Presentation is loading. Please wait.

Presentation is loading. Please wait.

Little Demonstration of the Power in Discovery Jason Hill, Steve Ross David E. Culler Computer Science Division U.C. Berkeley.

Similar presentations


Presentation on theme: "Little Demonstration of the Power in Discovery Jason Hill, Steve Ross David E. Culler Computer Science Division U.C. Berkeley."— Presentation transcript:

1 Little Demonstration of the Power in Discovery Jason Hill, Steve Ross David E. Culler Computer Science Division U.C. Berkeley

2 IBM 5/11/99Demo2 Understanding Going In Key Leverage: Composable Services –ease of authoring by automated scalability, availability –push services into the infrastructure –build new services from component services Key Tool: Transcoding Operators –adapt form or content to desired use Security fundamental to Universal Computing Tremendous Diversity Emerging without Plan –wide array of services –clients => information appliances Small devices impose interesting constraints

3 IBM 5/11/99Demo3 Example Pilot too slow to support effective Public Key Encryption (eg, SSL) –shared key techniques are viable (eg., DES) => encryption proxy –device interacts with trusted proxy using shared secret –proxy interacts with rest of the internet using PKI The Really Important Idea: Identity Service –a strong box to lock away all your keys –a critical level of indirection –map: you and your mode of access -> your identity and mode of authentication at each service Weak Client Encription Proxy Service SSL RMI(DES)

4 IBM 5/11/99Demo4 Typical Internet Service DATEK (Trust Contract) Trusted Client https

5 IBM 5/11/99Demo5 Infrastructure Services: Embedded Untrusted Interface Key Store DATEK (Trust Contract) Trusted Client Content Filter (pseudonym) https Embeded Untrusted Client https sRMI NINJA

6 IBM 5/11/99Demo6 Constrained Personal Info Appliance - Untrusted Gateway Key Store RMI PXY DATEK (Trust Contract) Trusted Client Content Filter (pseudonym) https Embeded Untrusted Client https sRMI Personal Appl GWY CF NINJA ST

7 IBM 5/11/99Demo7 Uniform Access to Diverse Services Key Store RMI PXY DATEK (Trust Contract) Trusted Client Content Filter (pseudonym) https Embeded Untrusted Client https sRMI Personal Appl GWY CF NINJA Trade-R-us ST

8 IBM 5/11/99Demo8 Automated “Clients” Key Store RMI PXY DATEK (Trust Contract) Trusted Client Content Filter (pseudonym) https Embeded Untrusted Client https sRMI Personal Appl GWY CF NINJA Trade-R-us BOT svc ST

9 IBM 5/11/99Demo9 Take-Away Composable Services in the infrastructure –key enabling concept –new level of “programming” Towards an Architecture for Universal Computing –in the presence of diverse concurrent development Eureka Phenomenon –the most fundamental service are probably those yet to be discovered »ex: identity service –only find them by building the world and living in it


Download ppt "Little Demonstration of the Power in Discovery Jason Hill, Steve Ross David E. Culler Computer Science Division U.C. Berkeley."

Similar presentations


Ads by Google