SecurityPolicyImplementationStrategiesforCommonCarrier公共运输的安全策略的实施策略

上传人:ra****d 文档编号:252343916 上传时间:2024-11-14 格式:PPT 页数:14 大小:1MB
返回 下载 相关 举报
SecurityPolicyImplementationStrategiesforCommonCarrier公共运输的安全策略的实施策略_第1页
第1页 / 共14页
SecurityPolicyImplementationStrategiesforCommonCarrier公共运输的安全策略的实施策略_第2页
第2页 / 共14页
SecurityPolicyImplementationStrategiesforCommonCarrier公共运输的安全策略的实施策略_第3页
第3页 / 共14页
点击查看更多>>
资源描述
Click to edit Master title style,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,*,Click to edit Master title style,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,Click to edit Master title style,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,*,Click to edit Master title style,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,*,Click to edit Master title style,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,*,Click to edit Master title style,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,*,Click to edit Master title style,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,Security Policy Implementation Strategies forCommon Carrier Monitoring Service ProvidersShort Position Paper for IEEE POLICY 2021,Carl A.Gunter,University of Illinois,Monitoring Service Provider(MSP),collects data from monitored parties,conveys it to users.,Example:monitoring for security and fire emergencies.,Advantages,Division of labor,Deals with heterogeneity,change,Provides value added services like routing and triage,Economy of scale,Monitoring Service Provider,MSP Components,Applied to telecommunication carriers:limited responsibility for content,Basis under US law,Restatement of Torts(Rest.2d Torts sections 581,612),the Digital Millennium Copyright Act(17 U.S.C.section 512),and the Communications Decency Act immunity for interactive computer service(47 U.S.C.sec 230).,This talk:,Argue for three technologies that support the implementation of,Common Carrier MSPs(CCMSPs),Illustrate with two application areas,Common Carrier Protection,Healthcare,Assisted living:monitor vital signs of assisted persons,Increasing number of elderly,rising healthcare costs,desire for independent living,Enabled by advances in networking,sensors,and healthcare IT systems,Assisted Living Service Provider(ALSP),is an MSP for assisted living,Energy Systems,Advanced Meter Infrastructure(AMI):computers with wireless digital links monitor and may control power usage.,Facilitates demand response and distributed generation,.for“Smart Grid,Meter Data Management Service(MDMS)is an MSP for AMI,Application Areas,AMI Components and Applications,Technology,Service Oriented Architecture(SOA)(aka“web services)is distributed computing based on a set of standardized formats for B2B web commerce developed by W3C and Oasis,Provide support for flexible security,including encryption,Provides security capabilities beyond SSL/TLS,Application,ALSP design can use SOA with XMLENC to provide end-to-end encryption model,Easy to implement with existing platforms,Assures that the ALSP collects only the routing data it needs,not medical data it does not process,CCMSP protection,Enabling Technologies 1,Drop-Box Architecture,E,nc,Health status,Enc,Reminder,Store,&,Forward,Medical,Device,Monitoring,Service,Clinician,8,May,Shin,Gunter,FMSE 07,Message Encryption,Header Information,(Including sender,recipient,data ID etc.),Medical data,(readings,checksum,etc),Header Information,(Including sender,recipient,data ID etc.),Medical data,(readings,checksum,etc),Header Information,(Including sender,recipient,data ID etc.),Medical data,(readings,checksum,etc),Stored in ALSP,Transmitted over network,Only authorized people,can see,Technology,Attribute-Based Encryption(ABE),New public key cryptography based on Identity-Based Encryption(IBE),Encrypts using a policy based on attributes,Prevents collusion between parties with attributes,Application,Provides ALSP a flexible way to dispatch encrypted messages to parties without knowing more than their attributes,Message to attending and primary care physicians can be encrypted under doctor attribute,Minimizes key management while supporting CCMSP,Enabling Technologies 2,Attribute-Based Messaging Encryption,Bobba,Fatemieh,Khan,Khan,Gunter,Khanna,Prabhakaran,TISSEC 09,Technology,Remote Attestation,is the concept of checking remote system state using a trusted monitoring element,Protection levels vary:software or also hardware tamper resistance,TPM now common in PCs,Need to extend technology to embedded processors(e.g.flash MPUs),Application,Residential loads generate details useful to residents but not by utility,Desirable to leave details behind and collect aggregate data needed for billing,Remote attestation offers some assurance for the aggregation,especially for updatable software meters,Enabling Technologies 3,Cumulative Attestation for Embedded Processors,LeMay,Gunter,ESORICS 07,Architecture,MSP,Monitoring Service Provider,CCMSP,Common Carrier MSP,Application,ALSP,Assisted Living Service Provider,MDMS,Meter Data Management Service,Technology,SOA,Service Oriented Architecture,ABE and ABM,Attribute-Based Encryption and Messaging,Remote Attestation,Summary,
展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 商业管理 > 商业计划


copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!