SlideShare a Scribd company logo
IADIS e-Society 2004



 Lisbon
Portugal
                 Building multi-services
               in personal mobile devices
           based on partially trusted domains



                           Miguel Pardal (mflpar@yahoo.co.uk)
                       Alberto Cunha (alberto.cunha@inesc.pt)


                                              July 19th 2004
Overview


             • Personal devices
             • Self-contained services
                – Examples
             • Multi-services
                – Opportunities
             • Work in progress
                – Pilot implementation




2004-07-19           Building multi-services on partially trusted domains   2
Personal devices
• Examples:
     – Smart card
     – Mobile phone
     – PDA
• Enable information access anywhere
     – With little effort
     – At reasonable cost
• Can make service delivery more effective
2004-07-19       Building multi-services on partially trusted domains   3
Service delivery model
• Device-based service
     – The user has a device that can be used in a terminal
     – Data networks support information flows with business
       servers




2004-07-19        Building multi-services on partially trusted domains   4
Service examples
•   Transport tickets
•   Automated banking
•   Mobile communication
•   Health card
•   Public identification
•   Etc.

2004-07-19    Building multi-services on partially trusted domains   5   …
Service components
   Service                                                                          Supervising
                  User Device             Terminal               Infrastructure
                                                                                    organization


                 Magnetic stripe             ATM                   Secure private     Bank(s)
 Automated           card                                            network
  banking                                                          Bank servers


   Mobile
                   SIM Card                 Mobile               Cellular Network     Network
communication                               phone                Back-end servers     operator


                   Smart-card               Point-of-          Transport network     Transport
                                              sale                                   authority
Transportation                                Entry
                                             point


   2004-07-19             Building multi-services on partially trusted domains             6
Service examples
•   Transport tickets
•   Automated banking
•   Mobile communication
•   Health card
•   Public identification
•   Etc.

2004-07-19    Building multi-services on partially trusted domains   7
Selected subset of services
• Main requirements:
     – Valuable
     – Large scale and widespread
     – Fast interactions
• To satisfy these requirements
  economically:
     – Distributed architecture
     – Almost-never-connected to
       remote servers
• Security must be enforced on local interactions
     – Consistency checked later
2004-07-19         Building multi-services on partially trusted domains   8
Self-contained service
• The service typically:
     – Belongs to a single business area
     – Has specific devices, terminals and infrastructure
     – Has a supervising organization to ensure trust


• Strengths
     – Standard design and technology
• Weaknesses
     – ‘One device per service’
     – Difficult to extend beyond their original use
2004-07-19            Building multi-services on partially trusted domains   9
New value approach
• Improve services
     – Customers
             • Same device for multiple services
             • More convenience and other potential benefits
                – Ex. discounts
     – Service providers
             • Reach customers through new channels
     – Supervising organizations
             • Increase infrastructure return-on-investment

2004-07-19             Building multi-services on partially trusted domains   10
Multi-services
• Compose different self-contained services
   – Ex. device level or terminal level




• Aiming for more open and dynamic services
   – Assume only partial trust
   – Support restricted information and functionality sharing
 2004-07-19        Building multi-services on partially trusted domains   11
Our goal
• Develop models and tools to produce
  technical assurances that allow
  organizations to establish the partial trust
  relationship between them to deliver the
  service




2004-07-19    Building multi-services on partially trusted domains   12
Related work
• Multi-application interoperability
     – Standard application frameworks for cards or
       other devices
• Security assurance mechanisms
• Auditing
• Device certification
     – Hardware
     – Software

2004-07-19        Building multi-services on partially trusted domains   13
Pilot implementation
• Identify benefits and limitations of approach

• Use of payment network to load new tickets in
  secure transport card
     – Transport operator does not give up control of its
       security keys for ticket loading to the payment service
       provider




2004-07-19         Building multi-services on partially trusted domains   14
Pilot approach




2004-07-19   Building multi-services on partially trusted domains   15
Why partial trust?
• There are already examples of combined services:
     – Co-branded credit cards
• However, they’re managed by a single dominant
  organization, fully trusted by all business partners
     – In this sense, they’re not much different from self-
       contained services!
• True multi-services entail only partial trust
     – Existing approaches assume a total trust domain
     – We want to make trust explicit in models and tools
2004-07-19         Building multi-services on partially trusted domains   16
Questions & Answers
                                       “Going from an issuer card to a user
                                       card…”
                                                                       In (Zóreda and Otón, 1994)


                                      “(The device is) their electronic Identity,
                                      their reliable key to e-services”.
                                         In OSCIE vol. 3-5, eEurope Smart Cards, 2003
         Thank you!

         Miguel Pardal
      mflpar@yahoo.co.uk


 2004-07-19                Building multi-services on partially trusted domains            17

More Related Content

What's hot

offload
 offload offload
offload
xingbei
 
Broadview Networks Site Seller R2011
Broadview Networks Site Seller R2011Broadview Networks Site Seller R2011
Broadview Networks Site Seller R2011
dshetterly
 
Welcome to Level(3)
Welcome to Level(3)Welcome to Level(3)
Welcome to Level(3)
djpuccio
 
Developing a Comprehensive Carrier Ethernet Business Portfolio
Developing a Comprehensive Carrier Ethernet Business PortfolioDeveloping a Comprehensive Carrier Ethernet Business Portfolio
Developing a Comprehensive Carrier Ethernet Business Portfolio
Kuncoro Wastuwibowo
 
Total Network Solutions
Total Network SolutionsTotal Network Solutions
Total Network Solutions
Tata Communications
 
From Telkom for IYCE Award Candidates
From Telkom for IYCE Award CandidatesFrom Telkom for IYCE Award Candidates
From Telkom for IYCE Award Candidates
Kuncoro Wastuwibowo
 
Bw Overview 0607
Bw Overview 0607Bw Overview 0607
Bw Overview 0607
fantastic1
 
Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0
Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0
Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0
Mitchell Menezes
 
1vc.tv approach for securuty vertical
1vc.tv approach for securuty vertical1vc.tv approach for securuty vertical
1vc.tv approach for securuty vertical
VMukti Solutions Pvt. Ltd.
 
NSN / Samsung Brusknet PR
NSN / Samsung Brusknet PRNSN / Samsung Brusknet PR
NSN / Samsung Brusknet PR
naeemmirza
 
Gtt Overview
Gtt OverviewGtt Overview
Gtt Overview
bigshowbrandon
 
Cdn prospects 2011
Cdn prospects 2011Cdn prospects 2011
Cdn prospects 2011
Dr.Joko Suryana
 
Ch08
Ch08Ch08
ABSS Essentials
ABSS EssentialsABSS Essentials
ABSS Essentials
Chris Keaton
 
"End-to-end Interoperability and Mobile Services"
"End-to-end Interoperability and Mobile Services" "End-to-end Interoperability and Mobile Services"
"End-to-end Interoperability and Mobile Services"
John Loughney
 
Rubik Financial - Introduction- March 2012
Rubik Financial - Introduction- March 2012Rubik Financial - Introduction- March 2012
Rubik Financial - Introduction- March 2012
Shelf Companies Aust
 
CORE2AFRICA 4page Brochure
CORE2AFRICA 4page BrochureCORE2AFRICA 4page Brochure
CORE2AFRICA 4page Brochure
Nigel Van Tura
 
The Case for WiFi: Optimizing Your Network for Mobile Commerce
The Case for WiFi: Optimizing Your Network for Mobile CommerceThe Case for WiFi: Optimizing Your Network for Mobile Commerce
The Case for WiFi: Optimizing Your Network for Mobile Commerce
CradlePoint
 
Corporate Products & Network
Corporate Products & NetworkCorporate Products & Network
Corporate Products & Network
SalmanSK
 
Hp Sdp Evolution
Hp Sdp EvolutionHp Sdp Evolution
Hp Sdp Evolution
Marie-Paule Odini
 

What's hot (20)

offload
 offload offload
offload
 
Broadview Networks Site Seller R2011
Broadview Networks Site Seller R2011Broadview Networks Site Seller R2011
Broadview Networks Site Seller R2011
 
Welcome to Level(3)
Welcome to Level(3)Welcome to Level(3)
Welcome to Level(3)
 
Developing a Comprehensive Carrier Ethernet Business Portfolio
Developing a Comprehensive Carrier Ethernet Business PortfolioDeveloping a Comprehensive Carrier Ethernet Business Portfolio
Developing a Comprehensive Carrier Ethernet Business Portfolio
 
Total Network Solutions
Total Network SolutionsTotal Network Solutions
Total Network Solutions
 
From Telkom for IYCE Award Candidates
From Telkom for IYCE Award CandidatesFrom Telkom for IYCE Award Candidates
From Telkom for IYCE Award Candidates
 
Bw Overview 0607
Bw Overview 0607Bw Overview 0607
Bw Overview 0607
 
Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0
Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0
Smallworld_Network_Inventory_Brochure_-_print-HR_with_bleed_for_printers_0
 
1vc.tv approach for securuty vertical
1vc.tv approach for securuty vertical1vc.tv approach for securuty vertical
1vc.tv approach for securuty vertical
 
NSN / Samsung Brusknet PR
NSN / Samsung Brusknet PRNSN / Samsung Brusknet PR
NSN / Samsung Brusknet PR
 
Gtt Overview
Gtt OverviewGtt Overview
Gtt Overview
 
Cdn prospects 2011
Cdn prospects 2011Cdn prospects 2011
Cdn prospects 2011
 
Ch08
Ch08Ch08
Ch08
 
ABSS Essentials
ABSS EssentialsABSS Essentials
ABSS Essentials
 
"End-to-end Interoperability and Mobile Services"
"End-to-end Interoperability and Mobile Services" "End-to-end Interoperability and Mobile Services"
"End-to-end Interoperability and Mobile Services"
 
Rubik Financial - Introduction- March 2012
Rubik Financial - Introduction- March 2012Rubik Financial - Introduction- March 2012
Rubik Financial - Introduction- March 2012
 
CORE2AFRICA 4page Brochure
CORE2AFRICA 4page BrochureCORE2AFRICA 4page Brochure
CORE2AFRICA 4page Brochure
 
The Case for WiFi: Optimizing Your Network for Mobile Commerce
The Case for WiFi: Optimizing Your Network for Mobile CommerceThe Case for WiFi: Optimizing Your Network for Mobile Commerce
The Case for WiFi: Optimizing Your Network for Mobile Commerce
 
Corporate Products & Network
Corporate Products & NetworkCorporate Products & Network
Corporate Products & Network
 
Hp Sdp Evolution
Hp Sdp EvolutionHp Sdp Evolution
Hp Sdp Evolution
 

Similar to Building multi-services in personal mobile devices based on partially trusted domains

Next genits closing_event
Next genits closing_eventNext genits closing_event
Next genits closing_event
imec.archive
 
Mobile Authentication on the Internet
Mobile Authentication on the InternetMobile Authentication on the Internet
Mobile Authentication on the Internet
evidos
 
Sedlacek, Dostal
Sedlacek, DostalSedlacek, Dostal
Sedlacek, Dostal
TUESDAY Business Network
 
Creating a smarter world with eSIM
Creating a smarter world with eSIMCreating a smarter world with eSIM
Creating a smarter world with eSIM
JT IoT
 
SeeMoto - Sensors As A Service
SeeMoto - Sensors As A ServiceSeeMoto - Sensors As A Service
SeeMoto - Sensors As A Service
Marko Kyrölä
 
Mobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, Qtel
Mobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, QtelMobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, Qtel
Mobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, Qtel
Until ROI
 
The Hague Tech Conference - Impact of Networks & Comms on Smart Cities
The Hague Tech Conference - Impact of Networks & Comms on Smart CitiesThe Hague Tech Conference - Impact of Networks & Comms on Smart Cities
The Hague Tech Conference - Impact of Networks & Comms on Smart Cities
Dean Bubley
 
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
Nok Nok Labs, Inc
 
EarthLink Business mpls overview
EarthLink Business mpls overviewEarthLink Business mpls overview
EarthLink Business mpls overview
Ross McVey
 
EarthLink Business Corporate Overview pres 6 13-11
EarthLink Business Corporate Overview pres 6 13-11 EarthLink Business Corporate Overview pres 6 13-11
EarthLink Business Corporate Overview pres 6 13-11
denisweickert
 
OpenID Connect: The Mobile Profile
OpenID Connect: The Mobile ProfileOpenID Connect: The Mobile Profile
OpenID Connect: The Mobile Profile
Bjorn Hjelm
 
2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction
Szymon Dowgwillowicz-Nowicki
 
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Ioannis Krontiris
 
TADS Telecom Summit Huawei Mac Taylor
TADS Telecom Summit Huawei Mac TaylorTADS Telecom Summit Huawei Mac Taylor
TADS Telecom Summit Huawei Mac Taylor
Alan Quayle
 
Verso IoT experience – What have we learned from implementations all over the...
Verso IoT experience – What have we learned from implementations all over the...Verso IoT experience – What have we learned from implementations all over the...
Verso IoT experience – What have we learned from implementations all over the...
Bosnia Agile
 
7.2 gsm-association-fraud-forum
7.2 gsm-association-fraud-forum7.2 gsm-association-fraud-forum
7.2 gsm-association-fraud-forum
kkvences
 
Why Collaborate? Graham Nicholls, Extrada Inc.
Why Collaborate? Graham Nicholls, Extrada Inc.Why Collaborate? Graham Nicholls, Extrada Inc.
Why Collaborate? Graham Nicholls, Extrada Inc.
mfrancis
 
OpenID Foundation Workshop at EIC2017
OpenID Foundation Workshop at EIC2017OpenID Foundation Workshop at EIC2017
OpenID Foundation Workshop at EIC2017
Bjorn Hjelm
 
End-to-End and e-Business Value from the Telematics Reference Implementation ...
End-to-End and e-Business Value from the Telematics Reference Implementation ...End-to-End and e-Business Value from the Telematics Reference Implementation ...
End-to-End and e-Business Value from the Telematics Reference Implementation ...
mfrancis
 
Future of m commerce
Future of m commerceFuture of m commerce
Future of m commerce
Alok Gupta
 

Similar to Building multi-services in personal mobile devices based on partially trusted domains (20)

Next genits closing_event
Next genits closing_eventNext genits closing_event
Next genits closing_event
 
Mobile Authentication on the Internet
Mobile Authentication on the InternetMobile Authentication on the Internet
Mobile Authentication on the Internet
 
Sedlacek, Dostal
Sedlacek, DostalSedlacek, Dostal
Sedlacek, Dostal
 
Creating a smarter world with eSIM
Creating a smarter world with eSIMCreating a smarter world with eSIM
Creating a smarter world with eSIM
 
SeeMoto - Sensors As A Service
SeeMoto - Sensors As A ServiceSeeMoto - Sensors As A Service
SeeMoto - Sensors As A Service
 
Mobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, Qtel
Mobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, QtelMobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, Qtel
Mobile WiMAX drives speed to market for 4G networks By Data Sharan Mishra, Qtel
 
The Hague Tech Conference - Impact of Networks & Comms on Smart Cities
The Hague Tech Conference - Impact of Networks & Comms on Smart CitiesThe Hague Tech Conference - Impact of Networks & Comms on Smart Cities
The Hague Tech Conference - Impact of Networks & Comms on Smart Cities
 
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok LabsFIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
 
EarthLink Business mpls overview
EarthLink Business mpls overviewEarthLink Business mpls overview
EarthLink Business mpls overview
 
EarthLink Business Corporate Overview pres 6 13-11
EarthLink Business Corporate Overview pres 6 13-11 EarthLink Business Corporate Overview pres 6 13-11
EarthLink Business Corporate Overview pres 6 13-11
 
OpenID Connect: The Mobile Profile
OpenID Connect: The Mobile ProfileOpenID Connect: The Mobile Profile
OpenID Connect: The Mobile Profile
 
2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction
 
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
 
TADS Telecom Summit Huawei Mac Taylor
TADS Telecom Summit Huawei Mac TaylorTADS Telecom Summit Huawei Mac Taylor
TADS Telecom Summit Huawei Mac Taylor
 
Verso IoT experience – What have we learned from implementations all over the...
Verso IoT experience – What have we learned from implementations all over the...Verso IoT experience – What have we learned from implementations all over the...
Verso IoT experience – What have we learned from implementations all over the...
 
7.2 gsm-association-fraud-forum
7.2 gsm-association-fraud-forum7.2 gsm-association-fraud-forum
7.2 gsm-association-fraud-forum
 
Why Collaborate? Graham Nicholls, Extrada Inc.
Why Collaborate? Graham Nicholls, Extrada Inc.Why Collaborate? Graham Nicholls, Extrada Inc.
Why Collaborate? Graham Nicholls, Extrada Inc.
 
OpenID Foundation Workshop at EIC2017
OpenID Foundation Workshop at EIC2017OpenID Foundation Workshop at EIC2017
OpenID Foundation Workshop at EIC2017
 
End-to-End and e-Business Value from the Telematics Reference Implementation ...
End-to-End and e-Business Value from the Telematics Reference Implementation ...End-to-End and e-Business Value from the Telematics Reference Implementation ...
End-to-End and e-Business Value from the Telematics Reference Implementation ...
 
Future of m commerce
Future of m commerceFuture of m commerce
Future of m commerce
 

More from Miguel Pardal

Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023
Miguel Pardal
 
Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019
Miguel Pardal
 
SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)
Miguel Pardal
 
Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018
Miguel Pardal
 
IoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fieldsIoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fields
Miguel Pardal
 
Rastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) CoisasRastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) Coisas
Miguel Pardal
 
Vulnerability-tolerant Transport Layer Security
Vulnerability-tolerant Transport Layer SecurityVulnerability-tolerant Transport Layer Security
Vulnerability-tolerant Transport Layer Security
Miguel Pardal
 
Master Beginners
Master BeginnersMaster Beginners
Master Beginners
Miguel Pardal
 
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Miguel Pardal
 
Precision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of ThingsPrecision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of Things
Miguel Pardal
 
Smart Places INForum16 presentation
Smart Places INForum16 presentationSmart Places INForum16 presentation
Smart Places INForum16 presentation
Miguel Pardal
 
Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)
Miguel Pardal
 
LaTeX workshop (NEB)
LaTeX workshop (NEB)LaTeX workshop (NEB)
LaTeX workshop (NEB)
Miguel Pardal
 
Thesis for beginners 2015-10
Thesis for beginners 2015-10Thesis for beginners 2015-10
Thesis for beginners 2015-10
Miguel Pardal
 
LaTeX workshop (JEQ)
LaTeX workshop (JEQ)LaTeX workshop (JEQ)
LaTeX workshop (JEQ)
Miguel Pardal
 
Thesis for beginners
Thesis for beginnersThesis for beginners
Thesis for beginners
Miguel Pardal
 
Scalable and secure RFID data discovery
Scalable and secure RFID data discoveryScalable and secure RFID data discovery
Scalable and secure RFID data discovery
Miguel Pardal
 
Breve introdução à investigação
Breve introdução à investigaçãoBreve introdução à investigação
Breve introdução à investigação
Miguel Pardal
 
Eclipse workshop presentation
Eclipse workshop presentationEclipse workshop presentation
Eclipse workshop presentation
Miguel Pardal
 
BEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things classBEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things class
Miguel Pardal
 

More from Miguel Pardal (20)

Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023
 
Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019
 
SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)
 
Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018
 
IoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fieldsIoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fields
 
Rastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) CoisasRastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) Coisas
 
Vulnerability-tolerant Transport Layer Security
Vulnerability-tolerant Transport Layer SecurityVulnerability-tolerant Transport Layer Security
Vulnerability-tolerant Transport Layer Security
 
Master Beginners
Master BeginnersMaster Beginners
Master Beginners
 
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
 
Precision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of ThingsPrecision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of Things
 
Smart Places INForum16 presentation
Smart Places INForum16 presentationSmart Places INForum16 presentation
Smart Places INForum16 presentation
 
Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)
 
LaTeX workshop (NEB)
LaTeX workshop (NEB)LaTeX workshop (NEB)
LaTeX workshop (NEB)
 
Thesis for beginners 2015-10
Thesis for beginners 2015-10Thesis for beginners 2015-10
Thesis for beginners 2015-10
 
LaTeX workshop (JEQ)
LaTeX workshop (JEQ)LaTeX workshop (JEQ)
LaTeX workshop (JEQ)
 
Thesis for beginners
Thesis for beginnersThesis for beginners
Thesis for beginners
 
Scalable and secure RFID data discovery
Scalable and secure RFID data discoveryScalable and secure RFID data discovery
Scalable and secure RFID data discovery
 
Breve introdução à investigação
Breve introdução à investigaçãoBreve introdução à investigação
Breve introdução à investigação
 
Eclipse workshop presentation
Eclipse workshop presentationEclipse workshop presentation
Eclipse workshop presentation
 
BEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things classBEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things class
 

Recently uploaded

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 

Recently uploaded (20)

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 

Building multi-services in personal mobile devices based on partially trusted domains

  • 1. IADIS e-Society 2004 Lisbon Portugal Building multi-services in personal mobile devices based on partially trusted domains Miguel Pardal (mflpar@yahoo.co.uk) Alberto Cunha (alberto.cunha@inesc.pt) July 19th 2004
  • 2. Overview • Personal devices • Self-contained services – Examples • Multi-services – Opportunities • Work in progress – Pilot implementation 2004-07-19 Building multi-services on partially trusted domains 2
  • 3. Personal devices • Examples: – Smart card – Mobile phone – PDA • Enable information access anywhere – With little effort – At reasonable cost • Can make service delivery more effective 2004-07-19 Building multi-services on partially trusted domains 3
  • 4. Service delivery model • Device-based service – The user has a device that can be used in a terminal – Data networks support information flows with business servers 2004-07-19 Building multi-services on partially trusted domains 4
  • 5. Service examples • Transport tickets • Automated banking • Mobile communication • Health card • Public identification • Etc. 2004-07-19 Building multi-services on partially trusted domains 5 …
  • 6. Service components Service Supervising User Device Terminal Infrastructure organization Magnetic stripe ATM Secure private Bank(s) Automated card network banking Bank servers Mobile SIM Card Mobile Cellular Network Network communication phone Back-end servers operator Smart-card Point-of- Transport network Transport sale authority Transportation Entry point 2004-07-19 Building multi-services on partially trusted domains 6
  • 7. Service examples • Transport tickets • Automated banking • Mobile communication • Health card • Public identification • Etc. 2004-07-19 Building multi-services on partially trusted domains 7
  • 8. Selected subset of services • Main requirements: – Valuable – Large scale and widespread – Fast interactions • To satisfy these requirements economically: – Distributed architecture – Almost-never-connected to remote servers • Security must be enforced on local interactions – Consistency checked later 2004-07-19 Building multi-services on partially trusted domains 8
  • 9. Self-contained service • The service typically: – Belongs to a single business area – Has specific devices, terminals and infrastructure – Has a supervising organization to ensure trust • Strengths – Standard design and technology • Weaknesses – ‘One device per service’ – Difficult to extend beyond their original use 2004-07-19 Building multi-services on partially trusted domains 9
  • 10. New value approach • Improve services – Customers • Same device for multiple services • More convenience and other potential benefits – Ex. discounts – Service providers • Reach customers through new channels – Supervising organizations • Increase infrastructure return-on-investment 2004-07-19 Building multi-services on partially trusted domains 10
  • 11. Multi-services • Compose different self-contained services – Ex. device level or terminal level • Aiming for more open and dynamic services – Assume only partial trust – Support restricted information and functionality sharing 2004-07-19 Building multi-services on partially trusted domains 11
  • 12. Our goal • Develop models and tools to produce technical assurances that allow organizations to establish the partial trust relationship between them to deliver the service 2004-07-19 Building multi-services on partially trusted domains 12
  • 13. Related work • Multi-application interoperability – Standard application frameworks for cards or other devices • Security assurance mechanisms • Auditing • Device certification – Hardware – Software 2004-07-19 Building multi-services on partially trusted domains 13
  • 14. Pilot implementation • Identify benefits and limitations of approach • Use of payment network to load new tickets in secure transport card – Transport operator does not give up control of its security keys for ticket loading to the payment service provider 2004-07-19 Building multi-services on partially trusted domains 14
  • 15. Pilot approach 2004-07-19 Building multi-services on partially trusted domains 15
  • 16. Why partial trust? • There are already examples of combined services: – Co-branded credit cards • However, they’re managed by a single dominant organization, fully trusted by all business partners – In this sense, they’re not much different from self- contained services! • True multi-services entail only partial trust – Existing approaches assume a total trust domain – We want to make trust explicit in models and tools 2004-07-19 Building multi-services on partially trusted domains 16
  • 17. Questions & Answers “Going from an issuer card to a user card…” In (Zóreda and Otón, 1994) “(The device is) their electronic Identity, their reliable key to e-services”. In OSCIE vol. 3-5, eEurope Smart Cards, 2003 Thank you! Miguel Pardal mflpar@yahoo.co.uk 2004-07-19 Building multi-services on partially trusted domains 17