CONVERGENCE Glossary (version of 30/10/2012)



Similar documents
CTS2134 Introduction to Networking. Module Network Security

Bit Chat: A Peer-to-Peer Instant Messenger

7.1. Remote Access Connection

Contents Huntcliff, Suite 1350, Atlanta, Georgia, 30350, USA

Network Security Protocols

Introduction to UDDI: Important Features and Functional Concepts

Application Note. Onsight Connect Network Requirements v6.3

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

The English translation Of MBA Standard 0301

Sonian Getting Started Guide October 2008

What is OpenFlow? What does OFELIA? An Introduction to OpenFlow and what OFELIA has to do with it

Chapter 9. IP Secure

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

EAGLE EYE IP TAP. 1. Introduction

The ebbits project: from the Internet of Things to Food Traceability

Sync Security and Privacy Brief

M2M. Machine-to-Machine Intelligence Corporation. M2M Intelligence. Architecture Overview

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Introduction to Security and PIX Firewall

Flexible Identity Federation

Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems

IPv6 Fundamentals, Design, and Deployment

Case Study for Layer 3 Authentication and Encryption

Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords

Digital Identity Management

Implementing Cisco IOS Network Security v2.0 (IINS)

Setting Up an AS4 System

Content management and protection using Trusted Computing and MPEG-21 technologies

Week 9 / Paper 3. VoCCN: Voice Over Content-Centric Networks

Introduction to Network Security Key Management and Distribution

Authentication is not Authorization?! And what is a "digital signature" anyway?

Chapter 10. Network Security

Snow Agent System Pilot Deployment version

MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS

Design of a Cost Efficient Subscription Engine to Improve Customer Experience in Value Added Services

IBM WebSphere Data Power SOA Applicances V3.8.1 Solution IMP. Version: Demo. Page <<1/10>>

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

How To Understand And Understand The Security Of A Key Infrastructure

Public Key Infrastructure for a Higher Education Environment

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Evaluation of different Open Source Identity management Systems

TrustedX - PKI Authentication. Whitepaper

The IDA Catalogue. of GENERIC SERVICES. Interchange of Data between Administrations

Implementing Intercluster Lookup Service

IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

Application Note. Onsight TeamLink And Firewall Detect v6.3

Implementing Cisco IOS Network Security

DSL Forum Technical Report TR-054

ReadyNAS Remote White Paper. NETGEAR May 2010

Dynamic Service Chaining for NFV/SDN

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

Extending Networking to Fit the Cloud

CONCEPT OF OPERATIONS FOR THE SWIM COMMON REGISTRY (SCR)

MetroNet6 - Homeland Security IPv6 R&D over Wireless

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Security Digital Certificate Manager

Security Digital Certificate Manager

How To Protect Your Network From Attack

SSDG Operational Manual Draft version: 0.1. Operational Manual For SSDG

BASIC ANALYSIS OF TCP/IP NETWORKS

Usage of Business Process Choreography

FLX UC1000/1500 Registering with Siemens HiPath 4000 & OpenScape Voice Server

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Internet Peering, IPv6, and NATs. Mike Freedman V Networks

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

Object Identification for Ubiquitous Networking

Single Sign-On Secure Authentication Password Mechanism

Extensible Network Configuration and Communication Framework

Nuclear Regulatory Commission Computer Security Office Computer Security Standard

Configuring Notification for Business Glossary

Identity Management in Federated Telecommunication Systems

Security. TestOut Modules

Monitoring Infrastructure (MIS) Software Architecture Document. Version 1.1

A P2P SIP Architecture - Two Layer Approach - draft-sipping-shim-p2p-arch-00.txt

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

Arcot Systems, Inc. Securing Digital Identities. FPKI-TWG Mobility Solutions Today s Speaker Tom Wu Principal Software Engineer

Guideline for Implementing the Universal Data Element Framework (UDEF)

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

Security in Internet of Things using Delegation of Trust to a Provisioning Server

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

ITL BULLETIN FOR JANUARY 2011

Information-Centric Networking: Introduction and Key Issues

Structured Data Capture (SDC) Trial Implementation

Security of smart grid communication protocols

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Trust areas: a security paradigm for the Future Internet

NAT TCP SIP ALG Support

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

HKUST CA. Certification Practice Statement

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Using ICN in disaster scenarios (draft-seedorf-icn-disaster-00)

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Monitoring within an Autonomic Network: A. Framework

Citrix NetScaler 10 Essentials and Networking

SIP Trunking Manual. For Samsung OfficeServ. Sep 18, 2006 doc v Sungwoo Lee Senior Engineer

NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks

Transcription:

Glossary (version of 30/10/2012) Term Access Rights Advertise Application Business Scenario CA CCN Cl_Auth_SC Cl_Auth_User_Pw Clean-slate architecture CoApp CoApp Provider CoMid CoMid Provider CoMid Resource Community Dictionary Service (CDS) CoNet Provider CoNet Resource Content-based resource discovery Content-based Subscription Definition Criteria defining who can access a VDI or its components under what conditions. Procedure used by a CoNet user to make a resource accessible to other CoNet users. Software, designed for a specific purpose that exploits the capabilities of the System. A scenario describing a way in which the System may be used by specific users in a specific context or, more narrowly, a scenario describing the products and services bought and sold, the actors concerned and, possibly, the associated flows of revenue in such a context. Central Authority Content Centric Network Client Authentication with Smart Card (Challenge Response) Client Authentication with Username and Password The implementation of the Network Level, totally replacing existing IP functionality. See Integration Architecture and Overlay Architecture and Parallel Architecture. The Application Level. A user providing Applications running on the Middleware Level (CoMid). The Middleware Level. A user providing access to a single or an aggregation of CoMid services. A virtual or physical object or service referenced by a VDI, e.g. media, Real World Objects, persons, internet services. It has the same meaning of Resource and it is used only to better specify the term Resource when there is a risk of a misunderstanding with the term CoNet Resource. A CoMid Technology Engine that provides all the matching concepts in a user s subscription, search request and publication. A user providing access to CoNet services, i.e. the equivalent of an Internet Service Provider. A resource of the CoNet that can be identified by means of a name; resources may be either Named-data or a Named service access point. A user request for resources, either through a subscription or a search request to the system (from literature). See subscription and search. A subscription based on a specification of user s preferences or interests, (rather than a specific event or topic). The subscription is based on the actual content, which is not classified according to some predefined external criterion (e.g., topic name), but according to the

Content-centric Applications level (CoApp) Computing Platform level (CoComp) Core Ontology (CCO) Device Engine Middleware level (CoMid) Network (CoNet) node peer Resource Semantic Type (CoReST) Security element (CoSec) System Dec_Key_Unwrap DIDL Digital forgetting Digital Item (DI) Domain ontology Elementary Service (ES) Enc_Key_Wrap properties of the content itself. See Subscription and Publish-subscribe model. A network paradigm in which the network directly provides users with content, and is aware of the content it transports, (unlike networks that limit themselves to providing communication channels between hosts). The level of the architecture that establishes the interaction with users. The Applications Level interacts with the other levels on behalf of the user. The Computing Platform level provides content-centric networking (CoNet), secure handling (CoSec) of resources within and computing resources of peers and nodes. A semantic representation of the CoReST taxonomy. See Resource Semantic Type (CoReST) A combination of hardware and software or a software instance that allows a user to access Convergence functionalities A collection of technologies assembled to deliver specific functionality and made available to Applications and to other Engines via an API The level of the architecture that provides the means to handle VDIs and their components. The Content Centric component of the Computing Platform level. The CoNet provides access to named-resources on a public or private network infrastructure. A device that implements CoNet functionality and/or CoSec functionality. A device that implements CoApp, CoMid, and CoComp (CoNet and CoSec) functionality. A list of concepts or terms that makes it possible to categorize a resource, establishing a connection with the resource s semantic metadata. A component of the Computing Platform level implementing basic security functionality such as storage of private keys, basic cryptography, etc. A system consisting of a set of interconnected devices - peers and nodes - connected to each other built by using the technologies specified or adopted by the specification. See Node and Peer. Key Unwrapping and Content Decryption Digital Item Description Language A system functionality ensuring that VDIs do not remain accessible for indefinite periods of time, when this is not the intention of the user. A structured digital object with a standard representation, identification and metadata. A DI consists of resource, resource and context related metadata, and structure. The structure is given by a Digital Item Declaration (DID) that links resource and metadata. An ontology, dedicated to a specific domain of knowledge or application, e.g. the W3C Time Ontology and the GeoNames ontology. The most basic service functionality offered by the CoMid. Encryption and Key Wrapping

Entity Expiry date Fractal Group_Sig ICN Identifier Integration Architecture IP License Local named resource Metadata MPEG extensible Middleware (MXM) MPEG-M Multi-homing Named resource Named service access point Named-data Network Identifier (NID) Overlay architecture Parallel architecture An object, e.g. VDIs, resources, devices, events, group, licenses/contracts, services and users, that an Elementary Service can act upon or with which it can interact. The last date on which a VDI is accessible by a user of the System. A semantically defined virtual cluster of peers. Group Signature Information Centric Network A unique signifier assigned to a VDI or components of a VDI. An implementation of CoNet designed to integrate CoNet functionality in the IP protocol by means of a novel IPv4 option or by means of an IPv6 extension header, making IP content-aware. See Clean-state Architecture, Overlay Architecture, Parallel Architecture Identity Provider A machine-readable expression of Operations that may be executed by a Principal. A named-resource made available to users through a local device, permanently connected to the network. Users have two options to make named-resources available to other users: 1) store the resource in a device, with a permanent connection to the network; 2) use a hosting service. In the event she chooses the former option, the resource is referred to as a local named-resource. Data describing a resource, including but not limited to provenance, classification, expiry date etc. A standard Middleware specifying a set of Application Programming Interfaces (APIs) so that MXM Applications executing on an MXM Device can access the standard multimedia technologies contained in the Middleware as MXM Engines. An emerging ISO/IEC standard that includes the previous MXM standard. In the context of IP networks, the configuration of multiple network interfaces or IP addresses on a single computer. A CoNet resource that can be identified by means of a name. Namedresources may be either data (in the following referred to as nameddata ) or service-access-points ( named-service-access-points ). A kind of named-resource, consisting of a service access point identified by a name. A named-service-access-point is a network endpoint identified by its name rather than by the Internet port numbering mechanism. A named-resource consisting of data. An identifier identifying a named resource in the Network. If the named resource is a VDI or an identified VDI component, its NID may be derived from the Identifier (see Identifier ). An implementation of CoNet as an overlay over IP. See Clean-state Architecture and Integration Architecture and Parallel Architecture An implementation of CoNet as a new networking layer that can be used in parallel to IP.

PKI Policy routing Principal (CoNet) Principal (Rights Expression Language) Principal Identifier (CoNet) Publish Publisher Publish-subscribe model Real World Object REL Resource Scope (in the context of routing) Search Serv_Auth Service Level Agreement (SLA) Sig Smart_Card Role_Auth_SC SP Subscribe See Clean-state Architecture and Integration Architecture and Overlay Architecture Public Key Infrastructure In the context of IP networks, a collection of tools for forwarding and routing data packets based on policies defined by network administrators. The user who is granted the right to use a CoNet Principal Identifier for naming its named resources. For example, the principal could be the provider of a service, the publisher or the author of a book, the controller of a traffic lights infrastructure, or, in general, the publisher of a VDI. A Principal may have several Principal Identifiers in the CoNet. The User to whom Permissions are Granted in a License. The Principal identifier is a string that is used in the Network Identifiers (NID) of a CoNet resource, when the NID has the form: NID = <namespace ID, hash (Principal Identifier), hash (Label)> In this approach, hash (Principal Identifier) must be unique in the namespace ID, and Label is a string chosen by the principal in such a way that hash(label) is unique for in the context of the Principal Identifier. The act of informing an identified subset of users of the System that a VDI is available. A user of who performs the act of publishing. uses a content-based approach for the publishsubscribe model, in which notifications about VDIs are delivered to a subscriber only if the metadata / content of those VDIs match constraints defined by the subscriber in his Subscription VDI. A physical object that may be referenced by a VDI. Rights Expression Language A virtual or physical object or service referenced by a VDI, e.g. media, Real World Objects, persons, internet services. In the context of advertising and routing, the geographical or administrative domain on which a network function operates (e.g. a well-defined section of the network - a campus, a shopping mall, an airport -, or to a subset of nodes that receives advertisements from a service provider). The act through which a user requests a list of VDIs meeting a set of search criteria (e.g. specific key value pairs in the metadata, key words, free text etc.). Server Authentication without Smart Card An agreement between a service provider and another user or another service provider of to provide the latter with a service whose quality matches parameters defined in the agreement. Signature Role Authentication towards Smart Card Service Provider The act whereby a user requests notification every time another user publishes or updates a VDI that satisfies the subscription criteria

Subscriber Timestamp Tool Trials Un-named-data Us_Reg_IP Us_Reg_SP User User (in OSI sense) User ontology User Profile Versatile Digital Item (VDI) defined by the former user (key value pairs in the metadata, free text, key words etc.). A user of who performs the act of subscribing. A machine-readable representation of a date and time. Software providing a specific functionality that can be re-used in several applications. Organized tests of the System in specific business scenarios. A data resource with no NID. User Registration to Identity Provider User Registration to Service Provider Any person or legal entity in a Value-Chain connecting (and including) Creator and End-User possibly via other Users. In a layered architecture, the term is used to identify an entity exploiting the service provided by a layer (e.g. CoNet user). An ontology created by users when publishing or subscribing to a VDI. A description of the attributes and credentials of a user of the System. A structured, hierarchically organized, digital object containing one or more resources and metadata, including a declaration of the parts that make up the VDI and the links between them.