MIT Communications Futures Program Evolving communications paradigms and Security Karen Sollins MIT CSAIL January 23, 2007.

Slides:



Advertisements
Similar presentations
Fall IM 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
Advertisements

IM May 24, 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Intermediate 2 Computing
Information-centric networking: Concepts for a future Internet David D. Clark, Karen Sollins MIT CFP November, 2012.
Microsoft Internet Security and Acceleration (ISA) Server 2004 Technical Overview
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
ATA Practice Guidelines for Video- based Online Mental Health Services “The guidelines pertain to telemental health conducted between two parties, and.
Internet, Intranet and Extranets
Telefónica Móviles España GPRS (General Packet Radio Service)
1 Herald: Achieving a Global Event Notification Service Luis Felipe Cabrera, Michael B. Jones, Marvin Theimer Microsoft Research.
MODULE 11 DOCUMENTS ON WEB 11.1 The internet and the world wide web 11.2 Documents and the world wide web Systems Analysis And Design © Systems Analysis.
Reliable Internetworking using the Pub/Sub Paradigm Nikos Fotiou Advisor: Prof. George C. Polyzos Mobile Multimedia Laboratory, Department of Informatics.
Illustrating a Publish-Subscribe Internet Architecture Nikolaos Fotiou 1 George C. Polyzos 1 Dirk Trossen 2 Presenter: Konstantinos Katsaros 1 1 Athens.
Future Research Directions Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
Presence Vishal Kumar Singh and Henning Schulzrinne Feb 10, 2006.
A Scalable, Commodity Data Center Network Architecture.
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
Enterprise Infrastructure Solutions for SIP Trunking
Distributed Publish/Subscribe Network Presented by: Yu-Ling Chang.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
CLIENT A client is an application or system that accesses a service made available by a server. applicationserver.
1 Telecommunications, the Internet, Intranets, and Extranets CSC101 SECTIONS 01 & 02.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Large Space IPv4 Trial Usage Program for Future IPv6 Deployment ACTIVITIES UPDATE Vol.4 15 th APNIC Meeting / Policy SIG February 27th, 2003 at Taipei.
PowerPoint Presentation by Charlie Cook Copyright © 2005 Prentice Hall, Inc. All rights reserved. Chapter 12 Managing Information Systems and Communications.
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
Configuring Windows Vista Applications Lesson 9. Skills Matrix Technology SkillObjective DomainObjective # Configuring Internet Explorer 7 Configure Windows.
Social networking task force Jeff Jaffe Ann Bassetti Steve Holbrook 14 May
ASHIMA KALRA IMPORTANT TERMS.  WWW WWW  URL URL  HTTP PROTOCOL HTTP PROTOCOL  PROXIES PROXIES.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Web-based E-commerce Architecture
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
Networks QUME 185 Introduction to Computer Applications.
Extending the Value Chain into the Customer’s Home Connections 2004 May 7, 2004.
IT in Business Essentials of the Internet and World Wide Web.
Scalability Don McGregor Research Associate MOVES Institute
P2P SIP Names & Security Cullen Jennings
Distributed Computing COEN 317 DC2: Naming, part 1.
Information-Centric Networking Proposed IRTF RG IRTF Open Meeting at IETF-81 1IRTF Open IETF-81.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Module 5: Configuring Internet Explorer and Supporting Applications.
Multimedia & Mobile Communications Lab.
Web Services. 2 Internet Collection of physically interconnected computers. Messages decomposed into packets. Packets transmitted from source to destination.
AMQP, Message Broker Babu Ram Dawadi. overview Why MOM architecture? Messaging broker like RabbitMQ in brief RabbitMQ AMQP – What is it ?
2005 Electronic Messaging Opportunities IT and Security Services Department 22 February 2005.
Information-Centric Networks Section # 10.3: Publish/Subscribe Instructor: George Xylomenos Department: Informatics.
Viral Communications Viral Comms WG: The Viral Community David P. Reed Andy Lippman May, 2007.
Ασύρματες και Κινητές Επικοινωνίες
Networks and the Internet Topic 3. Three Important Networking Technologies Networks, Internet, WWW.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
MIT CFP Identity and Privacy: Social TV case study Security and Privacy Working Group CFP Plenary Meeting October 29, 2009.
Microsoft Cloud Solution.  What is the cloud?  Windows Azure  What services does it offer?  How does it all work?  How to go about using it  Further.
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
3 Internet Basics Internet is a collection of local, regional, national and international computer networks that are linked together to exchange data.
1 Enabling Smart Cities/Campuses to Serve the Internet of People Florence Hudson Senior Vice President & Chief Innovation Officer Internet2 TNC16 June.
IPv6 – The New Technology to Embrace Product Management Group Enterprise Data Product.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Postech DP&NM Lab Session Initiation Protocol (SIP) Date: Seongcheol Hong DP&NM Lab., Dept. of CSE, POSTECH Date: Seongcheol.
Chapter 1: Explore the Network
IS4550 Security Policies and Implementation
IS 4506 Server Configuration (HTTP Server)
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Indirect Communication Paradigms (or Messaging Methods)
Indirect Communication Paradigms (or Messaging Methods)
Presentation transcript:

MIT Communications Futures Program Evolving communications paradigms and Security Karen Sollins MIT CSAIL January 23, 2007

MIT CFP Sollins, 1/23/082 Overview: pulling on several threads Evolving communications paradigms Evolving social model Evolving security challenge

MIT CFP Sollins, 1/23/083 Communications: E2E Point-to-point –Letters/ –Telephones –TCP connections Broadcast/multicast –Print media - underneath 1:1 –Radio/TV –IP multicast From source to destination: some direct, some store-and-forward (e.g. intermediate servers)

MIT CFP Sollins, 1/23/084 Client/server: mostly E2E Remote invocation of specific server Distribution of “server”: clusters, load balancing, even some P2P systems (collaborating servers) P2P systems: each element can be both client and server

MIT CFP Sollins, 1/23/085 Intermediated communication: losing E2E Middle boxes –Forwarding (e.g. home for mobiles) –Firewall –Caching –Rendezvous (e.g. for multimedia conferencing) Beginning to break direct, realtime communication

MIT CFP Sollins, 1/23/086 It’s the content WWW and URLs Time and space separation –Not a question of when (realtime, etc.) –Not a question of where –Question of what Identification Search Pub/sub –Specification of what something is –Specification of interest or subscription –Current examples: social networking, news subscription services, …

MIT CFP Sollins, 1/23/087 Key components Information (Set of) Publishers (Set of) Subscribers Attributes: how to publish or subscribe Policies: (publisher, {attributes}) or (subscriber, {attributes}) Trust model Note: Can be simplified to achieve any of the other models, subsumes them.

MIT CFP Sollins, 1/23/088 The evolving social model: Trust and security Letter-writing: recognize handwriting Telephone: recognize voice recognize address TCP: recognize IP address Trust based on –Confidence in unmodified delivery –Confidence in correctness of source

MIT CFP Sollins, 1/23/089 And along came… (in the Internet) Forgeable addresses Forgeable IP addresses The Morris worm Viruses and other malware Business opportunities Enterprise and other organizational controls ISPs … Note: not all “bad”, just competing objectives

MIT CFP Sollins, 1/23/0810 Tussle: competing concerns Question: why do we care? –Sharing –Cooperation –Exposed contention Question: can we design for it? Question: is it monolithic? –Economics –Security –Social status –… Question: where are the control points? –Regulation –Specification –Design/implementation –Operation

MIT CFP Sollins, 1/23/0811 Security challenge: Trust model Not universal: regional, topical,…  context (e.g. Nissembaum, social networks) Not binary or pairwise: scalable, commutative, …  value-based, community-based Not immutable  evaluatable, assignable Consider: if assignable must have ability to assign “to something”. Therefore require appropriately defined identities.

MIT CFP Sollins, 1/23/0812 Advertisement (disclaimer here) The Security and Privacy Working Group: current agenda To explore the nature of identity required in an information-based communications paradigm, as a basis for examining the nature and capabilities required for trust and security