Little Demonstration of the Power in Discovery Jason Hill, Steve Ross David E. Culler Computer Science Division U.C. Berkeley.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

High Performance Computing Course Notes Grid Computing.
Data Grids Jon Ludwig Leor Dilmanian Braden Allchin Andrew Brown.
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
PlutoPlus: Policy and PKI Plans for FY00 Sheila Frankel Systems and Network Security Group Computer Security Division NIST
Unique Opportunities in Experimental Computer Systems Research - the Berkeley Testbeds David Culler U.C. Berkeley Grad.
Introduction to PKI, Certificates & Public Key Cryptography Erwan Lemonnier.
WP4 Gridification Subsystem overlap Globus & existing systems LCAS and AAA in WP4 for Gridification Task: David Groep
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Watermarking in WSNs Anuj Nagar CS 590. Introduction WSNs provide computational and Internet interfaces to the physical world. They also pose a number.
WP4 Gridification Subsystem overlap & existing systems for Gridification Task: David Groep
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Towards I-Space Ninja Mini-Retreat June 11, 1997 David Culler, Steve Gribble, Mark Stemm, Matt Welsh Computer Science Division U.C. Berkeley.
Network Shared Services. Shared Services –Network Authentication and Authorization Services –Exchange Network Discovery Service –Universal Description.
ISRG and the Post-PC Era David Culler U.C. Berkeley ISRG Retreat Jan, 1999.
Link Setup Time (ms) Details : How do sender and receiver synchronize i ? Discovery/binding messages: infrequent and narrow interface  short term linkability.
The n Hottest Topics in Parallel and Distributed Computing for the Next...long while IPDPS Panel May 3, 2000 David E. Culler Computer Science Division.
The Case for ICEBERG Integrated services from diverse networks-- “PANS” (Potentially Any Network Services) Service infrastructure that allows user level.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
ProActive Infrastructure Eric Brewer, David Culler, Anthony Joseph, Randy Katz Computer Science Division U.C. Berkeley ninja.cs.berkeley.edu Active Networks.
Security in a Pervasive Computing Environment Mike Chen CS Division, UC Berkeley
Clusters Massive Cluster Gigabit Ethernet System Design for Vastly Diverse Devices David Culler U.C. Berkeley HP Visit 3/9/2000.
Proactive Infrastructure: The Ninja Service Platform David Culler, Eric Brewer, Anthony Joseph & Randy Katz UC Berkeley ninja.cs.berkeley.edu.
Post-PC Summary Prof. Eric A. Brewer
A Security Framework for a World of Post-PC Clients and Infrastructure-based Services Steven Ross, Jason Hill, Michael Chen, Anthony D. Joseph, David E.
Universal Berkeley Activities in the ISRG / Endeavour David Culler Randy Katz, Eric Brewer, Anthony Joseph, James Landay and others
Packing for the Expedition David Culler. 5/25/992 Ongoing Endeavors Millennium: building a large distributed experimental testbed –Berkeley Cluster Software.
Internet-Scale Systems Research Group Eric Brewer David Culler Anthony Joseph Randy Katz Steven McCanne Computer Science Division University of California,
Presented by, Sai Charan Obuladinne MYSEA Technology Demonstration.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
PKI in Higher Education: Dartmouth PKI Lab Update Internet2 Virtual Meeting 5 October 2001.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
World Wide Web Hypertext model Use of hypertext in World Wide Web (WWW) WWW client-server model Use of TCP/IP protocols in WWW.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
The Data Grid: Towards an Architecture for the Distributed Management and Analysis of Large Scientific Dataset Caitlin Minteer & Kelly Clynes.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
1 Emergency Alerts as RSS Feeds with Interdomain Authorization Filippo Gioachin 1, Ravinder Shankesi 1, Michael J. May 1,2, Carl A. Gunter 1, Wook Shin.
Portal for ArcGIS An Introduction
A semi autonomic infrastructure to manage non functional properties of a service Pierre de Leusse Panos Periorellis Paul Watson Theo Dimitrakos UK e-Science.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
The FI-WARE Project – Base Platform for Future Service Infrastructures FI-WARE Interface to the network and Devices Chapter.
Building Security into Your System Bill Major Gregory Ponto.
Lecture 5: User Accounts & Directory Service Instructor: Dr. Najla Al-Nabhan
ClearTunnel Close the SSL Hole! Copyright ©2008 Collective Software, LLC.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Grid Computing & Semantic Web. Grid Computing Proposed with the idea of electric power grid; Aims at integrating large-scale (global scale) computing.
Middleware CAMP Day 2. Current Research Research that develops th e…
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
Jini Architectural Overview Li Ping
ProActive Infrastructure Eric Brewer, David Culler, Anthony Joseph, Randy Katz Computer Science Division U.C. Berkeley ninja.cs.berkeley.edu Active Networks.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
Discussion - HITSC / HITPC Joint Meeting Transport & Security Standards Workgroup October 22, 2014.
NINJA. Project of UC Berkeley Computer Science Division Paper : The Ninja Architecture for Robust Internet-Scale Systems and Services
Societal-Scale Computing: The eXtremes Scalable, Available Internet Services Information Appliances Client Server Clusters Massive Cluster Gigabit Ethernet.
What the $#*! IS my password? Secure Online Password Storage Lon Smith Aaron Gremmert.
PARALLEL AND DISTRIBUTED PROGRAMMING MODELS U. Jhashuva 1 Asst. Prof Dept. of CSE om.
The Ninja Architecture for Robust Internet-Scale Systems and Services UC Berkeley Computer Science Division 2002 년 10 월 9 일 박준호.
Secure Connected Infrastructure
HIMSS National Conference New Orleans Convention Center
Proactive Infrastructure: The Ninja Service Platform
Presentation transcript:

Little Demonstration of the Power in Discovery Jason Hill, Steve Ross David E. Culler Computer Science Division U.C. Berkeley

IBM 5/11/99Demo2 Understanding Going In Key Leverage: Composable Services –ease of authoring by automated scalability, availability –push services into the infrastructure –build new services from component services Key Tool: Transcoding Operators –adapt form or content to desired use Security fundamental to Universal Computing Tremendous Diversity Emerging without Plan –wide array of services –clients => information appliances Small devices impose interesting constraints

IBM 5/11/99Demo3 Example Pilot too slow to support effective Public Key Encryption (eg, SSL) –shared key techniques are viable (eg., DES) => encryption proxy –device interacts with trusted proxy using shared secret –proxy interacts with rest of the internet using PKI The Really Important Idea: Identity Service –a strong box to lock away all your keys –a critical level of indirection –map: you and your mode of access -> your identity and mode of authentication at each service Weak Client Encription Proxy Service SSL RMI(DES)

IBM 5/11/99Demo4 Typical Internet Service DATEK (Trust Contract) Trusted Client https

IBM 5/11/99Demo5 Infrastructure Services: Embedded Untrusted Interface Key Store DATEK (Trust Contract) Trusted Client Content Filter (pseudonym) https Embeded Untrusted Client https sRMI NINJA

IBM 5/11/99Demo6 Constrained Personal Info Appliance - Untrusted Gateway Key Store RMI PXY DATEK (Trust Contract) Trusted Client Content Filter (pseudonym) https Embeded Untrusted Client https sRMI Personal Appl GWY CF NINJA ST

IBM 5/11/99Demo7 Uniform Access to Diverse Services Key Store RMI PXY DATEK (Trust Contract) Trusted Client Content Filter (pseudonym) https Embeded Untrusted Client https sRMI Personal Appl GWY CF NINJA Trade-R-us ST

IBM 5/11/99Demo8 Automated “Clients” Key Store RMI PXY DATEK (Trust Contract) Trusted Client Content Filter (pseudonym) https Embeded Untrusted Client https sRMI Personal Appl GWY CF NINJA Trade-R-us BOT svc ST

IBM 5/11/99Demo9 Take-Away Composable Services in the infrastructure –key enabling concept –new level of “programming” Towards an Architecture for Universal Computing –in the presence of diverse concurrent development Eureka Phenomenon –the most fundamental service are probably those yet to be discovered »ex: identity service –only find them by building the world and living in it