Amit Kleinmann NDS Israel IRTF - SMuG Second Meeting (Orlando) December 1998 IRTF - SMuG Second Meeting (Orlando) December 1998 Scenarios and Requirements.

Slides:



Advertisements
Similar presentations
Extended Enterprise Laboratory, Hewlett-Packard Laboratories, Bristol Keryx: Internet Notification Service for Dynamic Web Applications Søren Brandt Anders.
Advertisements

Service Composition Scenarios for Next Generation Networks Bhaskaran Raman, ICEBERG, EECS, U.C.Berkeley Presentation at Siemens, Munich, June 2001.
Name | Title | Microsoft Corporation
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Multicast Fundamentals n The communication ways of the hosts n IP multicast n Application level multicast.
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
Some contributions to the management of data in grids Lionel Brunie National Institute of Applied Science (INSA) LIRIS Laboratory/DRIM Team – UMR CNRS.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
1 Chapter 9 The Internet in Business: Corporations, Businesses, and Entrepreneurs.
Confidentiality using Symmetric Encryption traditionally symmetric encryption is used to provide message confidentiality consider typical scenario –workstations.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
EEC-681/781 Distributed Computing Systems Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
Virtual Meetings Increasing Collaboration While Reducing Costs and Ensuring Business Continuity Ram Narayanaswamy CTO 8x8, Inc.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
T.Sharon-A.Frank 1 Multimedia Various Applications.
1 IP Multicast Applications: Challenges & Solutions Bob Quinn Stardust Forums, Inc. IP Multicast Initiative.
Introduction to Microsoft Lync Online This course covers the following: Overview of Microsoft Lync Online Customizing Lync Online.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Communication Part IV Multicast Communication* *Referred to slides by Manhyung Han at Kyung Hee University and Hitesh Ballani at Cornell University.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Dennis Karlinsky, Director, OCS Product Team Ziv Fass, Senior Product Manager, OCS Marketing Microsoft Corporation SESSION CODE: UNC206.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Free Powerpoint Templates Page 1 Free Powerpoint Templates Push and Pull Technology by Chen Yin Wang.
Requirements to benefit from CB in Value Added Services Mark Cabiling, Swapcom Marketing Manager
A Policy Framework for Multicast Group Control Salekul Islam and J. William Atwood Concordia University Department of Computer Science and Software Engineering.
10 Two-sided Platforms 1 Aaron Schiff ECON
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Media Server Streaming Elizabeth Canela David Vera Bernard James Lilian Ohanian.
An IPSec-based Host Architecture for Secure Internet Multicast R. Canetti, P-C. Cheng, F.Giraud, D. Pendarakis, J.R. Rao, P. Rohatgi, IBM Research D. Saha.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
“ACT” Audio Conference over ATM Network with TRM Technion - Israel Institute of Technology Electrical Engineering Faculty Computer Networks Laboratory.
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
Quality of Service in the Internet The slides of part 1-3 are adapted from the slides of chapter 7 published at the companion website of the book: Computer.
Issues Relevant To Distributed Security CSC 8320 Nidhi Gahlot.
Module 9: Fundamentals of Securing Network Communication.
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Security considerations for notifications. Issues  Security needs/threats  Application domains  Security areas  Trust models for security.
APPLICATION SOFTWARE Week# 5. Application software consists of programs designed to make users more productive and/or assist them with personal tasks.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Multimedia Systems Instructor: Bajuna Salehe Web:
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Internet2 AdvCollab Apps 1 Access Grid Vision To create virtual spaces where distributed people can work together. Challenges:
Security Distributed Systems Lecture # 14. Why care about security? Authentication Use another person’s ID for sending Non-repudiation E-commerce.
Strong Authentication Infrastructure Requirement: Trusted Input Devices National ID Workshop Carnegie Mellon University November 28, 2001 Lark M. Allen.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Week-5 (Lecture-1) Streaming media: Audio video content over internet Played immediately No wait for download file Use the data packet Advantages: Video.
OMA Secure Content Delivery for the Mobile World ODRL Workshop, Vienna Dr. Willms Buhse Vice Chair, OMA Download and DRM group.
Information Systems Design and Development Security Precautions Computing Science.
iPhones and iPads and iTunes, Oh My!
The Internet in Business: Corporations, Businesses, and Entrepreneurs
Security Issues.
3.2 Virtualisation.
PREPARED BY: RUMMY MIRANDA
X-Road as a Platform to Exchange MyData
The Internet and Electronic mail
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Presentation transcript:

Amit Kleinmann NDS Israel IRTF - SMuG Second Meeting (Orlando) December 1998 IRTF - SMuG Second Meeting (Orlando) December 1998 Scenarios and Requirements for Business-Oriented Multicast Security

Motivation nSolve the most common problems nHandle issues that are most attractive to businesses

Anticipating Future Applications nWhy use multicast? l Save bandwidth l Save time l Save computational resources nWhen is multicast use justified? l Many users l High traffic volume nMulticast applications - practically don’t exist - chicken & egg problem

Multicast Applications  Multimedia streaming/Pay Per View 4 4  Data distribution Software distribution 2 Content (sports, weather, etc.) 2 Finance (stock tickers) 2 News/USENET 2 distribution 2 Push applications  Network synchronization DNS, Routing updates 2 Advertising and locating servers 2 Data link switching (DLSw) Application Many Participants High traffic volume  Shared whiteboards 8 8 2Not (yet) well defined applications ? ? 2 Distributed interactive games/simulation 2 Distance learning 2 Communicating with unknown/dynamic group  Multi-party audiovisual conferencing 8 4

Scenario Requirements Two main scenarios: l File transfer l Data streaming  Multimedia streaming/Pay Per View  Data distribution Software distribution 2 Content (sports, weather, etc.) 2 Finance (stock tickers) 2 News/USENET 2 distribution, push app.  Network synchronization DNS, Routing updates 2 Advertising and locating servers 2 Data link switching (DLSw) Application Many High traffic File Data participants volume transfer streaming

Business Models nOne to Many vs. Many(few) to Many(few) nFree vs. Monitored l Free Multicast: Channels (Public, Previews) Content (Shareware, Program Guides, Ads) l Monitored Multicast: Subscription (Streaming Video, Audio, Data) Packages (Software, Games, Audio/Video clips) Volume (bits/packets sent and/or consumed) Time (Feeds, Conferences, Lectures)

File Transfer nStatic (closed) group nReliable nBusiness models: l Subscription l Packages

Data Streaming nBusiness model l Subscription l Packages l Volume l Time nMost common l Multimedia streaming l Non-reliable nDynamic (open) group l Monitoring group members’ behavior nKey management l SMuG decision: should be separated from the actual securing of the traffic. l Synchronization between keys and content l Real time => Symmetric keys for traffic l Key period

Multicast Conditional Access => Contents + Users nContent management l C.A. attributes for content l Multicast content authenticated and encrypted l Users should be aware of content descriptions and schedule. nUser/Client management l Users are known/registered l User has an authenticator l User has C.A. attributes nHierarchy

Multicast Conditional Access: User/Client Authentication & Encryption nEach user authenticates to the Multicast server nKey exchange between user/server nSecurity entitlements nContent usage monitoring

Trust in User/Client nHardware tokens l Features: Tamper-resistant Cannot be replicated easily l Advantages: Distributed solution Portability nSoftware protection l Server l Client Subject to attacks (e.g., viruses) Can be replicated

Benefits of Smart Cards l Physical security (VLSI, OS, Memory) l Portable (identity, rights) l Secure storage (keys, certificates, entitlements) l Secure processing (crypto functions) l Non Repudiation (transactions, signatures)