1 Authenticity Capture Prototype Matt Dunckley, STFC.

Slides:



Advertisements
Similar presentations
Proposed Revised Mission of the Conformance Sig Current Mission Statement –The SIG Conformance will provide mechanisms for : 1. Specification of conformance.
Advertisements

MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
Using Multi-Encryption to Provide Secure and Controlled Access to XML Documents Tomasz Müldner, Jodrey School of Computer Science, Acadia University, Wolfville,
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Authentication of the Federal Register Charley Barth Director, Office of the Federal Register United States Government.
Digital Preservation - Its all about the metadata right? “Metadata and Digital Preservation: How Much Do We Really Need?” SAA 2014 Panel Saturday, August.
Grid Security. Typical Grid Scenario Users Resources.
Chapter 4: Security Policies Overview The nature of policies What they cover Policy languages The nature of mechanisms Types Secure vs. precise Underlying.
Proposal for an achievable, cost effective Security Concept for EOBRs C. Hardinge / A. Lindinger.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Determining Textual Authenticity n Comparison with original n Use of recordings n Comparisons of all texts Slide 6.1.
Archival Prototypes and Lessons Learned Mike Smorul UMIACS.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
1 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. by Mary Anne Poatsy, Keith Mulbery, Eric Cameron, Jason Davidson, Rebecca Lawson,
COPYRIGHT © 2008 – APEX SOFTWARE LTD. ALL RIGHTS RESERVED Human Resources COPYRIGHT © 2008 – APEX SOFTWARE LTD. ALL RIGHTS RESERVED CATEGORY FUNCTION Why.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
CS499 Use Cases References From Alistair Cockburn Writing Effective Use Cases (Book) - Use Case.
Configuration Management and Server Administration Mohan Bang Endeca Server.
Practical RDF Chapter 1. RDF: An Introduction
Automating Tasks with Visual Basic. Introduction  When can’t find a readymade macro action that does the job you want, you can use Visual Basic code.
ASP.NET 2.0 Chapter 5 Advanced Web Controls. ASP.NET 2.0, Third Edition2 Objectives.
1 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 12 Designing Systems Interfaces, Controls, and Security.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
1 WS-Privacy Paul Bui Ryan Dickey. 2 Agenda  WS-Privacy  Introduction to P3P  How P3P Works  P3P Details  A P3P Scenario  Conclusion  References.
1 Authenticity Capture Prototype Matt Dunckley, STFC.
Ashley Hawley. Project Description Business Need User Profiles Development Technology Testing Plan Deliverables Demonstration Conclusion.
Heidi Atha Diane Look Buena Vista School District.
Metadata Models in Survey Computing Some Results of MetaNet – WG 2 METIS 2004, Geneva W. Grossmann University of Vienna.
Web Services Standards. Introduction A web service is a type of component that is available on the web and can be incorporated in applications or used.
Digital Preservation: Current Thinking Anne Gilliland-Swetland Department of Information Studies.
7 Systems Analysis and Design in a Changing World, Fifth Edition.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Copyright © 2006 Pilothouse Consulting Inc. All rights reserved. Office Server Specific Web content management –Page structure, layouts, and controls –Publishing.
What's New in Kinetic Calendar 2.0 Jack Boespflug Kinetic Data.
NHS Education for Scotland The Knowledge Network: Shared Space April 2010.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
Click to add text Systems Analysis, Prototyping and Iteration.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Chapter 11 Enhancing an Online Form and Using Macros Microsoft Word 2013.
1 Session 4 Module 6: Digital signatures. Digital Signatures / Session4 / 2 of 18 Module 4, 5 - Review (1)  Java 2 security model provides a consistent.
Saturday, January 23, 2016 Towards an easy use of CIRCABC Communication and Information Resource Centre for Administrations, Businesses and Citizens By.
1 Central Publish to External Catalog from the Alma Network Zone.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
21/1/ Analysis - Model of real-world situation - What ? System Design - Overall architecture (sub-systems) Object Design - Refinement of Design.
1 E-Acquisitions Workflows and Management in Alma Network Zone.
HEI/OCAN College Access Program Data Submissions.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Integrating the Healthcare Enterprise The Integration Profiles: Basic Security Profile.
IBM Kenexa BrassRing on Cloud Candidate Portal
SQL Database Management
Architecture Review 10/11/2004
Unit 3 Section 6.4: Internet Security
Chapter 11 Designing Inputs, Outputs, and Controls.
Exercise: understanding authenticity evidence
Chapter 5: The Art of Ensuring Integrity
Exercise: understanding authenticity evidence
Data Quality By Suparna Kansakar.
$, $$, $$$ API testing Edition
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
Instructor Materials Chapter 5: Ensuring Integrity
Cryptography and Network Security
Presentation transcript:

1 Authenticity Capture Prototype Matt Dunckley, STFC

2 Why we need tools Demonstrable Authenticity Trustworthiness (Implies Quality) Need to capture all information deemed necessary to make an informed judgement as to the authenticity Provide a customisable and flexible mechanism to define what is the important PDI that needs capturing Design is based on the Authenticity Model, which provides a standard process and framework

3 Authenticity Model Framework to record pertinent information using standard terminology Events – Capture information about an Event of importance Protocols – Executed in response to an event occurring Steps – Details information to capture for the event AuthProtocolExecutionReport – Result of execution used by community member to make a judgement

4 Nature of the Tool Keeping it simple to start with GUI tool Capture mainly textual information (Evidence) when events occur Consistent and Standard user experience to perform capture Where possible allow automated capture through plug-ins & external tools

5 User Roles – Use Cases Project Creator/Administrator –Sets up an Authenticity project - providing detailed project information - reasons, objectives, ie. the business case –Imports the projects Authenticity model, an XML protocol document based on Authenticity Model Authenticity Information Capturer –Registers to Project –Edit/Add User Profile Information i.e credentials, details of their role, qualifications, affiliations, accreditations. –Creates and instance of a project, i.e for a particular digital object –Follows authenticity protocols / steps a procedure to capturing the specified information for each step –Sign off Capture as complete Researcher/Consumer / All users –Can search for authenticity information by project –Can browse the holdings –Export Captured information in various formats

6 Digests To verify the collected Authenticity information is trustworthy it is important to detect any forgery and if the information has been tampered To allow this to be determined by a consumer we use the digest for digital signing the captured information A cryptographic hash function is applied to the captured text information, returning a (cryptographic) hash value, such that an accidental or intentional change to the data will change the hash value. To investigate if there has been some change, the hash value can be recalculated and compared the original. A Hash value is also know simply a digest The digest will also inform as to whether digital corruption has ocurred The properties of a good digest should mean it would be –impracticable to find a message that has a given hash, –impracticable to modify a message without changing its hash, –impracticable to find two different messages with the same hash.

7 Digests At each information capture point a digest of the information is recorded At the point of sign-off a digest of all captured information is recorded Example of information captured for Ionosonde station Location <capture capturer="us01" confidence="85" dateTime=" :09:36" hashAlorithum="md5 hashValue="7a1e512cef9cfd93af cc2 pdiID="Ionosonde-01_step1_pdi2" pdiValue="BUDAPEST - HUNGARY Geographic Latitude (WGS-84) 47.00°N Geographic Longitude (WGS-84) 19.00°E Magnetic Latitude (IGRF-10(2005) 45.93°N Magnetic Longitude (IGRF-10(2005)) °E projectID="Ionosonde" stepID="Ionosonde-01_step1" timestamp=" "/>

8 XML Protocol Document Defined by XML Schema – Based on Authenticity Model

9 User Experience / Flow diagram

10 Case Study Applied Auth Model - Ionosonde WDC, STFC To allow us to design of the Auth Protocols 1 st Statement of policy (Authenticity Recommendation) by which we can measure if we have captured enough evidence Record all PDI necessary to verify the authenticity and quality of received data files for long term archival within the WDC 2 nd Identify Events –Ingestion of raw data files in varying formats –Transformation of received data files into IIWG format –Final validation and archival of IIWG file within WDC 3 rd Design Protocols and steps

11 Ingestion Protocol Ingestion of raw data files in varying formats Recommendation (Policy) In order for this digital data to be accepted as Ionosonde data of sufficient quality the reliability of its source must be verified and recorded by a WDC accredited archivist Steps will capture –Source of dataset Evidence that this is indeed the source –Archivist name and details Ideally some form of credentials would be attached

12 Transformation Protocol Transformation of received data files into IIWG format Recommendation (Policy) For the received data file to be deemed as sufficient quality to support data analysis it must have been successfully transformed into standard IIWG data format, the use of processing software must be recorded Steps will capture –Details of transformation used Software details including name, version, source Time/date of process System details Details of person responsible Reason for believing this software is reliable –Details of Transformational Information Properties checked Information Property descriptions Values checked Details of how checked Details of who was responsible for the check

13 Archival Protocol Final validation and archival of IIWG file within WDC Recommendation (Criteria) Successful validation of the IIWG structure and syntax must be achieved and recorded before long term archival can take place Steps will capture –Details of validation process Details of checks performed Details of person responsible –Details of transfer to storage Details of person responsible Checks performed on transfer e.g. Fixity checks Details of archive and storage system Date/time of transfer