LTAP protocol presentation

Slides:



Advertisements
Similar presentations
SOAP.
Advertisements

An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
A Public Web Services Security Framework Based on Current and Future Usage Scenarios J.Thelin, Chief Architect PJ.Murray, Product Manager Cape Clear Software.
Http Web Authentication Web authentication is used to verify a users identity before allowing access to certain web pages On web browsers you get a login.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
G O B E Y O N D C O N V E N T I O N WORF: Developing DB2 UDB based Web Services on a Websphere Application Server Kris Van Thillo, ABIS Training & Consulting.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Client-server interactions in Mobile Applications.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Asynchronous Web Services Approach Enrique de Andrés Saiz.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Draft-ietf-abfab-aaa-saml Josh Howlett, JANET IETF 82.
Exchange Network Node Help Desk NOLA Conference Feb 9-10, 2004.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
C Copyright © 2009, Oracle. All rights reserved. Appendix C: Service-Oriented Architectures.
Using SCVP to Convey Evidence Records Carl Wallace Orion Security Solutions.
UDDI ebXML(?) and such Essential Web Services Directory and Discovery.
Abierman-nanog-30may03 1 XML Router Configs BOF Operator Involvement Andy Bierman
IETF - LTANS, March 2004P. Sylvester, Edelweb & A. Jerman Blazic, SETCCE Introduction The following slides were prepared as a result of analysis and discussion.
OpenEvidence and ESS Peter Sylvester, EdelWeb IETF - N° 57, Wien S/MIME working group.
COMPARISSON OF TECHNOLOGIES FOR CONNECTING BUSINESS PROCESSES AMONG ENTERPRISES Maja Pušnik, dr. Marjan Heričko.
Evidence Record Syntax <draft-ietf-ltans-ers-00.txt>
XML Evidence Record Syntax
1 SHAWEL Sharable and Interactive Web-Lexicon Greg Gulrajani - Max-Planck-Institute in collaboration with David Harrison & Peter Wittenburg Max Planck.
LTANS service and protocol Carl Wallace (on behalf of Peter Sylvester) 6 Aug 2004, 60th IETF, San Diego.
Report for Work-Package 1 „Integrated workspace“.
SAML for SIP Hannes Tschofenig, Jon Peterson, James Polk, Douglas Sicker, Marcus Tegnander.
LTAP status IETF 68 - Praha March 20, 2007 Peter Sylvester - EdelWeb.
BEA position on W3C ‘Web Services’ Standards Jags Ramnarayan 11th April 2001.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Current Topic – EPP - TWNIC Jeff Yeh
Long-term Archive and Notary Services (LTANS) Working Group.
Core and Framework DIRAC Workshop October Marseille.
IEEE SISWG (P1619.3)‏ Messaging & Transport. AGENDA Transport Protocols & Channel Protection Messaging Layer Capability Exchange & Authentication Groups.
ESRIN, 15 July 2009 Slide 1 Web Service Security support in the SSE Toolbox HMA-T Phase 2 FP 14 December 2009 S. Gianfranceschi, Intecs.
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
Now every configuration is possible
Hypertext Transfer Protocol
ERS to XML Introduction to ERS syntax in XML format
Data Virtualization Community Edition
August 1, 2005 Carl Wallace & Tobias Gondrom
draft-ietf-simple-message-sessions-00 Ben Campbell
An Overview of Data-PASS Shared Catalog
UNIT.4 IP Security.

Server Concepts Dr. Charles W. Kann.
Using SSL – Secure Socket Layer
Requirements – Scenarios and Use Cases
Enterprise Service Bus (ESB) (Chapter 9)
A Web-Based Data Grid Chip Watson, Ian Bird, Jie Chen,
NZFSA E-cert.
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Security Vulnerabilities in RPC (csci5931)
Tim Bornholtz Director of Technology Services
The Secure Sockets Layer (SSL) Protocol
VuFind APIs - A practical approach
Multi-server Namespace in NFSv4.x Previous and Pending Updates
Assessment Needs Analysis
Transport Layer Security (TLS)
Technical Integration Guide
WEB SERVICES From Chapter 19, Distributed Systems
WebDAV Advanced Collection Requirements
WebDAV Collections Protocol
Electronic Payment Security Technologies
Integrated Security System
IDABC e-Invoicing – e-Ordering > Pilot of e-PRIOR Meeting with Suppliers IDABC stands for Interoperable Delivery of European eGovernment Services to public.
Presentation transcript:

LTAP protocol presentation LTAP status Peter.sylvester@edelweb.fr July 2006 IETF 66 Montreal Peter Sylvester LTAP protocol presentation

LTAP protocol presentation LTAP reminder Very thin layer Usable for many use cases Record keeping long term archive July 2006 IETF 66 Montreal Peter Sylvester LTAP protocol presentation

LTAP protocol presentation Services Basic service (treated) Interaction between client and ONE server Few and simple operations Simple use/profile of protocol Example: One target, one message, etc Extended service (not treated in this doc) For front ends and brokers (Encryption, splitting, proxies, …) Can use the same protocol or overload May add operations Example CompleteTRANSFER from one archive to another July 2006 IETF 66 Montreal Peter Sylvester LTAP protocol presentation

LTAP protocol presentation Transactions Transaction based (asynchronous operation) borrowed from ebXML Request Acknowledge (technical) Response (business) Support for services archive/status/verify/export/delete defined by service Underlying authorization and transport services SAML, SOAP, SSL, etc. Transaction model almost stable Artifacts are probably not necessary, identification via hash and long term URI seems sufficient. French National Archive has defined OAIS like operations and services that map down the LTAP (without saying so) July 2006 IETF 66 Montreal Peter Sylvester LTAP protocol presentation

LTAP protocol presentation Transactions Asynchronous by need Need to « wait » until evidence available Implemented using polling via status function Request, acknowledge, final result Some clients may only need 1 function + status Ex. Just archive July 2006 IETF 66 Montreal Peter Sylvester LTAP protocol presentation

LTAP protocol presentation Basic functions Archive – insert data in the archive Status – determine status of archived data Export – export archive data and evidence data Delete – delete archive data and evidence data Verify – demonstrate data integrity and authenticity Question: Can Verify mapped to something in WEBDAV? July 2006 IETF 66 Montreal Peter Sylvester LTAP protocol presentation

LTAP protocol presentation Status Document version 01 out, still incomplete, next version is already advanced. Small tool to allow automatic creation of asn1 and xsd modules was developped in the meantime. Data structures not yet fully included from existing implementation July 2006 IETF 66 Montreal Peter Sylvester LTAP protocol presentation

LTAP protocol presentation To be done Result of Verify function? Just a date? An ERS? How to add/handle metainformation? Just « archive » them using existing long term reference. July 2006 IETF 66 Montreal Peter Sylvester LTAP protocol presentation

LTAP protocol presentation General Information Authors Aleksej Jerman Blazic, SETCCE Peter Sylvester, EDELWEB Carl Wallace, ORIONSEC July 2006 IETF 66 Montreal Peter Sylvester LTAP protocol presentation