Digital Object Architecture

Slides:



Advertisements
Similar presentations
Session 3: Safer Services in a Digital Society Security with RFID Gérald Santucci European Commission Head of Unit DG INFSO/D4.
Advertisements

Secure Single Sign-On Across Security Domains
doi> Digital Object Identifier: overview
Digital Object Architcture An open approach to Information Management on the Net Bibliotheca Alexandrina Dr. Robert E. Kahn Corporation for National Research.
© Copyright International Telecommunication Union (ITU). All Rights Reserved page - 1 Alexander NTOKO Project Manager, ITU Electronic Commerce.
DRIVER Long Term Preservation for Enhanced Publications in the DRIVER Infrastructure 1 WePreserve Workshop, October 2008 Dale Peters, Scientific Technical.
The Draft of Lithuanian Information Society Development Strategy for
Native Language Internet Address NETPIA.COM, INC. CHANG HUN LEE December 6, 2001.
© ITU Telecommunication Development Bureau (BDT) page - 1 Alexander NTOKO Chief, E-Strategy Unit ITU Telecommunication Development Bureau Seminar.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
International Telecommunication Union ITU Seminar – Madrid, December 2002 ITU-T Membership Benefits Gary Fishman ITU-T TSAG Chairman
Use of Public-Key Infrastructure (PKI) Erik Andersen Association for the Directory Information and Related Search Industry (EIDQ -
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Basic Internet Terms Digital Design. Arpanet The first Internet prototype created in 1965 by the Department of Defense.
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
WORKSHOP ON SATELLITES IN IP & MULTIMEDIA Geneva, 9-11 December 2002 Contribution of Mr. Ahmed Toumi Director General & CEO International Telecommunications.
A Unified Approach to Combat Counterfeiting: Use of the Digital Object Architecture and ITU-T Recommendation X.1255 Robert E. Kahn President & CEO CNRI,
The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
A Successful RHIO Implementation
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
 Introduction Originally developed by Open Software Foundation (OSF), which is now called The Open Group ( Provides a set of tools and.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
“ICANN and the Global Internet” ICANN Workshop Wednesday, October 9, 2002 Mexico City.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
CORDRA Philip V.W. Dodds March The “Problem Space” The SCORM framework specifies how to develop and deploy content objects that can be shared and.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Chapter 10: Authentication Guide to Computer Network Security.
Introduction to Object Identifiers (OIDs) France Telecom Orange Olivier Dubuisson 15 June 2009.
CNRI Handle System and its Applications
Resolving Unique and Persistent Identifiers for Digital Objects Why Worry About Identifiers? Individuals and organizations, including governments and businesses,
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
Masud Hasan Secue VS Hushmail Project 2.
The Internet in Education Objectives Introduction Overview –The World Wide Web –Web Page v. Web Site v. Portal Unique and Compelling Characteristics Navigation.
WSIS Forum 2011 May 19, 2011 Presentation by Robert E. Kahn
XHTML Introductory1 Linking and Publishing Basic Web Pages Chapter 3.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Sanzi-1 CSE5 810 CSE5810: Intro to Biomedical Informatics Dynamically Generated Adaptive Credentials for Health Information Exchange Eugene Sanzi.
ICANN Mission, Structure and Constituencies Capacity Building Program June
Internet  Major:Safety science and engineering  Author:jiangqian( 蒋乾 )
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Two Installing and Configuring Exchange Server 2003.
Copyright © 2007 Pearson Education, Inc. Slide 3-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Third Edition.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
DIGITAL SIGNATURE.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 ICT and E-Business Strategies For Development Geneva, October.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
NCP Info DAY, Brussels, 23 June 2010 NCP Information Day: ICT WP Call 7 - Objective 1.3 Internet-connected Objects Alain Jaume, Deputy Head of Unit.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
A Solution Perspective An Open Source Collaborative and Foundational Solution Targeted at Non-OECD Member Countries February 9, 2016.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
Digital Object Architecture (DOA) Information session
Digital Object Architecture Tutorial
Com-ITU/CEPT - January 2016, Copenhagen, Denmark
Trust Profiling for Adaptive Trust Negotiation
Secure Single Sign-On Across Security Domains
Issues need harmonization
Corporation for National Research Initiatives
Public Key Infrastructure (PKI)
Goals Introduce the Windows Server 2003 family of operating systems
ITU-T activity in ICT security
AUC’s Role In Facilitating Access To Knowledge In The Arab World
Presentation transcript:

Digital Object Architecture an advanced architecture for information management

Evolution of the Internet 60s: We addressed computers by the wire that the computer was connected to — on only one existing network. 70s: When we got to multiple networks, it wasn’t sufficient to say “send it out on that wire”, you had to say “then what? Where else would it have to go?” So we created the notion of Internet Protocol (IP) addresses to identify the machines, regardless of where they were. 80s: We had to create simple ways for people to remember those addresses. That was a kind of application, which is now well-known as the Domain Name System (DNS). 90s: World Wide Web was created and Uniform Resource Locators (URLs) were used to locate resources on the Internet (e.g. http://www.abc.com/John_CV). DRAWBACKS Information is tied to its location -- specific machine names and then to specific files on those machines. Limited to specifying URL domain names in Latin scripts only

… Evolution of the Internet 21st Century: THE INTERNET....A GLOBAL PHENOMENON Exists in most countries of the world and runs applications that touch on virtually all aspects of society A critical national resource for governments, a vital part of the national infrastructure, and one of the key drivers of socio-economic development As a result, current and future applications and services would increasing rely on support for key features such as Multilingualism, Security, Identity Management. Digital Object Architecture (DOA) An advanced architecture for current and future needs …

DOA: Features and Benefits Multilingual support – Native support for Identifier names in most scripts in the world Enhanced security - Secure communication with digital objects, building greater trust, confidence and security in the use of ICTs Unique identifiers - Can remain unchanged (persistence) irrespective of where the object is located, who owns it, what type it is, what technology it is based on, etc. Enhanced search capabilities - Metadata Registries that hold relevant information about digital objects; and where authors can specify search criteria Secure record update - Easy and distributed management of information securely over the Internet Distributed technical management - Globally distributed and managed by multiple independent parties working in collaboration Compatible and interoperable - With most existing architectures within the Internet Global Presence Over 1,000 services built on DOA, in 64 countries, on 6 continents; The International DOI Foundation's System has over 50 million registered identifiers. Today top-level DOA global root servers receive (on average) 100 million resolution requests per month Diverse Domains Libraries Intellectual Property Distance Learning Academic Research Entertainment Industry RFID Much more…

DOA: Features and Benefits Multilingualism - Native support for Unicode characters Names can be defined in any native language alphabet Allows Global Uniqueness / Readability <prefix>/Правительство Российской Федерации <prefix>/الاتحاد الدولي للاتصالات <prefix>/信息社会世界高峰会议 成果

DOA: Features and Benefits Persistence – Ability to locate and use digital objects, independent of its attributes (e.g. physical location) If the object’s attribute (e.g. location) changes, this change has to be updated only once (easily and securely over the Internet) Anyone referencing this object by name would automatically be directed to the new location Enhanced Security - Native support for Public Key Infrastructure (PKI) Ownership defined per identifier, access control defined per identifier– essential for privacy protection Provides protection against security vulnerabilities through Public/Private key pairs + Passwords to authenticate every resolution Public/Private key pairs + Security certificates for individual user protection (architecture supports ITU-T X.509 certificates)

DOA: Features and Benefits Compatibility and Interoperability - With most existing architectures within the Internet Backward compatible and ensures complete interoperability with current infrastructure It is an Infrastructure service that promotes interoperability among various information systems, regardless of the computing platform. Supports different object identification schemes. Architecture could harmonize current and future identification schemes ITU-T X.660 OID, RFID, Barcodes, HL7 patient medical information identifier, etc.

DOA: Features and Benefits Infrastructure service that Promotes for Identity Management Identity management is essential for all kinds of security services, especially in areas such as authentication/authorization, data confidentiality, as well as service non- repudiation. Different ways of identity reference determines how identities are used or managed. DOA uses Persistent identity reference, separating identity reference from any of its attributes. Separates transport security from credential validation. Simplifies the authentication process.

Primary root servers globally distributed and managed autonomously Distributed service model that is both scalable and extendable Primary root servers globally distributed and managed autonomously Primary Root Servers Primary Root Primary Root Primary Root Primary Root Local Servers Users

ITU and Corporation for National Research Initiatives (CNRI) CNRI was founded in 1986 by Dr. Robert Kahn to foster information infrastructure research and development. CNRI is a sector member of ITU-T and ITU-D Dr Robert Kahn is a recipient of ITU’s silver medal recognizing his contribution as a co-founder of the Internet A MoU was signed between ITU and CNRI in 2008, with the intention of collaborating on potentially bringing the benefits of DOA to ITU membership. Consistent with ITU’s Constitution (Article 1), 2010 ITU Plenipotentiary Resolutions 101, 102, 130, 133, 140 and 180, Programme 1 of the 2010 ITU World Telecommunication Development Conference, ITU-T Study Group 17: ITU works to ensure that the global community realizes maximum benefits from new emerging technologies such as DOA

Thank You! Use - DOA for your information management needs. Benefit from its key features including enhanced support for Multilingualism, Security and Identity Management. Contact: Sorene Assefa Technology Analyst, Corporate Strategy Division International Telecommunication Union Email: sorene.assefa@itu.int