13 research outputs found
Evaluation of policy based admission control mechanisms in NGN
The 3GPP consortium proposed in the release 7 of the IP Multimedia Subsystem (IMS) a Diameter interface for the resource admission communication process replacing the previous COPS solution. Although both academic and industry communities have deeply debate the advantages and disadvantages of each protocol, its impact in NGN may have not been thoroughly quantified. This paper compares both protocols in terms of messages
exchanged between network entities, and of bandwidth
requirements during the admission control process. Based on
general network operator environment characteristics, we present
several exploitation scenarios where it is analyzed the scalability
and adequacy of each protocol
Greenpass Client Tools for Delegated Authorization in Wireless Networks
Dartmouth\u27s Greenpass project seeks to provide strong access control to a wireless network while simultaneously providing flexible guest access; to do so, it augments the Wi-Fi Alliance\u27s existing WPA standard, which offers sufficiently strong user authentication and access control, with authorization based on SPKI certificates. SPKI allows certain local users to delegate network access to guests by issuing certificates that state, in essence, he should get access because I said it\u27s okay. The Greenpass RADIUS server described in Kim\u27s thesis [55] performs an authorization check based on such statements so that guests can obtain network access without requiring a busy network administrator to set up new accounts in a centralized database. To our knowledge, Greenpass is the first working delegation-based solution to Wi-Fi access control. My thesis describes the Greenpass client tools, which allow a guest to introduce himself to a delegator and allow the delegator to issue a new SPKI certificate to the guest. The guest does not need custom client software to introduce himself or to connect to the Wi-Fi network. The guest and delegator communicate using a set of Web applications. The guest obtains a temporary key pair and X.509 certificate if needed, then sends his public key value to a Web server we provide. The delegator looks up her guest\u27s public key and runs a Java applet that lets her verify her guests\u27 identity using visual hashing and issue a new SPKI certificate to him. The guest\u27s new certificate chain is stored as an HTTP cookie to enable him to push it to an authorization server at a later time. I also describe how Greenpass can be extended to control access to a virtual private network (VPN) and suggest several interesting future research and development directions that could build on this work.My thesis describes the Greenpass client tools, which allow a guest to introduce himself to a delegator and allow the delegator to issue a new SPKI certificate to the guest. The guest does not need custom client software to introduce himself or to connect to the Wi-Fi network. The guest and delegator communicate using a set of Web applications. The guest obtains a temporary key pair and X.509 certificate if needed, then sends his public key value to a Web server we provide. The delegator looks up her guest\u27s public key and runs a Java applet that lets her verify her guests\u27 identity using visual hashing and issue a new SPKI certificate to him. The guest\u27s new certificate chain is stored as an HTTP cookie to enable him to push it to an authorization server at a later time. I also describe how Greenpass can be extended to control access to a virtual private network (VPN) and suggest several interesting future research and development directions that could build on this work
Privacidade em redes de próxima geração
Doutoramento em Engenharia InformáticaIn the modern society, communications and digital transactions are becoming
the norm rather than the exception. As we allow networked computing devices
into our every-day actions, we build a digital lifestyle where networks and
devices enrich our interactions. However, as we move our information towards
a connected digital environment, privacy becomes extremely important as most
of our personal information can be found in the network. This is especially
relevant as we design and adopt next generation networks that provide
ubiquitous access to services and content, increasing the impact and pervasiveness
of existing networks.
The environments that provide widespread connectivity and services usually
rely on network protocols that have few privacy considerations, compromising
user privacy. The presented work focuses on the network aspects of privacy,
considering how network protocols threaten user privacy, especially on next
generation networks scenarios. We target the identifiers that are present in
each network protocol and support its designed function. By studying how the
network identifiers can compromise user privacy, we explore how these threats
can stem from the identifier itself and from relationships established between
several protocol identifiers.
Following the study focused on identifiers, we show that privacy in the network
can be explored along two dimensions: a vertical dimension that establishes
privacy relationships across several layers and protocols, reaching the user,
and a horizontal dimension that highlights the threats exposed by individual
protocols, usually confined to a single layer. With these concepts, we outline an
integrated perspective on privacy in the network, embracing both vertical and
horizontal interactions of privacy. This approach enables the discussion of several
mechanisms to address privacy threats on individual layers, leading to
architectural instantiations focused on user privacy. We also show how the
different dimensions of privacy can provide insight into the relationships that
exist in a layered network stack, providing a potential path towards designing
and implementing future privacy-aware network architectures.Na sociedade moderna, as comunicações e transacções digitais estão a
tornar-se a regra e não a excepção. À medida que permitimos a intromissão de
dispositivos electrĂłnicos de rede no nosso quotidiano, vamos construĂndo um
estilo de vida digital onde redes e dispositivos enrirquecem as nossas interacções.
Contudo, ao caminharmos para um ambiente digital em rede, a nossa
privacidade vai-se revestindo de maior importãncia, pois a nossa informação
pessoal passa a encontrar-se cada vez mais na rede. Isto torna-se particularmente
relevante ao adoptarmos redes de próxima geração, que permitem
acesso ubĂquo a redes, serviços e conteĂşdos, aumentando o impacte e
pervasividade das redes actuais.
Os ambientes onde a conectividade e os serviços se tornam uma constante,
assentam em protocolos de rede que normalmente contemplam poucas
considerações sobre privacidade, comprometendo desta forma o utlizador. O
presente trabalho centra-se nos aspectos de privacidade que dizem respeito Ă
rede devido Ă forma como os protocolos sĂŁo utilizados nas diferentes camadas,
e que resultando em ameaças à privacidade do utilizador. Abordamos especificamente
os identificadores presentes nos protocolos de rede, e que sĂŁo
essenciais à sua função. Neste contexto exploramos a possibilidade destes
identificadores comprometerem a privacidade do utilizador através da
informação neles contida, bem como das relações que podem ser estabelecidas
entre identificadores de diferentes protocolos.
ApĂłs este estudo centrado nos identificadores, mostramos como a privacidade
em redes pode ser explorada ao longo de duas dimensões: uma dimensão que
acentua as relações verticais de privacidade, cruzando vários protocolos até
chegar ao utilizador, e uma dimensão horizontal que destaca as ameaças
causadas por cada protocolo, de forma individual, normalmente limitadas a
uma única camada. Através destes conceitos, mostramos uma visão integrada
de privacidade em redes, abrangendo tanto as interacçoes de privacidade
verticais como as horizontais. Esta visão permite discutir vários mecanismos
para mitigar ameaças especĂficas a cada camada de rede, resultando em
instânciações arquitecturais orientadas à privacidade do utilizador. Finalmente,
mostramos como as diferentes dimensões de privacidade podem fornecer uma
visão diferente sobre as relações estabelecidas na pilha protocolar que
assenta em camadas, mostrando um caminho possĂvel para o desenvolvimento
de futuras arquitecturas de rede com suporte para privacidade
Technologies and Applications for Big Data Value
This open access book explores cutting-edge solutions and best practices for big data and data-driven AI applications for the data-driven economy. It provides the reader with a basis for understanding how technical issues can be overcome to offer real-world solutions to major industrial areas. The book starts with an introductory chapter that provides an overview of the book by positioning the following chapters in terms of their contributions to technology frameworks which are key elements of the Big Data Value Public-Private Partnership and the upcoming Partnership on AI, Data and Robotics. The remainder of the book is then arranged in two parts. The first part “Technologies and Methods” contains horizontal contributions of technologies and methods that enable data value chains to be applied in any sector. The second part “Processes and Applications” details experience reports and lessons from using big data and data-driven approaches in processes and applications. Its chapters are co-authored with industry experts and cover domains including health, law, finance, retail, manufacturing, mobility, and smart cities. Contributions emanate from the Big Data Value Public-Private Partnership and the Big Data Value Association, which have acted as the European data community's nucleus to bring together businesses with leading researchers to harness the value of data to benefit society, business, science, and industry. The book is of interest to two primary audiences, first, undergraduate and postgraduate students and researchers in various fields, including big data, data science, data engineering, and machine learning and AI. Second, practitioners and industry experts engaged in data-driven systems, software design and deployment projects who are interested in employing these advanced methods to address real-world problems
Technologies and Applications for Big Data Value
This open access book explores cutting-edge solutions and best practices for big data and data-driven AI applications for the data-driven economy. It provides the reader with a basis for understanding how technical issues can be overcome to offer real-world solutions to major industrial areas. The book starts with an introductory chapter that provides an overview of the book by positioning the following chapters in terms of their contributions to technology frameworks which are key elements of the Big Data Value Public-Private Partnership and the upcoming Partnership on AI, Data and Robotics. The remainder of the book is then arranged in two parts. The first part “Technologies and Methods” contains horizontal contributions of technologies and methods that enable data value chains to be applied in any sector. The second part “Processes and Applications” details experience reports and lessons from using big data and data-driven approaches in processes and applications. Its chapters are co-authored with industry experts and cover domains including health, law, finance, retail, manufacturing, mobility, and smart cities. Contributions emanate from the Big Data Value Public-Private Partnership and the Big Data Value Association, which have acted as the European data community's nucleus to bring together businesses with leading researchers to harness the value of data to benefit society, business, science, and industry. The book is of interest to two primary audiences, first, undergraduate and postgraduate students and researchers in various fields, including big data, data science, data engineering, and machine learning and AI. Second, practitioners and industry experts engaged in data-driven systems, software design and deployment projects who are interested in employing these advanced methods to address real-world problems
Dictionary of privacy, data protection and information security
The Dictionary of Privacy, Data Protection and Information Security explains the complex technical terms, legal concepts, privacy management techniques, conceptual matters and vocabulary that inform public debate about privacy.
The revolutionary and pervasive influence of digital technology affects numerous disciplines and sectors of society, and concerns about its potential threats to privacy are growing. With over a thousand terms meticulously set out, described and cross-referenced, this Dictionary enables productive discussion by covering the full range of fields accessibly and comprehensively. In the ever-evolving debate surrounding privacy, this Dictionary takes a longer view, transcending the details of today''s problems, technology, and the law to examine the wider principles that underlie privacy discourse.
Interdisciplinary in scope, this Dictionary is invaluable to students, scholars and researchers in law, technology and computing, cybersecurity, sociology, public policy and administration, and regulation. It is also a vital reference for diverse practitioners including data scientists, lawyers, policymakers and regulators
Products and Services
Today’s global economy offers more opportunities, but is also more complex and competitive than ever before. This fact leads to a wide range of research activity in different fields of interest, especially in the so-called high-tech sectors. This book is a result of widespread research and development activity from many researchers worldwide, covering the aspects of development activities in general, as well as various aspects of the practical application of knowledge
Semantic discovery and reuse of business process patterns
Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse