Challenges in Making E-Privacy Real Larry Korba Institute for Information Technology National Research Council of Canada Panel Presentation, 6 th Annual.

Slides:



Advertisements
Similar presentations
Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
Advertisements

CWE, EC – ESA joint activities on e-collaboration Brussels, 13 April 2005 IST Call 5 Preparatory workshop.
Instant Messenger Security with a focus on implementing security policies in corporate IM services Kaushal S Chandrashekar CS 691 Dr. Edward Chow UCCS.
Cloud PIV Authentication and Authorization Demo PIV Card User Workstation Central Security Server In order to use Cloud Authentication and Authorization.
Unified Communications: The State of the Industry.
GENI: Global Environment for Networking Innovations Larry Landweber Senior Advisor NSF:CISE Joint Techs Madison, WI July 17, 2006.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Creating Value Through Innovation The Changing Face of Business Communications Simon Gwatkin VP Strategic Marketing Mitel July 16, 2008.
Chapter 17: Client/Server Computing Business Data Communications, 4e.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Steve Kenny Presented by: Larry Korba Design Embedded Privacy Risk Management Institute for Information Technology 14 th CACR, November 7,8, 2002.
Elisa Bertino Dept. of Computer Science University of Milano Page 1 Author-X Secure and selective access and flexible distribution mechanisms for XML documents.
Secure Public Instant Messaging (IM): A Survey Mohammad Mannan Paul C. Van Oorschot Digital Security Group School of Computer Science Carleton University,
Clinic Security and Policy Enforcement in Windows Server 2008.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Cloud Computing Introduction to China-cloud Project and Related Works in JSI Yi Liu Sino-German Joint Software Institute, Beihang Univ. May 2011.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
John McDougall, President 10 th Annual Re$earch Money Conference, 11 May 2011.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Kevin Walsh CI Channel Evangelist Apryl Bailey CI Channel Creative Director March 13, 2006 SDSC The CI Channel Platform A Mobile, Scalable.
Description of the monitoring system experimentation on the freight car pSHIELD Demonstrator Testbed Architecture pSHIELD Final Review Meeting, Bruxelles.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Sungkyunkwan University (SKKU) Security Lab. A Framework for Security Services based on Software-Defined Networking Jaehoon (Paul) Jeong 1, Jihyeok Seo.
Presentation Title Capacity Building Programme on the Economics of Adaptation Supporting National/Sub-National Adaptation Planning and Action Economics.
OFC290 Information Rights Management in Microsoft Office 2003 Lauren Antonoff Group Program Manager.
The ACGT Workflow Editing & Enactment Environment Giorgos Zacharioudakis Institute of Computer Science, Foundation for Research & Technology – Hellas (ICS-FORTH)
© 2009 WatchGuard Technologies WatchGuard Encryption Subscription Ensuring Privacy and Compliance of Messages.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Service Oriented Architectures Presentation By: Clifton Sweeney November 3 rd 2008.
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Chapter 17: Client/Server Computing Business Data Communications, 4e.
Copyright © 2007 Pearson Education, Inc. Slide 3-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Third Edition.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
Virtual techdays INDIA │ august 2010 ENTERPRISE CONTENT MANAGEMENT WITH SHAREPOINT 2010 Naresh K Satapathy │ Solution Specialist, Microsoft Corporation.
Internet Architecture and Governance
Module 11: Designing Security for Network Perimeters.
Lecture 24 Wireless Network Security
Secure Virtual Enclaves February 4, 2000 Deborah Shands, Richard Yee Jay Jacobs, E. John Sebes.
Open Geospatial Consortium Overview and why we are adopting the standards.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
CSE CST Anti-Terrorism and Privacy, One Year After Nancy Y. Cheng, FCA Associate Deputy Chief, IT Security Communications Security Establishment November.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Consumers’ Association Engaging with Online Consumers Allan Williams Senior Communications Policy Advisor
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Core and Framework DIRAC Workshop October Marseille.
The Open Access Repository of INFN Roberto Barbera and Rita Ricceri – INFN
Geomatics data perspective from the Centre of Geographic Sciences (COGS) Future of Geomatics Policy in Canada An educational perspective Bob Maher Applied.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Mobilizing Your SAS® Business Analytic Reports Falko Schulz Sr. Systems Engineer SAS Australia & New Zealand.
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
Presented by Edith Ngai MPhil Term 3 Presentation
The Library as Virtual Space
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Wireless Control Foundation
Security Issues.
Securing the Network Perimeter with ISA 2004
Infrastructure, Data Center & Managed Services
Free Dumps With Real Exam Question Answers | Free Update
Security for Distributed Computer Systems
Chapter 17: Client/Server Computing
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
The best approaches to facilitate the processing of business transactions and interactions with systems that pre-date the Web, and address the need to.
Presentation transcript:

Challenges in Making E-Privacy Real Larry Korba Institute for Information Technology National Research Council of Canada Panel Presentation, 6 th Annual CACR Security and Privacy Workshop November 3-4, 2005

Overview Background –NRC-IIT Privacy-related technologies –What we have done… –Some Challenges today. Some approaches NRC-IIT takes Conclusions

NRC – IIT – IS NRC –$850 million, Every Province, 20 Inst. & Programs –Scientific Research one of 7 Mandates. NRC – IIT –4 Cities, 9 Groups – Diverse Areas in IT –Information Security IT Security Research since 1996 Privacy Technology: 2000

Research Privacy Technology NRC has a broad mandate IT is a large area –IIT is small Next - Privacy research –IIT –Research Challenges

Possible Privacy Tech: Current Research Dynamic privacy & Security policy negotiation Security Intelligence –Computer Supported Collaborative Work –Inappropriate Insider Activity Trustworthy HCI for Security Applications –Biometry Protocol for Ad Hoc Wireless Privacy (Red highlighted research featured in this talk with descriptions of our prototype technology demonstrations)

security policy negotiation EASE: Environmentally-Aware Security Enforcement In a web service world… –User’s privacy only as good as the security of her platform Client Attacks: Trojan, worms, keystroke monitors, viruses This work… –Extends security policies from server to client platforms –Enforces security compliance at client Secure operating environment Corporate Policy Application use Copyright Works well with legacy systems

Secure Environment security policy negotiation EASE Client-Server Demo Available Application Server Client A Client B Client C Senses context of user operation, extends server security policy to client. Manages Authentication, Authorization, forces trojan/virus scan, prevents inappropriate applications from being installed, kills inappropriate processes Activities, (linking with security intelligence) prevents inappropriate user behavior

security policy negotiation EASE Screenshot from prototype

Ad Hoc Wireless Privacy Secure. Private, Wireless Ad Hoc Messaging Anonymous Dynamic Source Routing protocol Enable Private communications through multiple parties A Z B C D E

Challenges: Privacy Technology Research Knowledge-related –What’s required –What is what –What people are doing –Why Enforcement-Related –Users, Protocols, Mechanisms –Privacy with security

Challenges: Privacy Research in Canada Little privacy research in Canada Low receptor capacity Security Funding –Many (getting) involved, across Canada Privacy Research Funding –NSERC, CFI –(Mike is working on this)

Scientific/Technical Knowledge But How to make it Real? Foundational Research Prototype 1 Unknown Prototype 2 Books, Papers, Reports Outreach, Influence Research Collaborations Technology Push Industry OGD, Etc. Support/Focus Technology Pull Engineering, Marketing Users Product

Summary NRC-IIT Research –Some of Ours –Some Challenges Research to Impact Challenge –Research Focus –Technology Uptake Improved with industry, user involvement Tripod model helps –Influence: Support Broader Research Base Bell Collaboration –Lead-In to Mike…

Thank You