130 research outputs found
Engineering a global resolution service
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1997.Includes bibliographical references (p. 99-100).by Edward C. Slottow.M.Eng
Panorama et modélisation d’identifiants pérennes pour la création d’identités de confiance
Dans le chaos informationnel actuel, les identifiants pérennes (ou PID) sont devenus primordiaux pour améliorer le référencement, l’accessibilité et la pérennité des ressources de tous types, en particulier numériques. Bien que ces identifiants soient cruciaux dans le mouvement de l’Open Science, leur nombre et leur hétérogénéité affectent leur pertinence et leur efficacité. Victimes de leur succès, bien au-delà du domaine académique ou scientifique, les identifiants pérennes se sont en effet multipliés au niveau international. Ils forment aujourd’hui une nuée d’identifiants dont il n’existe aucun aperçu global. De plus, leur allocation n’est que rarement harmonisée au niveau étatique, la Suisse ne faisant pas exception à la règle. La nature de ce projet de recherche est à la fois théorique et pratique. Il a pour objectif de produire un état de l’art des identifiants pérennes actuels, sous forme d’un panorama visuel, et de proposer une réflexion autour de la modélisation d’un service d’attribution ainsi que la création d’une véritable « identité de confiance » (Van de Sompel, Treloar 2014) au niveau national suisse. Notre panorama visuel s’articule autour de 27 identifiants pérennes, tous domaines confondus, analysés selon onze critères. Cette représentation permet une comparaison rapide et rigoureuse des identifiants actuellement disponibles. La supériorité supposée d’un PID sur un autre s’avère toute relative ; la pertinence et l’efficacité de chacun des PID dépend en effet du contexte dans lequel ils s’inscrivent et des besoins de leurs utilisateurs. Notre réflexion autour de la modélisation d’un service national d’allocation nous a amenées, dans un second temps, à décliner deux alternatives quant à l’identifiant attribué (l’ARK, d’une part, le DOI couplé avec l’ORCID, d’autre part) et à proposer une politique d’allocation de ces PID. Elle s’est confrontée aux spécificités helvétiques (langue, autonomie des cantons), rendant a priori malaisée l’implémentation d’une telle structure nationale, mais aussi aux considérations financières et de gouvernance, difficiles à appréhender dans le temps qui nous était imparti pour ce projet de recherche. Enfin, la notion d’identité de confiance et son examen dans une perspective suisse nous ont permis de souligner les acquis de l’infrastructure savante helvétique mais également ses lacunes, en particulier en termes de spécificité d’archivage et d’identification pérenne systématique et harmonisée
Handling of IP-Addresses in the Context of Remote Access
Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, GrimstadFor various reasons (e.g., security, lack of IPv4-addresses) the services in the home
smart space only use private IP addresses. This is unfortunate in the remote service
access since these addresses frequently appear in responses sent from a service in
the remote smart space (e.g., your home) to the visited smart space (e.g., your
friend’s home).The Internet Engineering Task Force (IETF) provides some solutions
and workarounds for the problem caused by NAT.
In this project, the challenge to me is to summarize the available options, rank the
options according to which one is preferred for the RA-scenario. I will come up with
my practical NAT traversal techniques by testing and gathering data on the reliability
of NAT traversal techniques since none of the existing ones seems to work well. A
demonstration of the key features will be shown in the thesis. NAT traversal
techniques apply to TCP and UDP need to be researched in advance. Handling of
peers behind all kinds of NAT need to be tested and determined for the
communication. The result of the paper will well improve the evaluation of specific
issues on NAT and the creating of an UNSAF proposal
OGC® Ocean Science Interoperability Experiment : Phase II Report
This OGC Engineering Report documents the work performed by the participants of the
Ocean Science Interoperability Experiment Phase II.This OGC Engineering Report documents the work performed by the participants of the Ocean Science Interoperability Experiment Phase II. This work is a follow-on to the OGC Oceans IE Phase 1 activity. Specifically, this IE addressed the following tasks: • Automated metadata/software installation via PUCK protocol. • Offering of complex systems (e.g. observations systems containing other systems) such as collection of stations. • Linking data from SOS to out-of-band offerings. • Semantic Registry and Services. • Catalogue Service-Web Registry. • IEEE-1451/OGC-SWE harmonization As a result of this experiment, a number of recommendations and conclusions were identified.Postprint (published version
Segurança e privacidade em terminologia de rede
Security and Privacy are now at the forefront of modern concerns, and drive
a significant part of the debate on digital society. One particular aspect that
holds significant bearing in these two topics is the naming of resources in the
network, because it directly impacts how networks work, but also affects how
security mechanisms are implemented and what are the privacy implications
of metadata disclosure. This issue is further exacerbated by interoperability
mechanisms that imply this information is increasingly available regardless of
the intended scope.
This work focuses on the implications of naming with regards to security and
privacy in namespaces used in network protocols. In particular on the imple-
mentation of solutions that provide additional security through naming policies
or increase privacy. To achieve this, different techniques are used to either
embed security information in existing namespaces or to minimise privacy ex-
posure. The former allows bootstraping secure transport protocols on top of
insecure discovery protocols, while the later introduces privacy policies as part
of name assignment and resolution.
The main vehicle for implementation of these solutions are general purpose
protocols and services, however there is a strong parallel with ongoing re-
search topics that leverage name resolution systems for interoperability such
as the Internet of Things (IoT) and Information Centric Networks (ICN), where
these approaches are also applicable.Segurança e Privacidade são dois topicos que marcam a agenda na discus-
sĂŁo sobre a sociedade digital. Um aspecto particularmente subtil nesta dis-
cussĂŁo Ă© a forma como atribuĂmos nomes a recursos na rede, uma escolha
com consequências práticas no funcionamento dos diferentes protocols de
rede, na forma como se implementam diferentes mecanismos de segurança
e na privacidade das várias partes envolvidas. Este problema torna-se ainda
mais significativo quando se considera que, para promover a interoperabili-
dade entre diferentes redes, mecanismos autónomos tornam esta informação
acessĂvel em contextos que vĂŁo para lá do que era pretendido.
Esta tese foca-se nas consequĂŞncias de diferentes polĂticas de atribuição de
nomes no contexto de diferentes protocols de rede, para efeitos de segurança
e privacidade. Com base no estudo deste problema, são propostas soluções
que, atravĂ©s de diferentes polĂticas de atribuição de nomes, permitem introdu-
zir mecanismos de segurança adicionais ou mitigar problemas de privacidade
em diferentes protocolos. Isto resulta na implementação de mecanismos de
segurança sobre protocolos de descoberta inseguros, assim como na intro-
dução de mecanismos de atribuiçao e resolução de nomes que se focam na
protecçao da privacidade.
O principal veĂculo para a implementação destas soluções Ă© atravĂ©s de ser-
viços e protocolos de rede de uso geral. No entanto, a aplicabilidade destas
soluções extende-se também a outros tópicos de investigação que recorrem
a mecanismos de resolução de nomes para implementar soluções de intero-
perabilidade, nomedamente a Internet das Coisas (IoT) e redes centradas na
informação (ICN).Programa Doutoral em Informátic
- …