12/2/2003chow1 Network and System Support for Multi-Level Security C. Edward Chow Department of Computer Science University of Colorado At Colorado Springs.

Slides:



Advertisements
Similar presentations
웹 서비스 개요.
Advertisements

WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
ICS 434 Advanced Database Systems
Online Educational Game of Snakes and Ladders -Shalini Pradhan -Manali Joshi -Uttara Paingankar -Seema Joshi.
Multilingual Chat Client-Server-Client. Main Features : Its a GUI based Chat Server The multilingual chat currently features two languages English & Hindi.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Secure Group communication for First Responders [SGFR] By Ganesh Godavari.
6/4/2015Page 1 Enterprise Service Bus (ESB) B. Ramamurthy.
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
LAB#2 JAVA SECURITY OVERVIEW Prepared by: I.Raniah Alghamdi.
1 SGFR: Secure Groupware for First Responders Contact: A NISSC Sponsored Project C.
A CHAT CLIENT-SERVER MODULE IN JAVA BY MAHTAB M HUSSAIN MAYANK MOHAN ISE 582 FALL 2003 PROJECT.
The Application Layer Chapter 7. Electronic Mail Architecture and Services The User Agent Message Formats Message Transfer Final Delivery.
The Internet Useful Definitions and Concepts About the Internet.
1 SWE Introduction to Software Engineering Lecture 22 – Architectural Design (Chapter 13)
Edward Tsai – CS 239 – Spring 2003 Strong Security for Active Networks CS 239 – Network Security Edward Tsai Tuesday, May 13, 2003.
Internet…issues Managing the Internet
Secure Group communication for First Responders [SGFR] By Ganesh Godavari.
Application architectures
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Figure 1.1 Interaction between applications and the operating system.
WNT Client/Server SDK Tony Vaccaro CS699 Project Presentation.
Tcl Agent : A flexible and secure mobile-agent system Paper by Robert S. Gray Dartmouth College Presented by Vipul Sawhney University of Pennsylvania.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
1 DACAManet Proposer’s Workshop UCCS-Raytheon Terry Boult C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs Leland.
Linux Networking CIS Why Linux/Unix? Configurability ▫Customizable System to satisfy unique needs. Scalability ▫Able to serve an increasing number.
A Web Services Based Streaming Gateway for Heterogeneous A/V Collaboration Hasan Bulut Computer Science Department Indiana University.
Application Layer. Applications A program or group of programs designed for end users. A program or group of programs designed for end users. Software.
Application architectures
INTRODUCTION TO WEB DATABASE PROGRAMMING
Beyond DHTML So far we have seen and used: CGI programs (using Perl ) and SSI on server side Java Script, VB Script, CSS and DOM on client side. For some.
Cli/Serv.: JXTA/151 Client/Server Distributed Systems v Objective –explain JXTA, a support environment for P2P services and applications ,
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 7 The Application Layer.
Chapter Two Application Layer Prepared by: Dr. Bahjat Qazzaz CS Dept. Sept
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
1 Chapter Client-Server Interaction. 2 Functionality  Transport layer and layers below  Basic communication  Reliability  Application layer.
Institute of Computer and Communication Network Engineering OFC/NFOEC, 6-10 March 2011, Los Angeles, CA Lessons Learned From Implementing a Path Computation.
Jaeki Song ISQS6337 JAVA Lecture 16 Other Issues in Java.
第十四章 J2EE 入门 Introduction What is J2EE ?
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Chow6/23/2003 sgfr1 SFGR: Secure Groupware for First Responder C. Edward Chow Chip Benight Ganesh Godavari.
SPREAD TOOLKIT High performance messaging middleware Presented by Sayantam Dey Vipin Mehta.
Module 9: Fundamentals of Securing Network Communication.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice HP Library Encryption - LTO4 Key.
1 Welcome to CSC 301 Web Programming Charles Frank.
1 ITS-ZeeWave Meeting 2/26/2004 UCCS Chow C. Edward Chow Department of Computer Science University of Colorado at Colorado Springs C. Edward Chow Department.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved RPC Tanenbaum.
Framework for MDO Studies Amitay Isaacs Center for Aerospace System Design and Engineering IIT Bombay.
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
ABone Architecture and Operation ABCd — ABone Control Daemon Server for remote EE management On-demand EE initiation and termination Automatic EE restart.
WINDOWS NT Network Architecture Amy, Mei-Hsuan Lu CML/CSIE/NTU August 19, 1998.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Kemal Baykal Rasim Ismayilov
Department of Computer Science Southern Illinois University Edwardsville Spring, 2008 Dr. Hiroshi Fujinoki FTP Protocol Programming.
A Demonstration of Collaborative Web Services and Peer-to-Peer Grids Minjun Wang Department of Electrical Engineering and Computer Science Syracuse University,
Copyright © 2002 Pearson Education, Inc. Slide 3-1 Internet II A consortium of more than 180 universities, government agencies, and private businesses.
AFS/OSD Project R.Belloni, L.Giammarino, A.Maslennikov, G.Palumbo, H.Reuter, R.Toebbicke.
By Nitin Bahadur Gokul Nadathur Department of Computer Sciences University of Wisconsin-Madison Spring 2000.
COMPUTER NETWORKS Hwajung Lee. Image Source:
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Application architectures Advisor : Dr. Moneer Al_Mekhlafi By : Ahmed AbdAllah Al_Homaidi.
Client-server communication Prof. Wenwen Li School of Geographical Sciences and Urban Planning 5644 Coor Hall
Free Powerpoint Templates Page 1 Free Powerpoint Templates CHAPTER 1 LAB 1.1 Web Server.
VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain.
The Client/Server Database Environment
DUCKS – Distributed User-mode Chirp-Knowledgeable Server
Tiers vs. Layers.
SFGR: Secure Groupware for First Responder
New Tools In Education Minjun Wang
Presentation transcript:

12/2/2003chow1 Network and System Support for Multi-Level Security C. Edward Chow Department of Computer Science University of Colorado At Colorado Springs

12/2/2003chow2 Outline of the Talk Motivation. Related Literature –“A Model for Secure Multimedia Database System in a Distributed Environment”, by Joshi et al, Distributed Multimedia System Lab Purdue –XrML: eXtensible right Markup Language, –“A Cryptographic Solution to Implement Access Control in a Hierarchy and More, by Ray et al. Proposed Approach Discussion

12/2/2003chow3 SGFR Features Security Enhanced Groupware Instant messenger (JabberX) Group Communication Server Instant Messaging Server (Jabber) Psychology Evaluation Stress Level Tracking Effectiveness of Tool Usage (Keyboard/Mouse Event Tracking, History of Commands, Mistakes, Popup Quiz?) Group Key Managment Secure Group Rekeying system (Keystone)

12/2/2003chow4 SGFR System Architecture SGFR Client SGFR Group Key Server SGFR Instant Messenger Server Group key distribution Sign-in create/join chat groups Registration/authentication Encrypt/Decrypt msgs using group key

12/2/2003chow5 Interaction between various components

12/2/2003chow6 Associate JabberX client with Keyserver and Jabber server Users login to the Jabber server If login successful, the client registers with the Keyserver. When a user creates/joins a group, the Keyserver gives a key to the client. When a user leaves the group, the Keyserver generates a new key for the remaining members of the group.

12/2/2003chow7 Output of the Keystone Server User ganesh joining group g1 User ayen joining group g1 First group key assigned to… Same for the description of the 2 nd key below Point out certificate

12/2/2003chow8 Fig shows the encryption of the message from client to server. Fig shows the output of the Jabber server running on a machine

12/2/2003chow9 Secure Keystone Client Request Show the key piece of calls that send request to Keystone server. If it checks the server certificate ( show the code). Show the code that handle the response Show how Daemon process receive the group key and its format. Port # used.

12/2/2003chow10 Secure Keystone Client Verification Show the code that –Accept the SSL request, –Verify the certificate of the client,

12/2/2003chow11 Keystone Access Control Show the code that Compare the subject info with access list (show the file format of access List)

12/2/2003chow12 Keystone Server Show how group key are generated and distributed, the related specification file. Show how the group key are multicast.

12/2/2003chow13 Jabber-KeyStone Interface Show how the modified Jabber code uses group key for encryption.

12/2/2003chow14 Group File Download & Display Show how the client and server side code that implement remote image file download.

12/2/2003chow15 Testing Results RunsClient Registration Time (ms) Group Join Time (ms) Group Leave Time (ms) Avg/Run  Table 1 time taken for client registration group join, group leave File sizeTime Taken (ms) 8.5K K K K  Table 2 time taken for file transfer

12/2/2003chow16 Future work Improve the file transfer capability using Reliable Multicast Transport Protocol. Improve keystone’s error handling mechanism between keyserver/registrar and client manager. Improve keystone client manager by moving it into socket layer and providing socket layer API between a client manager and data processor. Integrate with multilevel secure document distribution system.