1 / 19

User Scenarios & Security Considerations in APPAGG part 1/2

User Scenarios & Security Considerations in APPAGG part 1/2. 2003.03.31 Nobuhiro Kobayashi@Mitsubishi Electric Corp. n-koba@iss.isl.melco.co.jp. User Scenarios. from Section 7 “User Scenarios” in “Appliance Aggregation Architecture Terminology, Survey, and Scenarios”, March 2003. John.

dallass
Télécharger la présentation

User Scenarios & Security Considerations in APPAGG part 1/2

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. User Scenarios&Security ConsiderationsinAPPAGG part 1/2 2003.03.31 Nobuhiro Kobayashi@Mitsubishi Electric Corp. n-koba@iss.isl.melco.co.jp 1

  2. User Scenarios • fromSection 7 “User Scenarios” in“Appliance Aggregation Architecture Terminology, Survey, and Scenarios”, March 2003 2

  3. John First Scenario customers John John John waits for some customers. He is working at his office PC. 3

  4. First Scenario (cont.) We are visiting John. customers doorman doorman The customers are visiting John. The doorman meets customers. The doorman inserts the information. 4

  5. First Scenario (cont.) The customers arrival customers John John He is working at his office PC. They meet, and go to the meeting room. 5

  6. John First Scenario (cont.) The meeting room customers When they enter the room, the lights turn on and the coffee maker starts functioning. 6

  7. John John brings his watch close to the laptop, and his personal desktop with his work appears. First Scenario (cont.) 7

  8. New ideas for your product by John John customers The video-projector turns on, the lights turn down and the presentation begins. First Scenario (cont.) 8

  9. Mary First Scenario (cont.) Connect with Mary. John John gives an oral command to the system to connect with Mary. 9

  10. END Thank you. John customers Mary Mary gives the report. The report is saved in everyone’s mobile storage media. First Scenario (cont.) 10

  11. First Scenario (cont.) The meeting room John customers The video-projector turns off, the light turn on. 11

  12. Security Considerations • Premise or Restrictions or Conditions • Threat • Property (Security target) • Solution 12

  13. Premise or Restrictions or Conditions Premise ( Is this OK? ) • secure networking ( ? IPv6 ) Restrictions • Limited Resources • the lack of continuous access to the infrastructure (e.g. certificate authorities). • the low performance of computation • the narrow bandwidth between appliances • the small memory space 13

  14. Threat impersonation, spoof violation of privilege ( or control ) out of scope( Is this OK ? ) • DOS ( denial of service attack ) • eavesdrop ( ? solved by IPv6 ) • alteration ( ? solved by IPv6 ) • repudiation ( Is the log needed ? ) • tamper_resistance ( ? H/W matter ) • BUG 14

  15. Property (Security target) • The right ( to turn on the lights and the coffee maker ) • John has the rights. • The customers has no rights.orThe customers may has only the right to turn on the lights. • Command( to turn on/off ) • (?) The lights turns on itself. ( The lights knows the context. “John enters the room.”) • (?) The John’s watch sends the command to the lights. 15

  16. Property (Security target) • The right ( to use the laptop ) • John’s watch has the right to use the laptop. • The right ( to use John’s personal desktop ) • John’s watch has the right to use John’s personal desktop.orThe laptop belongs to John’s watch. Then, the laptop has the right to use John’s personal desktop. • Command( to power on the laptop ) • John’s watch send the command. • Command( to appear John’s personal desktop ) • John’s watch send the command. • The laptop send the command. 16

  17. Property (Security target) • The right ( to turn on the video-projector ) • The laptop has the right.and John’s watch can share the laptop’s rights.orJohn’s watch has the right. • The right ( to turn down the lights ) • The laptop has the right.and John’s watch can share the laptop’s rights.orThe video-projector has the right.and John’s watch can share the projector’s right.orJohn’s watch has the right. • The right ( to start presentation ) • John’s watch has the right. • Property (Security target) • Command( to turn on the video-projector ) • John’s watch send the command.orThe laptop send the command. • Command( to turn down the lights ) • John’s watch send the command.orThe laptop send the command.orThe projector send the command. • Command( to start presentation ) • John’s watch send the command. 17

  18. Property (Security target) • The right ( to connect with Mary ) • John has the right to connect with Mary. • The right ( to give oral command to system ) • John has the right to give oral command to system. ( System accept oral command by John )orEveryone’s voice has the right to give oral command to system.( System accept oral command. and The voice is recognized as John ) orJohn’s watch has the right to give oral command to the laptop. • Command ( to connect with Mary ) • The laptop send the command to system. 18

  19. Property (Security target) • The right ( to save report in John’s mobile storage media ) • Mary has the right to send report to storage media directly. ( anonymous ftp, e-mail, P2P, etc)orMary has the right to send report to the laptop.and the laptop has the right to save report in mobile storage media. • The right ( to save report in customer’s mobile storage media ) • Mary has the right to send report to storage media directly. ( anonymous ftp, e-mail, P2P, etc)orMary has the right to send report to the laptop.and John has the right to save report in customer’s mobile storage media.and the laptop share the right. • Command( to save report in John’s mobile storage media ) • Mary send command.orThe laptop send command.orThe John’s watch send command to laptop. 19

More Related