130 likes | 243 Views
A Research Agenda for the PrivSec WG. Dirk Trossen. Objectives for Today. Put together thoughts on how we worked in the past Distil commonalities Derive principles for working in the future Determines areas of interest for studies and work
E N D
A Research Agenda for the PrivSec WG Dirk Trossen
Objectives for Today • Put together thoughts on how we worked in the past • Distil commonalities • Derive principles for working in the future • Determines areas of interest for studies and work Most importantly: stimulate discussion on all of this today
Locator-Identifier Split Discussions • Implication of locator-identifier split on authentication schemes, addressing schemes, … • Looked at examples in SIP, RADIUS, I3, HIP, ... as to how authentication and identity is split between components ->architectural principles • understanding of placement of authentication and identity functionality between endpoint and network ->case study driven • Work performed through mix of sponsor- and MIT-driven contributions
T2T Discussions • Principles around circles of trust and the implications to E2E • Discussion just started but is seen as highly relevant to this WG ->architectural implications Possibly in the future: ->case study driven ->experimentally grounded
Tussle Space Discussions • Larger issue of tussle space design (from PrivSec point of view) • Original tussle paper identifies security and identity as a good example for tussle to happen ->architectural implications Possibly in the future: ->case study driven ->experimentally grounded
Privacy Discussions • Intel’s interest in privacy • See presentation that just happened ->case study of interest to (at least) one sponsor
LivingTheFuture • Security & Privacy in the environment of end-user driven innovation • Hands-on approach for trying out things -> experimentally grounded Possibly in the future: ->architectural implications ->case studies being implemented and validated
What to Take Into Account for a Future Research Agenda? • Tackle the larger picture -> Derive relevant principles for trust & privacy • Tie into architecture issues -> Architecture WG relation • Be concrete -> Case studies of importance to sponsors • Be grounded -> Experimental verification, if possible
Architectures Principles Case Studies LTF From Case Studies over Experiments to Concepts Create a virtuous cycle of • Deriving principles and architectures through case studies and experiments and • Verifying principles and architectural approaches in case studies and experiments
Potential Outcomes • Principles • High profile paper(s) possible • Case studies • Reports and papers on the case studies themselves (similar to VCDWG) • Code? • Depending on LTF governance • The Book • Contribution to the bigger picture on Open Communications
Potential Case Studies • Privacy (Intel) • More concrete info needed • Tussle space of publish-subscribe (BT) • Security and privacy is one of the key driver for pubsub solutions • LTF (MIT) • Study on privacy and security solutions for LTF plus implementation • Case study on T2T (anybody?) • Relation to tussle design, E2E • Derivation of T2T principles • Driven by concrete examples
Prerequisite for Implementation The proposed model requires active partner participation! We’ve got so far: • Intel • BT • NSN? • ?