Copyright, 1995-2004 1 Issues from Internet Technologies 2 – Apps for Collaboration & Subversion Roger Clarke, Xamax Consultancy, Canberra Visiting Prof/Fellow,

Slides:



Advertisements
Similar presentations
Case Study: Examining the Results of P2P Collaboration at PricewaterhouseCoopers February 14, 2001 Case Study: Examining the Results of Collaboration at.
Advertisements

Copyright, IP Business Models for the TAFE Sector Roger Clarke Chair, AEShareNet Limited Xamax Consultancy, Canberra & Visiting Professor at.
Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy UNSW and at the ANU and the Uni. of.
Copyright, Issues from Internet Technologies 3 – Internet Governance Roger Clarke, Xamax Consultancy, Canberra Visiting Prof/Fellow, Unis of.
Slide 1 Insert your own content. Slide 2 Insert your own content.
© Ravi Sandhu Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.
Copyright COMP 3410 – I.T. in Electronic Commerce E-Trading 5. Alternative Architectures Roger Clarke Xamax Consultancy, Canberra Visiting Professor,
Internet Architecture and Operation: 'Supra-National' Rather Than 'International' Governance Roger Clarke, Xamax Consultancy, Canberra
Copyright Xamax Consultancy Pty Ltd, Canberra Visiting Professor, Uni. of Hong Kong, A.N.U. & U.N.S.W.
Copyright, Invitation to Research INTERPRETIVIST RESEARCH TECHNIQUES Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni.
Copyright, The Malware Menagerie Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy at U.N.S.W., eCommerce.
Copyright, Invitation to Research SCIENTIFIC RESEARCH TECHNIQUES Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of.
Copyright, Invitation to Research RESEARCH ETHICS Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of Hong Kong Visiting.
Copyright, Invitation to Research ALTERNATIVES TO SCIENCE Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of Hong Kong.
Copyright, Invitation to Research SYSTEMS THINKING Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of Hong Kong Visiting.
Copyright, Invitation to Research ENGINEERING RESEARCH TECHNIQUES Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of.
Copyright, Invitation to Research THE RESEARCH PRODUCT Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of Hong Kong.
Copyright, Invitation to Research RESEARCH TECHNIQUES – CHALLENGES Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni.
Copyright Digital Privacy Roger Clarke, Xamax Consultancy, Canberra Board Member, Australian Privacy Foundation Visiting Professor, Unis. of.
Copyright, Issues from Internet Technologies 1 – Internet Connected Devices Roger Clarke, Xamax Consultancy, Canberra Visiting Prof/Fellow,
Copyright, Issues from Internet Technologies 5 – From Data to Meaning? to Knowledge?? Roger Clarke, Xamax Consultancy, Canberra Visiting Prof/Fellow,
Copyright, Issues from Internet Technologies 4 – Counter-Attacks by the Powerful Roger Clarke, Xamax Consultancy, Canberra Visiting Prof/Fellow,
Internet-Induced Constraints on Freedoms: The Implications for Innovation Roger Clarke, Xamax Consultancy, Canberra Visiting Fellow, Dept of Computer Science,
Copyright How Academe and Business Can Connect Roger Clarke Xamax Consultancy Pty Ltd, Canberra Visiting Professor in eCommerce, Uni. of Hong Kong;
Copyright A 'Fair Go' for Creatives in a Digital Environment Roger Clarke Xamax Consultancy, Canberra Chair, AEShareNet Limited & Visiting.
Copyright, Invitation to Research THE SCIENTIFIC APPROACH Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, CSIS, Uni of Hong Kong.
Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor, Unis. of Hong Kong, U.N.S.W., ANU
Copyright Paper Reviewing Roger Clarke Xamax Consultancy Pty Ltd, Canberra Visiting Professor, Uni. of Hong Kong, U.N.S.W., A.N.U.
Copyright, A Pilot Study of the Effectiveness of Privacy Policy Statements Roger Clarke Xamax Consultancy Pty Ltd, Canberra Visiting Professor,
Performance in Decentralized Filesharing Networks Theodore Hong Freenet Project.
An Overview of Peer-to-Peer Sami Rollins
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
Web Content Control Application Providing Secure & Reliable Internet Access December 2010.
Free and Open Source Content, Software?. Free  In the context of free and open-source software, free refers to the freedom to copy and re-use the software,
University of Würzburg Department of Distributed Systems Prof. Dr. P. Tran-Gia Challenges of (P2P-based) Scalable Multicast in Infrastructure-based Mobile.
What is GNU/Linux (Not Linux!)? David Sudjiman davidsudjiman (at) yahoo (dot) com The latest version of this document can.
SECURITY AND INFORMATION SYSTEMS THE EVOLUTION OF SECURITY SYSTEMS Created By: Jamere Hill Instructor: Kyhia Bostic Section University of Houston.
INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 12 Prof. Crista Lopes.
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
Copyright, Can Mobile Payments be 'Secure Enough'? Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in eCommerce at Uni of Hong.
Network+ Guide to Networks, Fourth Edition
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Lesson 19: Configuring Windows Firewall
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Open Source for Government Alexander C. Pitzner Sr. Network Engineer Harrisburg University of Science and Technology
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
HPCC 2015, August , New York, USA Wei Chang c Joint work with Qin Liu a, Guojun Wang b, and Jie Wu c a. Hunan University, P. R. China b. Central.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Enterprise Computing with Jini Technology Mark Stang and Stephen Whinston Jan / Feb 2001, IT Pro presented by Alex Kotchnev.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Copyright, Creative Licensing to Expand Australia’s Public Domain Roger Clarke Xamax Consultancy Pty Ltd, Canberra Visiting Professor, Baker.
DCS230 Centralized or Decentralized Data Transfer Prof. Nalini Venkatasubramanian -Myung Guk Lee -YunHo Huh -Abhinav.
Public Tech Instruction: Internet Safety March 26, 2014.
Chapter 26: Network Security Dr. Wayne Summers Department of Computer Science Columbus State University
Chapter 3: Windows7 Part 4.
Network Services.
Chapter 26: Network Security
Chapter 27 Security Engineering
Presentation transcript:

Copyright, Issues from Internet Technologies 2 – Apps for Collaboration & Subversion Roger Clarke, Xamax Consultancy, Canberra Visiting Prof/Fellow, Unis of N.S.W., Hong Kong, A.N.U. II/CCCS-2-ACS.ppt UofQ CCCS, 6 December 2004

Copyright, Apps for Collaboration & Subversion Agenda From Master-Slave to Client-Server From Client-Server to Peer-to-Peer Proxy-Servers, incl. Nymity Open Source and Open Content

Copyright, Star Topology / Master-Slave Architecture 1950s Onwards

Copyright, Client-Server Architecture 1970s Onwards Intra-Organisational

Copyright, Client-Server Architecture 1980s Onwards Internet-Mediated

Copyright, Multiply-Connected Topology / P2P Architecture 1970s but esp. 1990s Onwards Internet-Mediated

Copyright, The Essential Nature of P2P In principle, Any Device is a client and/or a server In practice, Many Devices perform server-functions Collaboration inherent to the software Clients can find Servers Single Points-of-Failure, Bottlenecks / Chokepoints are avoided by means of networking dynamics Enough Devices with Enough Resources participate as Servers for discovery, and as Servers for services 'Free-Riding' / 'Over-Grazing' of the 'Commons' is restrained through software and psych. features

Copyright, Why P2P Is Attractive Much-reduced Dependence on individual devices and sub-networks (no central servers) Improved Resilience (inbuilt redundancy) Much-improved Scalability (proportionality) Much-improved ability to service highly- peaked demand (more devices on the demand-side represent more server- resources) resistance to denial of service (DDOS) attacks (no central servers)

Copyright, Issues in P2P Vulnerability to masquerade, pollution attacks (decoys) Unpredictability of, and Volatility in, the locations of processing services and digital objects Lack of Central Control, hence challenges to the imposition of authority, reduction in accountability Security Challenges, esp. embedded malware Surreptitious Enlistment of Devices (at least potential) Reticulation of Digital Objects in breach of the wishes of copyright-owners, governments, and individuals

Copyright, Internet Nodes at Work

Copyright, Proxy-Servers A intermediating node that performs functions on behalf of the sending and/or receiving node Proxies can filter content, or substitute content A nymous proxy passes on a substitute IP-address and perhaps identifiers and even data A nym is: Anonymous if unbreakable Pseudonymous if the link can be discovered

Copyright, Closed, Lock in Software Copyright Licences with very restrictive terms re reproduction, adaptation, re- distribution Source-Code is commonly not provided The objective of the copyright owner is to maximise revenue, by imposing constraints on both competitors and customers Such software is generally very expensive

Copyright, Open Source Software = Liberal Licence Terms The rationale is to enable cumulative improvements and enhancement, by exposing the source-code to more eyes The Free Software movement, since 1982: Richard Stallman and Comrades – free as in speech, not free as in beer copyleft, so that derivatives are free too The Open Source Initiative, since 1998 Eric Raymond and Friends –

Copyright, Open Source Software – Licence Terms Ready Availability of: a licence executable code and source-code Licence Permissions to: run the executable reproduce both executable and source re-distribute both executable and source adapt the source distribute adapted executables and source distribute within larger software packages Licence Constraints to: ensure that redistribution is no less liberal prevent subversion of the objectives

Copyright, Open Content = Liberal Licence Terms What It Is Content available under liberal licensing terms, and without technological protections Motivations to enable access e.g. shared Learning-and-Teaching Materials to encourage improvements and enhancement by exposing the content to more eyes e.g. Wikipedia