LifeSocial A P2P-based Online Social Network

Size: px
Start display at page:

Download "LifeSocial A P2P-based Online Social Network"

Transcription

1 LifeSocial A P2P-based Online Social Network Project Group A Distributed Framework for Social Networks UPB SS2011 PG-Framework Lecture-05 LifeSocial-a-P2P-based-OSN.ppt Dr.-Ing. Kalman Graffi graffi@mail.upb.de Fachgruppe Theorie verteilter Systeme Fakultät für Elektrotechnik, Informatik und Mathematik Universität Paderborn Fürstenallee 11, D Paderborn, Deutschland Tel , Fax

2 Overview 1 Online Social Networks 2 Motivation for a Peer-to-Peer Approach 2.1 Decentral OSNs 2.2 Safebook 3 LifeSocial 3.1 Requirements for a DHT-based OSN 3.2 Architecture Details of LifeSocial 3.3 LifeSocial Plugin Overview 3.4 Peer and Plugin Communcation Principles 3.5 FreePastry and PAST 3.6 Security 3.7 Practical Distributed Access Control 3.8 Deletion of Data 3.9 Architecture Component: Dispatcher 3.10 Architecture Component: Cache 3.11 Plugin Examples 4 Further Research Challenges Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 2

3 1 Online Social Networks What are Online Social Networks technically? Web-based applications (StudiVZ, Facebook, MySpace, Xing) Provide different services for community members Personal information and photos Events Games Plugin architecture Friends Social interaction Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 3

4 Goals and Motivations Users want System providers want Storing and searching for content Profiles, friend lists, Pictures, shared Wall editing, User to user interaction Chatting, VoIP, Games Security Access control on their data Secure, confidential communication High profit Many users Personalized advertisements Low operational costs For servers, electricity, cooling For personnel, legal issues Controlled Quality of Service To attract and keep users Providing reliable, high quality services Fun! Money! Can the requirements be implemented decentrally? Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 4

5 Centrally hosted OSNs Web-based solution Centrally hosted data Benefits for the provider Data used for marketing Issues Costs / scalability Trust in provider You cannot delete your account, only deactivate (Facebook) Limited application scope No real user-to-user interaction Wide community focus Must share information with the world Although only meant for family Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 5

6 2 Motivation for a Peer-to-Peer Approach Online social networks are very popular Need for decentralization Host your own community and more security Keep control of your data and cooler applications Supporting real-time interaction Server Capacity Consumer PC Capacity (PCs sold since 2008) Resources are available and powerful Can we build a P2P-based online social network? P2P ~ paradigm using only the user devices to create infrastructures Are the public research results useable? Are they combinable? Is the quality still good? Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 6

7 Peer-to-Peer Applications Many legitimate peer-to-peer applications illegal file sharing Source: Above logos copied from the respective web page Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 7

8 2.1 Decentral OSNs Trends Freedom from providers - decentralization Put privacy first - security Distributed OSNs Federation of private webservers Store your data on trusted friends BUT: do you have a webserver? Functionality Friend-of-a-friend Data-centric, similar to yellow pages HelloWorld Not existent anymore Diaspora Great marketing, $ for a promise Buggy and bad code Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 8

9 2.2 Safebook Developed at Eurecom & TU-Darmstadt Main idea: Use only friends in overlay Results in some security Main issue: Performance Requires large friend base per user See upcoming seminar talk Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 9

10 3 LifeSocial History Aiming at applicable results in p2p research Some lessons learned Build a running version first Improve later Goal Facebook-like user experience Basis functionality extendible through plugins Data-centric (profiles) and user-to-user (chat,video) interaction BUT: security guarantees Operator view Completely p2p-based BUT: with quality of service control and guarantees Research New application leads to new requirements New requirements to new results See: K. Graffi et al., A Distributed Platform for Multimedia Online Communities, In: Dr.-Ing. IEEE Kalman ISM 08, Graffi, LCN 09, FG P2P 10, Theorie CCNC verteilter 11 Systeme 10

11 User View: Rich Functionality Wide set of functionality Plugin-based application: Profile, Login, Friends, Groups, Mails, Photos, Chat, Whiteboard, Calendar Flexible GUI GUI-Framework like in Eclipse Fast and user-friendly performance See: K. Graffi et al., LifeSocial.KOM: A P2P-based Platform for Secure Online Social Dr.-Ing. Networks, KalmanIn: Graffi, IEEE FG P2P 10, Theorie 2010verteilter Systeme 11

12 Provider View: Monitoring and Management Monitoring and managing global system statistics See: K. Graffi et al., Monitoring and Management of Structured Peer-to-Peer Systems Dr.-Ing. In: IEEE Kalman P2P 09, Graffi, FG Theorie verteilter Systeme 12

13 3.1 Requirements for a DHT-based OSN Functionality Like Facebook Extendible through plugins Different to typical p2p applications Platform to host a wide set of applications General platform Core functionality as a basis Communication patterns? Extendible out of the box App-functionality, app-market? Data access patterns Read: Independent whether friends are online Write: create new content Update: update previous data Consistently for all copies of the data Delete: securely remove data Community-enforced deletion of illegal content See upcoming seminar talk Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 13

14 Requirements for a DHT-based OSN Suitable distributed data structures Supporting a wide range of apps Heterogeneous peer capacities and data access patterns Security Root of trust, user authentication Confidential, integer, auth. communication Access control: read/write/delete rights How to address attackers Controlled Quality of Service Guarantees on system behavior? Response time, availability Self-adaptive behavior Several hands-on challenges How to implement Various search mechanisms Bootstrapping, NAT-handling An extendible graphical user interface See upcoming seminar talk Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 14

15 3.2 Architecture Details of LifeSocial GUI Framework: Extendable and flexible Provides an interface to the Plugins Plugins: Functionality of online social networks (and more) Easy Plugin-to-Plugin communication Over shared storage Over Plugin ID based messaging Information Cache: Enables the Plugins to reuse the data Hides the asynchronous effects of distributed data storage Monitoring and Management: Provides statistics on system behavior Enables the provider to control the service quality Secure Message Dispatcher: Provides secure, low-delay Plugin-to-Plugin communication Integrate offline messaging feature Secure Storage Dispatcher + access control: Storage and retrieval of data objects (PAST) Replicates data and guarantees their availability Structured Peer-to-Peer Overlay Connects the nodes and enables inter-peer communication Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 15

16 3.3 LifeSocial Plugin Overview Everything is a Plugin Stand-alone applications (apps) Implement OSN functionality (and more) Mandatory or optional Building blocks combinable Communicate over storage messages Traditional OSN functionality Login, Profile, Friends, Groups, Search, Photos, Messages, Chat Extended OSN functionality Multi-chat, Whiteboard, Calendar, Tweets Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 16

17 Plugins Extendability Plugins are OSGI-based See seminar paper Can be loaded on runtime on demand Version updates over the Internet possible Idea: Plugin-Store hosting new Plugins Rapid application development Plugin interfaces are open and combinable Allows for Unix-style reuse of components Core functions and GUI separated Interfaces See upcoming seminar talk OSGi Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 17

18 3.4 Peer and Plugin Communcation Principles Two plugins communicate via messaging Addressing: Peer-ID Routing in DHT Plugin-ID in the Peer Analogous to IP / Port Applications Chatting Playing Streaming Audio Video PluginID PluginID Peer ID Peer ID Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 18

19 Peer and Plugin Communcation Principles Two plugins communicate via storage Common storage in DHT Store under ObjectID Retrieve from ObjectID Applications Profile Personal wall Modifiable friend list Photo album Calendar Peer ID PluginID PluginID Peer ID DHT Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 19

20 3.5 FreePastry and PAST FreePastry based on Pastry, DHT Documents are mapped to peers Every ObjectID has a responsible peer Contacted by document owners and requesters FreePastry routes to responsible peer Add-on PAST manages the data replication Node 1008 queries item 3000 Responsible peer found Principle of ID-based routing Use shortcuts/fingers Responsible for Responsible for Responsible for Plugin-to-Plugin communication PluginID based messaging Send message to PeerID Header information: PluginID Shared storage Distributed storage Additional fine-grained access control Example data object Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 20

21 Building Storage Keys: Two Rules To be able to store/lookup data Associated with a user Use user identifier (user name) To build the storage key To be able to store/lookup data Associated with certain known criteria Use criteria value to build the storage key To avoid key collisions Use Plugin identifiers or/and known keywords to build storage keys Storage key = hash( address + pluginid) Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 21

22 Distributed Linked List Example Photo Plugin: 1. Albums 2. Images Albums contain a collection of images. Distributed Linked List: 1. Every single image is stored separately 2. Album objects hold a list of storage keys of the images 3. An object holds a list of storage keys of the albums High granularity of stored objects Better load balancing of the resources. See upcoming seminar talk Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 22

23 Positioning in the Network Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 23

24 PAST - Replication Provides a read / write access Write Object under a specific ObjectID Read Object und ObjectID Replication Automatic replication of data on 5 closest peers in leaf set Observes peer joins/leaves see Key-based Routing (KBR) Interface Adaptation in LifeSocial Modify data (before: write-once) Retrieve data Modify Write under same ObjectID Still some drawbacks! See upcoming seminar talk Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 24

25 Deletion of Documents Originally not supported by PAST Approach in LifeSocial Overwrite with tombstone object Tombstone object is replicated Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 25

26 3.6 Security Root of Trust Username and passphrase private key Deduce private/public key at any PC NodeID = UserID = public key Buddy List List of friends s UserIDs Checked if online during login Secure communication Confidential, integer, authenticated Encrypt every message with NodeID (=PubKey) of addressed peer Requirements for access control No unauthorized user can read content Author is authenticated Content integrity can be checked False authorship can be rejected Data objects should be signed Data object must be replicable Replication Multiple storage of the same content Find copy to read Find all copies to write consistently Replication independent of security Efficient mechanisms usable See upcoming seminar talk Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 26

27 Used Keys Asymmetric Key pair for signing and encryption 2048 bit RSA-Key serves the purpose Symmetric Needed for item encryption 128 bit AES-Key Storage Local storage for later reusage Java KeyStore secures keys with password Quick access to keys The Public Key Infrastructure User-/NodeId String representation of users public key Enlarge Id-range of FreePastry Public key available for everyone Trust must be obtained individually Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 27

28 Evaluation - Data Overhead Message Increasing message size does not affect overhead Constant overhead because of wrapping class Less than 2 kb acceptable, especially for large messages Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 28

29 Evaluation - Time Overhead Message Encryption and decryption time are independent from message size Most time must be needed for administrative processes Obtaining keys, building CryptedItem Initially obtaining public key from network 300ms! Therefore local storage of public keys unavoidable Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 29

30 1extract 3.7 Practical Distributed Access Control Step 1: PeerID = UserID = PublicKey SharedItem objectid Header 3 [userid A] = Pub User A = f(username, passphrase) Privileged users Payload userids are public keys [userid B] = Pub User B Step 2: wrap symmetric key with public key 4 Attach enc. keys to data object Serialized and encrypted with symmetic key 2 Signed CryptedItem objectid Key list 5 Symmetric Key Encrpyted with Pub User A Byte array containing encrypted SharedItem userid A key A userid B key B userid C key C Signature Symmetric Key Encrpyted with Pub User B See: K. Graffi et al. (Norwegian Information Security Lab) Practical Security in P2P-based Dr.-Ing. Social Kalman Networks, Graffi, FG In: Theorie IEEE LCN 09 verteilter Systeme 30

31 Evaluation - Data Overhead Shared Item Overhead depends on number of privileged users Each additional privileged user causes data overhead of about 413 bytes Comes from added userids and wrapped keys to the key list Much more overhead than in message encryption but acceptable Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 31

32 Evaluation - Time Overhead SharedItem Encryption time rises linear with number of privileged users Key wrapping time per user = 0.36 ms Decryption time constant because only one key has to be unwrapped Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 32

33 3.8 Deletion of Data Deletion is essential To control own data Delete unwanted private data Several approaches feasible Good: Independent of replication Replication can be improved Bindings are to be avoided Idea: Tombstone objects Empty data elements With timestamp Overwrite old data Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 33

34 Deletion of Illegal Content Note: Not implemented in LifeSocial Idea: Community-based decision For a quorum of read-enabled peers Quorum may decide on validity of content (picture) Secured decision: If to delete: Take somehow influence on replication Danger of misuse by attackers Quorum: multicast group SCRIBE: Extension of FreePastry To create and manage multicast groups Allows to send messages to all group members Multicast is also useful for other purposes Group chat Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 34

35 3.9 Architecture Component: Dispatcher Message Dispatcher Sort incoming messages by PluginID Attach appropriate headers to sent messages Storage Dispatcher Handles storage access Decouples from overlay events Asynchronous storage access Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 35

36 3.10 Architecture Component: Cache Information Cache stores Incoming messages (under PluginID) Requested ObjectIDs (under ObjectID) Also for outgoing data/messages Help for Plugins Plugins pick the required objects Anytime as often as needed Like: Cache.get(ObjectID) Instant results Possible states: Available: Object is returned Pending: Object will come soon Lookup process still ongoing Fail: Object not available Timeout occured Plugins may react instantly Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 36

37 3.11 Plugin Examples Profile-Plugin Functions Register (create new profile data) Change a profile field Get profile item Write current profile item Profile Item Created while registration One specific data item Personal information Picture ID of Profile Item Hash of concatenation of Username Profile-Plugin ProfileItemToken Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 37

38 Friends Plugin Friends-Plugin Functions: Send and receive friend requests Based on UserID Queued in open requests list Accept or decline friend request Check for undelivered messages Get friends list item to UserID Friends-List Item ID Hash of concatenation of Username Friend-Plugin FriendsItemToken Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 38

39 Groups Plugin Functions: Create group Join and leave group Send (and receive) messages to all group members They are stored in a specific message queue (for the Groups-Plugin) Check for undelivered messages Show all groups of a user Get Groups-list Item to UserID Show all users of a group Get Groups-Item to Group-ID Group ID Hash of concatenation of Groups-Plugins Group-Name Groups-List ID Hash: Username + Groups-Plugin + GroupsItemToken Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 39

40 Messaging and Chat- Plugin functionality (messaging) Data items: Inbox and Outbox Send message to UserID List of messages Append message in User s inbox Get Inbox Item, get Outbox Item message 1 message 2 Message 3 Check for undelivered messages Delete message entries Offline messaging Approach for undelivered messages Destined to Plugins Put them in Message Queue Peer ID PluginID PluginID Peer ID Peer ID PluginID DHT PluginID Peer ID Retrieve when online again Chat Plugin Functions Send message to UserID:PluginID Specific PluginID to be used Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 40

41 Essential Distributed List Operations Useful, but not implemented in Lifesocial Append list entry Add new entry to a List-Item ListItem identified by ObjectID Add Entry write permission without ability to modify previous entries Useful for messaging, friend lists, group lists Delete list entry Delete previously set entry Previous authorship required Useful for group lists, multicast groups Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 41

42 Screenshots Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 42

43 Screenshots Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 43

44 Screenshots Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 44

45 4 Further Research Challenges No p2p framework as such Limited functionality Untested and incomplete Like in real software projects No clear interfaces But in OSGi: interfaces defined Interfaces unclear Clear separation of functionality Allows to improve individual solutions Allows to build more advanced solutions A good starting point Many components already available It runs and can be tested (in small) Some bugs, but well documented Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 45

46 Challenges: Testing and Monitoring Monitoring and Management Integrated monitoring solution Implement a distributed control loop Self-learning and calibrating How to secure control signals? Integrated testing facility How to test large scale networks What kind of workload to induce? Which metrics to measure? Support for heterogeneity Data access patterns are heterogeneous Peer capacities are heterogeneous Most solutions assume homogeneity Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 46

47 Challenges: Security Storage and replication attacks (Joining) attackers may be responsible for crucial data in DHT Attacks on: read/write/delete Routing challenges Malicious nodes may attack routing Colluding malicious nodes? Compatible with current Routing? Accounting in DHT Introduce accounting and billing for premium services Get money for clicking ads Pay money for using specific apps How to setup a secure distributed approach? Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 47

48 Challenges: Usability and new Plugins Finalization of the framework Which functionality to provide? Functionality to be tested Dummy programs and good documentation New / improved Plugins Showing the power of the framework Best if several basic-functions are combined Example: Wiki? Video-Chat? Game? Graphical user interface General toolset of visualizations How to manage internal information flows? Pull-based, Push-based? Impressive visualization of Plugins Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 48

49 Challenges: Marketing and Licenses Out of the box Usability Easy to install Pre-created set of bundles Licensing issue GUI and Website to follow Corporate Identity Look and feel of the social network Target group-specific: logos, flyers, advertisment Launching of press releases Licensing Which libraries are used? Which one to take for the P2P Framework? Maintenance Proper documentation Website representation / group pictures Community building Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 49

50 Questions?? Dr.-Ing. Kalman Graffi, FG Theorie verteilter Systeme 50

Distributed Framework for Social Networks

Distributed Framework for Social Networks Distributed Framework for Social Networks Dr.-Ing. Kalman Graffi graffi@mail.upb.de Tel. +49 5251 606730 Fachgebiet Multimedia Kommunikation Prof. Dr. Christian Scheideler Fakultät für Elektrotechnik,

More information

Peer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf

Peer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems Chapter 13 Online Social Networks Introduction to Online Social Networks

More information

Online Social Networks and Network Layers

Online Social Networks and Network Layers Online Social Networks and Network Layers Lecture for the Project Group A Distributed Framework for Social Networks UPB SS2011 PG-Framework Lecture-01 Online-Social-Networks-Network-Layer.ppt Dr.-Ing.

More information

Healthy P2P Systems Overview

Healthy P2P Systems Overview Monitoring and Management of Peer-to-Peer Systems Project Group A Distributed Framework for Social Networks www.p2pframework.com UPB SS2011 PG-Framework Lecture-04 Monitoring-and-Management.ppt Dr.-Ing.

More information

Final Year Project Interim Report

Final Year Project Interim Report 2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)

More information

P2P Characteristics and Applications

P2P Characteristics and Applications P2P Characteristics and Applications Lecture for the Project Group A Distributed Framework for Social Networks Dr.-Ing. Kalman Graffi Email: graffi@mail.upb.de Fachgruppe Theorie verteilter Systeme Fakultät

More information

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

Bit Chat: A Peer-to-Peer Instant Messenger

Bit Chat: A Peer-to-Peer Instant Messenger Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare shreyas@technitium.com https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one

More information

Project Group NODES - Offering Dynamics to Emerging Structures www.peerfact.org

Project Group NODES - Offering Dynamics to Emerging Structures www.peerfact.org PeerfactSim: A Simulation Framework for Peer-to-Peer Systems (and more) Project Group NODES - Offering Dynamics to Emerging Structures www.peerfact.org UPB SS2011 PG-Nodes Lecture-06 P2P-Simulations.ppt

More information

Peer-to-Peer Systems: "A Shared Social Network"

Peer-to-Peer Systems: A Shared Social Network Peer-to-Peer Systems: "A Shared Social Network" Nguyen Hoang Anh Helsinki University of Technology hanguyen@cc.hut.fi Abstract In the last few years, the success of the Napster online music sharing program

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan

VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s

More information

Lawful Interception in P2Pbased

Lawful Interception in P2Pbased Lawful Interception in P2Pbased VoIP Systems Jan Seedorf (jan.seedorf_at_nw.neclab.eu) NEC Laboratories Europe Heidelberg, Germany July Page 2008 1-1 IPTCOMM 2008 Heidelberg, Germany Outline 1.

More information

Identity Theft Protection in Structured Overlays

Identity Theft Protection in Structured Overlays Identity Theft Protection in Structured Overlays Lakshmi Ganesh Ben Y. Zhao University of California, Santa Barbara NPSec 2005 Background: Structured Overlays network abstraction IDs, not IPs app level

More information

Problems in Diaspora: A Distributed Social Network

Problems in Diaspora: A Distributed Social Network Problems in Diaspora: A Distributed Social Network Yousra Javed yjaved@uncc.edu ABSTRACT Recently, the notion of distributed social network has been introduced to address the limitations of centralized

More information

Facebook Smart Card FB 121211_1800

Facebook Smart Card FB 121211_1800 Facebook Smart Card FB 121211_1800 Social Networks - Do s and Don ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any

More information

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY) E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

NAT TCP SIP ALG Support

NAT TCP SIP ALG Support The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the

More information

Journal of Electronic Banking Systems

Journal of Electronic Banking Systems Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative

More information

An apparatus for P2P classification in Netflow traces

An apparatus for P2P classification in Netflow traces An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA

More information

RELOAD Usages for P2P Data Storage and Discovery

RELOAD Usages for P2P Data Storage and Discovery RELOAD Usages for P2P Data Storage and Discovery AW2-presentation from Alexander Knauf Alexander.Knauf@Haw-Hamburg.de Review Infrastructure Independent Conferencing: Decentralized fashion Multiple conference

More information

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the

More information

Implementation of Botcatch for Identifying Bot Infected Hosts

Implementation of Botcatch for Identifying Bot Infected Hosts Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus

More information

Webmail Using the Hush Encryption Engine

Webmail Using the Hush Encryption Engine Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5

More information

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered

More information

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching 2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

Security in Android apps

Security in Android apps Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Administration Guide

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Administration Guide BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Administration Guide Published: 2010-06-16 SWDT487521-1041691-0616023638-001 Contents 1 Overview: BlackBerry Enterprise

More information

Using Avaya Flare Experience for Windows

Using Avaya Flare Experience for Windows Using Avaya Flare Experience for Windows Release 9.0 Issue 02.01 September 2013 Contents Chapter 1: About Flare Experience... 5 About Flare Experience... 5 Main window... 6 Button descriptions... 10 Chapter

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Distributed and Secure Social Network Mobile Application with Id-based crypto and Cloud storage service. Tien Dat Le

Distributed and Secure Social Network Mobile Application with Id-based crypto and Cloud storage service. Tien Dat Le Distributed and Secure Social Network Mobile Application with Id-based crypto and Cloud storage service Tien Dat Le Outline Introduction Contribution Methodology Implementation Evaluation Conclusion Future

More information

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks

More information

P2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung

P2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung P2P Storage Systems Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung Outline Introduction Distributed file systems P2P file-swapping systems P2P storage systems Strengths

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

High Throughput Computing on P2P Networks. Carlos Pérez Miguel carlos.perezm@ehu.es

High Throughput Computing on P2P Networks. Carlos Pérez Miguel carlos.perezm@ehu.es High Throughput Computing on P2P Networks Carlos Pérez Miguel carlos.perezm@ehu.es Overview High Throughput Computing Motivation All things distributed: Peer-to-peer Non structured overlays Structured

More information

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August

More information

Class Outline. Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account

Class Outline. Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account EMAIL Basics Class Outline Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account Part 3 Managing Your Messages Deleting messages The Trash

More information

Aloaha Mail and Archive

Aloaha Mail and Archive Aloaha Mail and Archive Aloaha Mail and Archive is an email archiving solution that can archive inbound-, internal and outbound emails directly and transparently into a central mailstore. Additionally

More information

Installation and Configuration Manual

Installation and Configuration Manual Beacon Office Installation and Configuration Manual Version - 2.5(1) Radianta Inc. September 2008 Radianta, Inc. Beacon Office Page 2 Table of Contents Introduction... 4 What is Beacon Office... 4 How

More information

SoNet Privacy and Replication in Federated Online Social Networks

SoNet Privacy and Replication in Federated Online Social Networks SoNet Privacy and Replication in Federated Online Social Networks Lorenz Schwittmann, Christopher Boelmann, Matthäus Wander, Torben Weis University of Duisburg-Essen Duisburg, Germany wimi@vs.uni-due.de

More information

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2 BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution

More information

Introduction to Computer Networks

Introduction to Computer Networks Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,

More information

HelloWorld: An Open Source, Distributed and Secure Social Network

HelloWorld: An Open Source, Distributed and Secure Social Network HelloWorld: An Open Source, Distributed and Secure Social Network Markus Ackermann maac0001@stud.fh-kl.de Benjamin Ludwig belu0001@stud.fh-kl.de Krister Hymon krhy0001@stud.fh-kl.de Kai Wilhelm kawi0002@stud.fh-kl.de

More information

Installing and Configuring TrueConf Online

Installing and Configuring TrueConf Online Installing and Configuring TrueConf Online How to Install? How to Login? How to Configure? Creating a Conference How to Make 1-on-1 VideoCall? What modes of group conferences are available in TrueConf

More information

Internet Architecture for Robust Mobility. Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr

Internet Architecture for Robust Mobility. Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr Internet Architecture for Robust Mobility Sangheon Pack (백상헌) Korea University shpack@korea.ac.kr Contents Introduction IETF Activity Home Agent Reliability Protocol P2P-based Approaches ROAM and SAMP

More information

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška

More information

Key Management Interoperability Protocol (KMIP)

Key Management Interoperability Protocol (KMIP) (KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).

More information

PROJECT MANAGEMENT SYSTEM

PROJECT MANAGEMENT SYSTEM Requirement Analysis Document v.2 14.12.2009 CENG-401 SOFTWARE ENGINEER PROJECT MANAGEMENT SYSTEM (Project Manager) Ahmet Edip SEÇKİN 07010555 (Developer) Erhan ŞEN 07010507 (Developer) Semih Serdar CENGİZOĞLU

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Computer System Management: Hosting Servers, Miscellaneous

Computer System Management: Hosting Servers, Miscellaneous Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation

More information

Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

More information

isecuremail User Guide for iphone

isecuremail User Guide for iphone isecuremail User Guide for iphone Page 1 CONTENTS Chapter 1: Welcome... 4 Chapter 2: Getting Started... 5 Compatability... 5 Preliminary Steps... 5 Setting up a POP3 / IMAP4/ Exchange Email Account...

More information

P2P: centralized directory (Napster s Approach)

P2P: centralized directory (Napster s Approach) P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application

More information

SANE: A Protection Architecture For Enterprise Networks

SANE: A Protection Architecture For Enterprise Networks Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

TLS and SRTP for Skype Connect. Technical Datasheet

TLS and SRTP for Skype Connect. Technical Datasheet TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security

More information

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS. PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software

More information

Skype characteristics

Skype characteristics Advanced Networking Skype Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg Skype characteristics Skype is a well known P2P program for real time communications

More information

DKIM Enabled Two Factor Authenticated Secure Mail Client

DKIM Enabled Two Factor Authenticated Secure Mail Client DKIM Enabled Two Factor Authenticated Secure Mail Client Saritha P, Nitty Sarah Alex M.Tech Student[Software Engineering], New Horizon College of Engineering, Bangalore, India Sr. Asst Prof, Department

More information

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb The e-cheque System nmqwertyuiopasdfghjklzxcvbnmqwer System Specification tyuiopasdfghjklzxcvbnmqwertyuiopas

More information

Zoho Projects. Social collaborative project management platform

Zoho Projects. Social collaborative project management platform Zoho Projects is a feature- rich and easy- to- use cloud- based collaborative project management platform for small to medium- sized businesses as well as teams and departments in larger companies. Its

More information

How to select the right Marketing Cloud Edition

How to select the right Marketing Cloud Edition How to select the right Marketing Cloud Edition Email, Mobile & Web Studios ith Salesforce Marketing Cloud, marketers have one platform to manage 1-to-1 customer journeys through the entire customer lifecycle

More information

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer

More information

Email Electronic Mail

Email Electronic Mail Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing

More information

REBRANDING THE KBMMW REMOTE DESKTOP PAGE 1/4

REBRANDING THE KBMMW REMOTE DESKTOP PAGE 1/4 PAGE 1/ BY KIM MADSEN starter expert Delphi PROLOGUE kbmmw Enterprise Edition have long included components that makes it possible to create a remote desktop server, client, proxy and service, and a set

More information

A Study on Secure Electronic Medical DB System in Hospital Environment

A Study on Secure Electronic Medical DB System in Hospital Environment A Study on Secure Electronic Medical DB System in Hospital Environment Yvette E. Gelogo 1 and Sungwon Park 2 * 1 Catholic University of Daegu, Daegu, Korea 2 Department of Nursing, Hannam University, 133

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

Hosted VoIP Phone System. Admin Portal User Guide for. Call Center Administration

Hosted VoIP Phone System. Admin Portal User Guide for. Call Center Administration Hosted VoIP Phone System Admin Portal User Guide for Call Center Administration Contents 1 About this Guide... 4 2 Accessing the Hosted VoIP Phone System Administration Portal... 5 3 Hosted VoIP Phone

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

POSEIDON social network for carers

POSEIDON social network for carers PersOnalized Smart Environments to increase Inclusion of people with DOwn s syndrome Deliverable D5.5 POSEIDON social network for carers Call: Objective: FP7- ICT- 2013-10 ICT- 2013.5.3 ICT for smart and

More information

WHITEPAPER SECURITY APPROACHES AND SECURITY TECHNOLOGIES IN INTEGRATION CLOUD

WHITEPAPER SECURITY APPROACHES AND SECURITY TECHNOLOGIES IN INTEGRATION CLOUD WHITEPAPER SECURITY APPROACHES AND SECURITY TECHNOLOGIES IN INTEGRATION CLOUD TABLE OF CONTENTS 1 In this whitepaper... 3 2 User security... 4 2.1 Authentication... 4 2.2 Authorization & Access Control...

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

The English translation Of MBA Standard 0301

The English translation Of MBA Standard 0301 MBA 文 書 0603 号 MBA Document 0603 The English translation Of MBA Standard 0301 MISAUTH Protocol Specification The authoritive specification is Japansese one, MBA Standard 0203 (June 2004). The Protocol

More information

Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications

Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications Hushmail Express Password Encryption in Hushmail Brian Smith Hush Communications Introduction...2 Goals...2 Summary...2 Detailed Description...4 Message Composition...4 Message Delivery...4 Message Retrieval...5

More information

Configuring Nex-Gen Web Load Balancer

Configuring Nex-Gen Web Load Balancer Configuring Nex-Gen Web Load Balancer Table of Contents Load Balancing Scenarios & Concepts Creating Load Balancer Node using Administration Service Creating Load Balancer Node using NodeCreator Connecting

More information

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.

More information

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person

More information

Lecture II : Communication Security Services

Lecture II : Communication Security Services Lecture II : Communication Security Services Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 What is Communication

More information

ALERT & Cisco CallManager

ALERT & Cisco CallManager Micromedia International Technical specification Author : Pierre Chevrier Pages : 28 Company : Micromedia International Date : 26/05/2011 Réf. : ETT_20090618_000001.docx ALERT & Cisco CallManager This

More information

imail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2

imail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2 imail Frequently Asked Questions (FAQs) 27 July 2015 Version 2.2 Owner: Cynthia Tan IT Services Table of Contents GENERAL FAQS... 4 1. How to access to Sunway imail account?... 4 2. I can t login to my

More information

Cassandra A Decentralized, Structured Storage System

Cassandra A Decentralized, Structured Storage System Cassandra A Decentralized, Structured Storage System Avinash Lakshman and Prashant Malik Facebook Published: April 2010, Volume 44, Issue 2 Communications of the ACM http://dl.acm.org/citation.cfm?id=1773922

More information

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------ Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------

More information

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation 9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,

More information

MySQL Security: Best Practices

MySQL Security: Best Practices MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

Christoph Sorge. February 12th, 2014 Bitcoin minisymposium at KNAW

Christoph Sorge. February 12th, 2014 Bitcoin minisymposium at KNAW Bitcoin s Peer-to-Peer network Christoph Sorge February 12th, 2014 Bitcoin minisymposium at KNAW Clipart source: http://openclipart.org, users Machovka and Keistutis Department of Computer Science What

More information

Managing User Accounts

Managing User Accounts Managing User Accounts This chapter includes the following sections: Active Directory, page 1 Configuring Local Users, page 3 Viewing User Sessions, page 5 Active Directory Active Directory is a technology

More information

Why you need secure email

Why you need secure email Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with

More information

Technical White Paper BlackBerry Security

Technical White Paper BlackBerry Security Technical White Paper BlackBerry Security For Microsoft Exchange Version 2.1 Research In Motion Limited 2002 Research In Motion Limited. All Rights Reserved Table of Contents 1. INTRODUCTION... 1 2. ARCHITECTURE...

More information

PDF hosted at the Radboud Repository of the Radboud University Nijmegen

PDF hosted at the Radboud Repository of the Radboud University Nijmegen PDF hosted at the Radboud Repository of the Radboud University Nijmegen The following full text is a publisher's version. For additional information about this publication click this link. http://hdl.handle.net/2066/60933

More information

Enabling SSL and Client Certificates on the SAP J2EE Engine

Enabling SSL and Client Certificates on the SAP J2EE Engine Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine

More information

Forensic Toolkit. Sales and Promotional Summary ACCESSDATA, ON YOUR RADAR

Forensic Toolkit. Sales and Promotional Summary ACCESSDATA, ON YOUR RADAR Forensic Toolkit Sales and Promotional Summary ACCESSDATA, ON YOUR RADAR What is AccessData s Forensic Toolkit? Also known as FTK, this application enables you to perform complete and thorough computer

More information

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture IEEE GLOBECOM Design and Developers Forum Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture Tim Weil CISSP, CISA Booz Allen Hamilton

More information

b+s Connects CCE Edition

b+s Connects CCE Edition b+s Connects CCE Edition A Business Whitepaper by Bucher + Suter May, 2014 Todd Samalin, Sales Engineer Contents General Introduction... 2 What is b+s Connects?... 2 b+s Connects Introduction... 2 Editions...

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

SOSIMPLE Self Organizing SIMPLE A Proposed P2P Instant Messaging System

SOSIMPLE Self Organizing SIMPLE A Proposed P2P Instant Messaging System SOSIMPLE Self Organizing SIMPLE A Proposed P2P Instant Messaging System David A. Bryan College of William and Mary, CSCI 780, P2P and Grid Systems December, 2003 1 Introduction Instant messaging (IM) has

More information

Enterprise Email Archive Managed Archiving & ediscovery Services User Manual

Enterprise Email Archive Managed Archiving & ediscovery Services User Manual Enterprise Email Archive Managed Archiving & ediscovery Services User Manual Copyright (C) 2012 MessageSolution Inc. All Rights Reserved Table of Contents Chapter 1: Introduction... 3 1.1 About MessageSolution

More information

S ven. Tips to Keep Financial Apps Safe & Secure

S ven. Tips to Keep Financial Apps Safe & Secure S ven Tips to Keep Financial Apps Safe & Secure Mobile applications provide users with access to critical information while on the go. In order to quickly empower users with immediate access to their financial

More information