Direct Project Virtual Connect-A-Thon January 2016.

Slides:



Advertisements
Similar presentations
The Diffie-Hellman Algorithm
Advertisements

The Direct Project In A Box Vaibhav Bhandari (Engineer, Microsoft) Ali Emami (Engineer, Microsoft)
Public Key Infrastructure and Applications
SeND Hash Threat Analysis CSI WG Ana Kukec, Suresh Krishnan, Sheng Jiang.
Secure Network Bootstrapping Infrastructure May 15, 2014.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Nick Vennaro, NHIN Team (Contractor), Office of the National Coordinator for Health IT Michael Torppey, CONNECT Health IT Security Specialist (Contractor)
S&I Framework Provider Directories Initiative esMD Work Group October 19, 2011.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
Direct Implementation Perspective 0 Mark Bamberg, Vice President Research & Development MEDfx.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Interoperation Between a Conventional PKI and an ID-Based Infrastructure Geraint Price Royal Holloway University of London joint work with Chris Mitchell.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Administrivia Final exam: Wed, May 12, 3:00-5:00, in this room Q&A on it today Playoffs: Fri, May 14, noon-2:00, FEC 141 Post-class survey (anonymous)
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Privacy and Security in the Direct Context Session 6 April 12, 2010.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Deployment Models A. client (no S/MIME) »NHIN-Direct developed security agent »off-the-shelf S/MIME proxy B. client using Native S/MIME »Internet.
X.509 Certificate management in.Net By, Vishnu Kamisetty
Exchange of digitally signed SPSCertificate messages Overview of prototype of digital signature applied to SPSCertificate message between national systems.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 9: Securing Network Traffic Using IPSec.
Cross Vendor Exchange Testing and Certification Plans April 18, 2013.
Masud Hasan Secue VS Hushmail Project 2.
Securing Microsoft® Exchange Server 2010
Outlook Lesson 4 Managing Messages Microsoft Office 2010 Advanced Cable / Morrison 1.
Automate Blue Button Initiative Push Workgroup Meeting January 7, 2013.
INSERT GRAPHIC SQUARE HERE World Wide Web EPC Network DNS Authoritative system that routes requests for Web sites and ONS Authoritative record of.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Direct Project Direct + Policy Enablement. 12/06/10 Overview Policy Role In Direct Policy Enablement Security and Trust Support Architecture Tool Demo.
Direct Project Virtual Connect-A-Thon December 2010.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Draft-qi-i2nsf-access-network- usecase-00 Author: Minpeng Qi, Xiaojun Zhuang.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Java Security Nathan Moore CS 665. Overview Survey of Java Inherent Security Properties Java Runtime Environment Java Virtual Machine Java Security Model.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
1 ECHO SSL Ordering With ECHO 9.0 Dan Pilone. 2 Agenda Introduction SSL Ordering Overview Order Fulfillment Features Provider Requirements Configuring.
DirectProject Reference Implementation 4.0 Greg Director, Distinguished Engineer, Cerner Corp.
Presented by: Sanketh Beerabbi University of Central Florida.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Module 12 Integrating Exchange Server 2010 with Other Messaging Systems.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Automate Blue Button Initiative Push Workgroup Meeting November 26, 2012.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012.
Secure Neighbor Discovery in IPv6 Jari Arkko Ericsson Research James Kempf DoCoMo US Labs.
Ensuring Conformance & Interoperability NHIN Testing Leslie Power, NHIN Testing Lead (Contractor) Office of the National Coordinator for Health IT WEDNESDAY,
Security fundamentals Topic 9 Securing internet messaging.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Standards Implementation and Testing Environment (SITE) Direct Transport Sandbox.
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
By Chris Zachor CS 650.  Introduction  SSH Overview  Scenarios  How To:  Results  Conclusion.
Web Services Security INFOSYS 290, Section 3 Web Services: Concepts, Design and Implementation Adam Blum
DirectProject Reference Implementation 5.0 Greg Director, Distinguished Engineer, Cerner Corp.
DANE/DNSSEC/TLS Testing in the Go6lab Jan Žorž, ISOC/Go6 Institute, Slovenia
2013Prof. Reuven Aviv, Mail Security1 Pretty Good Privacy (PGP) Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
July 19, Secure Messaging Models Co-existence and Interoperability Russell W. Chung New York, NY July 19, 2005.
Direct Project Virtual Connect-A-Thon December 2010.
IPSecurity.
Unit 3 Section 6.4: Internet Security
S/MIME T ANANDHAN.
Presentation transcript:

Direct Project Virtual Connect-A-Thon January 2016

12/06/10 Agenda »Introduction and Overview »Update on Java RI 5.0: Greg Meyer »MaxMD Certificate Discovery Tool: Bruce Schreiber »NIST Direct Tooling Update: Andrew McCaffrey, Dragon »Ready, Set, Connect!!!!

Connect-A-Thon 3 Connect-A-Thon focused on interoperability testing Already have instances stood-up Want to test them against other implementations Increased focus on negative and edge case scenarios

Connect-A-Thon 4 »Goals General HISP interoperability Test new RI implementation and bug fixes Enhanced private key protection Config UI DNS Policy Enablement Regression testing HIMSS Pre-testing

Connect-A-Thon 5 »Addressing test cases Trusted sender to trusted recipient Trusted sender to untrusted recipient –Missing, expired, or revoked certificate Trusted sender to trusted and untrusted recipient Untrusted sender (on receiving side) to trusted recipient

Connect-A-Thon 6 »Negative Receipt Tests Unencrypted payload Encrypted, no signature Encrypted, bad signature Message not verified Corrupt encryption Chain can not be build Untrusted trust anchor Expired certificate »Negative Send Tests Tests Chain can not be built Untrusted trust anchor Expired certificate

Questions? 7