Lecture 12: M.Sc. Project Overview
|
|
|
- Betty Marshall
- 10 years ago
- Views:
Transcription
1 Security for Open Distributed Systems 1 1 Prof. Sead Muftic Lecture 12: M.Sc. Project Overview Security for Cloud and Mobile Environments
2 Cloud Access Points Communication and Applications 2 User Wi-Fi App-1 Internet User CAP AAP App-2 User 3G/4G Web
3 Cloud Security Components 3 IDMS PDP CA User Wi-Fi Internet App-1 User CAP/FW SAP AAP User 3G/4G App-2 CAP/FW Cloud Access Point / Firewall SAP Security Access Point (Portal Security ) AAP Application Access Point (Cloud Portal) IDMS Identity Management PDP Policy Decision Point CA Certification Authority
4 OpenStack Architecture 4
5 Central and Portal Security s 5 Central Security Security Cloud Station Web IDMS PACS CA Smart Cards SAML / PDP Cards Station Card Auth Portal Portal Station Internet Portal Security Internet Web / Portal A-1 Internet Web PEP VPN A-2 User Cloud Station Proxy Web / Portal A-3
6 M.Sc. Projects 6 Central Security Security Central Station Web IDMS PACS CA Smart Cards SAML / PDP Cards Station Card Auth Central Security (Home Page) Group 1: Cloud Security Management (Chenchen) Sanjaya: Security istration of the OpenStack Security Platform Arunendra: Secure IDMS for Financial Transactions in a Cloud Environment Davit: Secure Web Services for istration of Cloud Security s
7 Secure Cloud Applications Mail, Web, Documents 7 Portal Security Mail / Web Portal Mail Internet Web PEP VPN Web User Portal Station Proxy Web / Portal Doc Portal Security (Home Page)
8 Secure Cloud Applications SAFE System 8 SAFE System Internet Network Customer Browser Access SAFE Web Bank IT Bank Accounts DB Customer Merchant SMS SMS Gateway SAFE Communication SAFE Payments Mobile Accounts DB GPRS GSM/3G Network System Agent System SAFE Station Credit Card Credit Card Accounts DB
9 M.Sc. Projects 9 GSM/CDMA Network Customer SAFE Wallet Portal Security Mail / Web Portal Mail Internet Web PEP VPN Web User Portal Station Proxy Web / Portal Doc Group 2: Secure Cloud Applications (Ghafoor) Bibesh: Secure Cloud Client based on Smart Cards Daniel: Secure E mail and Secure Web in a Cloud Environment Natan: Secure Files/Documents Sharing System in a Cloud Environment (Ikram: Secure SEPA Web and Smart Card Clients) Feng: (Ph.D.) Secure SoA for Financial Environments
10 Hierarchical SEPA Security System 1 0 National SEPA Nat X-BIC Nat SEPA Station BIC DB Security Card SEPA Info X-Bank Interface X-Bank Transactions X-Bank Transactions Bank SEPA Bank SEPA DB DB Web Info Web Info Bank Interface Bank Interface
11 SEPA Cloud and Portals 11 Bank SEPA Portal Security DB Portal Portal Station Web PEP VPN Bank Interface Web Info Cloud Security Cloud Station Cloud Sec Proxy Bank SEPA Portal Security DB Portal Portal Station SEPA Cloud (Home Page) Web PEP VPN Bank Interface Web Info SEPA Portal (Home Page) Proxy
12 SEPA Clients Mobile, Web and Smart Cards 1 2 Bank SEPA Portal Security DB Web Info SEPA Customer SEPA Web Wallet Web PEP VPN Bank Interface SEPA SC Wallet Cloud Sec Proxy Portal Security Bank SEPA DB SEPA Customer SEPA Mobile Wallet SEPA Merchant SEPA Mobile Merchant Web PEP VPN Bank Interface Web Info SEPA SC Wallet SEPA POS Device Proxy
13 SEPA Mobile Wallet 1 3!
14 SEPA Payment Card 1 4 Soles Movil
15 SAFE / SEPA / PIV Card and Mobile Phone 1 5 Soles Movil!
16 M.Sc. Projects 1 6 Bank SEPA Portal Security DB Web Info SEPA Customer SEPA Web Wallet Web PEP VPN Bank Interface SEPA SC Wallet Cloud Sec Proxy SEPA Customer SEPA Mobile Wallet SEPA SC Wallet SEPA Merchant SEPA Mobile Merchant SEPA POS Device Group 3: Secure Financial Transactions (Feng) Salman: Secure SEPA Financial s Hafiz: Secure SEPA Cloud and Portals Web s Ikram: Secure SEPA Web and Smart Card Clients Mohammad: Secure SEPA Mobile Clients Feng: (Ph.D.): SAFE User / Web Services
17 Secure Messages for Mobile Applications 1 7 GSM Network SMS SAFE Gateway SAFE Bank Bank IT Clear Clear Protected (RSA) SAFE to Bank Protected (RSA) Protected (AES) Wallet to Bank (AES Shared key) Protected (AES) Thin / USSD Wallet Protected (RSA) Wallet to Bank (RSA Certificates) Protected (RSA) Thick Wallet
18 Trusted Stack 1 8 Cloud 4 Secure Mobile Applications 5 3G/GPRS Network Comm Switch 6 Service Switch Service Provider 7 Internet Network 3 Security Middleware Trusted Stack 2 Applets 2 Applets Services Switches Communications 4 M Appl 1 3 Middleware 2 Applets microsd Card SIM/UICC Chip Smart Cards 1 Chip (SE)
19 Secure Managements of UICC Modules 1 9
20 M.Sc. Projects 2 0 TSM OTA 3G/GPRS Network Comm Switch Service Switch Service Provider! NFC SEPA POS Device Protected (RSA) Phone to (RSA Certificates) Protected (RSA) Group 4: Secure Mobile Transactions (Hao) Dana: Security OTA Provisioning of Mobile Applications Girmay: Security of Mobile Applications based on Smart Cards Majid: Security Services for Mobile Applications Hao: (Ph.D.) Security Aspects for UICC Modules and Applications Pasquale: (Ph.D.) Trusted Stack
21 Secure Mobile POS Applications 2 1 Merchant 2 7 Receipt 1 PoS Device 6 Payments Wi-Fi NFC 3 4 SAFE System 5 Customer SAFE Communication 4 SAFE Payments Mobile Accounts DB 5
22 Secure Mobile Medical Applications 2 2
23 Secure Mobile Commerce Applications 2 3 SAFE System Internet Network Customer Ticketing Web 1 Ticketing Messages: 1 1 Theater enters ticket into in the system Customer searches for tickets Customer orders tickets Customer pays tickets 2 Events DB Tickets DB SAFE Tickets 4 Ticketing Station GSM/CDMA Network 3 SAFE Gateway SAFE Payments Customer Accounts DB
24 M.Sc. Projects 2 4 Group 5: Secure Mobile Applications (Aron) Kazi: Security Mobile POS System Zepu: Security Mobile System for Motor Vehicles Sabina: Secure Healthcare Applications for Mobile Devices! Aron: (Ph.D.) Security System for m Commerce Environments Ioannis: (Ph.D.) Privacy and Protection of Citizens in Mobile Environments
25 Sky and Clouds Home Pages 2 5 Dimensions and Sizes 218 x x x 88 Banner Security istration
26 Sky and Clouds Home Pages 2 6 Selection of Applications Users Sky / Cloud Logo Cloud Providers SEPA SAFE Applications Healthcare Sky / Clouds Portal Banner Promotion Area Information Area Security istration News, Info, Documents Web Design Tool: CMS Made Easy
27 Portals Home Pages 2 7 Security istration istrators Security istration Platforms Identities Certificates Smart Cards Authentication Authorization Provider s Portal Group 1 Group 2 Group 3 Group 4 Function 1.1 Function 1.2 Function 1.3 Function 1.4 Forms Area Display Area Portal Logo News, Info, Documents
28 Web Services Team 2 8 Web Services Group: Secure Web Services Hafiz: Secure SEPA Cloud and Portals Web Services Template Sanjaya: Web services for OpenStack istrators Arunendra: Web services for Security Providers istrators Davit: Web services for Security Providers istrators Natan, Daniel: Web services for Secure Applications istrators and Users Salman: Web services for SEPA Financial s istrators Ikram: Web services for SEPA Web Users Feng: Web services for SAFE istrators and Users
29 SecLab Security Architecture Portal Security Central / Shared Security Provider SSP Cloud Broker and SSP Web PEP IDMS CA SAML / PDP Station SSP Auth HA Cloud Security HA Cloud Platform Cloud Mail SAFE Enterprise Cloud /Users Web PEP Virtual s Web Doc SEPA Appl s MLA Cloud Security MLA Cloud Platform Mail SAFE User Cloud /Users Web PEP Virtual s Web Doc SEPA
30 Sec Broker HP: Selection of User Applications and Sec (Portal for Central Security ) Enterprise Appl s Secure Applications Home Architecture Security Applications User Cloud Secure Cloud Secure Web Cloud Secure Documents Cloud Secure Banking Cloud Secure Mobile Create Cloud Flash Area List of standard configurations (Configure, calculate, create) Link to Secure or Public Cloud
31 Sec Broker: Create Cloud Computer (Portal for Central Security ) Create Cloud SERVER TYPE Memory Clock Disk Network OS Price -- [ ] Small 2GB [ ] 2MHz [ ] 100GB [ ] 10Mb/sec [ ] Win 2008 [ ] $ 100 [ ] Medium 3GB [ ] 3MHz [ ] 200GB [ ] 20Mb/sec [ ] Win 2008 [ ] $ 200 Enterprise [ ] Large 4GB [ ] 4MHz [ ] 400GB [ ] 50Mb/sec [ ] Win 2008 [ ] $ 300 [ ] Super 16GB [ ] 8MHz [ ] 1TB [ ] 100Mb/sec [ ] Win 2008 [ ] $ 500 [ ] High Assurance Security [ ] Medium Assurance Security [ ] Low Assurance Security (PIV Smart Cards) (Software Certificates) (Password) Create Cancel
32 Cloud s istration HP (Portal for Central Security ) Cloud s istration Enterprise Secure Cloud s (List all Virtual s created by Create Cloud and select one to administer it) Appl s Secure Applications (List all Virtual s created by Create Cloud and select one. Then list all applications on that server. Select one to administer it) After selecting Virtual (by Enterprise ) or Secure Application (by Applications ) the system will transfer Ent or Appl to the s HP or Application HP located on Portals for HA Cloud (20.77) or for MLA Cloud (16). These HP are missing, must be created by Sanjaya and Appl Developers.
33 Sec HP: Sec Providers and Selection of Clouds /Sec (Portal for Central Security ) Security Providers istration Security Providers Identities Provider PKI/Certificates SSP PIV Smart Cards PIV Authentication PIV Authorization Secure Clouds Cloud SecLab Cloud Public Clouds SecLab Cloud Secure Cloud Home Page (20.77) Public Cloud Home Page (16)
34 Secure Cloud HP /Sec (Portal for Secure Cloud) Secure Platform Secure Cloud istration Cloud End-point Services Images Tenants and users Monitoring (Log) Networking / Firewall Certificates
35 Public Cloud HP /Sec (Portal for Public Cloud) Public Platform Public Cloud istration Cloud End-point Services Images Tenants and users Monitoring (Log) Networking / Firewall Certificates
36 Cloud Secure Application /Secure_ (Secure Cloud) Secure Secure Read Write Address Book Security Inbox User Outbox Drafts Junk Trash
37 Security for Open Distributed Systems Prof. Sead Muftic Lecture 12: M.Sc. Project Overview Security for Cloud and Mobile Environments
Software and Cloud Security
1 Lecture 12: Software and Cloud Security 2 Lecture 12 : Software and Cloud Security Subjects / Topics : 1. Standard ISO/OSI security services 2. Special problems, specific for software components and
SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES
SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES Sead Muftic 1, Feng Zhang 1 1Department of Computer and System Sciences, Royal Institute of Technology, Stockholm, Sweden
CryptoNET: Security Management Protocols
CryptoNET: Security Management Protocols ABDUL GHAFOOR ABBASI, SEAD MUFTIC CoS, School of Information and Communication Technology Royal Institute of Technology Borgarfjordsgatan 15, SE-164 40, Kista,
Generic, Secure and Modular (GSM) Methodology for Design and Implementation of Secure Mobile Applications
Generic, Secure and Modular (GSM) Methodology for Design and Implementation of Secure Mobile Applications Feng Zhang 1, Ioannis Kounelis 1,2, and Sead Muftic 1 1 Communication Systems School of Information
Secure Mobile POS System
A point of sale application for secure financial transitions in a mobile business enviroment KAZI MASUM SADIQUE KTH Information and Communication Technology Master of Science Thesis Stockholm, Sweden 2013
SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service
Hosted Cloud Storage Service: Scope of Service 1. Definitions 1.1 For the purposes of this Schedule: Access Account is an End User account with Data Storage requiring authentication via a username and
Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved.
Secure your Privacy www.jrsys.com.tw CNN 2013/7/16 8:25PM Man Middle In The I got your ID/Password! Mobile Secure Secure sensitive access data Random Login Web Authentication One Secure Time Channel Password
Strong Authentication Protocol using PIV Card with Mobile Devices
KTH Information and Communication Technology Strong Authentication Protocol using PIV Card with Mobile Devices Kunning Mao KTH Royal Institute of Technology School of Information and Communication Technology
Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file
1 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 1: Introduction to Computer s Security Introduction to Computer s Security 4. security services and mechanisms 3 Approach 4 Introduction to Computer
Entrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
Page 1. Smart Card Applications. Lecture 7: Prof. Sead Muftic Matei Ciobanu Morogan. Lecture 7 : Lecture 7 : Smart Card Applications
in Open Distributed Processing s 1 in Open Distributed Processing s 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 7: 1 2 in Open Distributed Processing s 3 in Open Distributed Processing s Smart s
SAP NetWeaver AS Java
Chapter 75 Configuring SAP NetWeaver AS Java SAP NetWeaver Application Server ("AS") Java (Stack) is one of the two installation options of SAP NetWeaver AS. The other option is the ABAP Stack, which is
VMware Workspace Portal Reference Architecture
VMware Workspace Portal 2.1 TECHNICAL WHITE PAPER Table of Contents Executive Summary.... 3 Overview.... 4 Hardware Components.... 5 VMware vsphere.... 5 VMware Workspace Portal 2.1.... 5 VMware Horizon
Hosting topology SMS PASSCODE 2015
Hosting topology SMS PASSCODE 2015 Hosting Topology In a hosting environment, you have a backend and a several front end (clients). In the example below, there is a backend at the right side. At the left
HOL9449 Access Management: Secure web, mobile and cloud access
HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle
Sophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
SERVICES & CAPABILITIES
SERVICES & CAPABILITIES 2014 CAPABILITIES CASHLESS EVENT (Key benefits from this new technology) TICKETING: (Key benefits from this new technology) MEMBERSHIP DRIVES. LEAD GENERATION FACEBOOK COMMUNITY
Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day
NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in
Kaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Banking. Extending Value to Customers. KONA Banking product matrix. KONA@I is leading the next generation of payment solutions.
Smart IC Banking Banking Extending Value to Customers KONA Banking product matrix Contact - SDA Product EEPROM Java Card Type KONA Products KONA@I is leading the next generation of payment solutions Banks,
Who s Endian? www.cloudrouter.dk
Who s Endian? Endian was founded in 2003 at Appiano, Italy, by a team of experienced network specialists and Linux enthusiasts. Endian s goal and path of development are immediately clear: creating sophisticated
STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses
STATE OF NEW YORK IT Transformation Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses June 8, 2012 Appendix B Consolidated Vendor Questions with
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
Mobile Wallet Platform. Next generation mobile wallet solution
Mobile Wallet Platform Next generation mobile wallet solution Introduction to mwallet / Mobile Wallet Mobile Wallet Account is just like a Bank Account User s money lies with the Mobile Wallet Operator
Managed Security Web Portal USER GUIDE
Managed Security Web Portal USER GUIDE CONTENTS 1.0 Introduction 4 2.0 Login 4 3.0 Portal Layout 4 3.1 Home Tab 5 3.2 Web Filtering Tab 5 3.3 SSL VPN Users Tab 6 4.0 Web Filtering Administration 7 4.1
Deriving a Trusted Mobile Identity from an Existing Credential
Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile
Oracle Desktop Virtualization
Oracle Desktop Virtualization Oracle Desktop Virtualization Portfolio Oracle Desktop Virtualization Portfolio Software. Hardware. Complete. Oracle Virtual Desktop Infrastructure VDI desktops to users on
Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture
Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco
ICT budget and staffing trends in the UK
ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget
Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios
Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios Overview Citrix XenApp, XenDesktop and NetScaler are commonly used in the creation of Payment Card Industry (PCI), Data Security
Sophos Mobile Control Technical Guide. Product version: 3
Sophos Mobile Control Technical Guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...3 2 Integration...5 3 Architecture...7 4 Workflow...12 5 Directory Access...14
Using RD Gateway with Azure Multifactor Authentication
Using RD Gateway with Azure Multifactor Authentication We have a client that uses RD Gateway to allow users to access their RDS deployment from outside their corporate network. They have about 1000+ users.
Deliver Desktops as a Service! With VDI 2.0!
Deliver Desktops as a Service! With VDI 2.0! Me! About the Author! Two smart people I work with! Gartner does not endorse any vendor, product or service depicted in our research publications, and does
VPN Client User s Guide. 9235966 Issue 2
VPN Client User s Guide 9235966 Issue 2 Copyright 2004 Nokia. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
Adaptive Authentication Integration Options. John Murray Manager, RSA Systems Engineering
Adaptive Authentication Integration Options John Murray Manager, RSA Systems Engineering What is RSA Adaptive Authentication? Comprehensive authentication and fraud detection platform Powered by Risk-Based
Flash Storage Optimizing Virtual Desktop Deployments
Flash Storage Optimizing Virtual Desktop Deployments Ashok Rajagopalan UCS Product Management May 2014 In Collaboration with Intel Old Fashioned VDI (circa 2012) was Financially Unattractive to Most Average
Jrsys International Corp.
Jrsys International Corp. Advance Mobile/Cloud Security Solutions James Wu www.jrsys.com.tw Jrsys Introduction Friends from 128 countries Mobile and Cloud security solution provider Secure mobile devices:
Policy and Profile Reference Guide
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Policy and Profile Reference Guide Published: 2014-06-16 SWD-20140616165002982 Contents 1 About this guide... 10 2 New IT policy
SEPA Clients in A Secure Cloud Banking Environment IKRAM RAHIM. Master s Degree Project Stockholm, Sweden 2013. Master Thesis in Communication Systems
SEPA Clients in A Secure Cloud Banking Environment Master Thesis in Communication Systems IKRAM RAHIM Master s Degree Project Stockholm, Sweden 2013 TRITA-ICT-EX-2013:4 Acknowledgements Thanks God for
msuite5 & mdesign Installation Prerequisites
CommonTime Limited msuite5 & mdesign Installation Prerequisites Administration considerations prior to installing msuite5 and mdesign. 7/7/2011 Version 2.4 Overview... 1 msuite version... 1 SQL credentials...
iphone Softphone App for the Opera IP System Installation and user guide
iphone Softphone App for the Opera IP System Installation and user guide IPhone App Installation and Use Specifications are subject to change without notice. Facilities described may or may not be supported
Junos Pulse. Windows In-Box Junos Pulse Client Quick Start Guide. Published: 2013-10-18. Copyright 2013, Juniper Networks, Inc.
Junos Pulse Windows In-Box Junos Pulse Client Quick Start Guide Published: 2013-10-18 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All
Toward Connected Vehicle with AGL
Toward Connected Vehicle with AGL September 9 th 2015 (at the AGL All Member Meeting - 2015 Fall) Ken-ichi Murata BR Connected Strategy & Planning Toyota Motor Corporation 68% of new vehicle will be connected
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
BIG-IP Access Policy Manager Tech Note for BIG-IP Edge Client App for ios
BIG-IP Access Policy Manager Tech Note for BIG-IP Edge Client App for ios 2 OpenTopic TOC Contents What is BIG-IP Edge Client app for ios?... 3 About supported authentication types... 3 About establishing
Cloudessa AAA and Captive Portal Cloud Service
Cloudessa AAA and Captive Portal Cloud Service Key Advantages Cloudessa AAA and Captive Portal Cloud Service makes it easy for any merchant, venue, institution, or organization to provide on-site WiFi
Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management
Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management 1 Product Roadmap Disclaimer Any forward-looking indication of plans for products is preliminary and all future release
Applying Common Criteria to a cloud type payment service
1 Applying Common Criteria to a cloud type payment service Kenji Yamaya ECSEC Laboratory Inc. 2 Evaluation of a cloud system Tablet internet cloud Newly developed terminal products Mobile POS Smart Phone
Secure Over the Air (OTA) Management Of Mobile Applications
Secure Over the Air (OTA) Management Of Mobile Applications Dinakaran Rajaram KTH-Royal Institute of Technology School Of Information and Communication Technology Communication Systems Master of Science
1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010
Foundation IT Written approximately Dec 2010 1 Outlook Web Access With the new version of Exchange 2010 Outlook Anywhere has been enabled and configured with a secure socket layer (SSL) certificate from
Secure Authentication for the Development of Mobile Internet Services Critical Considerations
Secure Authentication for the Development of Mobile Internet Services Critical Considerations December 2011 V1 Mobile Internet Security Working Group, SIMalliance AGENDA SIMalliance presentation What s
idash Infrastructure to Host Sensitive Data: HIPAA Cloud Storage and Compute
integrating Data for Analysis, Anonymization, and SHaring idash Infrastructure to Host Sensitive Data: HIPAA Cloud Storage and Compute Claudiu Farcas, Antonios Koures Outline Infrastructure Overview Typical
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
Managing BlackBerry Enterprise Service 10 version 10.2
Managing BlackBerry Enterprise Service 10 version 10.2 Course details Course code 726-08882-123 Approximate duration Labs 3 days Labs are included in this course Course overview This course explains how
How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0
How to set up the HotSpot module with SmartConnect Panda GateDefender 5.0 Content Introduction... 3 Minimum requirements to enable the hotspot module... 4 Hotspot settings... 6 General settings....6 Configuring
! Context: IoT, CPS and M2M! Challenges in M2M! Evolutionary M2M the FiDM way! Focus on: ! Conclusion 2
UMR 5205 On the Integration of Federated Identity Management in M2M middleware Youakim Badr!! LIRIS Lab, SOC team! INSA-Lyon! The 3 rd Franco American Workshop On CyberSecurity, Lyon, December 9-11, 2014
Tehran Traffic Control Company. Shabnam Farahani Tehran Traffic Control Company. Farshad Jalali Tehran Traffic Control Company
Mobile Phone as a medium for Electronic Toll Collection Toward developing a virtual e-wallet Tehran Congestion Charging Experience Hojat Behrooz Tehran Traffic Control Company Shabnam Farahani Tehran Traffic
PRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
Clodoaldo Barrera Chief Technical Strategist IBM System Storage. Making a successful transition to Software Defined Storage
Clodoaldo Barrera Chief Technical Strategist IBM System Storage Making a successful transition to Software Defined Storage Open Server Summit Santa Clara Nov 2014 Data at the core of everything Data is
U.S. Department of Agriculture HSPD 12 Program. USDA HSPD-12 Implementing PIV cards @ USDA
U.S. Department of Agriculture HSPD 12 Program USDA HSPD-12 Implementing PIV cards @ USDA April 2009 USDA and the GSA HSPD-12 Shared Solution USDA has been at the forefront of driving a shared solution
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
2013 AWS Worldwide Public Sector Summit Washington, D.C.
Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company
Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network
Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network Wireless Network Names and Credentials There are two wireless networks operating at the Goldfields
Centrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
RFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
Creating a Strong Security Infrastructure for Exposing JBoss Services
Creating a Strong Security Infrastructure for Exposing JBoss Services JBoss Enterprise SOA Platform Service Clients Service Gateway Enterprise Services Blake Dournaee, Product Management, Intel SOA Products
Hosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync
CA Mobile Device Management 2014 Q1 Getting Started
CA Mobile Device Management 2014 Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Centrify Identity Service and Mac - Online Training
C E N T R I F Y D A T A S H E E T M A R C H 2015 Centrify Identity Service and Mac - Online Training Overview This course is designed for administrators of the Centrify User Suite and mobile devices. At
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
SSL VPNs: An IETF Perspective
SSL VPNs: An IETF Perspective IETF 72, Dublin Paul Hoffman, VPNC Overview Why this might be interesting Intro to SSL VPN technologies Where SSL VPNs use IETF technologies, and where they make up their
ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0
ReadyNAS Replicate Software Reference Manual 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10727-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced,
Proof of Concept Guide
Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Embracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
Master Thesis in Information and Communication Systems Security SALMAN KHAN
Master Thesis in Information and Communication Systems Security SALMAN KHAN Abstract Due to Information Technology (IT) the world has become a global village. We can get information from anywhere on a
Version 2.3. Operations Manual for Users, Agents and Merchants
SETECS SAFE System Secure Mobile Transactions System Version 2.3 Operations Manual for Users, Agents and Merchants (for Smart Phone Applications) ~~~~~~~~~~~~~~~~ December 2011 Copyright 2009 2011 SETECS
NCP Secure Enterprise Management Next Generation Network Access Technology
Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access
Quick Start Guide: Iridium GO! Advanced Portal
Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...
SVN5800 Secure Access Gateway
The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,
CIDR Range Subnet Mask 85.115.32.0/19 85.115.32.0-85.115.63.255 85.115.32.0 255.255.224.0
MAC Endpoint Technical Overview Overview Websense MAC Web Endpoint is designed to provide a seamless experience to end users for authenticating and directing traffic to the Websense Cloud Security infrastructure.
Deploying iphone and ipad Virtual Private Networks
Deploying iphone and ipad Virtual Private Networks Secure access to private corporate networks is available on iphone and ipad using established industry-standard virtual private network (VPN) protocols.
Trådløs forbindelse. Juni 2011. Peter Fuglsang Product Application Engineer Automation
Trådløs forbindelse Juni 2011 Peter Fuglsang Product Application Engineer Automation Trådløs kommunikation Definition af netværk Trådløse produkter fra Schneider Electric RTU moduler Trådløse Løsninger
FBZ General Information. Cloud Mobile Banking 13,10,14-5. Copyright FBZ 2012-2013 All rights reserved
FBZ General Information Cloud Mobile Banking 13,10,14-5 Copyright FBZ 2012-2013 All rights reserved FBZ General information Cloud Banking Copyright (c) 2012-2013 Page 1 Read this first Thank you for choosing
Cloud Store & Share Frequently Ask Questions
Cloud Store & Share Frequently Ask Questions Where can I find information about the offer, e.g. the price list? How can I order the service? What is the Cloud Store & Share Client? Where can I download
GuestAir Administrators Guide
GuestAir Administrators Guide 1. Introduction 2. Companies 3. Users 4. Zones 5. SonicWALL Configuration 6. Emails 7. User Auth Logins 8. User Registration 9. Facebook Logins 10. Editing Templates 11. File
Remote Access via VPN Configuration (May 2011)
Remote Access via VPN Configuration (May 2011) Contents Copyright...2 Important Considerations...3 Introduction...4 Supported router models... 4 Installation Topology... 4 Dynamic IP Configuration (DynDNS)...5
Your Mobile Phone as a Ticket (NFC)
Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal [email protected] Abstract.
