Dr. Raimund Ege: Research Summary Security in the Mobile Context Trust and Access control models Peer-to-peer delivery networks Opportunities for student participation: Java programming for desktop peers Java Cryptographic Architecture Java Android programming BouncyCastle/SpongyCastle crypto library Ege - NIU - Computer Science
Research Overview Security in the Mobile Context Dr. Raimund K. Ege
CyberSecurity Concepts CIA Security Triad – confidentiality – integrity – availability plus: A and A – authenticity – accountability 11/15/2012Ege - NIU - Computer Science3
Mobile Context smartphone access to multi-media content – broadband internet throughput: 4G delivery from single source bottleneck – ex.: youtube.com peer-to-peer content delivery network – ex.: bittorrent 11/15/2012Ege - NIU - Computer Science4
Mobile Security intellectual property protection – authentication creates trust in identity – authorization grants access trust management models encrypted transmission implementation: Java & Android 11/15/2012Ege - NIU - Computer Science5
P2P Framework network of trusted peers – no central control or server – startup via bootstrap peer new peers join and gain trust – via positive participation or referral distribution of trust nuggets – signed in PKI context 11/15/2012Ege - NIU - Computer Science6
P2P Content Delivery 11/15/2012Ege - NIU - Computer Science7
Trust Management 11/15/2012Ege - NIU - Computer Science8
Android Prototype 11/15/2012Ege - NIU - Computer Science9
Opportunities for Participation Java programming for desktop peers – Java Cryptographic Architecture Java Android programming – Spongy Castle explore Trust and Access control models 11/15/2012Ege - NIU - Computer Science10