1 welcome hans andersson der yao leong yee jiun song wendy tobagus yang bei sherif yousef
TRANSCRIPT
![Page 1: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/1.jpg)
1
Welcome
Hans AnderssonDer Yao LeongYee Jiun Song
Wendy TobagusYang Bei
Sherif Yousef
![Page 2: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/2.jpg)
2
iSecurity Project Team
![Page 3: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/3.jpg)
3
Overview
BackgroundBackgroundVision and GoalsAccomplishmentsFuture WorkSummary
![Page 4: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/4.jpg)
4
Background
iSecurity Project– Joint project between KTH and Stanford
University– Security in an interactive environment
iSpace project – To create an international network of usable
augmented environments for collaborative, project-driven learning and working
iRoom & iLounge
![Page 5: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/5.jpg)
5
Motivation
The iSpace project was conceived in an academic environment
Security issues have not been a high priority However, security is essential for widespread
deployment
![Page 6: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/6.jpg)
6
Video
![Page 7: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/7.jpg)
7
Security Requirements
Security is a very important issue in Interactive Workspaces
Our security system ensures privacy and integrity
Convenience, customizability, accessibility and accountability are also ensured by our security system
![Page 8: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/8.jpg)
8
Overview
BackgroundVision and GoalsVision and GoalsAccomplishmentsFuture WorkSummary
![Page 9: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/9.jpg)
9
Vision and Goals
Our vision is to deliver a non-intrusive and robust security system for interactive environments
Social model Technically feasible system design Implementation Auditing tools Testing and evaluation
![Page 10: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/10.jpg)
10
Overview
BackgroundVision and GoalsAccomplishmentsAccomplishmentsFuture WorkSummary
![Page 11: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/11.jpg)
11
Accomplishments
Social Model Technical Design Implementation Auditing and Logging Tools Evaluation
![Page 12: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/12.jpg)
12
Social Model
Specify the nature of security in Interactive workspaces
Enumerate the objectives of the model Define the mechanisms by which these
objectives are accomplished.
![Page 13: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/13.jpg)
13
Ubicomp Security
Transparent, open and dynamic environment– Users and devices interacting spontaneously and
in an ad hoc fashion
Different security concerns compared to traditional computer environment
![Page 14: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/14.jpg)
14
Social Model Objectives
Integrity Privacy Availability Accountability Customizability Convenience
![Page 15: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/15.jpg)
15
Security Mechanisms
Gatekeeper Trust Groups
– Implicit Trust Groups– Explicit Trust Groups
Security Policy Definition– Permissions– Owners– Delegation
Authentication Privacy Guarantee Enforcement
![Page 16: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/16.jpg)
16
Technical Design
Map the ideas of the social model into a technical design that can be implemented
Specify the parts of the system and how they interact with each other
Specify authentication and security mechanisms Clear system and interface specifications, to allow
application design to proceed concurrently
![Page 17: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/17.jpg)
17
Secure Event Heap
A new secure Event Heap, built on top of the existing event heap server
Users are required to log into the system All events are checked by the security module before
they are sent or received All events can be traced back to a particular user Programmatic support for the development of secure
applications
![Page 18: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/18.jpg)
18
System Architecture
Event Heap
![Page 19: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/19.jpg)
19
Implementation
Implemented our design using Java SSL and crypto packages, and added security checking elements into Event Heap
Achieved:– Backwards compatibility– Secure communication– Permission management
iRoom now uses the secure version of Event Heap – all original applications run fine
No major problem
![Page 20: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/20.jpg)
20
Auditing and Logging Tools
Administrator should have the option of logging all activity
Provides traceability of security breaches Adapted a logging tool originally written by
Andy Szybalski Allows recording as well as browsing of logs,
also provides filtering capabilities
![Page 21: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/21.jpg)
21
Logging Tool
![Page 22: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/22.jpg)
22
Sample Applications
iPaint– Allows the sharing of a virtual whiteboard– All authenticated users can draw on it
Secure File Share– Allows the sharing of files– Three kinds of permissions (list, download,
upload)
![Page 23: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/23.jpg)
23
iPaint
![Page 24: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/24.jpg)
24
Secure File Share
![Page 25: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/25.jpg)
25
Permission Manager
![Page 26: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/26.jpg)
26
Evaluation
No detailed evaluation with real users Internal evaluation Useful security system that is easy to use More studies will be needed to determine if
our system fully meet users’ needs
![Page 27: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/27.jpg)
27
Overview
BackgroundVision and GoalsAccomplishmentsFuture WorkFuture WorkSummary
![Page 28: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/28.jpg)
28
Future Work
Performance improvement Flow Control Graphical User Interface Automatic monitoring and log-analysis tools
![Page 29: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/29.jpg)
29
Overview
BackgroundVision and GoalsAccomplishmentsFuture WorkSummarySummary
![Page 30: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/30.jpg)
30
Summary
iSpace infrastructure lacks security Ubicomp security issues are unique Our iSecurity system provides a non-
intrusive, robust security system for users System provides strong privacy and integrity
guarantees for users Rich area for future research work
![Page 31: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/31.jpg)
31
Questions
For further information about this project please visit our homepage:
http://csd.ssvl.kth.se/~csd2003-team16/index.htm
![Page 32: 1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef](https://reader036.vdocument.in/reader036/viewer/2022062500/5697bff21a28abf838cbc090/html5/thumbnails/32.jpg)