Security in Internet of Things using Delegation of Trust to a Provisioning Server
|
|
|
- Annabel Lewis
- 10 years ago
- Views:
Transcription
1 Security in Internet of Things using Delegation of Trust to a Provisioning Server Architecture overview Peter Waher Clayster Laboratorios Chile S.A, Blanco 1623, of. 1402, Valparaíso, Chile [email protected] Abstract. This paper proposes an architecture for open networks, such as the Internet of Things, and describes an implemented solution that allows Things with limited or no user interfaces to provide a high level of data security, by delegating trust to a trusted third party to help the device determine which users, devices or services are authorized to perform what operations on the device in a secure manner. Keywords: Internet of Things, Security, Provisioning, Authentication, Authorization. 1 Introduction One large problem in open networks is how to provide a high level of data security in the network. In closed networks of high value participants, like PCs with complex operating systems, system operators can provide security by using directory services that provide identity and privilege information to each participant in the network. But in open networks, containing small resource constrained devices, such solutions become impractical. An alternative to using a directory service in open networks has been to let each server (or service) handle authentication and authorization itself. This might work for stand-alone web servers and web applications, where rich user interfaces are available. But small resource constrained devices often have very limited human user interfaces, sometimes perhaps only a small button or a LED, if even that. Performing authentication and authorization on the device itself becomes both a complex and impractical task. Furthermore, performing authentication and authorization on the device itself, makes it difficult to reuse and propagate a user identity and privileges in a network of multiple devices, and makes distributed operations very difficult to perform in a secure manner. To avoid the aforementioned complexities of a uniform security model in an open network of resource constrained devices, some solutions go so far, as to assume any participant with access to the network is trusted to perform the operations it wants to do. Focus is given to the system operator to provide security for the network and only Security in Internet of Things using Delegation of Trust to a Provisioning Server, p. 1, Clayster Laboratorios Chile S.A 2014
2 allow access to the network to participants that are not malicious. This model may work very well in closed networks and back-end solutions, where full control of participants can be guaranteed, but for public open networks, where new participants can participate easily, such a security model quickly becomes impractical for the system operator. This paper proposes an architecture that allows resource constrained devices to delegate trust to a trusted third party, a Provisioning Server, which helps devices to decide which users, devices or services are authorized to perform what operations on the device. It also describes a solution that allows this to be performed over the public Internet using only existing, proven, open and standardized protocols and openly available extensions for maximum interoperability and scalability, and where components would be interchangeable. 2 Problem Description The problem being solved by the proposal is the following: In a public network (the Internet), how do you create user identities that are difficult to falsify for participants in the network, enforce secure user authentication, then provide authorization of who can communicate with whom, and finally when communication links are available, what operations can be performed on which device, by what user or through which service? The solution must support distributed operations and identity propagation. Furthermore, the solution must not use proprietary, but open, methods, allowing any manufacturer to share the same infrastructure if desired, promote interoperability and making sure end-users (or interested parties) can validate that used communication patterns are secure. At the same time, the solution must be simple to implement both by developers and network architects. Example: Consider a PLC with 24 outputs installed in the basement of a building with 10 apartments. How do you assure only users in the 10 apartments are allowed access to the PLC, and at the same time assure that each apartment is only allowed to read and configure the status of two distinct outputs each, while at the same time all 10 apartments can read and control the remaining four shared outputs? This, regardless of what service is used to read or control the PLC. Example: Consider an electricity meter installed in your apartment or house. Both the billing department in the Utility Company and the Energy Savings Company that helps you optimize your energy must have access to the electricity meter. But how do you assure the Utility Company is only allowed access to current and historical accumulated energy values, while the Energy Savings Company is allowed access to momentary power, so it can show you your current consumption? Since the momentary power can be used to detect if somebody is home, it might be a privacy issue who gets access to that value. Example: Competitors are forced to coexist and contractually interchange information between devices in a common network. This means competitors have access to each other s devices. How do you make sure only access to certain registers is given to the competitors, while private information is maintained confidentially?
3 3 Conceptual Architecture A Thing connects to the network by connecting to a Message Broker. The Message Broker makes sure the Thing is authenticated and provides the Thing with an Identity, which is unique within the Domain of the Message Broker. Message Brokers are then federated into a larger network, each Message Broker defined by its own domain. Communication between Message Brokers is encrypted, and Message Broker domains are validated using Domain Certificates. The Network Identity of the Thing in the federated network is the combination of the local identity on the Message Broker to which it connects, and the Domain Name of the Message Broker itself. Messaging between Things connected to different Message Brokers in the federated network is accomplished by simple message forwarding between the Brokers in the network. The Message Broker maintains a Roster of approved Friends for each Identity on the Message Broker. A Thing is only authorized to send messages to another if the other Thing has a defined Friendship. For Internet of Things, messages are then broken down into the following simple Operations that are well understood by participants in the network: Friendship request, Readout Request and Control Request. Things delegating trust to a Provisioning Server can ask the corresponding questions to the Provisioning Server, to know if the corresponding operations are allowed or not: Can be Friend? Can Read? 1 Can Control? Services in the network can also ask the Provisioning Server Has Privilege? For each question made to the Provisioning Server, the server can respond either by approving the request, denying the request or limiting the request, based on the Credentials of the request itself. Credentials can be both Network Identities, but also Tokens, issued by the Provisioning Server. The architecture allows for multiple Tokens to be used as credentials of a request, and the Provisioning Server can determine which credentials to use as a base for the response. When a response from the Provisioning Server has been received, the Thing can in turn respond correspondingly to the original request made to it. Apart from Network Identities provided to participants in the network, the architecture also provides a mechanism of providing X.509 Certificates based Identities for actors in the network not directly connected to the network, such as Users, Services and Devices. The corresponding entity provides the Public Part of the certificate to the Provisioning Server and the server returns a Token. This token is sufficiently random to be very difficult to guess, but as a string simple enough so that it can be easily propagated across the network. When an operation is performed and a token is provided as credentials, as tokens are not part of the underlying network authentication scheme, the Provisioning Server may pose a Challenge to the sender. This Challenge 1 Note that the Can Read? question to the Provisioning Server is not necessarily a consequence of a previous Read Request made by somebody. It can also be a result of the Thing itself wanting to send an asynchronous event to somebody or use the publish/subscribe pattern to publish information, etc., to make sure the recipients are entitled to receive the information that is about to be sent, and what information the recipients are entitled to.
4 can in turn be propagated back to the originator of the request. Only the holder of the Private Part of the Certificate can respond accurately on the challenge. In this way, actors in the network can make sure nobody without the correct credentials assumes the identity. To avoid making the Provisioning Server into a bottleneck in the network, Things are required to remember responses to questions posed to the Provisioning Server in a Cache. The size of this Cache and time to store items in the Cache is implementation specific, within certain limits. When changes concerning rules for a Thing are made on a Provisioning Server, the Provisioning Server can ask the Thing to simply clear the cache, as a simple way to make sure updated rules are propagated in the network in a simple way, and avoiding the complexities of maintaining an updated cache using incremental rule changes in a synchronized manner. Since rules for a Thing are not expected to be updated often during normal operation of a Thing, this is not considered to affect network load with any significant order of complexity. The Provisioning Server can also be proactive and Recommend Friendships to Things. In this way, it can connect things and indirectly create new relationships. 4 Choice of Protocol For the solution presented in this paper, XMPP [1] [2] [3] has been chosen as the transport protocol for communication in Internet of Things. Apart from being an open, flexible and extensible protocol [4] it also supports most commonly used communication patterns necessary for Internet of Things, such as request/response, asynchronous messaging and publish/subscribe 2 patterns. XMPP is based on Message Brokers to solve the security issues concerning user identities, authentication, federation, friendship relationships, and message authorization, as discussed above. It can also be used in resource constrained devices [5] [6] and supports resource constrained networks [7]. The operations discussed in this paper are defined in open extensions to XMPP: Sensor data readout is defined in XEP-0323 [8] and control of actuators in XEP-0325 [9]. XEP-0324 [10] provides an extension describing in detail the protocol used to communicate with the Provisioning Server for delegation of trust, and includes details on how to retrieve tokens, respond to challenges, ask for authorization to perform operations, etc. Other benefits of using XMPP for IoT applications include: possibility to bridge between different protocols using XEP-0326 [11], extensions of Semantic Web technologies onto XMPP networks [12] [13], secure in-band registration of new accounts using XEP-0077 [14] and XEP-0348 [15], and control the entire life cycle of Things 2 In XMPP, in comparison to MQTT, the publish/subscribe pattern allows owners of nodes (topics) to control who can subscribe to them, etc. In MQTT, a publisher cannot control who receives the information. Nor can a receiver of information make sure that the information comes from the pretended publisher, unless an additional layer of end-to-end encryption or content signatures are added.
5 using XEP-0347 [16], which includes production, installation, self-configuration, discovery, ownership, search, disowning and decommissioning of Things. Other available transport protocols lack one or the other of several important features with which XMPP helps IoT developers, whether it is unique authenticated identities that are propagated in a federated network, in-band registration in a secure way of new identities, authorization of messages, or specific communication patterns, etc. A comparison between XMPP and MQTT can be found in [17]. 5 XEP-0324 Internet of Things - Provisioning The entire protocol for communicating with a Provisioning Server is laid out in detail in XEP-0324 [10], to encourage implementation and interoperability between different manufacturers. This document describes how to delegate trust, server components vs. client-based provisioning servers, certificates, tokens, challenges, propagation of tokens, friendships, accepting/rejecting/limiting device read-outs, accepting/rejecting/limiting device control operations, cache management, services, users, privileges, determining support, multiple provisioning servers, security considerations, etc. 6 Existing Provisioning Server A Provisioning Server is available at: provisioning.thingk.me (XMPP Server at thingk.me) The Provisioning Server also hosts a Thing Registry, where Things and Owners can be securely matched according to methods defined in [16]. The URL of the provisioning web interface is: Both the Thing Registry as well as the Provisioning Server can be duplicated and hosted on small plug computers for local use, on PCs, servers or be clustered in the cloud. It is important to note that Thing Registries and Provisioning Servers are two different inventions that can either coexist or work separately of each other. 7 Reactive vs. Proactive Learning XEP-0324 [10] only specifies how Things communicate with the Provisioning Server to get information of what they can do in different situations. However, it does not specify how the Provisioning Server itself gets the information in the first place. The implementation presented here uses Reactive Learning as opposed to Proactive Learning of rules that govern the network. What does this mean? Instead of forcing
6 the user to beforehand provide possibly very complex rule information to the server, the server reacts to incoming requests and incrementally builds a knowledge database on how to respond to provisioning questions. This means that if a request is made that the Provisioning Server can respond to based information from previous input, the Provisioning Server responds accordingly. Otherwise, the Provisioning Server always responds in the negative, i.e. telling the requester the operation is not allowed. At the same time a simple atomic event is shown or sent to the owner (or operator) of the Thing that a new event has occurred and asks for guidance on how to respond to similar questions in the future. As owners respond to these simple atomic questions, the Provisioning Server incrementally updates the set of rules for the corresponding Things. This allows users to be able to configure otherwise complex networks without having advanced knowledge about the subject. An example of such an event can be seen in [18]. 8 Novel features The proposed architecture is the only IoT architecture publicly available, known to the author, which allows full authorization of Internet of Things operations across a federated network, distributed operation and configuration, including propagation of credentials to sub-operations across the network. It is designed for resource constrained devices and only uses publicly available standardized and openly extended protocols to promote interoperability that can be easily implemented by developers and used by IT architects and operators. The architecture aims for zero-configuration for operators and manufacturers, without compromising security or ease-of-use for end-users. Furthermore, the authorization mechanism does not only include accepting or rejecting of operations, but also include partial acceptance, i.e. limitations, of operations. This extended authorization mechanism is then used to provide for efficient and secure provisioning of services on-top of the network. The architecture is also scalable and can be used both in local environments such as cars, homes, offices, buildings, industry plants, etc., with local Provisioning Servers and local Message Brokers, as well as in global environments, with global Provisioning Servers connected to global Message Brokers. In all cases, there is a logical place where configuration of the network can be done by logical owners of things. The solution also supports multiple Provisioning Servers, allowing different operators to co-exist and together configure a common infrastructure. 9 About the author Clayster is a company with origin in Scandinavia, founded by Rikard Strid and Peter Waher. Clayster is dedicated to the promotion of Internet of Things technology and development of Internet of Things applications. Clayster also provides an IoT platform for rapid application development. Founder Rikard Strid currently lives in New York, USA, and apart from pro-
7 moting Internet of Things technology, is also a Cisco Champion. Co-founder, and author of this proposal, Peter Waher currently lives and works in Chile where he is CEO of Clayster Laboratorios Chile S.A., a subsidiary to Clayster that provides development expertise to partner companies and promotes Internet of Things technology to research institutions. Originally a mathematician, commercial pilot and computer games developer, he has worked twenty years with computer and device communication, including low-level development in assembler for resource constrained devices to high-level system design and architecture. He s currently participant in various standardization efforts within IEEE, IEC, ISO and XSF, working on standards for the Internet of Things. His work with Smart Applications for the Internet of Things and the development of the IP-TV application Energy Saving through Smart Applications won the Urban Living Labs global showcase award in category Cultural and Societal Participation and Collaboration Tools. Rikard Strid can be found on LinkedIn: Peter Waher can be found on LinkedIn: 10 Acknowledgements Thanks to Dr. Karin Forsell for all valuable feedback. 11 References [1] P. Saint-André, "RFC 6120: Extensible Messaging and Presence Protocol (XMPP): Core," [Online]. Available: [2] P. Saint-André, "RFC 6121: Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence," [Online]. Available: [3] P. Saint-André, "RFC 6122: Extensible Messaging and Presence Protocol (XMPP): Address Format," [Online]. Available: [4] xmpp.org, "XMPP Technology Overview," [Online]. Available: [Accessed ]. [5] R. Klauck and M. Kirsche, "Chatty Things Making the Internet of Things Readily Usable for the Masses with XMPP," [Online]. Available: cottbus.de/content/unrestricted/staff/mk/publications/collaboratecom_2012- Klauck_Kirsche.pdf. [6] M. Krische and R. Klauck, "Unify to Bridge Gaps: Bringing XMPP into the Internet of Things," [Online]. Available: cottbus.de/content/unrestricted/staff/mk/publications/percom_2012-wip- Kirsche_Klauck.pdf. [7] P. Waher and Y. DOI, "XEP-0322: Efficient XML Interchange (EXI) Format,"
8 2013. [Online]. Available: [8] P. Waher, "XEP-0323: Internet of Things Sensor Data," [Online]. Available: [9] P. Waher, "XEP-0325: Internet of Things - Control," [Online]. Available: [10] P. Waher, "XEP-0324: Internet of Things - Provisioning," [Online]. Available: [11] P. Waher, "XEP-0326: Internet of Things - Concentrators," [Online]. Available: [12] P. Waher, "XEP-0332: HTTP over XMPP transport," [Online]. Available: [13] P. Waher, "Extending the Semantic Web to Peer-to-Peer-Like Sensor Networks Based on XMPP". [14] P. Saint-Andre, "XEP-0077: In-Band Registration," [Online]. Available: [15] P. Waher, "XEP-0348: Signing Forms," [Online]. Available: [16] P. Waher and R. Klauck, "XEP-0347: Internet of Things - Discovery," [Online]. Available: [Accessed ]. [17] P. Waher, "Bridging MQTT & XMPP Internet of Things networks," [18] P. Waher, "Simple example of device readout request event in Clayster Provisioning Server," [Online]. Available: [Accessed ].
How To Bridge The Semantic Web To The Internet Of Things
Extending the Semantic Web to Peer-to-Peer-Like Sensor Networks Based on XMPP Peter Waher Clayster Laboratorios Chile S.A, Blanco 1623, of. 1402, Valparaíso, Chile [email protected] Abstract. This
XEP-0324: Internet of Things - Provisioning
XEP-0324: Internet of Things - Provisioning Peter Waher mailto:[email protected] xmpp:[email protected] http://www.linkedin.com/in/peterwaher 2015-11-09 Version 0.4 Status Type Short Name Experimental
W3C Meeting ISO/IEC/IEEE P21451-1-4
W3C Meeting ISO/IEC/IEEE P21451-1-4 1 st International Semantic Web 3.0 Standard for the Internet of Things (IoT) William J. Miller Chairman 07/22/2015 1 Internet of Things (IoT) http://www.sensei-iot.org
Introduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
XEP-0347: Internet of Things - Discovery
XEP-0347: Internet of Things - Discovery Peter Waher mailto:[email protected] xmpp:[email protected] http://www.linkedin.com/in/peterwaher Ronny Klauck mailto:[email protected]
E-Business Technologies for the Future
E-Business Technologies for the Future Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh [email protected] http://www.sis.pitt.edu/~spring Overview
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
CCN. CCNx 1.0 Internet of Things Architectural Overview. Computer Science Laboratory Networking & Distributed Systems March 2014
CCN CCNx 1.0 Internet of Things Architectural Overview Computer Science Laboratory Networking & Distributed Systems March 2014 CCN IoT Platform Accomodate multiple IoT protocols Improve performance and
On the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma [email protected] CpE 6510 3/24/2016
On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma [email protected] CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT
Configuring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
Service Virtualization: Managing Change in a Service-Oriented Architecture
Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
Short messaging solutions, including XMPP based instant messaging and text based conferences, between health care providers and general practitioners
Short messaging solutions, including XMPP based instant messaging and text based conferences, between health care providers and general practitioners Sokol Dhana One of the most challenging problems in
SOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
Service Oriented Architecture
Service Oriented Architecture Charlie Abela Department of Artificial Intelligence [email protected] Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline
Enabling REST Services with SAP PI. Michael Le [email protected] Peter Ha [email protected]
Enabling REST Services with SAP PI Michael Le [email protected] Peter Ha [email protected] Learning Points Understanding the REST architecture and concepts Understanding the differences between SOAP and
GravityLab Multimedia Inc. Windows Media Authentication Administration Guide
GravityLab Multimedia Inc. Windows Media Authentication Administration Guide Token Auth Menu GravityLab Multimedia supports two types of authentication to accommodate customers with content that requires
AquaLogic Service Bus
AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership
Fast Innovation requires Fast IT
Fast Innovation requires Fast IT 2014 Cisco and/or its affiliates. All rights reserved. 2 2014 Cisco and/or its affiliates. All rights reserved. 3 IoT World Forum Architecture Committee 2013 Cisco and/or
Frequently Asked Questions (FAQs) SIPRNet Hardware Token
Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:
Cross-domain Identity Management System for Cloud Environment
Cross-domain Identity Management System for Cloud Environment P R E S E N T E D B Y: N A Z I A A K H TA R A I S H A S A J I D M. S O H A I B FA R O O Q I T E A M L E A D : U M M E - H A B I B A T H E S
OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE
OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT,
Introduction to UDDI: Important Features and Functional Concepts
: October 2004 Organization for the Advancement of Structured Information Standards www.oasis-open.org TABLE OF CONTENTS OVERVIEW... 4 TYPICAL APPLICATIONS OF A UDDI REGISTRY... 4 A BRIEF HISTORY OF UDDI...
Technical. Overview. ~ a ~ irods version 4.x
Technical Overview ~ a ~ irods version 4.x The integrated Ru e-oriented DATA System irods is open-source, data management software that lets users: access, manage, and share data across any type or number
Cloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
USING FEDERATED AUTHENTICATION WITH M-FILES
M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication
Evolving from SCADA to IoT
Evolving from SCADA to IoT Evolving from SCADA to IoT Let s define Semantics IoT Objectives, chapters 1 and 2 Separating the hype from the reality Why IoT isn t easy An IoT roadmap & framework IoT vs.
Arrowhead Framework A Local Cloud Approach to Automation. Prof. Jerker Delsing. www.arrowhead.eu
1 Arrowhead Framework A Local Cloud Approach to Automation Prof. Jerker Delsing Luleå University of Technology Division of EISLAB Professor Jerker Delsing Arrowhead Process and energy system automation
Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya [email protected]
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya [email protected] Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
Service-Oriented Architectures
Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
IT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
Snow Agent System Pilot Deployment version
Pilot Deployment version Security policy Revision: 1.0 Authors: Per Atle Bakkevoll, Johan Gustav Bellika, Lars, Taridzo Chomutare Page 1 of 8 Date of issue 03.07.2009 Revision history: Issue Details Who
Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements
Joint White Paper: Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements Submitted Date: April 10, 2013 Submitted
How To Build An Operating Software For The Enterprise
Intel Information Technology Cloud Computing October 2009 Architecting Software as a for the Enterprise Executive Overview The reference architecture provides a proven template solution that Intel SaaS
HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity
Improving File Sharing Security: A Standards Based Approach A Xythos Software White Paper January 2, 2003 Abstract Increasing threats to enterprise networks coupled with an ever-growing dependence upon
A Unified Messaging-Based Architectural Pattern for Building Scalable Enterprise Service Bus
A Unified Messaging-Based Architectural Pattern for Building Scalable Enterprise Service Bus Karim M. Mahmoud 1,2 1 IBM, Egypt Branch Pyramids Heights Office Park, Giza, Egypt [email protected] 2 Computer
Internet of Things (IoT): A vision, architectural elements, and future directions
SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: [email protected] Table of contents Open challenges
Security of smart grid communication protocols
Security of smart grid communication protocols C-DAX is funded by the European Union's Seventh Framework Programme (FP7-ICT-2011-8) under grant agreement n 318708 Erik Poll Radboud University Nijmegen
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework
Service-Oriented Architecture and Software Engineering
-Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based
Collaborative Open Market to Place Objects at your Service
Collaborative Open Market to Place Objects at your Service D6.4.1 Marketplace integration First version Project Acronym COMPOSE Project Title Project Number 317862 Work Package WP6 Open marketplace Lead
NIST s Guide to Secure Web Services
NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:
SIF 3: A NEW BEGINNING
SIF 3: A NEW BEGINNING The SIF Implementation Specification Defines common data formats and rules of interaction and architecture, and is made up of two parts: SIF Infrastructure Implementation Specification
Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
An introduction to Cryptosoft
An introduction to Cryptosoft Seamless end-to-end data centric security for every IoT ecosystem Cryptosoft is building trust in the Internet of Things and M2M by simplifying the processes that a company
UPnP Internet of Things
UPnP Internet of Things July 2014 Keith Miller Intel Wouter van der Beek Cisco Systems, Inc. UPnP Internet of Things Task Force 2014 UPnP Forum Overview Scope Architecture Local components description
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
A Comparison of Protocols for Device Management and Software Updates
B L A C K B E R R Y M 2 M S O L U T I O N S A Comparison of Protocols for Device Management and Software Updates In the last two decades, the number of connected computing devices has grown at a staggering
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Concepts and Architecture of the Grid. Summary of Grid 2, Chapter 4
Concepts and Architecture of the Grid Summary of Grid 2, Chapter 4 Concepts of Grid Mantra: Coordinated resource sharing and problem solving in dynamic, multi-institutional virtual organizations Allows
AquaLogic ESB Design and Integration (3 Days)
www.peaksolutions.com AquaLogic ESB Design and Integration (3 Days) Audience Course Abstract Designed for developers, project leaders, IT architects and other technical individuals that need to understand
VIRGINIA DEPARTMENT OF MOTOR VEHICLES SECURITY ARCHITECTURE POLICY. 03/27/09 Version
VIRGINIA DEPARTMENT OF MOTOR VEHICLES SECURITY ARCHITECTURE POLICY 03/27/09 Version Approved April 30, 2009 Approval of Enterprise Security Architecture Policy (03/27/2009 Version) Douglas G. Mack IT Security
Enterprise effectiveness of digital certificates: Are they ready for prime-time?
Enterprise effectiveness of digital certificates: Are they ready for prime-time? by Jim Peterson As published in (IN)SECURE Magazine issue 22 (September 2009). www.insecuremag.com www.insecuremag.com 1
Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
vehicle cloud Connected vehicle cloud Under the hood
vehicle cloud Connected vehicle cloud Under the hood Connecting the vehicle opportunities around the bend bendexperience Ericsson s Connected Vehicle Cloud increases the value of car manufacturer s core
Horizontal IoT Application Development using Semantic Web Technologies
Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: [email protected] Roadmap Introduction Challenges
SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness
Interoperability Summit 2002 SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness Gavenraj Sodhi Senior Technology Analyst Provisioning
GROUPWARE. Ifeoluwa Idowu
GROUPWARE Ifeoluwa Idowu GROUPWARE What is Groupware? Definitions of Groupware Computer-based systems that support groups of people engaged in a common task (or goal) and that provide an interface to a
SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.
Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
Data Provenance. Functional Requirements Document: Developed in Response to the Data Provenance Task Force Recommendations. Version 1.
Data Provenance Functional Requirements Document: Developed in Response to the Data Provenance Task Force Recommendations Version 1.0 May 2015 Version History Version Revision Author Description of Change
Glossary of Key Terms
and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which
Literature Review Service Frameworks and Architectural Design Patterns in Web Development
Literature Review Service Frameworks and Architectural Design Patterns in Web Development Connor Patrick [email protected] Computer Science Honours University of Cape Town 15 May 2014 Abstract Organizing
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)
Research on the Model of Enterprise Application Integration with Web Services
Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business
Oracle Access Manager. An Oracle White Paper
Oracle Access Manager An Oracle White Paper NOTE: The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any
RoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
Sophisticated Common Data Environment (CDE) with BIMaaS Platform
Sophisticated Common Data Environment (CDE) with BIMaaS Platform September 2015 Contents 1. Introduction to BIMaaS Platform... 3 2. What is Common Data Environment?... 3 3. Real World Challenges without
Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems
Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System Architect, Internet of Things Group, Intel Corp Mac Devine
Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information
Direct Secure Messaging: Improving the Secure and Interoperable Exchange of Health Information Within the healthcare industry, the exchange of protected health information (PHI) is governed by regulations
De-Mail. A reliable and secure online communication platform. Armin Wappenschmidt (secunet) More information: www.de-mail.de
De-Mail A reliable and secure online communication platform Armin Wappenschmidt (secunet) More information: www.de-mail.de 1 Agenda Overview of De-Mail Implementation aspects Current status and outlook
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
SSLPost Electronic Document Signing
SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that
mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from
Technical Overview mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from Contents What is mkryptor? 1 Mkryptor VS
Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence
Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence Service Oriented Architecture SOA and Web Services John O Brien President and Executive Architect Zukeran Technologies
Web Hosting. Definition. Overview. Topics. 1. Overview of the Web
Web Hosting Definition The World Wide Web (WWW), a web of worldwide servers connected to the Internet, provides an easily used and understood method of accessing electronic content. Accessing information
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
UPnP Internet of Things Dec 2014
UPnP Internet of Things Dec 2014 Keith Miller Intel Wouter van der Beek Cisco UPnP Internet of Things Task Force 2014 UPnP Forum Overview Scope Architecture Local components description Sensor Management
Automation Systems and the IoT Industrial Internet
Automation Systems and the IoT Industrial Internet Ahmed Ismail and Wolfgang Kastner Vienna University of Technology Automation Systems Group www.auto.tuwien.ac.at {aismail, k}@auto.tuwien.ac.at Outline
Industrial Security Solutions
Industrial Security Solutions Building More Secure Environments From Enterprise to End Devices You have assets to protect. Control systems, networks and software can all help defend against security threats
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
SERVICE ORIENTED ARCHITECTURE
SERVICE ORIENTED ARCHITECTURE Introduction SOA provides an enterprise architecture that supports building connected enterprise applications to provide solutions to business problems. SOA facilitates the
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
ETSI M2M / onem2m and the need for semantics. Joerg Swetina (NEC) ([email protected])
ETSI M2M / onem2m and the need for semantics Joerg Swetina (NEC) ([email protected]) Outline of this presentation A simple picture of Machine-to-Machine (M2M) communications Where do standards apply
