What are our conclusions? What is the take-home work?

Slides:



Advertisements
Similar presentations
© 2006 NEC Corporation - Confidential age 1 November SPEERMINT Security Threats and Suggested Countermeasures draft-ietf-speermint-voipthreats-01.
Advertisements

ICN RG Proposed Charter IETF–81 July 2011 Börje Ohlman & Dirk Kutscher.
Expressive Privacy Control with Pseudonyms Seungyeop Han, Vincent Liu, Qifan Pu, Simon Peter, Thomas Anderson, Arvind Krishnamurthy, David Wetherall University.
HTTP Cookies. CPSC Application Layer 2 User-server state: cookies Many major Web sites use cookies Four components: 1) cookie header line of HTTP.
Outline  Introduction to Application Layer  Peer-to-peer paradigm  Client-server paradigm  Domain Name System (DNS)  Flat-naming vs hierarchical-naming.
July 2006IETF66 - ECRIT1 RELO: Retrieving End System Location Information draft-schulzrinne-geopriv-relo-00 Henning Schulzrinne.
Computer Networks Fall, 2007 Prof Peterson. CIS 235: Networks Fall, 2007 Western State College Homework #5 We will be talking about other protocols. Everyone.
Web Privacy Topics Andy Zeigler Senior Program Manager, Internet Explorer Microsoft.
StandardsDIS W4 RJK1 Distributed Information Systems Standards Bob Kummerfeld Department of Computer Science.
IETF Session Initiation Protocol Henning Schulzrinne Columbia University New York, NY.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Computer Concepts 2014 Chapter 7 The Web and .
HTTP-NG Briefing at Internet PSIG meeting, 8 June 1998; Mike Spreitzer, Xerox PARC 1 HTTP - Next Generation Mike Spreitzer Xerox PARC CSL 8 June 1998.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Midterm Exam Review Release questions via webcourse “assignment” around 10:30am, Thur. Oct. 20 th, due via webcourse at 10:30am next day Submit format:
Adrian Crenshaw. Darknets  There are many definitions, but mine is “anonymizing private networks ”  Use of encryption.
1 80 th IETF meeting NETCONF Notification over WebSocket Protocol ( draft-iijima-netconf-websocket-ps-00) Tomoyuki Iijima, (Hitachi) Yoshifumi Atarashi,
CIS 1310 – HTML & CSS 1 Introduction to the Internet.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 ITU-T Security Standardization on Mobile Web Services Lee, Jae Seung Special Fellow,
Focus on developing RESTful API Group Name: TP Source: Shingo Fujimoto, FUJITSU (TTC), Meeting Date: Agenda Item:
1 WS-Privacy Paul Bui Ryan Dickey. 2 Agenda  WS-Privacy  Introduction to P3P  How P3P Works  P3P Details  A P3P Scenario  Conclusion  References.
Workshop Outputs and Goals Hannes Tschofenig Internet Privacy Workshop, December 2010.
Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.
Wei Dong and Jan Newmarch June 2005 Session Management for Web Services by using SIP.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
Open Pluggable Edge Services (opes) 61st IETF Meeting Washington, D.C., USA.
HIP research group 1 HIP-RG meeting, IETF 65 March 24, 2006 Andrei Gurtov and Tom Henderson
Internet Privacy: Tracking and Filtering, a Policy Question PP290: Information Technology and Public Policy | Jason Christopher and Prof. Michael O’Hare,
METADATA: TRACKING AND ENCRYPTION. METADATA EXAMPLES Microsoft Word document properties Telephone/ metadata Camera/image metadata Web browser identification.
IETF-77 Clouds bar BoF Please send comments to Bhumip Khasnabish Clouds bar BoF Convener.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
March 25, 2009SIPPING WG IETF-741 A Batch Notification Extension for the Session Initiation Protocol (SIP) draft-johnston-sipping-batch-notify-00 Alan.
Converting Time Revision Level D Learning Intention Success Criteria
Cryptography and Network Security Chapter 16 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Understand Internet Security LESSON Security Fundamentals.
SCIM Ticket #28 “Clarify the Spec on Multi-Tenancy” Summary for IETF-86 Orlando, March 2013.
What are our conclusions? What is the take-home work? Hannes Tschofenig, Thomas Roessler.
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
Software Group 7-December-2005 | Cross © 2005 IBM Corporation Distributed Multimodal Synchronization Protocol (DMSP) Chris Cross, Multimodal Browser Architect.
Web Database Security Session 12 & 13 Matakuliah: Web Database Tahun: 2008.
Midterm Exam Review Release questions via webcourse “assignment” around 12:00pm, Mon. Oct. 28 th, due via webcourse at 12:00pm next day Submit format:
Session-Independent Policies draft-ietf-sipping-session-indep-policy-02 Volker Hilt Jonathan Rosenberg Gonzalo.
Block 5: An application layer protocol: HTTP
WebRTC enabled multimedia conferencing and collaboration solution
What’s Happening at the IETF & IRTF?
Internet transport protocols services
Application Layer Functionality and Protocols
Protocols and networks in the TCP/IP model initially.
Net 431: ADVANCED COMPUTER NETWORKS
Application Layer Functionality and Protocols
Human rights in technical standards: our practical approach
Application Layer Functionality and Protocols
CSCD 330 Network Programming Spring
Application Layer Functionality and Protocols
CSCD 330 Network Programming Spring
Human rights in technical standards: our practical approach
Hyper Text Transfer Protocol
COIN Motivation and Objectives
Wireshark(Ethereal).
Application Layer Functionality and Protocols
Application Layer Functionality and Protocols
CSCD 330 Network Programming Spring
Protocol Application TCP/IP Layer Model
Application Layer Functionality and Protocols
Presentation at TF-aace workshop in
Application Layer Functionality and Protocols
Application Layer Functionality and Protocols
CS 381: Introduction to Computer Networks
Midterm Exam Review Release questions via webcourse “assignment” around 10:30am, Thur. Oct. 25th, due via webcourse at 10:30am next day Submit format:
Presentation transcript:

What are our conclusions? What is the take-home work?

Mailing List In process, wait to subscribe until Friday AM – Or tell Lucy and she will add you when the list is live.

IETF Actions Create privacy directorate Investigate possible research work in privacy (IRTF) Explore what the IETF can learn from Tor (and vice versa) Support for continuing “Privacy Considerations” work – Apply it to some IETF protocols – Covers HTTP/non-HTTP-based Protocols Fingerprinting Considerations for IETF protocols (TCP, HTTP, SIP, etc.)

W3C Actions Formation of W3C Privacy Interest Group Fingerprinting of W3C protocols – How to help API Minimalization Referrer header & privacy Privacy Considerations for Non-Browser-based Protocols Usability: – Whitepapers & BCPs (?) – Usability Considerations in W3C specifications

Both/Misc Debate ‘Do not track’ technical mechanisms and policy consideration – Technical analysis – Possible experimental activity Cookie / cross-site management Terminology Threat Models (based on system-level view) Use Cases Explain why we care about correlation/linkability (examples in the workshop report) Investigate policy expression languages

Policies and Intentions Data retention/How long will you keep it? Unintended consequences of choosing an identifier Secondary use

Not covered during the workshop Privacy at the networking layer – beyond Tor – beyond the Web server (backend)