SHIP Secure Heterogeneous Information Presentation Marc Bezem PUT.ii.uib.

Slides:



Advertisements
Similar presentations
WECC EIDE Training Workshop Data Exchange Work Group.
Advertisements

J. Kaiser University of Ulm Dept. Of Comp. Structures Jörg Kaiser Dept. Of Computer Structures University of Ulm And gets.
Websydian products.
Mobile Agents Mouse House Creative Technologies Mike OBrien.
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
OOI-CI–Ragouzis– Ocean Observatories Initiative Cyberinfrastructure Component CI Design Workshop October 2007.
XML Technology in E-Commerce
Unifying the conceptual levels of network security through use of patterns Ph.D Dissertation Proposal Candidate: Ajoy Kumar, Advisor: Dr Eduardo B. Fernandez.
Chapters 14 & 15 Internet Databases. E-Commerce  Bringing new products, services, or ideas to market, supporting and enhancing business operations 
LYU0101 Wireless Digital Library on PDA Lam Yee Gordon Yeung Kam Wah Supervisor Prof. Michael Lyu First semester FYP Presentation 2001~2002.
1 CLOUD AND SaaS-BASED PLATFORMS: ENSURING DATA PRIVACY May, 2011.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
0 General information Rate of acceptance 37% Papers from 15 Countries and 5 Geographical Areas –North America 5 –South America 2 –Europe 20 –Asia 2 –Australia.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Understand Web Services
Building Applications Using SIP Scott Hoffpauir Vice President, Engineering Fall 1999 VON, Atlanta.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
Architecture & Data Management of XML-Based Digital Video Library System Jacky C.K. Ma Michael R. Lyu.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System interfaces Updated: November 2014.
Managing Agent Platforms with the Simple Network Management Protocol Brian Remick Thesis Defense June 26, 2015.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
AgentOS: The Agent-based Distributed Operating System for Mobile Networks Salimol Thomas Department of Computer Science Illinois Institute of Technology,
Tcl Agent : A flexible and secure mobile-agent system Paper by Robert S. Gray Dartmouth College Presented by Vipul Sawhney University of Pennsylvania.
Web services security I
Principles for Collaboration Systems Geoffrey Fox Community Grids Laboratory Indiana University Bloomington IN 47404
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
A Human-centric framework for universal access Canadian Undergraduate Software Engineering Conference March 7-9, 2002 Jacob Slonim Dalhousie.
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
Cli/Serv.: JXTA/151 Client/Server Distributed Systems v Objective –explain JXTA, a support environment for P2P services and applications ,
Wireless and Security CSCI 5857: Encoding and Encryption.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Facility Registry System and the Exchange Network Pat Garvey OEI/OIC May 2000.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Web Services An introduction for eWiSACWIS May 2008.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 ITU-T Security Standardization on Mobile Web Services Lee, Jae Seung Special Fellow,
Distributed Systems: Concepts and Design Chapter 1 Pages
Evaluation of a Publish/Subscribe System for Collaboration and Mobile Working Collaborative Advertising over Internet with Agents Independent Study: Wireless.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Context-Awareness on Mobile Devices - the Hydrogen Approach Thomas Hofer, Wieland Schwinger, Mario Pichler, Gerhard Leonhartsberger, Josef Altmann (Software.
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
ELECTRONIC COMMUNICATIONS Standard Grade Computing ELECTRONIC COMMUNICATIONS CHAPTER 10.
Semantic Web Technologies Research Topics and Projects discussion Brief Readings Discussion Research Presentations.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Private Information Protection based on User-Trusted Program Institute of Systems and Information Engineering/KYUSHU Ken ’ ichi Takahashi.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
The Benefits of Indigo SMS Aumne, Inc. Tel: Fax: Commerce Ct Suite 200, Lisle, IL USA.
Partial Notifications IETF 56 SIMPLE WG draft-lonnfors-simple-presinfo-deliv-reqs-00 draft-lonnfors-simple-partial-notify-00 Mikko Lönnfors
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
1. Relating Human Markup Language to the Web Services Component Model 1.0 The Human Markup Language-HumanML Codifying Human Characteristics  Basic XML.
1 Seminar: Pervasive Computing 2004 Automatic mobile device configuration: Status & open challenges Stefan Hoferer Supervisor: Andreas Fasbender.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CLOUDENTIFY.
COMPUTING BTEC LEVEL /17.
PPP – Point to Point Protocol
Presented by, Sreya G S3 EC
THREE TIER MOBILE COMPUTING ARCHITECTURE
Chinese wall model in the internet Environment
NETW-250 Avaya Voice Solutions Last Update
Knowledge Sharing Mechanism in Social Networking for Learning
Presentation transcript:

SHIP Secure Heterogeneous Information Presentation Marc Bezem PUT.ii.uib

The Internet Many servers connected to even more clients: a bewildering variety

Heterogeneity content: data, programs, text, sound, images, video hardware: from servers to mobile phones communication: bandwidth, security,… preferences: no/color, no/sound, braille, only the headlines,..

``Only´´ security encryption (low sec. – high sec.) public/private key signatures trusted third party protected against modification, redirection, …

Main Goal of SHIP Advancing the state of the art of network technology by developing a flexible framework for handling data and organizing software for heterogeneous content on heterogeneous platforms. Or, more modestly, …

Main Test Vehicle E-learning system developed by Mughal at II/UiB –multi-media content –content-independent –secure (privacy, exams) Prototyping extensions of this system in order to test new ideas

Status per Today Still in the initial phase ( ) 2 PhD fellows appointed: –Paul Simon Svanberg ( ), Security and Agent Logics (Sect.2.4.3) –Dag Hovland ( ), Inclusion relation for XML schemas (Sect.2.4.1/2) Vacancy for a research associate

Related Activities Collaboration with HiB: PhD fellow Adrian Rutle working on Diagram techniques for design and formalization of presentation patterns (Sect.2.4.1) Upcoming: cooperation with Vesta

Inclusion relation for XML schemas XML: a flexible language for representing heterogeneous content XML schemas: define valid XML documents Dynamic Presentation: XML schemas may change Q: which XML documents stay valid?

XML schemas, ctnd A1: test all your documents again (costly) A2: test a syntactic inclusion relation between the old and the new schema Problems: –Define `syntactic inclusion´ –Prove `syntactic´ implies `semantic´ inclusion –Find an algorithm to test syntactic inclusion (compare efficiency to testing all documents)

Security and Agent Logics Identification of a `Security Language´: –Abstraction mechanisms for security –Specification of security objectives –Validation wrt security objectives Make Agent Logics a suitable framework Simple example: if agent A knows an encrypted message, then he knows the message itself only if he also knows the key

Agent Logics (ctnd) Typical example: If A sends an encrypted message to B. How can A be sure that B has received the message? (missing key, failing communication) Challenges: flexibility, diversity

The End