Protecting ubiquitous applications: beyond the Byzantine threats model

ShareThis
Δημοσίευση: 10-06-2007 01:54 | Προβολές: 3808
Σημαντική Ημερομηνία: 13-06-2007
[Έληξε]
image

Το Τμήμα Πληροφορικής του Ιονίου Πανεπιστημίου σας προσκαλεί στη διάλεξη του κ. Mike Burmester, Καθηγητή του Florida State University, Department of Computer Science, που θα πραγματοποιηθεί την Τετάρτη 13 Ιουνίου 2007 και ώρα 18:15 – 19:15 στην αίθουσα 3 του κτιρίου «Αρεταίος», με θέμα:

«Protecting ubiquitous applications: beyond the Byzantine threats model»


Lecture Abstract

The traditional security model for network applications developed over 30 years ago deals with threats in which the adversary can corrupt a bounded number of components. Although this model is adequate for network systems whose components are of a similar type (but operationally independent), it is not suitable for ubiquitous systems whose components may have very different features and be subject to a variety of constraints such as, power constraints (e.g., battery operated), communication/medium constraints (e.g., wireless) and computational constraints (restricted memory, IC footprint). In addition, some components may share a functionality, e.g., use the same OS, in which case the adversary may succeed in controlling large numbers of components by simply corrupting this functionality (e.g., infecting the OS with a virus).

While the goal of any security model is to provide holistic security, it is important that a dynamic and flexible approach is used.What is needed is a model that will guarantee holistic security if proven secure components are combined in a secure framework. In particular, replacing/adding components (or subsystems) by other proven secure components (subsystems) should not weaken the security of the system, or require a re-evaluation of its security---plug and play security mode.

The talk will focus on such issues including dependent component faults, light crypto tools and Universal Composability issues. We shall consider ubiquitous networks whose components range from RFIDs and sensors to PDAs, laptops, and servers, with topologies that combine fixed with wireless and ad hoc infrastructures (such as mesh networks).

Σχετικά με τον ομιλητή

Mike Burmester, Ph.D., is the Harris Professor of Computer Science at Florida State University, Tallahassee, Florida, and co-director of the SAIT Lab. He graduated from Athens University and received his Ph.D. from the University of Rome (La Sapienza), Italy. He joined the faculty at FSU in 2001 after more than 30 years of research and teaching at leading institutions around the world. Dr. Burmester has published more than 100 research papers in information security. His current research interests include cryptography, network security and ubiquitous applications. He is a fellow of the Institute of Mathematics and its Applications (FIMA), and a member of IEEE Computer Society and the International Association of Cryptological Research (IACR).


Επιστροφή
Σχετικά Νέα
Το Ιόνιο Πανεπιστήμιο διοργανώνει το 7ο Journey to Hope στην Κέρκυρα
Δημοσίευση: 16-04-2024 16:41 | Προβολές: 3778
Σημαντική Ημερομηνία: 29-04-2024
[Έληξε]
Συνημμένα αρχεία
gr  pdf.png  Αφίσα εκδήλωσης
Mέγεθος: 201.43 KB :: Τύπος: Αρχείο PDF

Ενημέρωση

Κτίριο Γραμματειών (Κτίριο 3) Πλατεία Τσιριγώτη 7 (πρώην Πλατεία Παλιού Ψυχιατρείου) Κέρκυρα, 49100 τηλ:26610 87760 / 87761 / 87763
e-mail: cs@ionio.gr
certification
<< <
Δεκέμβριος 2024
> >>
Δε Τρ Τε Πε Πα Σα Κυ
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Ανάγνωση ΚειμένουΑνάγνωση Κειμένου Αναγνωσιμότητα ΚειμένουΑναγνωσιμότητα Κειμένου Αντίθεση ΧρωμάτωνΑντίθεση Χρωμάτων
Επιλογές Προσβασιμότητας