1 News about the privacy document 6 th TF-LSD Meeting Limerick 2.6.2002 Peter Gietz

Slides:



Advertisements
Similar presentations
Collection Service. 19 February 2001CYCLADES Kick-off meeting Collection A set of documents A set of services on the documents A set of polices that regulate.
Advertisements

Digital Certificate Operation in a Complex Environment Matthew J. Dovey Oxford University Computing Services.
Reinventing using REST. Anything addressable by a URI is called a resource GET, PUT, POST, DELETE WebDAV (MOVE, LOCK)
Basic Communication on the Internet:
Executional Architecture
Practical Digital Signature Issues. Paving the way and new opportunities. Juan Carlos Cruellas – DSS-X co-chair Stefan Drees - DSS-X.
Lesson 1. Course Outline E-Commerce and its types, Internet and WWW Basics, Internet standards and protocols, IP addressing, Data communication on internet,
Chapter 2. Slide 1 CULTURAL SUBJECT GATEWAYS CULTURAL SUBJECT GATEWAYS Subject Gateways  Started as links of lists  Continued as Web directories  Culminated.
Software Structure CHAPTER 4 The overall structure of the online learning community system : 1.user database 2.content database 3.user/content map 4.user/user.
LDAP crawlers use cases, dangers and how to cope with them 2 nd OpenLDAP Developers Day, Vienna, July 18, 2003 Peter Gietz
Information Technology Registry Services Security LDAP-based Attributes and Authentication.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
The Anatomy of a Large-Scale Hypertextual Web Search Engine Sergey Brin and Lawrence Page Distributed Systems - Presentation 6/3/2002 Nancy Alexopoulou.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
How the World Wide Web Works
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
1 Enabling Secure Internet Access with ISA Server.
Login Screen This is the Sign In page for the Dashboard Enter Id and Password to sign In New User Registration.
Worksheet: Mapping your authorization and consent use cases to the UMA architecture 17 Aug 2014 Questions? Send mail to
Shibboleth-intro-dec051 Shibboleth A Technical Overview Tom Scavo NCSA.
What IHE Delivers Healthcare Provider Directories IHE IT Infrastructure Planning Committee Eric Heflin – Medicity/THSA.
Chapter 9 - Applications We will look at three main applications DNS (name services) SMTP ( ) HTTP (World Wide Web) Our main focus will be on DNS.
Login Screen This is the Sign In page for the Dashboard New User Registration Enter Id and Password to sign In.
1 Privacy issues on pan-European White Pages service 4rd TF-LSD Meeting Amsterdam, Peter Gietz
European Shared Treasure Online system Improvements on search page.
Cosmos Security Feature Overview Product Planning Group Samsung IT Solutions Business 12 July 2010.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 25 TCP/IP Protocol Suite: Part 2, Application Layer.
XHTML Introductory1 Linking and Publishing Basic Web Pages Chapter 3.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Sympa Mailing List Server
Active Directory Windows2003 Server. Agenda What is Active Directory What is Active Directory Building an Active Directory Building an Active Directory.
 The World Wide Web is a collection of electronic documents linked together like a spider web.  These documents are stored on computers called servers.
Topical Crawlers for Building Digital Library Collections Presenter: Qiaozhu Mei.
Aquenergy Portal Elisabetta Zuanelli, University of Rome “Tor Vergata”, Italy E-Age 2014 Muscat december.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security.
Discovery issues in atoca Brian Rosen. We need to handle several cases Some alerts are broadcast via some access network specific mechanism (multicast,
Introducing HingX now with Capacity Development Network.
LDAP/TIO implementations -2- Overview of TIO-index implementations Henny Bekker The DAG, GIDS and Desire TIO/LDAP index servers.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
1 herbert van de sompel CS 502 Computing Methods for Digital Libraries Cornell University – Computer Science Herbert Van de Sompel
X-ASVP Executive Overview eXtensible Anti-spam Verification Protocol X-ASVP Committee Technical Working Group July 25, 2007.
Stroeder.COM TF-LSD Meeting S/MIME Certificate Collector  Motivation  Proposed Solution  Discussion.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
PAPI: Simple and Ubiquitous Access to Internet Information Services JISC/CNI Conference - Edinburgh, 27 June 2002.
Web Server.
Combining ArcGIS for Server & ArcGIS Online Julia Guard and Matt Monson.
LDAP- Protocol and Applications. Role of LDAP Allow clients to access a directory service Directories hold hierarchical structured information Clients.
1 Crawler policy document 6 th TF-LSD Meeting Limerick Peter Gietz
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Internet History Computer Networks.
JavaScript and Ajax (Internet Background) Week 1 Web site:
LOGIN PAGE Login Page Support CRM:
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
1 Directories in Europe SURFnet.NL Innovation Manager CAMP, Tempe, Arizona – 1-3 Feb 2002.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Search Engine and Optimization 1. Introduction to Web Search Engines 2.
What IHE Delivers Healthcare Provider Directories IHE IT Infrastructure Planning Committee Eric Heflin - Medicity.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Internet Protocol Version4 (IPv4)
How do Web Applications Work?
Introduction to LDAP Frank A. Kuse.
Alana Kroeber Director, Information Services.
ITIS 1210 Introduction to Web-Based Information Systems
Administrator Training
pVault Sharing Architecture
Index Object Schema and Replication Infrastructure
2nd TF-LSD meeting, Amsterdam, 2. February 2001
Combining ArcGIS for Server & ArcGIS Online
Some experiences on LDAP deployment in the RedIRIS network
Presentation transcript:

1 News about the privacy document 6 th TF-LSD Meeting Limerick Peter Gietz

2 Status  No comments other than the discussion at last meeting  These comments were on crawler detection and crawler policy, which were included in new chapter 3: Generic description of the White Pages Indexing System  Privacy enhancing technologies were renamed to Privacy Preserving technologies

Motivation  Replacement of the X.500 based Nameflow service  Problems: no chaining and no knowledge information

Overall Architecture  The Common Indexing Protocol and ist implementations Very short description of CIP and of the DESIRE II and the LIMS implementation Generic description of the componants  Referrals contain the data given away by the indexing system Detailed analysis of the fields of an LDAP URL Short discussion on different posibilities to use them

5 Referrals  Two types of answers in a referral: Ldap://datahost:888/c=NL??sub?(mail=xyz) Ldap://datahost:888/c=NL, o=Univ. XY, ou=Department of Physics, cn=Mister X?base?

Data Sourcrs  Different modes of data subject‘s consent: Consent with signature on paper Consent via Consent implied by non objection

Indexing schema  Minimalset of attributes Common name Surname Given name Organization Organizational unit Mail country

Crawler access to the data  Server side sizelimits can be overcome by crawlers  Spammers could use such crawlers

Crawler detection  Distinct features of a crawler: Big number of search requests Regular patterns in sending requests Short timeperiod in between requests IP address known to belong to a spammer IP address maps to a domain outside the community Crawler doesn‘t bind to authenticate itself

Crawler policy  Crawler policy defines: which part of the name space to crawl Which attributes should be crawled Which object classes to include in the search filter How many levels should be crawled Etc.

Protection of the Index Objects  PGP-MIME encryption