SDLS Protocol Green Book initiation Ignacio Aguilar Sanchez (ESA) CCSDS Spring Meeting 2010 | Portsmouth, VA.

Slides:



Advertisements
Similar presentations
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Advertisements

Systems Analysis and Design in a Changing World
<<Date>><<SDLC Phase>>
Final Report Document. Format Title Page Executive Summary Table of Contents Introduction Mission Statement Main PDS items Brief justification of the.
WKES 3202 SOFTWARE REQUIREMENTS ENGINEERING SEMESTER 1 SESSION 2004/2005.
A summary of the PSS-05 URD template
Designing Your Project Output Achieving your objectives by targeting your audience Ken Peffers UNLV February 2004.
1 Introduction to System Engineering G. Nacouzi ME 155B.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
AD description template definition Marián Mlynarovič FIIT Lectures 2006.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
CCSDS october 2008 meeting – Berlin 1 Space Data Link Security BOF SEA/SLS October 14, 2008 meeting.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
CCSDS Security WG Management Remarks Martin Pilgram - DLR RB-KOB > Management Remarks on Sec WG > www.DLR.de/rb Slide 1.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
BASIC IRRS TRAINING Lecture 7
IAEA International Atomic Energy Agency. IAEA Outline Learning Objectives The Mission Report Purpose and objectives What is not needed? Evolution of the.
Symmetric Key Management Books Development Plan Daniel Fischer (ESA) Ignacio Aguilar Sanchez (ESA) CCSDS Spring Meeting 2010 | Portsmouth, VA.
Delta-DOR SIG: Report of the Fall 2007 Meeting Heppenheim, Germany October 5th, 2007 Roberto Maddè ESA/ESOC
Software Requirements Engineering CSE 305 Lecture-2.
Requirements Specification for Lab3 COP4331 and EEL4884 OO Processes for Software Development © Dr. David A. Workman School of Computer Science University.
Experimental Research Methods in Language Learning Chapter 16 Experimental Research Proposals.
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/SPARTA (a Parsons Company) April.
1 Chapter 8++ The Final Design Report. 2 Motivation The main purpose of the design report is to provide all the information necessary to: The main purpose.
1 CCSDS Security Working Group Fall 2010 Meeting October 2010 British Standards Institute London, UK Howard Weiss NASA/JPL.
Standards Certification Education & Training Publishing Conferences & Exhibits 1Copyright © 2006 ISA ISA-SP99: Security for Industrial Automation and Control.
1 1 Expert Group on Energy Statistics. New York 2 – 5 Nov ESCN and the Oslo Group Olav Ljones Chair of the Oslo Group Statistics Norway
Ajh January 2007 CCSDS “Books” Adrian J. Hooke CMC Meeting, Colorado Springs 26 January 2007.
CS 4850: Senior Project Fall 2014 Object-Oriented Design.
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/PARSONS November 2014 BSI, London.
S&I Integration with NIEM (DRAFT) Standards Development Support June 8, 2011.
IAEA International Atomic Energy Agency. IAEA Outline Learning Objectives The Mission Report Purpose and objectives What is not needed? Evolution of the.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
1 SecWG New Business Discussions CCSDS CNES, Toulouse FR Howard Weiss NASA/JPL/SPARTA November 2004.
Delta-DOR WG: Report of the Spring 2010 Meeting Portsmouth, VA, USA May 7 th, 2010 Roberto Maddè ESA/ESOC,
1 Cross Support Architecture (CSAWG) Overview, Status, Goals Takahiro Yamada JAXA.
Ty - 1 Space Communication Cross Support Architecture WG Closing Plenary Report Spring 2011 Meeting Takahiro Yamada (JAXA/ISAS) 20 May May 2011.
SDLS Protocol Padding concept Ignacio Aguilar Sanchez (ESA) CCSDS Spring Meeting 2010 | Portsmouth, VA.
Consultative process for finalizing the Guidance Document to facilitate the implementation of the clearing-house mechanism regional and national nodes.
The Proposal AEE 804 Spring 2002 Revised Spring 2003 Reese & Woods.
Research Methodology Class.   Your report must contains,  Abstract  Chapter 1 - Introduction  Chapter 2 - Literature Review  Chapter 3 - System.
November SECURITY WORKING GROUP REPORT November 2004.
Fundamentals of Governance: Parliament and Government Understanding and Demonstrating Assessment Criteria Facilitator: Tony Cash.
Delta-DOR SIG Minutes of the meeting Heppenheim, Germany October 2nd, 2007 Roberto Maddè ESA/ESOC
ESA UNCLASSIFIED – For Official Use SDLS Key Management Extended Procedures Daniel Fischer, Ignacio Aguilar Sanchez CCSDS Fall Meetings 2012 Oct 2012.
CSIS 4850: CS Senior Project – Spring 2009 CSIS 4850: Senior Project Spring 2009 Object-Oriented Design.
Security WG: Report of the Fall 2004 Meeting November 19, 2004 Howard Weiss.
Systems Architecture WG: Report of the Spring 2005 Meeting April 14, 2005 Takahiro Yamada, JAXA/ISAS.
Security WG: Report of the Fall 2003 Meeting October 28, 2003 Howard Weiss, NASA/JPL/SPARTA.
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/Cobham (Parsons) October 2011.
Doc.: IEEE /xxxxr0 Submission May 2006 Darwin Engwer, NortelSlide 1 Services and SAPs Notice: This document has been prepared to assist IEEE
The CCSDS Security WG is chartered to:
CCSDS Systems Engineering Area: Security Working Group
Literature review Methods
Physical Layer Security
SDLS Protocol Green Book initiation
Introduction to vital statistics report writing
Cryptography and Network Security
ATS Architecture Design Solution Intent
Note: Text displayed in blue italics is included to provide guidance to the author and should be deleted or hidden before publishing the document.
, editor October 8, 2011 DRAFT-D
IMT-Advanced Technical Requirements
Design Report Submit one report per sub-team
Research Proposal and Report
Draft Mandate to request SCHER opinion on the TGD-EQS
Cryptography and Network Security
Presentation transcript:

SDLS Protocol Green Book initiation Ignacio Aguilar Sanchez (ESA) CCSDS Spring Meeting 2010 | Portsmouth, VA

Background –Green Book definition: –Intended to provide for the timely publication of a very broad range of general information for the CCSDS community. –Informational documents are often published in support of an Experimental specification, a Draft Standard or a Recommended Standard. –They may therefore contain descriptive material, supporting analysis, test results, scenarios, etc., which are otherwise inappropriate for the contents of a technical specification.

Chapter 1 of ToC –Introduction –Purpose –Scope –Organization of this Report –Conventions and Definitions –References Chapter 1 structure is standard. No particular adaptation to SDLS GB.

Chapter 2 of ToC –Overview –SDLS protocol –A summary description of what is SDLS and how it relates to SDL protocol. –Motivation –Provides the reasons why such protocol has been developed. Explains the simple mission network topology. –Interiperability for cross-support. –Major design goals and constraints –Security Services –Compatibility with SDL Services –Compatibility with SLE Services –Independence of cryptographic algorithms and support to CCSDS cryptographic algorithms Chapter 2 provides a summary introduction to SDLS.

Chapter 3 of ToC –Title to be found (design concepts? Summary of concept and rationale?) –Security services (selection) –This section will present the rationale for the selection of the agreed security services (authentication, confidentiality, integrity and combinations thereof). The selected services are taken out of ISO OSI Security Architecture. A set of tables (one per SDL protocol) will document threats, risks, and other elements justifying the decision taken for each of those ISO OSI Security Services. An important element of information will be constituted by the residual risk for not implementing a security service or by considering the performance of the selected service. –Protocol position –This section will present the placement of SDLS with respect to SDL in the CCSDS protocol stacks and its rationale. Furthermore, it will identify and discuss the interfaces with other layers. –Protocol data structures, fields and functions –Organization and description of the various protocol data structures and fields with their corresponding function. –Justifications. –Management –Presentation and discussion of management aspects. Among other things Security Association and Security Context are treated here. In line with GB template chapter 3 provides a detailed technical presentation and discussion of the major technical decisions behind SDLS development.

Chapter 4 of ToC –Concept of Operation Integrates the content produced by CB on the GB Conops. In particular look at cryptographic service processing flow diagrams.

Annexes –To be completed –Reference implementation –ISO OSI Security Services tables vs. SDL protocols –URD –…. Annexes will document detailed elements of information (e.g., analyses) not suitable for the main body of the document.

Open Points –Documenting detailed SDLS requirements? –A summary of main requirements and their discussion will go into the GB. –Should in addition detailed requirements be available for the reader? If so a reference can be made to the URD but the URD would need to be available (i.e., published) at –Alternatively, the URD becomes an Annex to this GB –Any relevant experience in previous GBs?

Next Actions –Collect feedback on the meeting and afterwards –Coordinate with SDLS Blue Book Technical Editor (Craig) to harmonize contents –Assign content writers on agreed topics