11.1.2007 (Josef Noll) -> MasterThesis Masteroppgaver 2008 Josef Noll, Prof. stip. Mohammad M. R. Chowdhury, PhD student.

Slides:



Advertisements
Similar presentations
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Advertisements

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
HCE AND BLE UNIVERSITY TOMORROWS TRANSACTIONS LONDON, 20 TH MARCH 2014.
WPKI available technology diagram and the business model
NFC Devices: Security and Privacy
Aloaha protects Mobile M2M Communication with secureSIM.
Electronic Transaction Security (E-Commerce)
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Understanding Active Directory
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Near Field Communication By Van Logan HTM 304. What is Near Field Communication Short range wireless communication technology between electronic devices.
Part of the BRE Trust Protecting People, Property and the Planet Smart Buildings and Security: Developing a unified approach Will Lloyd BRE Global Limited,
SIM205. (On-Premises) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service)
Smart card – A BT perspective Libraries ATM access Catering & Vending Transit University campuses Passports/ID cards Electronics benefits transfer Access.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Information Security for Managers (Master MIS)
PKI in Higher Education: Dartmouth PKI Lab Update Internet2 Virtual Meeting 5 October 2001.
ITEC0722: Mobile Business and Implementation: Mobile Payment and Security Suronapee Phoomvuthisarn, Ph.D.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Josef Noll, Personalised broadband1 Personalised Broadband: The key for Advanced Service Delivery Josef Noll 1,2 1 Telenor R&D, N-1331 Fornebu.
Property of the Smart Card Alliance © 2011 The Future of NFC Mobile Payments Randy Vanderhoof Executive Director Transit Payments Markets Migration to.
Josef Noll, The role of the Mobile1 Mobile based Admittance and Access to Information Josef Noll 1, Juan Carlos Lopez Calvet, Telenor R&D,, N-1331.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Confidential & proprietary M2M communications in Transportation industry.
PRESENTED BY : MOHAMMAD DIAB ALAA’ DWAIKAT SUPERVISOR: DR.SUFYAN SAMARA GRADUATION PROJECT PRESENTATION Amany 3la Al Tareeq أماني على الطريق.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
Identity-based Service Interaction Mohammad M. R. Chowdhury Ph.D. candidate UniK-University Graduate Center / University of Oslo SWACOM meeting, Stavanger,
Geneva, Switzerland, September 2014 Identity Based Attestation and Open Exchange Protocol (IBOPS) Scott Streit Chief Scientist.
Mobile Phone authorised Services through Near Field Communications Hans-Christian Haugli, Elin Melby, Josef Noll.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Near Field Communication Systems Patras, July 2006.
, Josef NollNISnet NISnet meeting Mobile Applied Trusted Computing Josef Noll,
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Page 1 Alliver™ Page 2 Scenario Users Contents Properties Contexts Tags Users Context Listener Set of contents Service Reasoner GPS Navigator.
Figures for Telektronikk – Services – Noll
Telenor R&DMobile Terminals Group 1 Four-in-one: Your mobile integrates them all Security Requirement Nice to know Need to know Have to know Examples:
1 WWRF_Workplan_WG2_v1.0_Service_Semantics_WP_ ppt WG 2 interim meeting, White Paper Semantic Services Klaus David, University Kassel,
György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access.
Online Parking System.
Panel Session: Dependability and Security in Complex and Critical Information Systems Department of Communications and Information Engineering University.
Defining Social Media Social Media Marketing Communications Digital Marketing Characteristics Types of Internet Advertising Mobile Marketing Social Behavior.
(Josef Noll) -> MasterThesis Masteroppgaver 2006 Josef Noll, Prof. stip. Univ. Graduate Center.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Josef Noll Payment and Access 1 Payment and Access through the Mobile Phone Josef Noll 1,2, Erzsébet Somogyi 3, Gyorgy Kalman 1, Ola Høiby 1 1.
The Changing Face of the Contact Centre 18 th September 2013.
Easy-to-Use RedFlag System Delivers Notifications via Phone, , Text, Social Media, and More to Improve Effectiveness of Your Communications COMPANY.
E-Commerce & M-Commerce. Introduction Electronic commerce, commonly known as e- commerce, It is a type of industry where buying and selling of product.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
György Kálmán, Josef Noll Mobile and Wireless Communications Summit, th IST 1-5, July 2007 Speaker : 黃韋綸 Right Management Infrastructure for Home.
The Trusted Network · · · LEFIS PKI · · · 2 nd June, 2006 · Sofia by Leonardo Catalinas · May 2006
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
It is Your mobile is now much more than just a communication device - more like a remote control for your life. You still call it a "mobile" from.
Enabling Access Control and Privacy through Ontology Mohammad M. R. Chowdhury Dr. Josef Noll UniK - University Graduate Center, Norway Dr. Juan Miguel.
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Digital Identity and My Data as Business Enablers 1 My Pekka Turpeinen, Business Architect.
Keyhub Identity and Access Management App is Powered by Azure and Offers Customers Easy Authentication, Authorization for Mobile Devices MICROSOFT AZURE.
E-Commerce for Developing Countries (EC-DC)
An Introduction to Cloud Computing
Presentation transcript:

(Josef Noll) -> MasterThesis Masteroppgaver 2008 Josef Noll, Prof. stip. Mohammad M. R. Chowdhury, PhD student György KálmánGyörgy Kálmán, PhD student University Graduate Center -UniK (Josef Noll & Mushfiq)

(Josef Noll) -> MasterThesis Research information (Josef Noll & Mushfiq)

(Josef Noll) -> MasterThesis Semantic and Ontology (Josef Noll & Mushfiq)

(Josef Noll) -> MasterThesis Service composition Next Generation Applications: – Semantic based – Dynamic, global Veivesent Applications SL, NSB Infoorder Semantic Web Services Access Home Work Train Car Telecom Services for intelligent transport systems -Weather, traffic, Points of interest -Exchange with car info (Daimler) (Josef Noll & Mushfiq)

(Josef Noll) -> MasterThesis Proximity Services: NFC – Near field communication Based on RFID technology at MHz Typical operating distance 10 cm Compatible with RFID Data rate today up to 424 kbit/s Philips and Sony ECMA-340, ISO/IEC & ECMA-352, …standards Powered and non-self powered devices

(Josef Noll) -> MasterThesis Device Authentication SIM with RFID & PKI OK Nettbank access through phone authentication Authenticate other devices based on phones SIM Seamless home content access Mobile as integrator OK Identity provider (IDP)

(Josef Noll) -> MasterThesis (Josef Noll & Mushfiq) Mobile phone and NFC/RFID - Demo lab in Telenor R&D Payment on coffee machine Flight tickets through SMS, boarding through the mobile phone Tromsbus payment RFID card in 2005 Tests in OSL and Arlanda RFID cards Think New applications: online traffic info, SL, NSB Key exchange on mobile phones

(Josef Noll) -> MasterThesis Proximity Service Example: SMS key access Service Centre Application 1) Send SMS 3) Send service to phone 2) Send info to recipient 4) Enters house with NFC access Smartcard interfaces ISO/IEC 7816 NFC communication unit SI M NFC2SIM (Josef Noll & Mushfiq)

(Josef Noll) -> MasterThesis Identity in the digital world (Josef Noll & Mushfiq)

(Josef Noll) -> MasterThesis Introduction to Identity Identity is attributes of your persona – Social, Corporate and Private IDs Internet was built without an identity layer – Identity 2.0 stems from Web 2.0 – People, information and software – More user-oriented (wikis, comments, tags) – More seamless web services (AJAX) Service related security – Provide just the information which is necessary Mobile challenges (Josef Noll & Mushfiq)

(Josef Noll) -> MasterThesis Identity 2.0 Real world: see and/or talk Voice, face dress, attributes Virtual world: , web Username, password SIM, PKI Security, privacy Service world (between providers) Identity management Service level agreement (SLA) Trust relation (Josef Noll & Mushfiq)

(Josef Noll) -> MasterThesis User view: Electronic identity Sensors PAN comm. devices LocationCommunity Context, creation User profile User behaviour User roles Identity in the electronic world: - mechanism, - security, privacy, trust (Josef Noll & Mushfiq)

(Josef Noll) -> MasterThesis Challenge: Role based service access Next Generation Applications: – Customized services – Remote services – Proximity services – High flexibility – Telecom-IT integration Challenges – Privacy – Trust – Application security App x App y App z Identity provider Corporate - CID VPNadmittance Public Authority … Bank Application providers Certificate Social - SID sportsorigin Private - PID Mastercard, Visa Soc. sec. number Certificate Telecom Josef Role based service access My identities (Josef Noll & Mushfiq)

(Josef Noll) -> MasterThesis Challenge: Role based service access (Josef Noll & Mushfiq) - Relation to a group/community (role in a group) can also be considered as identity - Using Semantics (Semantic Web Technology) to represent these - Service authentication due to Group Membership

(Josef Noll) -> MasterThesis Security and privacy of the user WLAN security analysis, user behavior monitoring Home networks – Devices in a home network – Functionalities, user experience – Content protection and management – Integration of the mobile phone – DRM in the home Recommended topics: – WLAN security in home environment, data gathering – Development of a device domain controller and connect to mobile network – Explore capabilities of current media players with focus on encryption possibilites (Josef Noll & Mushfiq)

(Josef Noll) -> MasterThesis Please contact Take contact to Mushfiq: Gyuri: Najeeb: Sarfraz: Marianne: Josef: (Josef Noll & Mushfiq)