Dr. Raimund Ege: Research Summary  Security in the Mobile Context Trust and Access control models Peer-to-peer delivery networks  Opportunities for student.

Slides:



Advertisements
Similar presentations
Smartphone Outlook Android Overview Youngmin Jung.
Advertisements

Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
Internet Protocol Security (IP Sec)
CSE300-1 Profs. Steven A. Demurjian Q. Jin, J. Nam, Z. Qian and C. Phillips Computer Science & Engineering Department 191 Auditorium Road, Box U-155 The.
The Academic Computing Assessment Data Repository: A New (Free) Tool for Program Assessment Heather Stewart, Director, Institute for Technology Development,
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
PEER-TO-PEER Is a type of network in which each workstation has equivalent capabilities and responsibilities. This differs from client/server architectures,
Introduction to PKI, Certificates & Public Key Cryptography Erwan Lemonnier.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
PDC Enabling Science Grid Security Research Olle Mulmo.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Groove Technologies Collaboration for Software Development.
Edward Tsai – CS 239 – Spring 2003 Strong Security for Active Networks CS 239 – Network Security Edward Tsai Tuesday, May 13, 2003.
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols Li Lu, Lei Hu State Key Lab of Information Security, Graduate School.
Applied Cryptography for Network Security
Web services security I
LionShare Presented by Eric Ferrin, Sr Director, Digital Library Technologies Feb 3, 2004 Copyright Penn State University, This work is.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
Working with Workgroups and Domains
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
Middleware challenges to service providers, the Nordic view TERENA, Ingrid Melve, UNINETT.
Scalable Security and Accounting Services for Content-based Publish/Subscribe Systems Himanshu Khurana NCSA, University of Illinois.
Sun’s Project JXTA Technical Overview Presented by Sergei Kovalenko Red Team: Janhavi James A. Davis Fernando D. Diaz.
MASY: Management of Secret keYs in Mobile Federated Wireless Sensor Networks Jef Maerien IBBT DistriNet Research Group Department of Computer Science Katholieke.
Lukas Ruf, TIK April 6th WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory,
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Authentication & Authorization: Security and Integrity in the Cloud Desmond White July 3,
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
1 Personalization and Trust Personalization Mass Customization One-to-One Marketing Structure content & navigation to meet the needs of individual users.
Peer to Peer Networks November 28, 2007 Jenni Aaker David Mize.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Using Encryption with Microsoft SQL Server 2000 Kevin McDonnell Technical Lead SQL Server Support Microsoft Corporation.
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
7th Summer School on Telecommunications Lappeenranta August Calypso - Broadband Service Architecture 7th Summer School on Telecommunications Juhana.
Working with Workgroups and Domains Lesson 9. Objectives Understand users and groups Create and manage local users and groups Understand the difference.
Architecture Models. Readings r Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 m Note: All figures from this book.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Survivable Trust for Critical Infrastructure David M. Nicol, Sean W. Smith, Chris Hawblitzel, Ed Feustel, John Marchesini, Bennet Yee* Cybersecurity Research.
Scalable Grid system– VDHA_Grid: an e-Science Grid with virtual and dynamic hierarchical architecture Huang Lican College of Computer.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Internet2 AdvCollab Apps 1 Access Grid Vision To create virtual spaces where distributed people can work together. Challenges:
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
Authentication and Authorisation in eduroam Klaas Wierenga, AA Workshop TNC Lyngby, 20th May 2007.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
11 SECURING NETWORK TRAFFIC WITH IPSEC Chapter 6.
INTERNET PROTOCOL TELEVISION (IP-TV)
Zueyong Zhu† and J. William Atwood‡
Challenges facing Enterprise Mobility
NAAS 2.0 Features and Enhancements
Goals Introduce the Windows Server 2003 family of operating systems
Security & .NET 12/1/2018.
Public Key Infrastructure from the Most Trusted Name in e-Security
IS4680 Security Auditing for Compliance
Install AD Certificate Services
e-Security Solutions Penki Kontinentai Vladas Lapinskas
Introduction to Cryptography
Definition Of Computer Security
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Dr. Raimund Ege: Research Summary  Security in the Mobile Context Trust and Access control models Peer-to-peer delivery networks  Opportunities for student participation: Java programming for desktop peers  Java Cryptographic Architecture Java Android programming  BouncyCastle/SpongyCastle crypto library Ege - NIU - Computer Science

Research Overview Security in the Mobile Context Dr. Raimund K. Ege

CyberSecurity Concepts CIA Security Triad – confidentiality – integrity – availability plus: A and A – authenticity – accountability 11/15/2012Ege - NIU - Computer Science3

Mobile Context smartphone access to multi-media content – broadband internet throughput: 4G delivery from single source bottleneck – ex.: youtube.com  peer-to-peer content delivery network – ex.: bittorrent 11/15/2012Ege - NIU - Computer Science4

Mobile Security intellectual property protection – authentication creates trust in identity – authorization grants access  trust management models  encrypted transmission  implementation: Java & Android 11/15/2012Ege - NIU - Computer Science5

P2P Framework network of trusted peers – no central control or server – startup via bootstrap peer new peers join and gain trust – via positive participation or referral distribution of trust nuggets – signed in PKI context 11/15/2012Ege - NIU - Computer Science6

P2P Content Delivery 11/15/2012Ege - NIU - Computer Science7

Trust Management 11/15/2012Ege - NIU - Computer Science8

Android Prototype 11/15/2012Ege - NIU - Computer Science9

Opportunities for Participation Java programming for desktop peers – Java Cryptographic Architecture Java Android programming – Spongy Castle  explore Trust and Access control models 11/15/2012Ege - NIU - Computer Science10