Midterm Presentation. iSecurity Project Team Presentation Contents Background Goal Project work breakdown The work so far Future targets User Perspective.

Slides:



Advertisements
Similar presentations
Presented By Krypto Security Software, LLC. What is BackStopp is a simple but effective tool to help an organization protect its mobile data in the event.
Advertisements

PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
SECOND MIDTERM REVIEW CS 580 Human Computer Interaction.
More CMM Part Two : Details.
SINGLE SIGN-ON. Definition - SSO Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order.
Effective Design of Trusted Information Systems Luděk Novák,
SALSA-NetAuth SALSA-FWNA BoF Kevin Miller Duke University Internet2 Member Meeting May 2005.
Background Current Status Future Plans. Agenda Background First Steps Current Status Future Plans Joomla Basics Questions 2.
Copyright 2002 Prentice-Hall, Inc. Chapter 1 The Systems Development Environment 1.1 Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Groupware to Support Distributed & Collocated Software Engineering Student Group Projects Sarah Drummond RISE Dept. Computer Science University of Durham.
LSU 07/24/2004Defining Project Tasks1 Defining the Project Tasks Project Management Unit, Lecture 4.
Software Configuration Management
Chapter 7 Database Auditing Models
Final Design and Implementation
Systems Analysis and Design: The Big Picture
Condor Technology Solutions, Inc. Grace RFTS Application Extension Phase.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
IS 460 Notes IS Strategic Planning By Thomas Hilton.
Copyright 2002 Prentice-Hall, Inc. Chapter 1 The Systems Development Environment 1.1 Modern Systems Analysis and Design.
1 Process Engineering A Systems Approach to Process Improvement Jeffrey L. Dutton Jacobs Sverdrup Advanced Systems Group Engineering Performance Improvement.
Abstract Other Resources Financial Resources Project Schedule Personnel Efforts Item DescriptionCost STK300 Microcontrollerdonated (Kanda) GM28 Cellular.
Course Introduction Software Engineering
Centro de Estudos e Sistemas Avançados do Recife PMBOK - Chapter 4 Project Integration Management.
BMAN Integrative Team Project Week 2 Professor Linda A Macaulay.
7-Oct-15 System Auditing. AUDITING Auditing is a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic.
INFSO-RI Enabling Grids for E-sciencE SA1: Cookbook (DSA1.7) Ian Bird CERN 18 January 2006.
Ubiquitous Computing Software Systems.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
1 10/14/2015ã 2007, Spencer Rugaber The Waterfall Process Software plans and requirements Validation System feasibility Validation Product design Verification.
ISYS 562 Microcomputer Business Applications David Chao.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Copyright 2002 Prentice-Hall, Inc. 1.1 Modern Systems Analysis and Design Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 1 The Systems Development.
Software Quality Assurance
February 8, 2005IHE Europe Educational Event 1 Integrating the Healthcare Enterprise Basic Security Robert Horn Agfa Healthcare.
1 The World Bank Internet Services Program Rajan Bhardvaj
KS3 Phase4 Client Server Monitoring System October 1, 2008 by Stephen, Seema, Kam, Shpetim.
Software configuration management (SCM). Definition – SCM: The organization of the component of a software system They fit together in a working order.
Engineering Essential Characteristics Security Engineering Process Overview.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
JRA Execution Plan 13 January JRA1 Execution Plan Frédéric Hemmer EGEE Middleware Manager EGEE is proposed as a project funded by the European.
1 reTHINK Deliverables, How To Read reThink deliverables quick starter.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef.
Rational Unified Process Fundamentals Module 4: Core Workflows II - Concepts Rational Unified Process Fundamentals Module 4: Core Workflows II - Concepts.
Testing and Validation Kuvvet Atakan and the WP6 and WP7 Teams.
Stages of design  High level design  High level data structure  Architecture  Low level design-code design  Algorithms  Low level data structures.
Welcome. Welcome to this TechNet Event URL for on-line feedback is in your reminder No Planned Fire Drills Please turn your Mobile Phones off To.
Module 11: Planning and Implementing an Active Directory Infrastructure.
E-Science Security Roadmap Grid Security Task Force From original presentation by Howard Chivers, University of York Brief content:  Seek feedback on.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
Basic Security Cor Loef Philips Medical Systems Co-Chair IHE Radiology Technical Committee.
Project CLASP: Common Login and Access rights across Services Plan Goal  Propose a detailed plan to reduce the number of login/passwords entered by users.
Grid Deployment Technical Working Groups: Middleware selection AAA,security Resource scheduling Operations User Support GDB Grid Deployment Resource planning,
PROJECT SECME Carthik A. Sharma Juan Carlos Vivanco Majid Khan Santhosh Kumar Grandai. Software Engineering Fall 2002.
Study on “Secure In-VM Monitoring Using Hardware Virtualization” Qiang.Guan Dependable Computing System Lab New Mexico Tech.
SOFTWARE TESTING Date: 29-Dec-2016 By: Ram Karthick.
PLAN Matters Arising Individual submissions Questionnaires.
Project Integration Management
MBI 630: Systems Analysis and Design
Information Technology (IT)
Chapter 11: Software Configuration Management
Operating System Security
Database Administration
HIPAA Security Standards Final Rule
e-Invoicing – e-Ordering 20/11/2008
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Midterm Presentation

iSecurity Project Team

Presentation Contents Background Goal Project work breakdown The work so far Future targets User Perspective Summary Questions

Background Joint project between KTH and Stanford University Built upon the Interactive Workspace projectInteractive Workspace Security in an interactive environment

External goal External Goals – Design a social model – Augment the existing iSpace infrastructure with the iSecurity system. – Implement simple auditing tools

Internal Goals – To gain an understanding of ubiquitous computing environment – To gain experience working in an international team – Exposure to software engineering and system design issues – To learn team management skills

Project work breakdown Study Social Model Development System Design Implementation & Testing Evaluation System Documentation Complete the Final Deliverables

The work so far What have been done so far – Completion of Study Phase – Completion of Social Model Development Completion of Social Model Development – Completion of the System Design

Future targets Implementation – Developing a secure Event Heap – Developing applications so that we can test the new secure Event Heap Testing our system Evaluation of the system Writing the final technical report Completion of the final deliverables

User perspective Who interacting with and when Where the users and items Which services they can provide and I can get

Summary Joint project between KTH and Stanford University A new and very interesting area There are differences between “classic” security and ubiquitous computing security Lesson learnt

Questions For further information about this project please visit our homepage:

”A central event dispatcher, all the message goes throughthe event heap server.” Event Heap

MECHANISMS SOCIAL MODEL OBJECTIVES Social Aspects Social Model Development

Mechanisms Component Security Objective Satisfied Gatekeeper  Bounded Environment  Integrity  Privacy  Availability  Accountability Trust Groups  Customizability  Convenience  Manageability Security Policy Definition  Integrity  Customizability Authentication  Bounded Environment  Integrity  Accountability Privacy Guarantee Enforcement  Privacy Table 1: Components and Satisfied Objectives

Ubiquitous computing environment Invisible Computers anywhere Smart Everyday Items Every computer for every one Etc..