1 / 10

Exploring Security, Trust, and Peer-to-Peer Delivery in Mobile Contexts

This research summary by Dr. Raimund K. Ege focuses on key cybersecurity concepts, including the CIA security triad—confidentiality, integrity, and availability—within the mobile context. It investigates trust and access control models, the role of peer-to-peer delivery networks, and opportunities for student participation in Java programming projects for both desktop and mobile Android platforms. Topics such as intellectual property protection, encrypted transmission, and the use of the BouncyCastle/SpongyCastle crypto library are also covered, providing a comprehensive overview of computer science innovation at NIU.

yestin
Télécharger la présentation

Exploring Security, Trust, and Peer-to-Peer Delivery in Mobile Contexts

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Dr. RaimundEge: Research Summary • Security in the Mobile Context • Trust and Access control models • Peer-to-peer delivery networks • Opportunities for student participation: • Java programming for desktop peers • Java Cryptographic Architecture • Java Android programming • BouncyCastle/SpongyCastle crypto library Ege - NIU - Computer Science

  2. Research OverviewSecurity in the Mobile Context Dr. Raimund K. Ege

  3. CyberSecurity Concepts • CIA Security Triad • confidentiality • integrity • availability • plus: A and A • authenticity • accountability Ege - NIU - Computer Science

  4. Mobile Context • smartphone access to multi-media content • broadband internet throughput: 4G • delivery from single source bottleneck • ex.: youtube.com • peer-to-peer content delivery network • ex.: bittorrent Ege - NIU - Computer Science

  5. Mobile Security • intellectual property protection • authentication creates trust in identity • authorization grants access • trust management models • encrypted transmission • implementation: Java & Android Ege - NIU - Computer Science

  6. P2P Framework • network of trusted peers • no central control or server • startup via bootstrap peer • new peers join and gain trust • via positive participation or referral • distribution of trust nuggets • signed in PKI context Ege - NIU - Computer Science

  7. P2P Content Delivery Ege - NIU - Computer Science

  8. Trust Management Ege - NIU - Computer Science

  9. Android Prototype Ege - NIU - Computer Science

  10. Opportunities for Participation • Java programming for desktop peers • Java Cryptographic Architecture • Java Android programming • Spongy Castle • explore Trust and Access control models Ege - NIU - Computer Science

More Related