IEEE P1619.3 Architecture Subcommittee Conference Call November 15, 2007 1IEEE P1619.3 Architecture Subcommittee.

Slides:



Advertisements
Similar presentations
E-Commerce Based Agents over P2P Network Arbab Abdul Waheed MSc in Smart Systems Student # Nov 23, 2008 Artificial Intelligence Zhibing Zhang.
Advertisements

Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
REST Introduction 吴海生 博克软件(杭州)有限公司.
Common Identifiers Providing Globally Unique Identifiers for UUID and Application IDs of keys and other objects.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Ferry Astika Saputra Workshop Administrasi Jaringan TELNET & SSH.
Data Integrity Proofs in Cloud Storage Sravan Kumar R, Ashutosh Saxena Communication Systems and Networks (COMSNETS), 2011 Third International Conference.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
Password?. Project CLASP: Common Login and Access rights across Services Plan
12/2/2003chow1 Network and System Support for Multi-Level Security C. Edward Chow Department of Computer Science University of Colorado At Colorado Springs.
LEAD Project Update for AC4 Vicki Suter IT-DCAS September 17, 1999.
Introduction to Enterprise JavaBeans. Integrating Software Development Server-side Component Model Distributed Object Architecture –CORBA –DCOM –Java.
2006 IEEE International Conference on Web Services ICWS 2006 Overview.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System interfaces Updated: November 2014.
Prepared by: Harvard University, Office of the UCIO Harvard University IT Services Integration Initiative Program Management Planning Meeting January 10,
Picture Users Making Art Chat An interactive communication tool.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
CONNECT as an Interoperability Platform - Demo. Agenda Demonstrate CONNECT “As an Evolving Interoperability Platform” –Incremental addition of features.
CertifiedMail Secure Messaging “Enterprise Encrypted Messaging… Hosted or In House Flexibility” Confidential – for authorized and internal distribution.
Exchange Network Node Help Desk NOLA Conference Feb 9-10, 2004.
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
Tracey Wright Jon Martin Office 365 Tips and Tricks.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
BY Rick Kleindienst Pm 440.  A collaboration tools that allows share files and documents, manage task lists and engage in group discussions.  Benefits:
Key Management with the Voltage Data Protection Server Luther Martin IEEE P May 7, 2007.
Web Services An introduction for eWiSACWIS May 2008.
Software Engineering General architecture. Architectural components:  Program organisation overview Major building blocks in a system Definition of each.
1 School of Computer, National University of Defense Technology A Profile on the Grid Data Engine (GridDaEn) Xiao Nong
© 2009 PGP Corporation Confidential State of Key Management Brian Tokuyoshi Solution Manager.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
569 Semantic Web. Dr. J. Lu University of windsor, Project Presentation Encrypted Web service application Encrypted Web Application Presented by:
1 The OASIS KMIP Standard: Interoperability for the Cryptographic Ecosystem Jon Geater OASIS KMIP TC With thanks to Bob Griffin, co-chair,
8.4 – 8.5 Securing & Securing TCP connections with SSL By: Amanda Porter.
Some Perspectives on Smart Card Cryptography
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
Presented by: Sanketh Beerabbi University of Central Florida.
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/PARSONS November 2014 BSI, London.
Management Task Force W3C Face To Face 03/04/03. Deliverables Proposed from January F2F Deliver –Proposal for base manageability requirements (All) Web.
IAWG (Interface Architecture WG) Trimester Meeting Phoenix, AZ 09/16/2008.
INTRODUCTION TO DBS Database: a collection of data describing the activities of one or more related organizations DBMS: software designed to assist in.
WG 3 Progress Report at TP #7 Group Name: oneM2M TP #7 Source: Raymond Forbes, LM Ericsson, Meeting Date: /18 Agenda.
Pairing Based Cryptography Standards Terence Spies VP Engineering Voltage Security
SMARTMAIL 3.0. OVERVIEW ● CLIENT ● WORKS WITH IMAP AND SMTP MAIL SERVER ● OFFERS SECURE , WORK FLOW MESSAGES, TRANSLATION ● PLUG-IN ARCHITECTURE.
IEEE SISWG P Sub-Committee Status Summary Walt Hubis 4/15/2009.
Desktop Integration with the Appx Client. Launch Documents Run Desktop Programs Transfer Files to the Client Transfer Files from the Client Client-Side.
IEEE P Architecture Subcommittee Model Update and Discussion November 1, 2007.
A Technical Overview Bill Branan DuraCloud Technical Lead.
EbXML Registry and Repository Dept of Computer Engineering Khon Kaen University.
ARC ordinary F2F meeting Seoul, June 2013 WG2 MEETING NOTES.
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
U N C L A S S I F I E D LA-UR Exchange 2007 Pilot at LANL Anil Karmel Technical Staff Member
IEEE P Architecture Subcommittee Conference Call January 24, IEEE P Architecture Subcommittee.
IEEE Security in Storage Working Group 1 Overview of the IEEE Security in Storage Working Group (SISWG) Matt Ball, SISWG Chair August 19, 2008 (As presented.
Progress Report Jon Garde, José Borbinha DLM Forum Members’ Meeting Luxembourg October 2015.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Profiling Interoperability Quarterly Conference January 22, 2002 Terry Blevins
IEEE SISWG (P1619.3)‏ Messaging & Transport. AGENDA Transport Protocols & Channel Protection Messaging Layer Capability Exchange & Authentication Groups.
Chapter 13 FTP and Telnet Cisco Learning Institute Network+ Fundamentals and Certification Copyright ©2005 by Pearson Education, Inc. Upper Saddle River,
IEEE P Architecture Subcommittee
Secure Sockets Layer (SSL)
CS691 M2009 Semester Project PHILIP HUYNH
File Transfer Protocol
Distributed Systems Bina Ramamurthy 11/30/2018 B.Ramamurthy.
Distributed Systems Bina Ramamurthy 12/2/2018 B.Ramamurthy.
OASIS Electronic Trial Master File Standard Technical Committee Meeting Agenda Comment Review Period January 5, :00 – 10:00 AM PDT.
Install AD Certificate Services
Standards, APIs, and Applications
Overview of Improvements to Key Holder Protocols
Snapshot Slide for TGbc
Presentation transcript:

IEEE P Architecture Subcommittee Conference Call November 15, IEEE P Architecture Subcommittee

Agenda Review Previous Actions “Draft” KM Conceptual Models “Draft” Key Lifecycle Models Items in Progress Next Steps 2IEEE P Architecture Subcommittee

Previous Action Item Review Mike W. to refine KM conceptual models; integrate into Model Proposal with definitions In progress, models “complete”, working definitions Bob L., Jon H., and Larry H. to collaborate on single key lifecycle model Common model agreed to in concept. Still working some of the finer points. We will discuss a little bit today. 3IEEE P Architecture Subcommittee

Proposed KM Conceptual Models 4IEEE P Architecture Subcommittee

Conceptual Key Management Model KM Server Encryption Application Cryptographic Unit KM Client Encryption User KM SW Lib (optional) KM API Encryption Application Cryptographic Unit Storage Medium Control Plane Option #1 Data Plane KM Message & Transport Protocol KM Server Encryption Application Cryptographic Unit KM Client Control Plane Option #2 OR 5IEEE P Architecture Subcommittee

Conceptual Key Management Model KM Server Cryptographic Unit Storage Medium Data Transfer (outside of KMS) KMCS Ops KMSS Ops Key Backup/Archive KM Client KM Server Key Backup/Archive Encryption Application Storage Medium Cryptographic Unit KM Client Encryption Application KM SW Lib (Opt) KM File Import/Export KMCS Ops 6IEEE P Architecture Subcommittee

Proposed Key Lifecycle Model 7IEEE P Architecture Subcommittee

“Draft” Key Lifecycle Models 8IEEE P Architecture Subcommittee

Items in Progress 9IEEE P Architecture Subcommittee

Items in Progress l What do we do with the key exchange data structures currently defined? l Action: Move to OO and MSG sections l What do we do about Policy definitions and do we need another model? l Action: Yes? l Do we need interaction models for the API and the Message/Transport protocol interface? l Action: Yes… 10IEEE P Architecture Subcommittee

Current D1 Policy Model 11IEEE P Architecture Subcommittee

Next Steps l Publish initial draft of model proposal l Integrate conceptual models and key lifecycle model l Need to tackle other models l Application Template/Policy/Key Interaction Model l API/MSG-Xport Interaction Model l Others? l Next call will be Thursday, Nov. 29 th 10 AM PST (1 PM EST) 12IEEE P Architecture Subcommittee