114,078 research outputs found

    Securing the Commercial Internet: Lessons Learned in Developing a Postgraduate Course in Information Security Management

    Get PDF
    This paper describes the inception, planning and first delivery of a security course as part of a postgraduate ecommerce program. The course is reviewed in terms of existing literature on security courses, the common body of knowledge established for security professionals and the job market into which students will graduate. The course described in this paper is a core subject for the e-commerce program. This program was established in 1999 and the first batch of students graduated in 2001. The program is offered at both postgraduate and undergraduate level. The work described here relates to the postgraduate offering. Students on this program are graduates of diverse disciplines and do not have a common e-commerce or business background

    Securing the RTP framework: why RTP does not mandate a single media security solution

    Get PDF
    This memo discusses the problem of securing real-time multimedia sessions, and explains why the Real-time Transport Protocol (RTP), and the associated RTP control protocol (RTCP), do not mandate a single media security mechanism. Guidelines for designers and reviewers of future RTP extensions are provided, to ensure that appropriate security mechanisms are mandated, and that any such mechanisms are specified in a manner that conforms with the RTP architecture

    Reflections on security options for the real-time transport protocol framework

    Get PDF
    The Real-time Transport Protocol (RTP) supports a range of video conferencing, telephony, and streaming video ap- plications, but offers few native security features. We discuss the problem of securing RTP, considering the range of applications. We outline why this makes RTP a difficult protocol to secure, and describe the approach we have recently proposed in the IETF to provide security for RTP applications. This approach treats RTP as a framework with a set of extensible security building blocks, and prescribes mandatory-to-implement security at the level of different application classes, rather than at the level of the media transport protocol

    Science and the media: securing the future

    Get PDF
    A report by the Science and the Media Expert Group, in which actions and recommendations are made which are aimed at delivering changes to improve the quality of science in the media and also stimulate an important debate about the future of science journalism

    Options for Securing RTP Sessions

    Get PDF
    The Real-time Transport Protocol (RTP) is used in a large number of different application domains and environments. This heterogeneity implies that different security mechanisms are needed to provide services such as confidentiality, integrity, and source authentication of RTP and RTP Control Protocol (RTCP) packets suitable for the various environments. The range of solutions makes it difficult for RTP-based application developers to pick the most suitable mechanism. This document provides an overview of a number of security solutions for RTP and gives guidance for developers on how to choose the appropriate security mechanism

    Quantum Internet: from Communication to Distributed Computing!

    Full text link
    In this invited paper, the authors discuss the exponential computing speed-up achievable by interconnecting quantum computers through a quantum internet. They also identify key future research challenges and open problems for quantum internet design and deployment.Comment: 4 pages, three figures, invited pape

    Identity principles in the digital age: a closer view

    Get PDF
    Identity and its management is now an integral part of web-based services and applications. It is also a live political issue that has captured the interest of organisations, businesses and society generally. As identity management systems assume functionally equivalent roles, their significance for privacy cannot be underestimated. The Centre for Democracy and Technology has recently released a draft version of what it regards as key privacy principles for identity management in the digital age. This paper will provide an overview of the key benchmarks identified by the CDT. The focus of this paper is to explore how best the Data Protection legislation can be said to provide a framework which best maintains a proper balance between 'identity' conscious technology and an individual's expectation of privacy to personal and sensitive data. The central argument will be that increased compliance with the key principles is not only appropriate for a distributed privacy environment but will go some way towards creating a space for various stakeholders to reach consensus applicable to existing and new information communication technologies. The conclusion is that securing compliance with the legislation will prove to be the biggest governance challenge. Standard setting and norms will go some way to ease the need for centralised regulatory oversight

    The Inevitability of Militarization of Outer Space

    Get PDF
    At the end of the second decade of the 21st century, we witness a progressive increase of strategic importance of artificial satellites and other orbital systems, which is a consequence of the ever-accelerating development of space technologies that include weapons systems. The outer space becomes a theatre for a potential conflict. The states possessing sufficient technological potential will further develop and expand those systems, both defensive (for eliminating threats) and offensive (securing the military advantage and serving as a deterrent) to secure their current and future interests. The main argument of the paper demonstrates the necessity, from the perspective of the strong outer space sector players like the USA, Russia, China, to further develop space weapon systems and military units of space corps

    The internet and public–private governance in the European Union

    Get PDF
    The EU plays a significant role in public policy aspects of Internet governance, having created in the late 1990s the dot eu Internet Top Level Domain (TLD). This enables users to register names under a European online address label. This paper explores key public policy issues in the emergent governance system for dot eu, because it provides an interesting case of new European transnational private governance. Specifically, dot eu governance is a reconciliation resulting from a governance cultural clash between the European regulatory state and what can be described broadly as the Internet community. The EU has customised the governance of dot eu towards a public–private dispersed agencification model. The paper extends the evidence base on agencification within trans-European regulatory networks and the emergence of private transnational network governance characterised by self-regulation

    Securing The Root: A Proposal For Distributing Signing Authority

    Get PDF
    Management of the Domain Name System (DNS) root zone file is a uniquely global policy problem. For the Internet to connect everyone, the root must be coordinated and compatible. While authority over the legacy root zone file has been contentious and divisive at times, everyone agrees that the Internet should be made more secure. A newly standardized protocol, DNS Security Extensions (DNSSEC), would make the Internet's infrastructure more secure. In order to fully implement DNSSEC, the procedures for managing the DNS root must be revised. Therein lies an opportunity. In revising the root zone management procedures, we can develop a new solution that diminishes the impact of the legacy monopoly held by the U.S. government and avoids another contentious debate over unilateral U.S. control. In this paper we describe the outlines of a new system for the management of a DNSSEC-enabled root. Our proposal distributes authority over securing the root, unlike another recently suggested method, while avoiding the risks and pitfalls of an intergovernmental power sharing scheme
    • 

    corecore