1 AAA for document delivery ~ Work in progress ~ Shuichi TASHIRO Electrotechnical Laboratory, Japan.

Slides:



Advertisements
Similar presentations
2011 NetIS Presentation The Complete ePublishing Platform Designed for the 21 st Century.
Advertisements

CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Security Controls and Systems in E-Commerce
How the Internet Works Course Objectives Introduce the various web browsers Introduce some new terms Explain the basic Internet to PC hookup  ISP  Wired.
Secure Socket Layer.
Lori Fitterling LI843 SSL Secured Sockets Layer. What is Secure Sockets Layer (SSL)? It is protection of data transferred over the Internet using encryption.
Protection of SCORM-compliant Content Magda Mourad T.J. Watson Research Center
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
OCS Library Systems TIMED ACCESS GATEKEEPER ON-LINE PRINT VENDING.
1 Authentication and Open Standards Brian Kelly UKOLN University of Bath Bath, BA2 7AY UKOLN is funded by the British Library Research.
Introducing K12Planet.com What is K12Planet.com? Who can access it? Is it secure? What do I need to use it? Can I control the information I see?
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.
ERM Workshop, ELAG 2005 Electronic Resource Management ELAG 2005 Workshop 6.
EUropean Best Information through Regional Outcomes in Diabetes Privacy and Disease Registries Technical Aspects Peter Beck JOANNEUM RESEARCH, Austria.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
1. Failure is when users do not feel they get what they paid for. 2. Failure is when the overall organization fails to adopt the solution.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Presentation Outline  Project Aims  Introduction of Digital Video Library  Introduction of Our Work  Considerations and Approach  Design and Implementation.
Using Digital Credentials On The World-Wide Web M. Winslett.
Mastering the Internet, XHTML, and JavaScript Chapter 2 Web Browsers.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
1 © Copyright 2007 EMC Corporation. All rights reserved. EMC Documentum Information Rights Management EMC Content Management and Archiving.
ELECTRONIC PAYMENT SYSTEMS FALL 2002COPYRIGHT © 2002 MICHAEL I. SHAMOS eCommerce Technology Lecture 9 Micropayments I.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Digital Literacy. Productivity Programs Digital Literacy Courses and Topics Computer Basics Security and Privacy Internet and Web Basics Digital Lifestyle.
1 Introduction to Web Development. Web Basics The Web consists of computers on the Internet connected to each other in a specific way Used in all levels.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 5: Multimedia on the Web.
1 UCISA-SG WebTools Forum An Evaluation Exercise David Lomas University of Salford.
Copyright © 2000 Internet Document Security Alan Weintraub Research Director March 9, 2000.
Internet Basics A management-level overview of the Internet, its architecture, capabilities, and protocols. Copyright 2011 SPMI / Online Development.
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
DRM Building Blocks - Protecting and Tracking Content Adopted from Chapter 5, Digital Rights Management Business and Technology.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
Electronic Commerce Jeff Campbell, Piyanuch Chuasiripattana, Travis Flood, Matthew Janocko, Kent Woodburn Research on Electronic Commerce.
18-jan-962. ETH-W4 (ra)1 security on the Web l security l authentication l privacy.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
UNESCO ICTLIP Module 1. Lesson 61 Introduction to Information and Communication Technologies Lesson 6. What is the Internet?
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
Web Controlled of Robot Georgi Chakarov Ivelin Stoyanov.
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
XP Practical PC, 3e Chapter 8 1 Browsing and Searching the Web.
1 World Wide Web Concepts (Chapter 18) 인공지능연구실. 2 목 차  Elements of the Web  Web Browsers  Keeping Tracking of your Favorite Web sites  Security and.
DISTRIBUTED COMPUTING. Computing? Computing is usually defined as the activity of using and improving computer technology, computer hardware and software.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
ISR is a Comprehensive System for Managing International Student Records Welcome ECIS Members.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Managing Learning Objects in Large Scale Courseware Authoring Studio Ivo Marinchev, Ivo Hristov Institute of Information Technologies Bulgarian Academy.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Web Services Security Patterns Alex Mackman CM Group Ltd
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Secure Transactions Chapter 17. The user's machine No control over security of user's machine –Might be in very insecure: library, school, &c. Users disable.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
CLOUD COMPUTING When it's smarter to rent than to buy.. Presented by D.Datta Sai Babu 4 th Information Technology Tenali Engineering College.
CX Introduction to Web Programming
Web Portal Project.
E-Commerce: Doing Business on the Internet
Who Uses Encryption? Module 7 Section 3.
CERN Certificates platform Emmanuel Ormancey / Anatoly Gladkov
South Carolina Alternate Assessment
Security in SharePoint and Teams with DLP, IRM, and AIP
Presentation transcript:

1 AAA for document delivery ~ Work in progress ~ Shuichi TASHIRO Electrotechnical Laboratory, Japan

2 Policy based usage control requestcheckservice (1)(2)(3) Document policy User capability

3 Example of policy on document delivery AuthorAkira Kurosawa Type of contentMPEG video Digitally copy by userProhibited Print by userPermitted Number of viewUnlimited Duration1/1/2000 – 1/1/2001 User qualificationStudent certification of xxx university is required FeeFree

4 Document to be distributed Digital signed to prevent tampering Encrypted to prevent unauthorized access Policy program Content ID Encrypted Content policy block

5 off-line model Policy capability Policy enforcement engine document All policy enforcement process is done at user’s PC check

6 Authorization model (Off-line model) Capability Checker (User Home Organization) User’s PC Policy Enforcement Engine(PEE) (AAA Server) Browser (Service Equipment) content Copyright Policy User capability database Broker (for author) Document Provider a b Broker (for user) b’b’

7 content Copyright Policy Authorization model (semi Off-line model) Capability Checker (User Home Organization) User’s PC Policy Enforcement Engine(PEE) (AAA Server) Browser (Service Equipment) content Copyright Policy User ⑦ capability database Broker (for author) b Broker (for user) b’b’ broker AAA Server Key conversion Document Provider

8 On-line model capability Policy Service server AAA sequence document user Policy enforcement process is (partially) done at server on Internet Policy enforcement engine

9 Authorization model (On-line model) User’s PC Policy Enforcement Engine(PEE) (AAA Server) Browser (Service Equipment) content Copyright Policy User a Content server Capability Checker (User Home Organization) capability database Broker (author) b Broker (user) b’b’ Document Provider

10 Implementation Capability Checker Policy Enforcement Engine(PEE) Browser (Netscape / Real player) capability database User’s PC Plugin JAVA interpreter + Library Plug-in module for Netscape navigator and Real player PCMCIA Card Sub Card

11 Future work Common Policy Description Language (currently using JAVA) Common architecture for Policy Enforcement Engine - common to various applications Security & Privacy - tamper resistance, - key management/update, - anonymity vs. security