Security, Devices and Automation Research in Oxygen

Slides:



Advertisements
Similar presentations
Many personal devices have rich set of capabilities: sensors, communication, computing power and data storage, and they are personal. Potentially they.
Advertisements

Ani Choudhury Why am I taking Dig-It?. Reasons why I am taking the Dig-It class: I’m taking the Dig-It class so that I can be efficient with computers.
Physical Unclonable Functions and Applications
Offline Untrusted Storage with Immediate Detection of Forking and Replay Attacks Marten van Dijk, Jonathan Rhodes, Luis Sarmenta Srini Devadas MIT Computer.
You are God in Heaven You are God in heaven And here am I on earth So I’ll let my words be few Jesus, I am so in love With You By Matt Redman © 2000 Kingsway’s.
Information Technology Registry Services Security LDAP-based Attributes and Authentication.
Clarke, R. J (2001) L909-01: 1 Office Automation & Intranets BUSS 909 Tutorial n Links in NetObjects.
Iceberg Preferences Manager Rahul Biswas and Bhaskar Raman ISRG Winter 2000 Retreat.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Smart Home Technologies CSE 4392 / CSE 5392 Spring 2006 Manfred Huber
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
MOODLE E-learning application device for the successful completion of the Practice in community pharmacy Go to:
L C SL C S The Untrusted Computer Problem and Camera-Based Authentication Dwaine Clarke, Blaise Gassend, Thomas Kotwal, Matt Burnside, Marten van Dijk,
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Bluetooth Jennifer Portillo Thomas Razo Samson Vuong By Sonny Leung.
Security Protocols in Automation Dwaine Clarke MIT Laboratory for Computer Science January 8, 2002 With help from: Matt Burnside, Todd.
K21 and Automation System Architecture Matthew Burnside MIT Laboratory for Computer Science January 8, 2002 Jointly with: Dwaine Clarke,
Capitalization 1 st grade Practice. Capitalization Practice What word needs to be capitalized in this sentence? the dog was running after the cat.
By Julia Nguyen B2. What is it?  Networking is two or more computers linked together  Two common types are Local Area Network (LAN) and Wide Area Network.
Systems Security & Audit Operating Systems security.
Speeding up Exponentiation using an Untrusted Computational Resource (Part 1) Author: M. Van Dijk, D. Clarke, B. Gassend, G.E. Suh and S. Devadas Source:
1 Vrijendra Gokhale, Bernard Menezes K. R. School of Information Technology IIT Bombay User Interfaces for Jini Services The Jini Pattern Language Workshop.
L C SL C S Security Research in Project Oxygen Srini Devadas Ronald L. Rivest Students: Burnside, Clarke, Gassend, Kotwal, Raman Oxygen Visitors: Marten.
© Synergetics Portfolio Security Aspecten.
By: Ehsan Khodarahmi L7. A genuine LDP aims at identifying and nurturing the leadership quality and attributes in potential future leaders. LDP prepares.
Kerberos. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open source or in supported commercial software.
Kristi Holmes National Outreach Lead, Washington University School of Medicine Approaching Administrators and Data Providers.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Security (and privacy) Larry Rudolph With help from Srini Devedas, Dwaine Clark.
CS Computer Literacy Ryan Shick Biological Chemistry/Pre-Pharmacy Major.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
Pupil Records Pupil Reports Surveys Club Records Database Applications.
By: Maite Velasquez. A computer network is a system in which two or more computers are connected by channels for the purpose to share information and.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Integrating Access Control with Intentional Naming Sanjay Raman MIT Laboratory for Computer Science January 8, 2002 With help from: Dwaine.
MOODLE E-learning application device for the successful completion of the Practice in community pharmacy Go to:
Submission November 2015doc: IEEE /1436r2 Xun Yang, HuaweiSlide 1 STA-to-STA Positioning Use Cases Date: Authors:
A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments Authors: Kui Ren, Wenjing Lou, Kwangjo Kim, and.
Submission November 2015doc: IEEE /1436r1 Xun Yang, HuaweiSlide 1 STA-to-STA Positioning Use Cases Date: Authors:
Lets Generate Bill for the due for renewal boxes and expired one. 1. click on Bill history.
KYUNG-HWA KIM HENNING SCHULZRINNE 12/09/2008 INTERNET REAL-TIME LAB, COLUMBIA UNIVERSITY DYSWIS.
Integrating Access Control with Intentional Naming Sanjay Raman MIT Laboratory for Computer Science January 8, 2002 With help from: Dwaine.
Electronic Banking & Security Electronic Banking & Security.
Let My Words Be Few Written by: Matt Redman Let My Words Be Few Written by: Matt Redman CCLI #
You are God in heaven, and here am I on earth. So I’ll let my words be few. Jesus, I am so in love with You.
21st ACM Symposium on Operating Systems Principles, Oct 2007 DejaView: A Personal Virtual Computer Recorder.
How to Install a HP Printer Without the Installation Disk If you lost installation disk and you need to install on another system then you.
CSCI 465 Data Communications and Networks Lecture 26
Identity and Access Management
Lightweight Mutual Authentication for IoT and Its Applications
Grid Security.
Name, Title.
MOODLE E-learning application
Writing Mandarin numbers 1-50
GROWTH MINDSET.
SEMINAR ON PROJECT OXYGEN Presented By: VIJET R HEGDE 3VC05IS056.
Printers.
Principles of report writing
Jason cooper blockchain specialist Unlock blockchain 14 January 2018
Project Oxygen… Shashwat Shriparv
AEGIS: Secure Processor for Certified Execution
Physics-based simulation for visual computing applications
Bluetooth.
The “Untrusted” Computer Problem
What's New in Visual Studio 2005
Protocol ap1.0: Alice says “I am Alice”
I’m so secure You’re here with me
Physical Unclonable Functions and Applications
All About Me By Raeem.
Presentation transcript:

Security, Devices and Automation Research in Oxygen Matt Burnside, Dwaine Clarke, Blaise Gassend, Tom Kotwal, Sanjay Raman Srini Devadas, Ron Rivest Marten Van Dijk - Philips

Main Goal Create an environment where devices are automatically yet securely controlled, and provide private yet efficient information access

Motivation Consider a scenario where many people share devices, appliances, and computers Only people I authorize should be able to use the printer next to my office I’ll only let “nice” people know where I am I want to print to the highest resolution printer, which is nearest to me, that I have access to I want to perform secure transactions on an “untrusted” computer/network

Sessions Session 1: Automation and Access Control System architecture Security protocols Efficient attribute search with ACL’s Session 2: “Untrusted” Computer Problem Visual authentication Visual identification