Little Demonstration of the Power in Discovery - PowerPoint PPT Presentation

1 / 9
About This Presentation
Title:

Little Demonstration of the Power in Discovery

Description:

adapt form or content to desired use. Security fundamental to Universal Computing ... Content Filter (pseudonym) https. Embeded. Untrusted. Client. https. sRMI ... – PowerPoint PPT presentation

Number of Views:58
Avg rating:3.0/5.0
Slides: 10
Provided by: DavidE2
Category:

less

Transcript and Presenter's Notes

Title: Little Demonstration of the Power in Discovery


1
Little Demonstration of the Power in Discovery
  • Jason Hill, Steve Ross
  • David E. Culler
  • Computer Science Division
  • U.C. Berkeley

2
Understanding Going In
  • Key Leverage Composable Services
  • ease of authoring by automated scalability,
    availability
  • push services into the infrastructure
  • build new services from component services
  • Key Tool Transcoding Operators
  • adapt form or content to desired use
  • Security fundamental to Universal Computing
  • Tremendous Diversity Emerging without Plan
  • wide array of services
  • clients gt information appliances
  • Small devices impose interesting constraints

3
Example
  • Pilot too slow to support effective Public Key
    Encryption (eg, SSL)
  • shared key techniques are viable (eg., DES)
  • gt encryption proxy
  • device interacts with trusted proxy using shared
    secret
  • proxy interacts with rest of the internet using
    PKI
  • The Really Important Idea Identity Service
  • a strong box to lock away all your keys
  • a critical level of indirection
  • map you and your mode of access -gt your identity
    and mode of authentication at each service

Service
Encription Proxy
Weak Client
RMI(DES)
SSL
4
Typical Internet Service
DATEK (Trust Contract)
Trusted Client
The Internet
https
5
Infrastructure Services Embedded Untrusted
Interface
NINJA
Key Store
sRMI
Content Filter (pseudonym)
Embeded Untrusted Client
https
DATEK (Trust Contract)
Trusted Client
The Internet
https
6
Constrained Personal Info Appliance - Untrusted
Gateway
NINJA
Key Store
Personal Appl
sRMI
GWY
RMI PXY
ST
CF
Content Filter (pseudonym)
Embeded Untrusted Client
https
DATEK (Trust Contract)
Trusted Client
The Internet
https
7
Uniform Access to Diverse Services
NINJA
Key Store
Personal Appl
sRMI
GWY
RMI PXY
ST
CF
Trade-R-us
Trade-R-us
Content Filter (pseudonym)
Embeded Untrusted Client
https
DATEK (Trust Contract)
Trusted Client
The Internet
https
8
Automated Clients
NINJA
Key Store
Personal Appl
sRMI
GWY
RMI PXY
ST
CF
BOT svc
Trade-R-us
Trade-R-us
Content Filter (pseudonym)
Embeded Untrusted Client
https
DATEK (Trust Contract)
Trusted Client
The Internet
https
9
Take-Away
  • Composable Services in the infrastructure
  • key enabling concept
  • new level of programming
  • Towards an Architecture for Universal Computing
  • in the presence of diverse concurrent development
  • Eureka Phenomenon
  • the most fundamental service are probably those
    yet to be discovered
  • ex identity service
  • only find them by building the world and living
    in it
Write a Comment
User Comments (0)
About PowerShow.com