IACT303 – INTI 2005 World Wide Networking Security and Next Generation Networking Technologies University of Wollongong.

Slides:



Advertisements
Similar presentations
Jim Hendler Chief Scientist - Information Systems Office DARPA.
Advertisements

An ontology server for the agentcities.NET project Dr. Manjula Patel Technical Research and Development
Overview of Web Services
W3C and RDF. Why OCLC is a W3C Member Access to networked information resources –the browser and online access –the breath and depth of networked information.
CH-4 Ontologies, Querying and Data Integration. Introduction to RDF(S) RDF stands for Resource Description Framework. RDF is a standard for describing.
Dr. Bruce A. Scharlau, AHDIT, August 2002 AHDIT: Ad Hoc Data Interoperability Tool Dr. Bruce A. Scharlau Dept. of Computing Science University of Aberdeen.
Semantic Web Thanks to folks at LAIT lab Sources include :
An Introduction to RDF(S) and a Quick Tour of OWL
27 January Semantically Coordinated E-Market Semantic Web Term Project Prepared by Melike Şah 27 January 2005.
CS570 Artificial Intelligence Semantic Web & Ontology 2
By Ahmet Can Babaoğlu Abdurrahman Beşinci.  Suppose you want to buy a Star wars DVD having such properties;  wide-screen ( not full-screen )  the extra.
Linked-data Architecture Payam Barnaghi Centre for Communication Systems Research University of Surrey FIA Budapest Linked data session Budapest, May 2010.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
SCSC 455 Computer Security Virtual Private Network (VPN)
The Web of data with meaning... By Michael Griffiths.
OASIS Reference Model for Service Oriented Architecture 1.0
1 Introduction to XML. XML eXtensible implies that users define tag content Markup implies it is a coded document Language implies it is a metalanguage.
Future Software Architectures Combining the Web 2.0 with the Semantic Web to realize future Web Communities Maarten Visser
Presentation 7 part 2: SOAP & WSDL. Ingeniørhøjskolen i Århus Slide 2 Outline Building blocks in Web Services SOA SOAP WSDL (UDDI)
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
COMP 6703 eScience Project Semantic Web for Museums Student : Lei Junran Client/Technical Supervisor : Tom Worthington Academic Supervisor : Peter Strazdins.
The Semantic Web Week 1 Module Content + Assessment Lee McCluskey, room 2/07 Department of Computing And Mathematical Sciences Module.
Intelligent Systems Semantic Web. Aims of the session To introduce the basic concepts of semantic web ontologies.
Applied Cryptography for Network Security
1 The HyperText Transfer Protocol: HTTP Nick Smith Stuart Alley Tara Tjaden.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Internet Protocol Security (IPSec)
OIL: An Ontology Infrastructure for the Semantic Web D. Fensel, F. van Harmelen, I. Horrocks, D. L. McGuinness, P. F. Patel-Schneider Presenter: Cristina.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
RDF (Resource Description Framework) Why?. XML XML is a metalanguage that allows users to define markup XML separates content and structure from formatting.
Semantic Web Technologies ufiekg-20-2 | data, schemas & applications | lecture 21 original presentation by: Dr Rob Stephens
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Deploying Trust Policies on the Semantic Web Brian Matthews and Theo Dimitrakos.
The Semantic Web Service Shuying Wang Outline Semantic Web vision Core technologies XML, RDF, Ontology, Agent… Web services DAML-S.
INF 384 C, Spring 2009 Ontologies Knowledge representation to support computer reasoning.
The Semantic Web William M Baker
 The HTML/HTTP combination data format and exchange protocol is the foundation pillar of the World Wide Web.  Evolution of the Web (Fig. 6.12) 6.3 Unified.
The INTERNET how it works. the internet: defined So, what is it?
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
Resource Description Framework (RDF) Presented by: Jonathan Catlett.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
Web Services Standards. Introduction A web service is a type of component that is available on the web and can be incorporated in applications or used.
Semantic Web - an introduction By Daniel Wu (danielwujr)
Dr. Bhavani Thuraisingham August 2006 Building Trustworthy Semantic Webs Unit #1: Introduction to The Semantic Web.
©Ferenc Vajda 1 Semantic Grid Ferenc Vajda Computer and Automation Research Institute Hungarian Academy of Sciences.
Web Services Presented By : Noam Ben Haim. Agenda Introduction What is a web service Basic Architecture Extended Architecture WS Stacks.
EEL 5937 Ontologies EEL 5937 Multi Agent Systems Lecture 5, Jan 23 th, 2003 Lotzi Bölöni.
It’s all semantics! The premises and promises of the semantic web. Tony Ross Centre for Digital Library Research, University of Strathclyde
The future of the Web: Semantic Web 9/30/2004 Xiangming Mu.
OWL Representing Information Using the Web Ontology Language.
Introduction to the Semantic Web and Linked Data Module 1 - Unit 2 The Semantic Web and Linked Data Concepts 1-1 Library of Congress BIBFRAME Pilot Training.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Vision for Semantic Web.
Kemal Baykal Rasim Ismayilov
Mr C Johnston ICT Teacher G055 - Lecture 03 Local and Wide Area Networks.
THE SEMANTIC WEB By Conrad Williams. Contents  What is the Semantic Web?  Technologies  XML  RDF  OWL  Implementations  Social Networking  Scholarly.
EEL 5937 Ontologies EEL 5937 Multi Agent Systems Lotzi Bölöni.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
A Portrait of the Semantic Web in Action Jeff Heflin and James Hendler IEEE Intelligent Systems December 6, 2010 Hyewon Lim.
© The ATHENA Consortium. Susan Thomas SAP AG, Research Department How do you do semantics? Semantic Web Drawings by Sebastian Cremers Unit 3:
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Semantic Web Technologies for UK HE and FE Institutions: Part 1: Background to the Development of the Web Brian Kelly UK Web Focus UKOLN
Sharing personal knowledge over the Semantic Web ● We call personal knowledge the knowledge that is developed and shared by the users while they solve.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
XML and Distributed Applications By Quddus Chong Presentation for CS551 – Fall 2001.
Setting the stage: linked data concepts Moving-Away-From-MARC-a-thon.
The Semantic Web By: Maulik Parikh.
Building the Semantic Web
Presentation transcript:

IACT303 – INTI 2005 World Wide Networking Security and Next Generation Networking Technologies University of Wollongong

Confidence in the Internet Over the last few years we have begun to witness the use of the Internet soar. Businesses and Government agencies demand an Internet Infrastructure that is robust, transparent and secure. The catalysts for these changes have been increasing costs and the increased pervasiveness of the net.

Many years ago organisations established private networks made out of leased lines. This culture has changed, there has been a great dependence on the Internet.

The Changing Nature of business on the Net. Two major innovations which are effecting the way organisations use the Internet are; –IPsec (Secure Internet Protocol). –VPN’s (Virtual Private Networks). The rationale for these varies technologies relates to cost and the abundance of technology/ networking.

Secure Internet Protocol (IPsec) IPsec is being defined/developed by the IPsec working group which is part of the IETF. The deployment of IPsec was influenced by the private sector, in particular IBM who described how to implement many of the RFC’s. The technology however was initially hampered by the US government.

US legislation prohibited the exportation of cryptographic algorithms. As a consequence the development of IPsec has moved to other parts of the world. There are still a number of obstacles in IPsec.

In order to understand what IPsec is, you need to understand the concept of a tunnel. A tunnel is basically a link between two nodes (endpoints). The tunnel is used to move a multitude of protocols i.e. HTTP, FTP etc. IPsec defines the concept of a secure tunnel on an unsecured network i.e. the Internet.

The actual passing of the traffic between the two points in a secure tunnel depends upon, the protocols, keys and cryptographic regimes (algorithms). IPsec defines the protocol for establishing secure communications for a number of protocols between two nodes or a number of networks. It describes the exchange of key, algorithms and trusting. It should be noted that this is an extension to the IP protocol which influence its transport.

Diagrammatically it looks like this; SECURE TUNNEL OVER INTERNET BETWEEN TWO ENDPOINTS

Virtual Private Networks Organisations want security and privacy when they perform transactions. In the past this was achieved by using leased lines. It was not uncommon for organisations for have transcountry or transoceanic private links. However this is expensive and inflexible.

The pervasiveness of the Internet has given a number of organisations the ability to globalise. Organisations have been able to establish private links also known as tunnels over the Internet. These links are used between a number of entities in an organisation. This concept is called a Virtual Private Network (VPN).

Most VPN’s use the IPsec protocol. However there are a number of other solutions. One of the simplest is tunneling traffic over secure shell links between two end points. Many network vendors and software houses are developing solutions for the business community which enhance this concept. It is not very difficult to understand but it is important to the growth of the Internet and future business.

What is the Semantic Web? The current web is comprised of natural language documents as well as media. OK for people but machines are not able to interpret this information very well Semantic Web will provide automated access to information based on machine- processable data. The Semantic Web is envisioned to be the latest evolution of the Internet

HTML, XML and E- commerce The use of XML represents one area that assists in better defining the structure of documentation online HTML is used to describe how the documents is presented XML is used to describe the structure of a document ie what the data is.

Semantic Web Ontologies The means by which data will gain meaning to machines is through a layered architecture that provides increasingly complex methods to describe relationships and attach meaning to certain words and sentences (and possibly concepts)

RDF Resource Description Frameworks are normally modelled using XML. RDFs are statements that have been modelled comprising: –Resources: an element, a URI, –Properties: directed relations between two resources. –Statements: “triplets” of two resources bound by a property Resource Property Resource –E,g Will (Teacher is a resource) teaches (Property) IACT417 (Course is a resource) Triplets: subject, predicate, object

Ontologies Essentially ontologies contain “specification of a conceptualisation” - that is defined terms and relationships between them, usually in some formal and machine readable manner” (Hendler, 2002, p. 30) Enable deductions to be made about data –E.g. “if «A» is left of «B» and «B» is left of «C», «A» is also left of «C»?”

Semantic Web Recent Developments The w3c has recently announced a revised RDF Schema and a web ontology language called OWL as the official languages of the Semantic web The intention is to build Web Service Applications in RDF and OWL. There is no thought of a killer application

Tim Berners Lee’s advice Deployment –Work RDF into products –Legacy adapters - registry - shopping list –Evangelism: using other people's terms –Find “low-hanging” fruit It took 20 years for relational data bases to be deployed – will the semantic web take as long?