir /Visit Our Website kba-pmp.org */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''[[http://www.kba-pmp.org/dir Visit Our Website KBA-PMP.org]]'''==&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195473</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195473"/>
				<updated>2015-05-28T19:41:45Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Visit Our Website */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''[[http://www.kba-pmp.org/dir /Visit Our Website kba-pmp.org]]'''==&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195472</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195472"/>
				<updated>2015-05-28T19:37:49Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Visit Our Website */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Visit Our Website'''==&lt;br /&gt;
[http://kba-pmp.org/dir]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195471</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195471"/>
				<updated>2015-05-28T19:37:12Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Our Website */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Visit Our Website'''==&lt;br /&gt;
[http://kba-pmp.org]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195470</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195470"/>
				<updated>2015-05-28T19:35:04Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. https://2015.appsec.eu/conference-program/ ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195469</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195469"/>
				<updated>2015-05-28T19:33:25Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, The Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195468</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195468"/>
				<updated>2015-05-28T19:27:40Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, the Netherlands. */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, The Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, Netherlands. ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195467</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195467"/>
				<updated>2015-05-28T19:22:15Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 ==&lt;br /&gt;
== Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, The Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, the Netherlands. ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195466</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195466"/>
				<updated>2015-05-28T19:18:16Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* May 21, 2015  */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, The Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 == &lt;br /&gt;
== Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features at the OWASP AppSec EU 2015 in Amsterdam, the Netherlands. ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195465</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195465"/>
				<updated>2015-05-28T19:14:50Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Talks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, The Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
== May 21, 2015 Co-Project Leaders Luis Enriquez and Ann Racuya-Robbins co-create a Lightning talk on the project's current essential features to KBA Performance Metrics. ==&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195464</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195464"/>
				<updated>2015-05-28T19:14:13Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== May 19-20, 2015 Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, The Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195461</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195461"/>
				<updated>2015-05-28T19:08:01Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
== May 19- 20, 2015 Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit in Amsterdam, The Netherlands see https://2015.appsec.eu/conference-program/ KBA-PMP and https://2015.appsec.eu/project-summit/. ==&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195460</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195460"/>
				<updated>2015-05-28T18:56:35Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
Knowledge Based Authentication Performance Metrics (KBA-PMP) holds its first Project Summit at https://2015.appsec.eu/conference-program/ KBA-PMP&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195459</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195459"/>
				<updated>2015-05-28T18:49:16Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== Quick Download ==&lt;br /&gt;
== In Print == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Classification ==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195458</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195458"/>
				<updated>2015-05-28T18:43:19Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* AGENDA */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome and Introductions  &lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** KBA-PMP Standard Structure #3  -  All&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195457</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195457"/>
				<updated>2015-05-28T18:40:23Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Our Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome  &lt;br /&gt;
** Introductions&lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** OWASP KBA Structure - Pilots KBA request All&lt;br /&gt;
**** Integrating where appropriate OWASP ASVS and SAMM and engaging the larger OWASP community&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
*** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
****Update on Project Infrastructure&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* International Participants&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195456</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195456"/>
				<updated>2015-05-28T18:35:46Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
Please see the [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#News News] and [https://www.owasp.org/index.php/OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project#Talks Talks] tabs&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome  &lt;br /&gt;
** Introductions&lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** OWASP KBA Structure - Pilots KBA request All&lt;br /&gt;
**** Integrating where appropriate OWASP ASVS and SAMM and engaging the larger OWASP community&lt;br /&gt;
*** NIST SP 800-63-2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
**** Identity Proofing Contextual Article/NIST SP 800-63-2 Eauthentication&lt;br /&gt;
**** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
****Update on Project Infrastructure&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* International Participants&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
* Application to Conference in Amsterdam Update&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Previous Meeting(s)==&lt;br /&gt;
&lt;br /&gt;
Fill in information on past meeting(s), links to slides, pictures, etc.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Presentation == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Project Leaders == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- * [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya-robbins@owasp.org Ann Racuya-Robbins] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195455</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195455"/>
				<updated>2015-05-28T18:33:18Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome  &lt;br /&gt;
** Introductions&lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** OWASP KBA Structure - Pilots KBA request All&lt;br /&gt;
**** Integrating where appropriate OWASP ASVS and SAMM and engaging the larger OWASP community&lt;br /&gt;
*** NIST SP 800-63-2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
**** Identity Proofing Contextual Article/NIST SP 800-63-2 Eauthentication&lt;br /&gt;
**** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
****Update on Project Infrastructure&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* International Participants&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
* Application to Conference in Amsterdam Update&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Previous Meeting(s)==&lt;br /&gt;
&lt;br /&gt;
Fill in information on past meeting(s), links to slides, pictures, etc.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Presentation == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Project Leaders == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- * [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya-robbins@owasp.org Ann Racuya-Robbins] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195454</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195454"/>
				<updated>2015-05-28T18:31:19Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome  &lt;br /&gt;
** Introductions&lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** OWASP KBA Structure - Pilots KBA request All&lt;br /&gt;
**** Integrating where appropriate OWASP ASVS and SAMM and engaging the larger OWASP community&lt;br /&gt;
*** NIST SP 800-63-2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
**** Identity Proofing Contextual Article/NIST SP 800-63-2 Eauthentication&lt;br /&gt;
**** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
****Update on Project Infrastructure&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* International Participants&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
* Application to Conference in Amsterdam Update&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Previous Meeting(s)==&lt;br /&gt;
&lt;br /&gt;
Fill in information on past meeting(s), links to slides, pictures, etc.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Presentation == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Project Leaders == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- * [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya-robbins@owasp.org Ann Racuya-Robbins] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195453</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195453"/>
				<updated>2015-05-28T18:27:43Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Our Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday June 1, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome  &lt;br /&gt;
** Introductions&lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** OWASP KBA Structure - Pilots KBA request All&lt;br /&gt;
**** Integrating where appropriate OWASP ASVS and SAMM and engaging the larger OWASP community&lt;br /&gt;
*** NIST SP 800-63-2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
**** Identity Proofing Contextual Article/NIST SP 800-63-2 Eauthentication&lt;br /&gt;
**** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
****Update on Project Infrastructure&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* International Participants&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
* Application to Conference in Amsterdam Update&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Previous Meeting(s)==&lt;br /&gt;
&lt;br /&gt;
Fill in information on past meeting(s), links to slides, pictures, etc.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Presentation == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Project Leaders == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- * [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya-robbins@owasp.org Ann Racuya-Robbins] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195452</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=195452"/>
				<updated>2015-05-28T18:26:32Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: KBA-PMP News&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday May 25, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome  &lt;br /&gt;
** Introductions&lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** OWASP KBA Structure - Pilots KBA request All&lt;br /&gt;
**** Integrating where appropriate OWASP ASVS and SAMM and engaging the larger OWASP community&lt;br /&gt;
*** NIST SP 800-63-2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
**** Identity Proofing Contextual Article/NIST SP 800-63-2 Eauthentication&lt;br /&gt;
**** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
****Update on Project Infrastructure&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* International Participants&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
* Application to Conference in Amsterdam Update&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Previous Meeting(s)==&lt;br /&gt;
&lt;br /&gt;
Fill in information on past meeting(s), links to slides, pictures, etc.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Presentation == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Project Leaders == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- * [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya-robbins@owasp.org Ann Racuya-Robbins] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= News =&lt;br /&gt;
&lt;br /&gt;
= Talks =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= FAQs =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=194436</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=194436"/>
				<updated>2015-05-04T20:19:21Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Our Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday May 25, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome  &lt;br /&gt;
** Introductions&lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** OWASP KBA Structure - Pilots KBA request All&lt;br /&gt;
**** Integrating where appropriate OWASP ASVS and SAMM and engaging the larger OWASP community&lt;br /&gt;
*** NIST SP 800-63-2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
**** Identity Proofing Contextual Article/NIST SP 800-63-2 Eauthentication&lt;br /&gt;
**** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
****Update on Project Infrastructure&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* International Participants&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
* Application to Conference in Amsterdam Update&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Previous Meeting(s)==&lt;br /&gt;
&lt;br /&gt;
Fill in information on past meeting(s), links to slides, pictures, etc.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Presentation == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Project Leaders == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- * [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya-robbins@owasp.org Ann Racuya-Robbins] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=194336</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=194336"/>
				<updated>2015-05-02T18:03:00Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday May 4, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome  &lt;br /&gt;
** Introductions&lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** OWASP KBA Structure - Pilots KBA request All&lt;br /&gt;
**** Integrating where appropriate OWASP ASVS and SAMM and engaging the larger OWASP community&lt;br /&gt;
*** NIST SP 800-63-2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
**** Identity Proofing Contextual Article/NIST SP 800-63-2 Eauthentication&lt;br /&gt;
**** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
****Update on Project Infrastructure&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* International Participants&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
* Application to Conference in Amsterdam Update&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Previous Meeting(s)==&lt;br /&gt;
&lt;br /&gt;
Fill in information on past meeting(s), links to slides, pictures, etc.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Presentation == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Project Leaders == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- * [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya-robbins@owasp.org Ann Racuya-Robbins] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=194206</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=194206"/>
				<updated>2015-04-29T20:19:14Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* P */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday April 27, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome  &lt;br /&gt;
** Introductions&lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** Harmonizing the name of our work KBA-PMP or KBA-PM and Infrastructure Update&lt;br /&gt;
*** Framework and Structure ALL&lt;br /&gt;
**** Integrating where appropriate OWASP ASVS and SAMM and engaging the larger OWASP community&lt;br /&gt;
*** NIST SP 800-63-2&lt;br /&gt;
*** Perspectives and Filters ALL&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
**** Identity Proofing Contextual Article/NIST SP 800-63-2 Eauthentication&lt;br /&gt;
**** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
****Update on Project Infrastructure&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* International Participants&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
* Application to Conference in Amsterdam Update&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Previous Meeting(s)==&lt;br /&gt;
&lt;br /&gt;
Fill in information on past meeting(s), links to slides, pictures, etc.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Presentation == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Project Leaders == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- * [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya-robbins@owasp.org Ann Racuya-Robbins] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
Performance Metrics&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=194205</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=194205"/>
				<updated>2015-04-29T20:18:26Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* S */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday April 27, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome  &lt;br /&gt;
** Introductions&lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** Harmonizing the name of our work KBA-PMP or KBA-PM and Infrastructure Update&lt;br /&gt;
*** Framework and Structure ALL&lt;br /&gt;
**** Integrating where appropriate OWASP ASVS and SAMM and engaging the larger OWASP community&lt;br /&gt;
*** NIST SP 800-63-2&lt;br /&gt;
*** Perspectives and Filters ALL&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
**** Identity Proofing Contextual Article/NIST SP 800-63-2 Eauthentication&lt;br /&gt;
**** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
****Update on Project Infrastructure&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* International Participants&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
* Application to Conference in Amsterdam Update&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Previous Meeting(s)==&lt;br /&gt;
&lt;br /&gt;
Fill in information on past meeting(s), links to slides, pictures, etc.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Presentation == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Project Leaders == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- * [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya-robbins@owasp.org Ann Racuya-Robbins] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
Scalability&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=194204</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=194204"/>
				<updated>2015-04-29T20:12:08Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* KBA-PMP Best Practices */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA-PMP Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday April 27, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome  &lt;br /&gt;
** Introductions&lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** Harmonizing the name of our work KBA-PMP or KBA-PM and Infrastructure Update&lt;br /&gt;
*** Framework and Structure ALL&lt;br /&gt;
**** Integrating where appropriate OWASP ASVS and SAMM and engaging the larger OWASP community&lt;br /&gt;
*** NIST SP 800-63-2&lt;br /&gt;
*** Perspectives and Filters ALL&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
**** Identity Proofing Contextual Article/NIST SP 800-63-2 Eauthentication&lt;br /&gt;
**** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
****Update on Project Infrastructure&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* International Participants&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
* Application to Conference in Amsterdam Update&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Previous Meeting(s)==&lt;br /&gt;
&lt;br /&gt;
Fill in information on past meeting(s), links to slides, pictures, etc.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Presentation == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Project Leaders == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- * [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya-robbins@owasp.org Ann Racuya-Robbins] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=194202</id>
		<title>OWASP Knowledge Based Authentication Performance Metrics Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Knowledge_Based_Authentication_Performance_Metrics_Project&amp;diff=194202"/>
				<updated>2015-04-29T19:40:03Z</updated>
		
		<summary type="html">&lt;p&gt;AnnElizabeth Racuya-Robbins: /* KBA-PMP Project Metrics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==What is KBA-PMP ==&lt;br /&gt;
&lt;br /&gt;
There is a lack of standard performance metrics regarding the use of knowledge based authentication (KBA) for remote identity proofing. KBA-PMP's goal is to establish standard performance metrics for knowledge based authentication.&lt;br /&gt;
&lt;br /&gt;
=='''Collaborate'''==&lt;br /&gt;
[[http://kba-pmp.org/dir/ Collaborate]]&lt;br /&gt;
&lt;br /&gt;
=='''KBA Best Practices'''==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==What is Knowledge Based Authentication? ==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Knowledge Based Authentication (KBA) is much more complex than the following description from Wikipedia might lead one to expect. In order to establish reliable and standard performance metrics these complexities will need to be identified and addressed.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--From Wikipedia— &amp;quot;Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service, such as a website. As the name suggests, KBA requires the knowledge of personal information of the individual to grant access to the protected material. There are two types of KBA: &amp;quot;static KBA&amp;quot;, which is based on a pre-agreed set of &amp;quot;shared secrets&amp;quot;; and &amp;quot;dynamic KBA&amp;quot;, which is based on questions generated from a wider base of personal information.&amp;quot;--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====KBA-PMP Project Supports the NSTIC Guiding Principles ====&lt;br /&gt;
KBA-PMP Project is dedicated to developing KBA Standards in alignment the the NSTIC Guiding Principle. To that end KBA-PMP Project has answered the IDESG Standards Committee Solicitation to develop Knowledge Based Authentication Performance Metrics Standards.&lt;br /&gt;
&lt;br /&gt;
The IDESG, its components, and its members shall at all times operate in accordance with four Guiding Principles set forth in the NSTIC. They are:&lt;br /&gt;
&lt;br /&gt;
'''1. Identity solutions will be privacy-enhancing and voluntary.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will be grounded in a holistic, integrated implementation of the Fair Information Practice Principles to promote the creation and adoption of policies and standards that are privacy-enhancing, including the preservation of the capacity to engage in anonymous and pseudonymous activities online. Ideally, identity solutions within the Identity Ecosystem should preserve the positive privacy benefits associated with offline identity-related transactions while mitigating some of the negative privacy aspects. Finally, participation in the Identity Ecosystem will be voluntary: the government will neither mandate that individuals obtain an Identity Ecosystem credential nor that companies require Identity Ecosystem credentials from consumers as the only means to interact with them. Individuals shall be free to use an Identity Ecosystem credential of their choice, provided the credential meets the minimum risk requirements of the relying party, or to use any non-Identity Ecosystem mechanism provided by the relying party. Individuals’ participation in the Identity Ecosystem will be a day-to-day—or even a transaction-to-transaction—choice.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''2. Identity solutions will be secure and resilient.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Identity solutions within the Identity Ecosystem will provide secure and reliable methods of electronic authentication by being grounded in technology and security standards that are open and collaboratively developed with auditable security processes. Credentials within the Identity Ecosystem are: issued based on sound criteria for verifying the identity of individuals and devices, when appropriate; resistant to theft, tampering, counterfeiting, and exploitation; and issued only by providers who fulfill the necessary requirements. Identity solutions must detect when trust has been broken, be capable of timely restoration after any disruption, be able to quickly revoke and recover compromised digital identities, and be capable of adapting to the dynamic nature of technology.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''3. Identity solutions will be interoperable.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--Interoperability encourages and enables service providers to accept a wide variety of credentials and enables users to take advantage of different credentials to assert their identity online. Two types of interoperability are recognized in the Identity Ecosystem: technical interoperability is the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards; policy-level interoperability is the ability for organizations to adopt common business policies and processes.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''4. Identity solutions will be cost-effective and easy to use.'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--The Identity Ecosystem will promote identity solutions that enable individuals to use a smaller number of identity credentials across a wide array of service providers. These identity solutions must be cost-effective for users, identity and attribute providers, and relying parties. Furthermore, identity solutions should be simple to understand, intuitive, easy-to-use, and enabled by technology that requires minimal user training.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
Creative Commons Attribution ShareAlike 3.0 License&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == What is OWASP KBA-PMP Project? == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
== Project Manager Scrum Leader ==&lt;br /&gt;
* [mailto:ann.racuya.robbins@owasp.org Ann Racuya-Robbins]&lt;br /&gt;
&lt;br /&gt;
===  Join our Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/owasp_kbapm_project Mailing List]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Follow us on Twitter ===&lt;br /&gt;
&lt;br /&gt;
[https://twitter.com/owasp_kbapmp @OWASP_KBAPMP]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Our Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== WHEN ==== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Monday April 27, 2015 at 11:00 AM - 12:30 PM US Eastern Time ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--//'''Previous Meeting Minutes''' &amp;lt;!--[[https://www.owasp.org/index.php/KBAPM_Meeting_Notes#KBAPM_Meeting_Notes_20150112]]--&amp;gt;&lt;br /&gt;
*[https://www.dropbox.com/s/a8mm4msrkg9s6z5/2015-02-23%2011.20%20OWASP%20KBAPMP.mp3?dl=0 '''RECORDING of CONVERSATION with CRYPTOGRAPHER BILL BURR''']&lt;br /&gt;
&lt;br /&gt;
==== AGENDA ====&lt;br /&gt;
All Meetings are Open and All are Welcome&lt;br /&gt;
 &lt;br /&gt;
* Welcome  &lt;br /&gt;
** Introductions&lt;br /&gt;
** Discussion on: (We can decide/confirm the order of discussion at the top of meeting)&lt;br /&gt;
*** Harmonizing the name of our work KBA-PMP or KBA-PM and Infrastructure Update&lt;br /&gt;
*** Framework and Structure ALL&lt;br /&gt;
**** Integrating where appropriate OWASP ASVS and SAMM and engaging the larger OWASP community&lt;br /&gt;
*** NIST SP 800-63-2&lt;br /&gt;
*** Perspectives and Filters ALL&lt;br /&gt;
&lt;br /&gt;
** ''If time allows''&lt;br /&gt;
**** Identity Proofing Contextual Article/NIST SP 800-63-2 Eauthentication&lt;br /&gt;
**** New approaches to KBA metrics &lt;br /&gt;
**** Feedback from US National Science Foundation's (NSF) Bahvani (from NIST Big Data Public Working Group - NBDPWG) on challenges to Multi-Factor Authentication (MFA)&lt;br /&gt;
****Update on Project Infrastructure&lt;br /&gt;
&lt;br /&gt;
*'''Ongoing:'''&lt;br /&gt;
* International Participants&lt;br /&gt;
* Outreach to KBA Providers and other Stakeholders Continues&lt;br /&gt;
* Application to Conference in Amsterdam Update&lt;br /&gt;
** https://2015.appsec.eu/call-for-papers/&lt;br /&gt;
** https://2015.appsec.eu/call-for-research/&lt;br /&gt;
** Distributing Recorded Meetings?&lt;br /&gt;
&lt;br /&gt;
*Next Steps: Tasks&lt;br /&gt;
*Adjourn&lt;br /&gt;
&lt;br /&gt;
==== WHERE  ====&lt;br /&gt;
&lt;br /&gt;
GoToMeeting&lt;br /&gt;
'''https://www3.gotomeeting.com/join/642177878'''&lt;br /&gt;
'''Access Code: 642-177-878'''&lt;br /&gt;
&lt;br /&gt;
2. Use your microphone and speakers (VoIP) - a headset is recommended. Or, call in using your telephone.&lt;br /&gt;
Dial +1 (571) 317-3112&lt;br /&gt;
Audio PIN: Shown after joining the meeting&lt;br /&gt;
Meeting ID: 642-177-878&lt;br /&gt;
GoToMeeting® &lt;br /&gt;
Online Meetings Made Easy®&lt;br /&gt;
Not at your computer? Click the link to join this meeting from your iPhone®, iPad® or Android® device via the GoToMeeting app&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Previous Meeting(s)==&lt;br /&gt;
&lt;br /&gt;
Fill in information on past meeting(s), links to slides, pictures, etc.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Presentation == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- == Project Leaders == --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- * [mailto:luis.enriquez@owasp.org Luis Enriquez]&lt;br /&gt;
* [mailto:ann.racuya-robbins@owasp.org Ann Racuya-Robbins] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
OWASP Security Labeling System Project&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Security_Labeling_System_Project]&lt;br /&gt;
&lt;br /&gt;
OWASP NIST NSTIC Initiative&lt;br /&gt;
&lt;br /&gt;
== KBA-PMP Project Metrics ==&lt;br /&gt;
&amp;lt;!-- https://www.openhub.net/accounts/KBAOpenHub &lt;br /&gt;
A performance metrics tool for the KBA-PMP--&amp;gt;&lt;br /&gt;
https://github.com/KBA-PMP-ADMIN&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]   &lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator. &lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Ann Racuya-Robbins Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
Luis Enriquez Project Co-Leader&lt;br /&gt;
&lt;br /&gt;
= Road Map - Time Line =&lt;br /&gt;
&lt;br /&gt;
OWASP KBA-PMP - Knowledge Based Authentication Performance Metrics Project&lt;br /&gt;
&lt;br /&gt;
Goals - To meet the requirements of the IDESG KBA Solicitation:&lt;br /&gt;
&lt;br /&gt;
'''KBA PROJECT PHASES''' (PROPOSAL)&lt;br /&gt;
Dear KBA collegues, we propose an action plan divided in the following phases:&lt;br /&gt;
&lt;br /&gt;
'''FIRST PHASE: SCANNING THE MARKET'''&lt;br /&gt;
The goal of this first phase, is to understand how KBA is working today (static and dynamic), and&lt;br /&gt;
how KBA methodologies have been implemented by KBA providers. I think this a good departure&lt;br /&gt;
point.&lt;br /&gt;
*1. Footprinting the KBA market providers.&lt;br /&gt;
*2. Identifying the KBA product providers used by the main market players.&lt;br /&gt;
*3. Identifying the advantages and drawbacks of KBA provider's methodology.&lt;br /&gt;
*4. Draw the document's structure.&lt;br /&gt;
**Complete document structure v1&lt;br /&gt;
*5. Initial Timeline &lt;br /&gt;
*5. Launch Participant Outreach&lt;br /&gt;
&lt;br /&gt;
'''SECOND PHASE: DEVELOPMENT'''&lt;br /&gt;
Once the advantages and drawbacks of the KBA market have been clearly identified, it would be&lt;br /&gt;
necessary to have our own platform for testing purposes. This will give us the right perspective about&lt;br /&gt;
developing a transnational, neutral, secure, and market wise KBA standard. I would also suggest&lt;br /&gt;
building an open wiki, to get community feedback.&lt;br /&gt;
*1. Setting an Application for KBA testing purposes.&lt;br /&gt;
*2. Build an open wiki for community feedback.&lt;br /&gt;
*3. Test the KBA proposals in our test application.&lt;br /&gt;
*4. Analyzing the framework in crucial legal areas (such as Dynamic KBA and privacy).&lt;br /&gt;
&lt;br /&gt;
'''THIRD PHASE: EDITION'''&lt;br /&gt;
This phase is very important, as it concerns the text edition. Once all proposals have being tested in our&lt;br /&gt;
lab, we should translate them into a clear document.&lt;br /&gt;
*1. Edit the contents of the sources (sources such as the wiki).&lt;br /&gt;
*2. Release the version 1.0. and license it under the terms of a suitable license.&lt;br /&gt;
&lt;br /&gt;
Initial Overview&lt;br /&gt;
# Survey and research the Global OWASP Community and other networks to identify and recruit appropriate participation.&lt;br /&gt;
# Develop Opinion polls, foundations' research, interviews, perspectives on project, input from communities outside of the networks.&lt;br /&gt;
# Survey and research other standards groups and their interests.&lt;br /&gt;
# Phase I footprinting&lt;br /&gt;
# Phase II Development&lt;br /&gt;
# Phase III Implementation, Lessons Learned, Continuous refinement, Ongoing participation model, etc.&lt;br /&gt;
# Research Licensing models //&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Research Papers =&lt;br /&gt;
&lt;br /&gt;
'''1. Knowledge Based Authentication: Paradigms and Challenges '''&lt;br /&gt;
https://drive.google.com/file/d/0B3AkniUi7NFeRXduS3pPQTJ6Mm8/view?usp=sharing&amp;quot;&lt;br /&gt;
&lt;br /&gt;
= Glossary =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
= KBA Concepts =&lt;br /&gt;
&lt;br /&gt;
{{taggedDocument&lt;br /&gt;
  | type=partialOld &lt;br /&gt;
  | mode=silent &lt;br /&gt;
}} &lt;br /&gt;
{{compactTOC}}&lt;br /&gt;
&lt;br /&gt;
{{SecureSoftware}}&lt;br /&gt;
&lt;br /&gt;
==0–9==&lt;br /&gt;
&lt;br /&gt;
==A==&lt;br /&gt;
&lt;br /&gt;
==B==&lt;br /&gt;
&lt;br /&gt;
==C==&lt;br /&gt;
&lt;br /&gt;
==D==&lt;br /&gt;
&lt;br /&gt;
==E==&lt;br /&gt;
&lt;br /&gt;
==F==&lt;br /&gt;
&lt;br /&gt;
==G==&lt;br /&gt;
&lt;br /&gt;
==H==&lt;br /&gt;
&lt;br /&gt;
==I==&lt;br /&gt;
&lt;br /&gt;
==J==&lt;br /&gt;
&lt;br /&gt;
==K==&lt;br /&gt;
&lt;br /&gt;
==L==&lt;br /&gt;
&lt;br /&gt;
==M==&lt;br /&gt;
&lt;br /&gt;
==N==&lt;br /&gt;
&lt;br /&gt;
==O==&lt;br /&gt;
&lt;br /&gt;
==P==&lt;br /&gt;
&lt;br /&gt;
==Q==&lt;br /&gt;
&lt;br /&gt;
==R==&lt;br /&gt;
&lt;br /&gt;
==S==&lt;br /&gt;
&lt;br /&gt;
==T==&lt;br /&gt;
&lt;br /&gt;
==U==&lt;br /&gt;
&lt;br /&gt;
==V==&lt;br /&gt;
&lt;br /&gt;
==W==&lt;br /&gt;
&lt;br /&gt;
==X==&lt;br /&gt;
&lt;br /&gt;
==Y==&lt;br /&gt;
&lt;br /&gt;
==Z==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>AnnElizabeth Racuya-Robbins</name></author>	</entry>

	</feed>