Gergely Tóth, Rump Session1 PETWorkshop 2004, Toronto, Canada, 26-28 May 2004 Gergely Tóth Budapest University of Technology and Economics Department of.

Slides:



Advertisements
Similar presentations
Click to continue Network Protocols. Click to continue Networking Protocols A protocol defines the rules of procedures, which computers must obey when.
Advertisements

Baryons Software Solutions. ONLINE FILM & VIDEO PUBLISHING PLATFORM Online Film & Video Publishing is a solution for launching, ticketing, and distributing.
Presenter : Stuart Stent Lecturer : Robert Dale Supervisor: Rajan Shankaran.
Stork is an EU co-funded project INFSO-ICT-PSP Secure Identity Across Borders Linked Secure Electronic Identity Across Europe! STORK – 4 TH I NDUSTRY.
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
Network Layer and Transport Layer.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
Copyright 2008 Vision Australia DAISY Online Standard Bringing things together Trish Egan Vision Australia.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Confidentiality using Symmetric Encryption traditionally symmetric encryption is used to provide message confidentiality consider typical scenario –workstations.
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
Applied Cryptography for Network Security
Circuit & Application Level Gateways CS-431 Dick Steflik.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
THE OSI REFERENCE MODEL LES M C LELLAN DEAN WHITTAKER SANDY WORKMAN.
Public Key Infrastructure Ammar Hasayen ….
Host Identity Protocol
Making the Services Directive Work: UK experience Kerry Jones, Head of the UK Single Market Centre European Reform Team, Department for Business Innovation.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
Comparing modem and other technologies
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Introducing Digital Rights Management Willms Buhse October 2002, Vilnius.
Architectures. Many tasks involved in encoding, protecting and transmitting user application data as bit stream. Network Architecture is how tasks are.
MPEG-21 : Overview MUMT 611 Doug Van Nort. Introduction Rather than audiovisual content, purpose is set of standards to deliver multimedia in secure environment.
THE OSI REFERENCE MODEL Open Systems Interconnection (OSI) International Organization for Standardization( ISO)
Course ILT The OSI model Unit objectives Explain the significance of the OSI model, label the seven layers of the OSI model, and describe services provided.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
OSI Model. Topics What is the OSI Model? What is a Protocol? Why 7 Layers? The 7 Layers – Application – Presentation – Session – Transport – Network –
Gergely Tóth, 5 November Nordsec 2004, Helsinki, Finland, 4-5 November 2004 Measuring Anonymity Revisited Gergely Tóth Zoltán Hornák Ferenc Vajda.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Network Applications and Layered Architectures Protocols OSI Reference Model.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 7 – Confidentiality Using Symmetric Encryption.
Chapter 7 Confidentiality Using Symmetric Encryption.
SESSION 14 INFORMATION SYSTEMS SECURITY AND CONTROL.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Gergely Tóth, 23 September IWCIT’03, Gliwice, Poland, September 2003 Measure for Anonymity Gergely Tóth Budapest University of Technology and.
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
An Analysis of XMPP Security Team “Vision” Chris Nelson Ashwin Kulkarni Nitin Khatri Taulant Haka Yong Chen CMPE 209 Spring 2009.
1 © NOKIA WWRF-Reference-Framework.PPT/ 26 June 2002 / Kimmo Raatikainen WWRF Reference Framework Nokia’s Perspective WWRF WG2 Meeting 26 June 2002 Kimmo.
Chapter 7 – Confidentiality Using Symmetric Encryption.
1/15 Chapter 5 Open Systems Interconnection Model.
Office of the National Coordinator for Health Information Technology ONC Update for HITSP Board U.S. Department of Health and Human Services John W. Loonsk,
Computer Network Lab. 1 3 장 OSI 기본 참조 모델 n OSI : Open System Interconnection n Basic Reference Model : ISO-7498 n Purpose of OSI Model ~ is to open communication.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
OMA Secure Content Delivery for the Mobile World ODRL Workshop, Vienna Dr. Willms Buhse Vice Chair, OMA Download and DRM group.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Networking Using the OSI Model.
TV Broadcasting What to look for Architecture TV Broadcasting Solution
e-Health Platform End 2 End encryption
practice-questions.html If you Are Thinking about your dumps? Introduction:
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
DATA COMMUNICATION Lecture-10.
PREPARED BY: RUMMY MIRANDA
Computer Security Network Security
Ch. 11 – Cipher Techniques Dr. Wayne Summers
Lecture 1: Foundation of Network Security
Telecommunications and Networking
William Hackett & Co. Solicitors
Anja Burghardt, Institute for Employment Research (IAB)
Integrated Security System
Security Mechanisms Network Security.
ONC Update for HITSP Board
Presentation transcript:

Gergely Tóth, Rump Session1 PETWorkshop 2004, Toronto, Canada, May 2004 Gergely Tóth Budapest University of Technology and Economics Department of Measurement and Information Systems SEARCH Laboratory PETWorkshop 2004 — Rump Session

Gergely Tóth, Rump Session2 PETWorkshop 2004, Toronto, Canada, May 2004 General-purpose Anonymity Framework

Gergely Tóth, Rump Session3 PETWorkshop 2004, Toronto, Canada, May 2004 Extending the OSI Model ProblemProblem: current network layer architecture does not provide anonymity extend the existing OSI modelOur aim: extend the existing OSI model in order to support anonymity –introduce new layers for different functions –create an implementation (open source free software)

Gergely Tóth, Rump Session4 PETWorkshop 2004, Toronto, Canada, May 2004 The New Architecture anonymity for messages Provides anonymity for messages by relaying them through intermediate nodes in order to break the end-to-end TCP link anonymous replies Enables anonymous replies thus provides bi-directional streams security Provides security (encryption, integrity protection, authentication, etc.) Application-level Application-level anonymity services (e.g. e-voting, e-payment)

Gergely Tóth, Rump Session5 PETWorkshop 2004, Toronto, Canada, May 2004 INDICARE INDIC ARE The INformed DIalogue about Consumer Acceptability of DRM Solutions in Europe

Gergely Tóth, Rump Session6 PETWorkshop 2004, Toronto, Canada, May 2004 Aim of INDICARE ProblemsProblems with user acceptance of DRM solutionProposed solution: bring together the different involved parties: users, solution providers, service providers, etc. informed dialogueStart an informed dialogue –discussions stimulated and informed by good quality input

Gergely Tóth, Rump Session7 PETWorkshop 2004, Toronto, Canada, May 2004 How to Benefit from INDICARE Comprehensive and informative website Electronic discussion forum Newsletter Five workshops State of the art reports Consumer survey Publications for specifically targeted audiences “e-Payments for Digital Content” October 28, 2004 Budapest, Hungary together with HISEC