130 research outputs found

    Governance in Namespaces

    Get PDF

    Engineering a global resolution service

    Get PDF
    Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1997.Includes bibliographical references (p. 99-100).by Edward C. Slottow.M.Eng

    Panorama et modélisation d’identifiants pérennes pour la création d’identités de confiance

    Get PDF
    Dans le chaos informationnel actuel, les identifiants pérennes (ou PID) sont devenus primordiaux pour améliorer le référencement, l’accessibilité et la pérennité des ressources de tous types, en particulier numériques. Bien que ces identifiants soient cruciaux dans le mouvement de l’Open Science, leur nombre et leur hétérogénéité affectent leur pertinence et leur efficacité. Victimes de leur succès, bien au-delà du domaine académique ou scientifique, les identifiants pérennes se sont en effet multipliés au niveau international. Ils forment aujourd’hui une nuée d’identifiants dont il n’existe aucun aperçu global. De plus, leur allocation n’est que rarement harmonisée au niveau étatique, la Suisse ne faisant pas exception à la règle. La nature de ce projet de recherche est à la fois théorique et pratique. Il a pour objectif de produire un état de l’art des identifiants pérennes actuels, sous forme d’un panorama visuel, et de proposer une réflexion autour de la modélisation d’un service d’attribution ainsi que la création d’une véritable « identité de confiance » (Van de Sompel, Treloar 2014) au niveau national suisse. Notre panorama visuel s’articule autour de 27 identifiants pérennes, tous domaines confondus, analysés selon onze critères. Cette représentation permet une comparaison rapide et rigoureuse des identifiants actuellement disponibles. La supériorité supposée d’un PID sur un autre s’avère toute relative ; la pertinence et l’efficacité de chacun des PID dépend en effet du contexte dans lequel ils s’inscrivent et des besoins de leurs utilisateurs. Notre réflexion autour de la modélisation d’un service national d’allocation nous a amenées, dans un second temps, à décliner deux alternatives quant à l’identifiant attribué (l’ARK, d’une part, le DOI couplé avec l’ORCID, d’autre part) et à proposer une politique d’allocation de ces PID. Elle s’est confrontée aux spécificités helvétiques (langue, autonomie des cantons), rendant a priori malaisée l’implémentation d’une telle structure nationale, mais aussi aux considérations financières et de gouvernance, difficiles à appréhender dans le temps qui nous était imparti pour ce projet de recherche. Enfin, la notion d’identité de confiance et son examen dans une perspective suisse nous ont permis de souligner les acquis de l’infrastructure savante helvétique mais également ses lacunes, en particulier en termes de spécificité d’archivage et d’identification pérenne systématique et harmonisée

    Handling of IP-Addresses in the Context of Remote Access

    Get PDF
    Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, GrimstadFor various reasons (e.g., security, lack of IPv4-addresses) the services in the home smart space only use private IP addresses. This is unfortunate in the remote service access since these addresses frequently appear in responses sent from a service in the remote smart space (e.g., your home) to the visited smart space (e.g., your friend’s home).The Internet Engineering Task Force (IETF) provides some solutions and workarounds for the problem caused by NAT. In this project, the challenge to me is to summarize the available options, rank the options according to which one is preferred for the RA-scenario. I will come up with my practical NAT traversal techniques by testing and gathering data on the reliability of NAT traversal techniques since none of the existing ones seems to work well. A demonstration of the key features will be shown in the thesis. NAT traversal techniques apply to TCP and UDP need to be researched in advance. Handling of peers behind all kinds of NAT need to be tested and determined for the communication. The result of the paper will well improve the evaluation of specific issues on NAT and the creating of an UNSAF proposal

    OGC® Ocean Science Interoperability Experiment : Phase II Report

    Get PDF
    This OGC Engineering Report documents the work performed by the participants of the Ocean Science Interoperability Experiment Phase II.This OGC Engineering Report documents the work performed by the participants of the Ocean Science Interoperability Experiment Phase II. This work is a follow-on to the OGC Oceans IE Phase 1 activity. Specifically, this IE addressed the following tasks: • Automated metadata/software installation via PUCK protocol. • Offering of complex systems (e.g. observations systems containing other systems) such as collection of stations. • Linking data from SOS to out-of-band offerings. • Semantic Registry and Services. • Catalogue Service-Web Registry. • IEEE-1451/OGC-SWE harmonization As a result of this experiment, a number of recommendations and conclusions were identified.Postprint (published version

    Segurança e privacidade em terminologia de rede

    Get PDF
    Security and Privacy are now at the forefront of modern concerns, and drive a significant part of the debate on digital society. One particular aspect that holds significant bearing in these two topics is the naming of resources in the network, because it directly impacts how networks work, but also affects how security mechanisms are implemented and what are the privacy implications of metadata disclosure. This issue is further exacerbated by interoperability mechanisms that imply this information is increasingly available regardless of the intended scope. This work focuses on the implications of naming with regards to security and privacy in namespaces used in network protocols. In particular on the imple- mentation of solutions that provide additional security through naming policies or increase privacy. To achieve this, different techniques are used to either embed security information in existing namespaces or to minimise privacy ex- posure. The former allows bootstraping secure transport protocols on top of insecure discovery protocols, while the later introduces privacy policies as part of name assignment and resolution. The main vehicle for implementation of these solutions are general purpose protocols and services, however there is a strong parallel with ongoing re- search topics that leverage name resolution systems for interoperability such as the Internet of Things (IoT) and Information Centric Networks (ICN), where these approaches are also applicable.Segurança e Privacidade são dois topicos que marcam a agenda na discus- são sobre a sociedade digital. Um aspecto particularmente subtil nesta dis- cussão é a forma como atribuímos nomes a recursos na rede, uma escolha com consequências práticas no funcionamento dos diferentes protocols de rede, na forma como se implementam diferentes mecanismos de segurança e na privacidade das várias partes envolvidas. Este problema torna-se ainda mais significativo quando se considera que, para promover a interoperabili- dade entre diferentes redes, mecanismos autónomos tornam esta informação acessível em contextos que vão para lá do que era pretendido. Esta tese foca-se nas consequências de diferentes políticas de atribuição de nomes no contexto de diferentes protocols de rede, para efeitos de segurança e privacidade. Com base no estudo deste problema, são propostas soluções que, através de diferentes políticas de atribuição de nomes, permitem introdu- zir mecanismos de segurança adicionais ou mitigar problemas de privacidade em diferentes protocolos. Isto resulta na implementação de mecanismos de segurança sobre protocolos de descoberta inseguros, assim como na intro- dução de mecanismos de atribuiçao e resolução de nomes que se focam na protecçao da privacidade. O principal veículo para a implementação destas soluções é através de ser- viços e protocolos de rede de uso geral. No entanto, a aplicabilidade destas soluções extende-se também a outros tópicos de investigação que recorrem a mecanismos de resolução de nomes para implementar soluções de intero- perabilidade, nomedamente a Internet das Coisas (IoT) e redes centradas na informação (ICN).Programa Doutoral em Informátic

    Designing a Federated Testbed as a Distributed System

    Full text link
    • …
    corecore