SPI 2003 Secure Audio and Video Conferencing system Jaroslav Dočkal, Tomáš Bouček, Petr Dušek, Tomáš Koníř.

Slides:



Advertisements
Similar presentations
Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
Advertisements

Teleconferencing support for small groups Eva Hladká *, Petr Holub *, Jiří Denemark * * Faculty of Informatics Masaryk University Brno, CZ Institute of.
Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
DIGIDOC A web based tool to Manage Documents. System Overview DigiDoc is a web-based customizable, integrated solution for Business Process Management.
The Challenges of CORBA Security It is important to understand that [CORBAsecurity] is only a (powerful) security toolbox and not the solution to all security.
Efficient Kerberized Multicast Olga Kornievskaia University of Michigan Giovanni Di Crescenzo Telcordia Technologies.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Retail Laundry(Laundry POS Solutions) Laundry POS is used for all the retail operations those who are doing the Laundry business.
Experience Building and Supporting Secure Ad Hoc Collaborations Deb Agarwal Lawrence Berkeley National Laboratory Ad Hoc Collaboration - Internet2 Fall.
Grid Security. Typical Grid Scenario Users Resources.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential The Internet offers no inherent security services to its users; the data transmitted.
Kerberos Authentication for Multi-organization Cross-Realm Kerberos Authentication User sent request to local Authentication Server Local AS shares cross-realm.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
Office of Science U.S. Department of Energy Grids and Portals at NERSC Presented by Steve Chan.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
SACMAT02-1 Security Prototype Defining a Signature Constraint.
Chapter 17 TACACS+.
POLYCOM CONFIDENTIAL Polycom enables Alcatel Instant Video Solution by combining the power Alcatel IP Telephony with Polycom Unified Collaboration Solutions.
Digital Certificates. What is a Digital Certificate? A digital certificate is the equivalent of your business card in the e-commerce world. It says who.
Distributed Collaboration with Audio/Video Conferencing V C onnect Team: Priyanka Warade Kalpana Chatnani.
ASA 5505 SSL VPN Joe Cicero Northeast Wisconsin Technical College.
UC Security with Microsoft Office Communication Server R1/R2 FRHACK Sept 8, 2009 Abhijeet Hatekar Vulnerability Research Engineer.
How we use UCL common at ANU Internet Futures Rhys Hawkins ANU Internet Futures/Grangenet.
Product Perspective Intelligent Online Course Portal System is not depending on any other systems.
The Operator Neutral Access At KistaIP. KistaIP ? Is a student dorm with 144 apartments.
Configuration of Linux Terminal Server Group: LNS10A6 Thebe Laxmi, Sharma Prabhakar, Patrick Appiah.
CSD 2006 / TEAM 12 Final presentation 29 th May 2006.
Nu Vendor Management System A web based tool to Manage Vendors.
Building Scalable and High Efficient Java Multimedia Collaboration Wenjun Wu, Tao Huang, Geoffrey Fox Community Grids Computing Laboratory, Indiana University,
Our Online Courier Management Application is developed with the latest technology and State of the Art Database. This Management Software will be very.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Sauna Network Protocol. Create User $SAU,CU,[UserName],[Password],[Firstname],[ Lastname],[ ],[Phone]
How to Design Open Platform Video Management Software (VMS)
03/09/2003Helsinki University of Technology1 Overview of Thesis Topic Presented By: Zhao Xuetao.
Gregorio Martínez Pérez University of Murcia PROVIDING SECURITY TO UNIVERSITY ENVIRONMENT COMMUNICATIONS.
PRESENTED BY : MOHAMMAD DIAB ALAA’ DWAIKAT SUPERVISOR: DR.SUFYAN SAMARA GRADUATION PROJECT PRESENTATION Amany 3la Al Tareeq أماني على الطريق.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
Outline Overview Video Format Conversion Connection with An authentication Streaming media Transferring media.
Ashley Hawley. Project Description Business Need User Profiles Development Technology Testing Plan Deliverables Demonstration Conclusion.
Group Communications at Concordia J. William Atwood High Speed Protocols Laboratory Concordia University Montreal, Quebec, Canada.
Directory and File transfer Services By Jothi. Two key resources Lightweight Directory Access Protocol (LDAP) File Transfer protocol Secure file transfer.
Group 1 : Grid Computing Laboratory of Information Technology Supervisors: Alexander Ujhinsky Nikolay Kutovskiy.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
The Distance Learning Session Management System for the Next Generation Internet Se-Jun Na.
Access Grid Workshop – APAC ‘05 Access Grid Overview Access Grid Workshop APAC 05
Security in Skype Prepared by Prithula Dhungel. Security in Skype2 The Skype Service P2P based VoIP software Founded by the founders of Kazaa Can be downloaded.
Systems and Network Design Professional Services for NT Server and NetWare Networks.
Firewall Configurations Responses from the ETF (the names have been changed to protect the innocent..)
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Jaime Pérez Lyon, February Goals –The ability to monitor the status of the Identity and/or Service Providers of a working federation. –To have a.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Internet2 AdvCollab Apps 1 Access Grid Vision To create virtual spaces where distributed people can work together. Challenges:
3 Star Hotel Management System - Easy to use, yet powerful hotel software, offering management and reservation solutions for all types of hotels, motels,
May , 2006ICBL 2007 Florianopolis Brazil1 IRI-Easy: A Distance Education Software System Y. Wang, K. Maly, C. M. Overstreet Department of Computer.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Systems and Network Design Professional Services for NT Server and NetWare Networks.
Introduction to Microsoft Windows 2000 Security Microsoft Windows 2000 Security Services Overview Security subsystem components Local security authority.
KERBEROS SYSTEM Kumar Madugula.
The Trusted Network · · · LEFIS PKI · · · 2 nd June, 2006 · Sofia by Leonardo Catalinas · May 2006
SOFTWARE TESTING SERVICES  It also opens the other source program that involves all the proprietary products and projects.  The buzgilla testers are.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Submitted By : Group No:42 Rahul Pandey(1159) Jayant Mali(1129) Pallavi Kesare(1058) Prerna Preeti (1153) Mr. Milind Arjun Project Guide.
Skype.
Grid Security.
Module 8: Securing Network Traffic by Using IPSec and Certificates
Design and Implementation of Audio/Video Collaboration System Based on Publish/subscribe Event Middleware CTS04 San Diego 19 January 2004 PTLIU Laboratory.
PREPARED BY: RUMMY MIRANDA
File Transfer Protocol
Module 8: Securing Network Traffic by Using IPSec and Certificates
NetChat Communications Framework
Presentation transcript:

SPI 2003 Secure Audio and Video Conferencing system Jaroslav Dočkal, Tomáš Bouček, Petr Dušek, Tomáš Koníř

Current status ● Many audio/video conferencing systems ● Many incompatibile protocols (some are proprietary) ● Not secured: – No authentication – No authorization – No secured data over transfer

Our Goal ● Find suitable solution based on multicast or similar ● Improve existing solution (add the security parts) ● Security funcions MUST NOT affect the usability ● Our solution must be able to run on the most commonly used platforms.

Software we used as basement ● Audio and video conferencing tools, based on packet reflector technology ● Programs, named VIC (video conferencing tool) and RAT (robust audio tool) Packet Reflector Client AClient B Client C

Security model ● Add one security module to each client ● Not modify existing client ● Rewrite the packet reflector Packet Reflector Module AModule B Module C Client A

Server improvements ● Use authentication ● Key generation and distribution ● User authorization

What to do now? ● Login / password –> X.509 digital certificates ● Attribute certificates ● User – friendly interface

Thank you for patience Questions ?