SlideShare une entreprise Scribd logo
1  sur  43
Télécharger pour lire hors ligne
Secure DDS
A Security Model suitable for Net-
Centric, Publish-Subscribe, and
Data Distribution Systems
RTESS, Washington DC, July 2007
Gerardo Pardo-Castellote, Ph.D.
Chief Technology Officer
Real-Time Innovations, Inc.
gerardo@rti.com
© 2007, Real-Time Innovations, Inc.2
Agenda
Motivation & Requirements
DDS Concepts
Security Concepts
Is there a Conflict?
Net-centric Security requirements
Net-centric approach to Security
Required DDS Extensions
Conclusion
© 2007, Real-Time Innovations, Inc.3
Motivation
Net-centric systems rely on
information sharing…
– They are built on top a
Shared Information
Space or Common-
Operational Picture
– They assume information
availability where and
when it is needed
As the system scope
expends Security/IA
becomes a concern
– Information flow must be
restricted to the
intended/authorized
recipients
– Can no longer assume a
single protection domain.
© 2007, Real-Time Innovations, Inc.4
Application Requirements
High-level goal:
“control and restrict access to information such that it is only accessible
to the intended/authorized recipients. “
Secondary goals include:
– guaranteed access to the information by the authorized users
prevent denial of service attacks
– audit trails,
– ensure non-repudiation (guarantee identity of the source of the
information).
– deployable within the exiting Internet Environment
This breaks down into
– Functional requirements:
Authentication, Confidentiality, Integrity
Availability
– Non-functional requirements:
Manageability, Accountability, Assurance
– Deployment requirements:
Work in WAN environment, operate across NATs
© 2007, Real-Time Innovations, Inc.5
Agenda
Motivation & Requirements
DDS Concepts
Security Concepts
Is there a Conflict?
Net-centric Security requirements
Net-centric approach to Security
Required DDS Extensions
Conclusion
© 2007, Real-Time Innovations, Inc.6
DDS Communications model
Provides a “Global Data Space” that is accessible to all
interested applications.
– Data objects addressed by Domain, Topic and Key
– Subscriptions are decoupled from Publications
– Contracts established by means of QoS
– Automatic discovery and configuration
Global Data Space
Participant
Pub
Participant
Pub
Sub
Participant
Sub
Participant Pub Alarm
Track,2
Track,1 Track,3
Participant
Sub
© 2007, Real-Time Innovations, Inc.7
DDS Domain Separation
Instance
DW 3
DW 4
DW 5
Instance
DR 4
DR 5
DR 6
Topic “green” Topic “orange”
InstanceDW 1
DW 2
Instance
DR 1
DR 2
DR 3
Domain2
Domain1
2
1
1
2
DomainParticipant Node
© 2007, Real-Time Innovations, Inc.8
Data
Reader
“Circle”
Domain
Participant
Data
Writer
“Circle”
Domain
Participant
DDS communications model
Publisher declares information it has and specifies the Topic
– and the offered QoS contract
– and an associated listener to be alerted of any significant status changes
Subscriber declares information it wants and specifies the Topic
– and the requested QoS contract
– and an associated listener to be alerted of any significant status changes
DDS automatically discovers publishers and subscribers
– DDS ensures QoS matching and alerts of inconsistencies
Failed to
produce
data
Listener
Offered
QoS Listener
Failed to
get data
Offered
QoS
© 2007, Real-Time Innovations, Inc.9
Agenda
Motivation & Requirements
DDS Concepts
Security Concepts
Is there a Conflict?
Net-centric Security requirements
Net-centric approach to Security
Required DDS Extensions
Conclusion
© 2007, Real-Time Innovations, Inc.10
Security Terminology
Principals and Subjects
– The active entities
Principals are the entities that can be granted access control (e.g. the human users) .
Subjects are active computer-system entities that bound to principals and operate on
their behalf. Subjects perform the actions on the objects.
Objects
– The passive entities
can be accessed or manipulated
– e.g. memory, files, sockets, semaphores, etc.
Access operations
– the actions that can be performed on the objects
e.g. read memory, write a message on a socket.
Security model
– The architecture, concepts, and algorithms used to define the access control
restrictions on the objects and the access rights given to principals.
– Examples are Mandatory Access Control (MAC), Role-based Access Control
(RBAC), Discretionary Access Control (DAC), etc.
Security policy
– a set of goals, rules, and regulations regarding the access rights to information
and objects.
– defines what is allowed and what is not allowed within a particular security
model.
– Examples are the Bell LaPadula model, the Biba model, Chinese Wall, etc.
© 2007, Real-Time Innovations, Inc.11
Example: Unix File System
“principals” the registered users of the system (user accounts)
“subjects” the processes that user starts to perform actions
“objects” the files, devices, and other operating system
resources whose access is restricted
“access operations” Read, Modify, Execute
“security model” Unix security model:
– Each security target (file, device) has an owner, and a group, as well as a set of
permissions (read, write, execute) for the owner, group and “other users”.
– Each user is assigned a set of groups to which they belong.
– A subject (process) executing on behalf of a principal (user) is given permission
to read, write, or modify a file based on the following rules:
(a) If he user is the one that owns the file, then access is granted according to the type of
access (read/write/execute) and the corresponding permission for the owner of the
file.
(b) Otherwise if the user belongs to the group to which the file belongs, then access is
granted according to corresponding group permissions for the file.
(c) Otherwise access is granted according to corresponding “other users” permissions for
the file.
“security policies” Defined by the organization by means of
creating groups (e.g. ‘admin’, ‘finance’)
and assigning users to those.
© 2007, Real-Time Innovations, Inc.12
Security Concepts
Authentication
– Verify the identity of the principals accessing the information
– Restrict information access to the authorized principals
– Presumes a security model where the authorization rules are
expressed
E.g. Mandatory Access Control or Role-Based Access Control
– State of the practice: PKI, “Certificates” signed by a
“recognized authority”
Confidentiality
Integrity
Non-repudiation
Availability
© 2007, Real-Time Innovations, Inc.13
Security Concepts
Authentication
Confidentiality
– Protect information so that only the intended recipients can see
it, ensure the information cannot be snooped or intercepted.
– Hide the contents of messages from third-party observers.
– State of the practice: Encryption, Key-exchange algorithms
Integrity
Non-repudiation
Availability
© 2007, Real-Time Innovations, Inc.14
Security Concepts
Authentication
Confidentiality
Integrity
– Prevent data from being tampered/modified by a third party
– Prevent spoofing/masquerading and the so called “man in the
middle” attacks
– State of the practice: Integrity check functions or cryptographic
hash functions
Non-repudiation
Availability
© 2007, Real-Time Innovations, Inc.15
Security Concepts
Authentication
Confidentiality
Integrity
Non-repudiation
– Prove in an irrefutable way who the originator of the message
is.
Depends on having Integrity. Knowing the source of a message
that could have been modified in transit offers little value.
– State of the practice: digital-signatures.
Availability
© 2007, Real-Time Innovations, Inc.16
Security Concepts
Authentication
Confidentiality
Integrity
Non-repudiation
Availability
– Protect the system/infrastructure so that authorized principals
are not prevented from accessing the information
– State of the practice: Boundary protection, use of challenges
to Limit Denial of Service Attacks
© 2007, Real-Time Innovations, Inc.17
Background: Public Key Infrastructure
Two components:
– Technology base: Asymmetric Key Encryption
– Infrastructure/Policy: Set of trusted Certificate Authorities (CAs)
Asymmetric Key Encryption
– 2 different keys are used: PublicKey and PrivateKey
– Messages encrypted with one key can only be decrypted with the
other.
– PublicKey is made available to everybody
Certificate Authorities
– Agreed set of “authorities” whose PublicKey is known
– CAs are trusted to “sign” certificates asserting facts about the
holder (e.g. their PublicKey, the company name, address, etc.)
These certificates are tamper-proof
Formats are standard e.g. X.509
– Cryptographic techniques are used to verify the certificates
© 2007, Real-Time Innovations, Inc.18
Example: web-based e-commerce
Assume you enter https://www.rti.com as the URL:
Authentication
– Browsers (e.g. Firefox, InternetExplorer) are pre-configured with the public keys of
“recognized” CAs (e.g. RSA, Thawte, Verisign)
– Each web site (e.g. RTI.com) gets a Certificate signed with Public Key of the CA.
– The HTTPS protocol (layered on TLS/SSL) attempts to connect to www.rti.com as part of
this rti.com supplies the signed certificate.
– The certificate contains the name of the CA (e.g. RSA) and information such as “domain
name: rti.com” validity period “jan 2007 to jan 2008”, public key of RTI, etc.
– Certificate is encrypted with CA private key. Browser use the CA’s public key to verify the
certificate
Confidentiality
– Once authenticated the browser and the RTI web-server use their respective public keys
and to “negotiate” a fresh private key. This “negotiation” includes some random elements
introduced by each side.
– From there on all messages are encrypted using the newly-created private key.
Integrity and Non-repudiation
– The sender computes a hash of the message and encrypts the hash with its private key.
– Using the public key anybody can verify that:
The message has not been tampered with
The sender (only one that knows public key) is the origin of the message.
Availability
– Before connecting and consuming state/recourses issue a challenge that forces client to
consume significant CPU
© 2007, Real-Time Innovations, Inc.19
Agenda
Motivation & Requirements
DDS Concepts
Security Concepts
Is there a Conflict?
Net-centric Security requirements
Net-centric approach to Security
Required DDS Extensions
Conclusion
© 2007, Real-Time Innovations, Inc.20
Is there a Conflict?
Security…
– desires to restrict communication to only happen
between authorized subjects
– wants to confidentiality so that only communicating
subjects see the information
PubSub/DDS
– attempts to create a ‘global information space’ where
anybody can access the information it needs
– de-couples communications so publishers are
unaware of subscribers and vice-versa
© 2007, Real-Time Innovations, Inc.21
Security in the Global Information Space
The conflict is only apparent
Publishers are decoupled from subscribers via the
Global Information Space
– This does not mean loss of access control to the information
– It means that the Information Space must have an associated
security model
DDS can use standard PKI and cryptographic
techniques to enforce the security policies
The situation is analogous to access control policies in a
file system
The key is to use a net-centric security model!
© 2007, Real-Time Innovations, Inc.22
Agenda
Motivation & Requirements
DDS Concepts
Security Concepts
Is there a Conflict?
Net-centric Security requirements
Net-centric approach to Security
Required DDS Extensions
Conclusion
© 2007, Real-Time Innovations, Inc.23
General Secure DDS requirements
DDS needs a net-centric (pub-sub friendly)
security model:
– Security model defined in terms of DDS concepts
(Domains, Topics)
– Authorization should be separate from apps
– De-coupled via the GDS
– Support one-to-many & multicast
– Allow persistence and other DDS services
We have investigated two possible models:
– Domain-based MAC (Basic)
– Topic-based RBAC (Advanced)
© 2007, Real-Time Innovations, Inc.24
Mandatory Access Control (MAC)
Typical in Military systems
Each “security object” is assigned a “security level” (Unclassified,
Classified, Secret, Top-Secret).
– Order: Unclassified < Classified < Secret < Top-Secret.
Each principal is also assigned a “clearance level”
MAC policy made of two rules:
(1) A principal is only allowed to read information where
security level <= clearance level
(2) A principal is only allowed to write information where
security level >= clearance level
Notes:
(1) prevents access to restricted information by users that have not
been granted the right level of clearance.
(2) prevents users that have access to more secure information
from leaking it to users that should not have access to it.
SELinux (Security-Enhanced Linux) project added a Mandatory
Access Control architecture to the Linux kernel.
© 2007, Real-Time Innovations, Inc.25
Role Based Access Control (RBAC)
Information is only accessible to the owners as well as
the principals that have the right “role”.
– E.g. Medical records may only be accessible to the patient itself
as well as somebody assigned the role of “medical doctor”.
E.g. an organization could create roles representing the
various job functions.
– The rights to perform certain access operations could be
assigned to specific roles.
– Each member of the staff is assigned particular roles, and thus
become authorized to perform certain access operations.
Notes:
Role-based access control provides the capability of
what in A&D is generally called “need to know”.
Systems including Microsoft Active Directory, SELinux,
Solaris, Oracle DBMS, PostgreSQL 8.1, SAP R/3 and
many others effectively implement some form of RBAC
© 2007, Real-Time Innovations, Inc.26
Specific Secure DDS requirements
Basic (must have)
– Authenticated DomainParticipants
– Confidential Domain communications
– MAC for Domains
– Integrity of all data
Advanced (nice to have)
– “Need to know”. RBAC per Topic
– Separate read and write access
– Centralized security configuration & management
– Audit tools
© 2007, Real-Time Innovations, Inc.27
Agenda
Motivation & Requirements
DDS Concepts
Security Concepts
Is there a Conflict?
Net-centric Security requirements
Net-centric approach to Security
Required DDS Extensions
Conclusion
© 2007, Real-Time Innovations, Inc.28
Proposed DDS Security Models
The approach based in two ideas:
– Secure Domains
– Confidential Topics
Secure Domains
– Limit each Global Data Space (DDS Domain) to contain
information at a single level of security
– Only authorized participants are allowed to join a Domain
– All domain communications are confidential
– All information is accessible to all members of the domain
Confidential need-to-know Topics
– Within a Global Data Space allow participants to read and write
Topics on a “need to know basis”
– Separate “right to read” from “right to write”
– Each Topic is authorized and protected separately
© 2007, Real-Time Innovations, Inc.29
Secure DDS Domains
Each DDS domain implements MAC at a single security
level.
Each DDS domain is configured with a CA. The PK of
the CA is compiled into each application
The CA gives certificates to each Participant that is
allowed to join the domain
When participants discover each other they use the pre-
configured CA PK to verify their peer’s certificate to join
the domain
Result:
– Limits access to the domain only to the principals (the DDS
Participants) that have the proper security clearance.
– Mandatory Access Control (MAC) is therefore applied to each
DDS Domain separately.
© 2007, Real-Time Innovations, Inc.30
Implementing Secure Domains
Use DTLS – datagram flavor of TLS/SSL
– TLS/SSL provides functions to issue certificates and
verify them
Once verified DTLS establishes secure
communications between each pair of
participants
Each message is also signed providing integrity
and non-repudiation
Disadvantages:
– Multicast is not supported
– All-or-nothing security
© 2007, Real-Time Innovations, Inc.31
Using Secure Domains
Security Admin uses TLS tools to create a CA.
Obtains PK of CA. The CA-PK is ‘compiled’ into
every application
Security Admin issues certificates identifying the
computers that can join the domain and
distributes them securely
App developers or executors install the
Certificate in their computer (file, environment)
or build it into their application
At run-time the DTLS library takes care of
authentication, encryption, etc.
© 2007, Real-Time Innovations, Inc.32
Confidential DDS Topics
The RBAC model applied to DDS Topics
Each Topic is assigned a list of “reader roles” and a list of “writer
roles”.
– ‘reader roles’ are the roles of the principals that can read the Topic
– ‘writer roles’ are the roles of principals that can write the Topic
Each Participant attached to the Domain is assigned a set of
roles.
– Write access to the Topic given only to Participants that have a role
that appears in the list of “writer roles” for the Topic
– Read access to the Topic given only to Participants that have a role
that appears in the list of “reader roles” for the Topic
Result:
– Limits access to the Topic only to the principals (the DDS
Participants) that have the “need to know” for that Topic
– A single domain can carry traffic of multiple security levels
© 2007, Real-Time Innovations, Inc.33
Implementing Confidential Topics
Use DTLS – datagram flavor of TLS/SSL
Similar to Secure Domain DTLS is used for:
– Authentication of participant
– Checking of right to Join Domain
– Negotiating session key -> Confidentiality
– Signing messages -> Integrity, non-repudiation
Details:
– Participant Certificate is propagated via discovery
– Each time a remote Entity (Topic, DataReader, DataWriter) is
discovered the Participant certificate is checked to establish
right to read/write Topic
Disadvantages:
– Multicast is not supported
– Apps within domain can discover all entities
© 2007, Real-Time Innovations, Inc.34
Using Secure Topics
Security Admin (SA) uses TLS tools to create a CA. Obtains PK of
CA. The CA-PK is ‘compiled’ into every application
SA issues certificates identifying the Topics in the domain and the
corresponding read-access roles and write-access roles
SA issues certificates to individual participants identifying the
domain, and their roles.
App developers or executors install the Certificate in their computer
(file, environment) or build it into their application
DTLS library used internally to check that the Participant has the
role it needs to create DataWriter and DataReaders by checking the
roles in the participant against those in the Topic.
© 2007, Real-Time Innovations, Inc.35
Supporting Multicast
MC support cannot use standard SSL session-based encryption…
possibilities are:
– Topic-based encryption
– DataWriter-based encryption
– Role-based encryption
Topic-based
– Each Topic is encrypted with a separate crypto-key
– Topic key distributed securely to authorized participants
DataWriter-based
– Each DataWriter uses its own crypto-key
– DataWriter shares its crypto-key with authorized readers
Role-based
– Each role has a crypto-key
– Each Writer or Message has its own crypto-key
– Either
DataWriter key is encrypted with *all* the read-role keys and shared with
readers
Or Message key is encrypted with *all* the read-role keys
Either way any reader that has one of the roles can get the key.
© 2007, Real-Time Innovations, Inc.36
Recommendation: DataWriter key
Each DataWriter uses its own crypto-key to
encrypt all messages
– Multicast messages are allowed
DW key must be propagated to all authorized
readers
– This can be done via the standard discovery
mechanism by encrypting the DW key with the public
keys of the authorized readers
– This approach allows the DW to explicitly control
who it communicates with and alings with the
DDS::ignore_subscription() api
© 2007, Real-Time Innovations, Inc.37
Agenda
Motivation & Requirements
DDS Concepts
Security Concepts
Is there a Conflict?
Net-centric Security requirements
Net-centric approach to Security
Required DDS Extensions
Conclusion
© 2007, Real-Time Innovations, Inc.38
Required DDS Extensions
Secure Domains can be implemented at
the transport level. It does not require any
extensions to DDS.
Confidential Topics would require some
extension to DDS.
– Extensions would be limited to some new
QoS policies
© 2007, Real-Time Innovations, Inc.39
Security Attributes for DDS Entities
security_roles[*]
These attributes are set by the system when the Participant s created. See the
create_participant() operation on the DDS DomainParticipantFactory.
security_levelDDS DomainParticipant
The DDS topicName is the string used in the DDS API to represent a Topic.
The security_write_roles attribute lists the roles of Applications that have a “need to
modify” the Topic and hence have “write permission” to the Topic.
The security_read_roles attribute lists the roles of the Processes that have a “need to
know” for the information available under that topic and hence have “read
permission” to the Topic.
security_write_roles [*]topicName
A Topic is assigned two attributes: the security_read_roles and security_write_roles.security_read_roles [*]DDS Topic/
The DDS DomainParticipantFactory is the singleton that represents the Application in
the DDS API.
Applications will only be allowed to “attach” to a domain if their security_level
matches and they share at least one common role.
security_roles[*]DDS
DomainParticipantFactory
Each Application is assigned a security level and a set of roles.security_levelApplication/
The DDS domainId is the integer used in the DDS API to represent a Domain.
The information in the Domain is only accessible to applications that have “need to
know”. The security_access_roles attribute lists a set of tags that represents
the roles of applications/processes that have a ‘need to know’ for the
information in the domain.
security_access_roles[*]DDS domainId
A DDS Domain represents a separate global data-space. All he information on that
Global Data Space is only accessible at the single level of security indicated
by the security_level attribute
security_levelDDS Domain/
Policy NotesSecurity AttributesDDS Concept/Entity
© 2007, Real-Time Innovations, Inc.40
Security extensions to the operations on DDS Entities
If the check fails, the operation fails, otherwise it proceeds as stated by the DDS specification.
∩ ( topicName.security_write_roles[]) ≠ Ø )
( DP. security_roles[]
OR
∩ ( topicName.security_read_roles[]) ≠ Ø )
( DP. security_roles[]lookup_topic(topicName)
Check that:create_topic(topicName)DDS
DomainParticipant
(DP)
∩ domainId. DPF.security_roles[]
DPF.security_access_roles[]
DP. security_roles[] :=
DP. security_level := DPF.security_level
If they both succeed the created DomainParticipant will have its security attributes set to:
If either check fails, the participant creation fails
∩ domainId. DPF.security_access_roles[] ≠ Ø )
( DPF.security_access_roles[]
AND
(DPF.security_level == domainId.security_level)
Check that:create participant(domainId)DDS
DomainParticipantFactory
(DPF)
Changes to support securityoperationDDS Entity
© 2007, Real-Time Innovations, Inc.41
If the check fails, the operation fails, otherwise it proceeds as stated by the DDS
specification.
∩ Topic.security_write_roles[] ≠ Ø )
( S.participant().security_roles[]
Check that:create_datawriter(Topic)DDS Publisher (P)
If the check fails, the operation fails, otherwise it proceeds as stated by the DDS
specification.
∩ Topic.security_read_roles[] ≠ Ø )
( S.participant().security_roles[]
Check that:create_datareader(Topic)DDS Subscriber (S)
Changes to support securityoperationDDS Entity
© 2007, Real-Time Innovations, Inc.42
Agenda
Motivation & Requirements
DDS Concepts
Security Concepts
Is there a Conflict?
Net-centric Security requirements
Net-centric approach to Security
Required DDS Extensions
Conclusion
© 2007, Real-Time Innovations, Inc.43
Conclusion
Security requirements do not intrinsically conflict with
the use of publish-subscribe or a net-centric global
information space
To be effective Security Models such as MAC and
RBAC need to be mapped to global-information space
concepts
COTS technologies such as PKI and TLS can be used
to provide Secure DDS domains and Confidential DDS
Topics.
Supporting fine-grained security may require some
extensions to DDS

Contenu connexe

Tendances

Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureInformation Technology
 
Identity based secure distributed data storage
Identity based secure distributed data storageIdentity based secure distributed data storage
Identity based secure distributed data storageIEEEFINALYEARPROJECTS
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteVCW Security Ltd
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPandreasschuster
 
2019 cou kolokotronis_nicholas - nicholas kolokotronis
2019 cou kolokotronis_nicholas - nicholas kolokotronis2019 cou kolokotronis_nicholas - nicholas kolokotronis
2019 cou kolokotronis_nicholas - nicholas kolokotronisLiza Charalambous
 
Content Strategy and Developer Engagement for DevPortals
Content Strategy and Developer Engagement for DevPortalsContent Strategy and Developer Engagement for DevPortals
Content Strategy and Developer Engagement for DevPortalsAxway
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case studyashu6
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?Ulf Mattsson
 
An Enterprise Guide to Understanding Key Management
An Enterprise Guide to Understanding Key ManagementAn Enterprise Guide to Understanding Key Management
An Enterprise Guide to Understanding Key ManagementSafeNet
 
Securing data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYCSecuring data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYCUlf Mattsson
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
 
[EMC] Source Code Protection
[EMC] Source Code Protection[EMC] Source Code Protection
[EMC] Source Code ProtectionPerforce
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityPvrtechnologies Nellore
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI TechnologySylvain Maret
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computingJahangeer Qadiree
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityLeMeniz Infotech
 

Tendances (19)

Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 
Identity based secure distributed data storage
Identity based secure distributed data storageIdentity based secure distributed data storage
Identity based secure distributed data storage
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security Suite
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
2019 cou kolokotronis_nicholas - nicholas kolokotronis
2019 cou kolokotronis_nicholas - nicholas kolokotronis2019 cou kolokotronis_nicholas - nicholas kolokotronis
2019 cou kolokotronis_nicholas - nicholas kolokotronis
 
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. MookheyData Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
 
Content Strategy and Developer Engagement for DevPortals
Content Strategy and Developer Engagement for DevPortalsContent Strategy and Developer Engagement for DevPortals
Content Strategy and Developer Engagement for DevPortals
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
An Enterprise Guide to Understanding Key Management
An Enterprise Guide to Understanding Key ManagementAn Enterprise Guide to Understanding Key Management
An Enterprise Guide to Understanding Key Management
 
Securing data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYCSecuring data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYC
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
[EMC] Source Code Protection
[EMC] Source Code Protection[EMC] Source Code Protection
[EMC] Source Code Protection
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 

Similaire à DDS Security: A Security Model Suitable for Net-Centric for Pub-Sub and Data Distribution Systems

DDS Security for the Industrial Internet - London Connext DDS Conference
DDS Security for the Industrial Internet - London Connext DDS ConferenceDDS Security for the Industrial Internet - London Connext DDS Conference
DDS Security for the Industrial Internet - London Connext DDS ConferenceGerardo Pardo-Castellote
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The SecurityRachel Phillips
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data SharingIJERA Editor
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...MongoDB
 
Secure webl gate way
Secure webl gate waySecure webl gate way
Secure webl gate wayvfmindia
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissanceCloudera, Inc.
 
SC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and IdentitySC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and IdentityFredBrandonAuthorMCP
 
Network Security 2016
Network Security 2016 Network Security 2016
Network Security 2016 Mukesh Pathak
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) ghayour abbas
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmSergio Loureiro
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case StudyEvelyn Donaldson
 
Security Issues in OpenStack
Security Issues in OpenStackSecurity Issues in OpenStack
Security Issues in OpenStackoldbam
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk
 

Similaire à DDS Security: A Security Model Suitable for Net-Centric for Pub-Sub and Data Distribution Systems (20)

DDS Security for the Industrial Internet - London Connext DDS Conference
DDS Security for the Industrial Internet - London Connext DDS ConferenceDDS Security for the Industrial Internet - London Connext DDS Conference
DDS Security for the Industrial Internet - London Connext DDS Conference
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
 
DDS Security
DDS SecurityDDS Security
DDS Security
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
original.pdf
original.pdforiginal.pdf
original.pdf
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
1784 1788
1784 17881784 1788
1784 1788
 
Secure webl gate way
Secure webl gate waySecure webl gate way
Secure webl gate way
 
Hadoop and Big Data Security
Hadoop and Big Data SecurityHadoop and Big Data Security
Hadoop and Big Data Security
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
SC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and IdentitySC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and Identity
 
Network Security 2016
Network Security 2016 Network Security 2016
Network Security 2016
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 
Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
 
Security Issues in OpenStack
Security Issues in OpenStackSecurity Issues in OpenStack
Security Issues in OpenStack
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 

Plus de Gerardo Pardo-Castellote

DDS, the US Navy, and the Need for Distributed Software
DDS, the US Navy,  and the Need for Distributed SoftwareDDS, the US Navy,  and the Need for Distributed Software
DDS, the US Navy, and the Need for Distributed SoftwareGerardo Pardo-Castellote
 
Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Gerardo Pardo-Castellote
 
A Converged Approach to Standards for Industrial Automation
A Converged Approach to Standards for Industrial AutomationA Converged Approach to Standards for Industrial Automation
A Converged Approach to Standards for Industrial AutomationGerardo Pardo-Castellote
 
DDS-Security Interoperability Demo - March 2018
DDS-Security Interoperability Demo - March 2018DDS-Security Interoperability Demo - March 2018
DDS-Security Interoperability Demo - March 2018Gerardo Pardo-Castellote
 
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and SimulinkApplying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and SimulinkGerardo Pardo-Castellote
 
Deep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway SpecificationDeep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway SpecificationGerardo Pardo-Castellote
 
DDS for eXtremely Resource Constrained Environments 1.0 Beta
DDS for eXtremely Resource Constrained Environments 1.0 BetaDDS for eXtremely Resource Constrained Environments 1.0 Beta
DDS for eXtremely Resource Constrained Environments 1.0 BetaGerardo Pardo-Castellote
 
DDS-Security Interoperability Demo - December 2017
DDS-Security Interoperability Demo - December 2017DDS-Security Interoperability Demo - December 2017
DDS-Security Interoperability Demo - December 2017Gerardo Pardo-Castellote
 
DDS-Security Interoperability Demo - September 2017
DDS-Security Interoperability Demo - September 2017DDS-Security Interoperability Demo - September 2017
DDS-Security Interoperability Demo - September 2017Gerardo Pardo-Castellote
 
Extensible Types for DDS (DDS-XTYPES) version 1.2
Extensible Types for DDS (DDS-XTYPES) version 1.2Extensible Types for DDS (DDS-XTYPES) version 1.2
Extensible Types for DDS (DDS-XTYPES) version 1.2Gerardo Pardo-Castellote
 
Interface Definition Language (IDL) version 4.2
Interface Definition Language (IDL) version 4.2 Interface Definition Language (IDL) version 4.2
Interface Definition Language (IDL) version 4.2 Gerardo Pardo-Castellote
 
DDS for eXtremely Resource Constrained Environments
DDS for eXtremely Resource Constrained EnvironmentsDDS for eXtremely Resource Constrained Environments
DDS for eXtremely Resource Constrained EnvironmentsGerardo Pardo-Castellote
 
DDS-XRCE - Revised Submission Presentation (September 2017)
DDS-XRCE - Revised Submission Presentation (September 2017)DDS-XRCE - Revised Submission Presentation (September 2017)
DDS-XRCE - Revised Submission Presentation (September 2017)Gerardo Pardo-Castellote
 
DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)Gerardo Pardo-Castellote
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)Gerardo Pardo-Castellote
 

Plus de Gerardo Pardo-Castellote (20)

DDS, the US Navy, and the Need for Distributed Software
DDS, the US Navy,  and the Need for Distributed SoftwareDDS, the US Navy,  and the Need for Distributed Software
DDS, the US Navy, and the Need for Distributed Software
 
Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.
 
DDS-TSN OMG Request for Proposals (RFP)
DDS-TSN OMG Request for Proposals (RFP)DDS-TSN OMG Request for Proposals (RFP)
DDS-TSN OMG Request for Proposals (RFP)
 
A Converged Approach to Standards for Industrial Automation
A Converged Approach to Standards for Industrial AutomationA Converged Approach to Standards for Industrial Automation
A Converged Approach to Standards for Industrial Automation
 
Overview of the DDS-XRCE specification
Overview of the DDS-XRCE specificationOverview of the DDS-XRCE specification
Overview of the DDS-XRCE specification
 
DDS-Security Interoperability Demo - March 2018
DDS-Security Interoperability Demo - March 2018DDS-Security Interoperability Demo - March 2018
DDS-Security Interoperability Demo - March 2018
 
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and SimulinkApplying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
 
Deep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway SpecificationDeep Dive into the OPC UA / DDS Gateway Specification
Deep Dive into the OPC UA / DDS Gateway Specification
 
OPC UA/DDS Gateway version 1.0 Beta
OPC UA/DDS Gateway version 1.0 BetaOPC UA/DDS Gateway version 1.0 Beta
OPC UA/DDS Gateway version 1.0 Beta
 
DDS for eXtremely Resource Constrained Environments 1.0 Beta
DDS for eXtremely Resource Constrained Environments 1.0 BetaDDS for eXtremely Resource Constrained Environments 1.0 Beta
DDS for eXtremely Resource Constrained Environments 1.0 Beta
 
DDS-Security Interoperability Demo - December 2017
DDS-Security Interoperability Demo - December 2017DDS-Security Interoperability Demo - December 2017
DDS-Security Interoperability Demo - December 2017
 
DDS-Security Interoperability Demo - September 2017
DDS-Security Interoperability Demo - September 2017DDS-Security Interoperability Demo - September 2017
DDS-Security Interoperability Demo - September 2017
 
Extensible Types for DDS (DDS-XTYPES) version 1.2
Extensible Types for DDS (DDS-XTYPES) version 1.2Extensible Types for DDS (DDS-XTYPES) version 1.2
Extensible Types for DDS (DDS-XTYPES) version 1.2
 
DDS-Security version 1.1
DDS-Security version 1.1DDS-Security version 1.1
DDS-Security version 1.1
 
Interface Definition Language (IDL) version 4.2
Interface Definition Language (IDL) version 4.2 Interface Definition Language (IDL) version 4.2
Interface Definition Language (IDL) version 4.2
 
DDS Security Specification version 1.0
DDS Security Specification version 1.0DDS Security Specification version 1.0
DDS Security Specification version 1.0
 
DDS for eXtremely Resource Constrained Environments
DDS for eXtremely Resource Constrained EnvironmentsDDS for eXtremely Resource Constrained Environments
DDS for eXtremely Resource Constrained Environments
 
DDS-XRCE - Revised Submission Presentation (September 2017)
DDS-XRCE - Revised Submission Presentation (September 2017)DDS-XRCE - Revised Submission Presentation (September 2017)
DDS-XRCE - Revised Submission Presentation (September 2017)
 
DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)DDS-XRCE (Extremely Resource Constrained Environments)
DDS-XRCE (Extremely Resource Constrained Environments)
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 

Dernier

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Dernier (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

DDS Security: A Security Model Suitable for Net-Centric for Pub-Sub and Data Distribution Systems

  • 1. Secure DDS A Security Model suitable for Net- Centric, Publish-Subscribe, and Data Distribution Systems RTESS, Washington DC, July 2007 Gerardo Pardo-Castellote, Ph.D. Chief Technology Officer Real-Time Innovations, Inc. gerardo@rti.com
  • 2. © 2007, Real-Time Innovations, Inc.2 Agenda Motivation & Requirements DDS Concepts Security Concepts Is there a Conflict? Net-centric Security requirements Net-centric approach to Security Required DDS Extensions Conclusion
  • 3. © 2007, Real-Time Innovations, Inc.3 Motivation Net-centric systems rely on information sharing… – They are built on top a Shared Information Space or Common- Operational Picture – They assume information availability where and when it is needed As the system scope expends Security/IA becomes a concern – Information flow must be restricted to the intended/authorized recipients – Can no longer assume a single protection domain.
  • 4. © 2007, Real-Time Innovations, Inc.4 Application Requirements High-level goal: “control and restrict access to information such that it is only accessible to the intended/authorized recipients. “ Secondary goals include: – guaranteed access to the information by the authorized users prevent denial of service attacks – audit trails, – ensure non-repudiation (guarantee identity of the source of the information). – deployable within the exiting Internet Environment This breaks down into – Functional requirements: Authentication, Confidentiality, Integrity Availability – Non-functional requirements: Manageability, Accountability, Assurance – Deployment requirements: Work in WAN environment, operate across NATs
  • 5. © 2007, Real-Time Innovations, Inc.5 Agenda Motivation & Requirements DDS Concepts Security Concepts Is there a Conflict? Net-centric Security requirements Net-centric approach to Security Required DDS Extensions Conclusion
  • 6. © 2007, Real-Time Innovations, Inc.6 DDS Communications model Provides a “Global Data Space” that is accessible to all interested applications. – Data objects addressed by Domain, Topic and Key – Subscriptions are decoupled from Publications – Contracts established by means of QoS – Automatic discovery and configuration Global Data Space Participant Pub Participant Pub Sub Participant Sub Participant Pub Alarm Track,2 Track,1 Track,3 Participant Sub
  • 7. © 2007, Real-Time Innovations, Inc.7 DDS Domain Separation Instance DW 3 DW 4 DW 5 Instance DR 4 DR 5 DR 6 Topic “green” Topic “orange” InstanceDW 1 DW 2 Instance DR 1 DR 2 DR 3 Domain2 Domain1 2 1 1 2 DomainParticipant Node
  • 8. © 2007, Real-Time Innovations, Inc.8 Data Reader “Circle” Domain Participant Data Writer “Circle” Domain Participant DDS communications model Publisher declares information it has and specifies the Topic – and the offered QoS contract – and an associated listener to be alerted of any significant status changes Subscriber declares information it wants and specifies the Topic – and the requested QoS contract – and an associated listener to be alerted of any significant status changes DDS automatically discovers publishers and subscribers – DDS ensures QoS matching and alerts of inconsistencies Failed to produce data Listener Offered QoS Listener Failed to get data Offered QoS
  • 9. © 2007, Real-Time Innovations, Inc.9 Agenda Motivation & Requirements DDS Concepts Security Concepts Is there a Conflict? Net-centric Security requirements Net-centric approach to Security Required DDS Extensions Conclusion
  • 10. © 2007, Real-Time Innovations, Inc.10 Security Terminology Principals and Subjects – The active entities Principals are the entities that can be granted access control (e.g. the human users) . Subjects are active computer-system entities that bound to principals and operate on their behalf. Subjects perform the actions on the objects. Objects – The passive entities can be accessed or manipulated – e.g. memory, files, sockets, semaphores, etc. Access operations – the actions that can be performed on the objects e.g. read memory, write a message on a socket. Security model – The architecture, concepts, and algorithms used to define the access control restrictions on the objects and the access rights given to principals. – Examples are Mandatory Access Control (MAC), Role-based Access Control (RBAC), Discretionary Access Control (DAC), etc. Security policy – a set of goals, rules, and regulations regarding the access rights to information and objects. – defines what is allowed and what is not allowed within a particular security model. – Examples are the Bell LaPadula model, the Biba model, Chinese Wall, etc.
  • 11. © 2007, Real-Time Innovations, Inc.11 Example: Unix File System “principals” the registered users of the system (user accounts) “subjects” the processes that user starts to perform actions “objects” the files, devices, and other operating system resources whose access is restricted “access operations” Read, Modify, Execute “security model” Unix security model: – Each security target (file, device) has an owner, and a group, as well as a set of permissions (read, write, execute) for the owner, group and “other users”. – Each user is assigned a set of groups to which they belong. – A subject (process) executing on behalf of a principal (user) is given permission to read, write, or modify a file based on the following rules: (a) If he user is the one that owns the file, then access is granted according to the type of access (read/write/execute) and the corresponding permission for the owner of the file. (b) Otherwise if the user belongs to the group to which the file belongs, then access is granted according to corresponding group permissions for the file. (c) Otherwise access is granted according to corresponding “other users” permissions for the file. “security policies” Defined by the organization by means of creating groups (e.g. ‘admin’, ‘finance’) and assigning users to those.
  • 12. © 2007, Real-Time Innovations, Inc.12 Security Concepts Authentication – Verify the identity of the principals accessing the information – Restrict information access to the authorized principals – Presumes a security model where the authorization rules are expressed E.g. Mandatory Access Control or Role-Based Access Control – State of the practice: PKI, “Certificates” signed by a “recognized authority” Confidentiality Integrity Non-repudiation Availability
  • 13. © 2007, Real-Time Innovations, Inc.13 Security Concepts Authentication Confidentiality – Protect information so that only the intended recipients can see it, ensure the information cannot be snooped or intercepted. – Hide the contents of messages from third-party observers. – State of the practice: Encryption, Key-exchange algorithms Integrity Non-repudiation Availability
  • 14. © 2007, Real-Time Innovations, Inc.14 Security Concepts Authentication Confidentiality Integrity – Prevent data from being tampered/modified by a third party – Prevent spoofing/masquerading and the so called “man in the middle” attacks – State of the practice: Integrity check functions or cryptographic hash functions Non-repudiation Availability
  • 15. © 2007, Real-Time Innovations, Inc.15 Security Concepts Authentication Confidentiality Integrity Non-repudiation – Prove in an irrefutable way who the originator of the message is. Depends on having Integrity. Knowing the source of a message that could have been modified in transit offers little value. – State of the practice: digital-signatures. Availability
  • 16. © 2007, Real-Time Innovations, Inc.16 Security Concepts Authentication Confidentiality Integrity Non-repudiation Availability – Protect the system/infrastructure so that authorized principals are not prevented from accessing the information – State of the practice: Boundary protection, use of challenges to Limit Denial of Service Attacks
  • 17. © 2007, Real-Time Innovations, Inc.17 Background: Public Key Infrastructure Two components: – Technology base: Asymmetric Key Encryption – Infrastructure/Policy: Set of trusted Certificate Authorities (CAs) Asymmetric Key Encryption – 2 different keys are used: PublicKey and PrivateKey – Messages encrypted with one key can only be decrypted with the other. – PublicKey is made available to everybody Certificate Authorities – Agreed set of “authorities” whose PublicKey is known – CAs are trusted to “sign” certificates asserting facts about the holder (e.g. their PublicKey, the company name, address, etc.) These certificates are tamper-proof Formats are standard e.g. X.509 – Cryptographic techniques are used to verify the certificates
  • 18. © 2007, Real-Time Innovations, Inc.18 Example: web-based e-commerce Assume you enter https://www.rti.com as the URL: Authentication – Browsers (e.g. Firefox, InternetExplorer) are pre-configured with the public keys of “recognized” CAs (e.g. RSA, Thawte, Verisign) – Each web site (e.g. RTI.com) gets a Certificate signed with Public Key of the CA. – The HTTPS protocol (layered on TLS/SSL) attempts to connect to www.rti.com as part of this rti.com supplies the signed certificate. – The certificate contains the name of the CA (e.g. RSA) and information such as “domain name: rti.com” validity period “jan 2007 to jan 2008”, public key of RTI, etc. – Certificate is encrypted with CA private key. Browser use the CA’s public key to verify the certificate Confidentiality – Once authenticated the browser and the RTI web-server use their respective public keys and to “negotiate” a fresh private key. This “negotiation” includes some random elements introduced by each side. – From there on all messages are encrypted using the newly-created private key. Integrity and Non-repudiation – The sender computes a hash of the message and encrypts the hash with its private key. – Using the public key anybody can verify that: The message has not been tampered with The sender (only one that knows public key) is the origin of the message. Availability – Before connecting and consuming state/recourses issue a challenge that forces client to consume significant CPU
  • 19. © 2007, Real-Time Innovations, Inc.19 Agenda Motivation & Requirements DDS Concepts Security Concepts Is there a Conflict? Net-centric Security requirements Net-centric approach to Security Required DDS Extensions Conclusion
  • 20. © 2007, Real-Time Innovations, Inc.20 Is there a Conflict? Security… – desires to restrict communication to only happen between authorized subjects – wants to confidentiality so that only communicating subjects see the information PubSub/DDS – attempts to create a ‘global information space’ where anybody can access the information it needs – de-couples communications so publishers are unaware of subscribers and vice-versa
  • 21. © 2007, Real-Time Innovations, Inc.21 Security in the Global Information Space The conflict is only apparent Publishers are decoupled from subscribers via the Global Information Space – This does not mean loss of access control to the information – It means that the Information Space must have an associated security model DDS can use standard PKI and cryptographic techniques to enforce the security policies The situation is analogous to access control policies in a file system The key is to use a net-centric security model!
  • 22. © 2007, Real-Time Innovations, Inc.22 Agenda Motivation & Requirements DDS Concepts Security Concepts Is there a Conflict? Net-centric Security requirements Net-centric approach to Security Required DDS Extensions Conclusion
  • 23. © 2007, Real-Time Innovations, Inc.23 General Secure DDS requirements DDS needs a net-centric (pub-sub friendly) security model: – Security model defined in terms of DDS concepts (Domains, Topics) – Authorization should be separate from apps – De-coupled via the GDS – Support one-to-many & multicast – Allow persistence and other DDS services We have investigated two possible models: – Domain-based MAC (Basic) – Topic-based RBAC (Advanced)
  • 24. © 2007, Real-Time Innovations, Inc.24 Mandatory Access Control (MAC) Typical in Military systems Each “security object” is assigned a “security level” (Unclassified, Classified, Secret, Top-Secret). – Order: Unclassified < Classified < Secret < Top-Secret. Each principal is also assigned a “clearance level” MAC policy made of two rules: (1) A principal is only allowed to read information where security level <= clearance level (2) A principal is only allowed to write information where security level >= clearance level Notes: (1) prevents access to restricted information by users that have not been granted the right level of clearance. (2) prevents users that have access to more secure information from leaking it to users that should not have access to it. SELinux (Security-Enhanced Linux) project added a Mandatory Access Control architecture to the Linux kernel.
  • 25. © 2007, Real-Time Innovations, Inc.25 Role Based Access Control (RBAC) Information is only accessible to the owners as well as the principals that have the right “role”. – E.g. Medical records may only be accessible to the patient itself as well as somebody assigned the role of “medical doctor”. E.g. an organization could create roles representing the various job functions. – The rights to perform certain access operations could be assigned to specific roles. – Each member of the staff is assigned particular roles, and thus become authorized to perform certain access operations. Notes: Role-based access control provides the capability of what in A&D is generally called “need to know”. Systems including Microsoft Active Directory, SELinux, Solaris, Oracle DBMS, PostgreSQL 8.1, SAP R/3 and many others effectively implement some form of RBAC
  • 26. © 2007, Real-Time Innovations, Inc.26 Specific Secure DDS requirements Basic (must have) – Authenticated DomainParticipants – Confidential Domain communications – MAC for Domains – Integrity of all data Advanced (nice to have) – “Need to know”. RBAC per Topic – Separate read and write access – Centralized security configuration & management – Audit tools
  • 27. © 2007, Real-Time Innovations, Inc.27 Agenda Motivation & Requirements DDS Concepts Security Concepts Is there a Conflict? Net-centric Security requirements Net-centric approach to Security Required DDS Extensions Conclusion
  • 28. © 2007, Real-Time Innovations, Inc.28 Proposed DDS Security Models The approach based in two ideas: – Secure Domains – Confidential Topics Secure Domains – Limit each Global Data Space (DDS Domain) to contain information at a single level of security – Only authorized participants are allowed to join a Domain – All domain communications are confidential – All information is accessible to all members of the domain Confidential need-to-know Topics – Within a Global Data Space allow participants to read and write Topics on a “need to know basis” – Separate “right to read” from “right to write” – Each Topic is authorized and protected separately
  • 29. © 2007, Real-Time Innovations, Inc.29 Secure DDS Domains Each DDS domain implements MAC at a single security level. Each DDS domain is configured with a CA. The PK of the CA is compiled into each application The CA gives certificates to each Participant that is allowed to join the domain When participants discover each other they use the pre- configured CA PK to verify their peer’s certificate to join the domain Result: – Limits access to the domain only to the principals (the DDS Participants) that have the proper security clearance. – Mandatory Access Control (MAC) is therefore applied to each DDS Domain separately.
  • 30. © 2007, Real-Time Innovations, Inc.30 Implementing Secure Domains Use DTLS – datagram flavor of TLS/SSL – TLS/SSL provides functions to issue certificates and verify them Once verified DTLS establishes secure communications between each pair of participants Each message is also signed providing integrity and non-repudiation Disadvantages: – Multicast is not supported – All-or-nothing security
  • 31. © 2007, Real-Time Innovations, Inc.31 Using Secure Domains Security Admin uses TLS tools to create a CA. Obtains PK of CA. The CA-PK is ‘compiled’ into every application Security Admin issues certificates identifying the computers that can join the domain and distributes them securely App developers or executors install the Certificate in their computer (file, environment) or build it into their application At run-time the DTLS library takes care of authentication, encryption, etc.
  • 32. © 2007, Real-Time Innovations, Inc.32 Confidential DDS Topics The RBAC model applied to DDS Topics Each Topic is assigned a list of “reader roles” and a list of “writer roles”. – ‘reader roles’ are the roles of the principals that can read the Topic – ‘writer roles’ are the roles of principals that can write the Topic Each Participant attached to the Domain is assigned a set of roles. – Write access to the Topic given only to Participants that have a role that appears in the list of “writer roles” for the Topic – Read access to the Topic given only to Participants that have a role that appears in the list of “reader roles” for the Topic Result: – Limits access to the Topic only to the principals (the DDS Participants) that have the “need to know” for that Topic – A single domain can carry traffic of multiple security levels
  • 33. © 2007, Real-Time Innovations, Inc.33 Implementing Confidential Topics Use DTLS – datagram flavor of TLS/SSL Similar to Secure Domain DTLS is used for: – Authentication of participant – Checking of right to Join Domain – Negotiating session key -> Confidentiality – Signing messages -> Integrity, non-repudiation Details: – Participant Certificate is propagated via discovery – Each time a remote Entity (Topic, DataReader, DataWriter) is discovered the Participant certificate is checked to establish right to read/write Topic Disadvantages: – Multicast is not supported – Apps within domain can discover all entities
  • 34. © 2007, Real-Time Innovations, Inc.34 Using Secure Topics Security Admin (SA) uses TLS tools to create a CA. Obtains PK of CA. The CA-PK is ‘compiled’ into every application SA issues certificates identifying the Topics in the domain and the corresponding read-access roles and write-access roles SA issues certificates to individual participants identifying the domain, and their roles. App developers or executors install the Certificate in their computer (file, environment) or build it into their application DTLS library used internally to check that the Participant has the role it needs to create DataWriter and DataReaders by checking the roles in the participant against those in the Topic.
  • 35. © 2007, Real-Time Innovations, Inc.35 Supporting Multicast MC support cannot use standard SSL session-based encryption… possibilities are: – Topic-based encryption – DataWriter-based encryption – Role-based encryption Topic-based – Each Topic is encrypted with a separate crypto-key – Topic key distributed securely to authorized participants DataWriter-based – Each DataWriter uses its own crypto-key – DataWriter shares its crypto-key with authorized readers Role-based – Each role has a crypto-key – Each Writer or Message has its own crypto-key – Either DataWriter key is encrypted with *all* the read-role keys and shared with readers Or Message key is encrypted with *all* the read-role keys Either way any reader that has one of the roles can get the key.
  • 36. © 2007, Real-Time Innovations, Inc.36 Recommendation: DataWriter key Each DataWriter uses its own crypto-key to encrypt all messages – Multicast messages are allowed DW key must be propagated to all authorized readers – This can be done via the standard discovery mechanism by encrypting the DW key with the public keys of the authorized readers – This approach allows the DW to explicitly control who it communicates with and alings with the DDS::ignore_subscription() api
  • 37. © 2007, Real-Time Innovations, Inc.37 Agenda Motivation & Requirements DDS Concepts Security Concepts Is there a Conflict? Net-centric Security requirements Net-centric approach to Security Required DDS Extensions Conclusion
  • 38. © 2007, Real-Time Innovations, Inc.38 Required DDS Extensions Secure Domains can be implemented at the transport level. It does not require any extensions to DDS. Confidential Topics would require some extension to DDS. – Extensions would be limited to some new QoS policies
  • 39. © 2007, Real-Time Innovations, Inc.39 Security Attributes for DDS Entities security_roles[*] These attributes are set by the system when the Participant s created. See the create_participant() operation on the DDS DomainParticipantFactory. security_levelDDS DomainParticipant The DDS topicName is the string used in the DDS API to represent a Topic. The security_write_roles attribute lists the roles of Applications that have a “need to modify” the Topic and hence have “write permission” to the Topic. The security_read_roles attribute lists the roles of the Processes that have a “need to know” for the information available under that topic and hence have “read permission” to the Topic. security_write_roles [*]topicName A Topic is assigned two attributes: the security_read_roles and security_write_roles.security_read_roles [*]DDS Topic/ The DDS DomainParticipantFactory is the singleton that represents the Application in the DDS API. Applications will only be allowed to “attach” to a domain if their security_level matches and they share at least one common role. security_roles[*]DDS DomainParticipantFactory Each Application is assigned a security level and a set of roles.security_levelApplication/ The DDS domainId is the integer used in the DDS API to represent a Domain. The information in the Domain is only accessible to applications that have “need to know”. The security_access_roles attribute lists a set of tags that represents the roles of applications/processes that have a ‘need to know’ for the information in the domain. security_access_roles[*]DDS domainId A DDS Domain represents a separate global data-space. All he information on that Global Data Space is only accessible at the single level of security indicated by the security_level attribute security_levelDDS Domain/ Policy NotesSecurity AttributesDDS Concept/Entity
  • 40. © 2007, Real-Time Innovations, Inc.40 Security extensions to the operations on DDS Entities If the check fails, the operation fails, otherwise it proceeds as stated by the DDS specification. ∩ ( topicName.security_write_roles[]) ≠ Ø ) ( DP. security_roles[] OR ∩ ( topicName.security_read_roles[]) ≠ Ø ) ( DP. security_roles[]lookup_topic(topicName) Check that:create_topic(topicName)DDS DomainParticipant (DP) ∩ domainId. DPF.security_roles[] DPF.security_access_roles[] DP. security_roles[] := DP. security_level := DPF.security_level If they both succeed the created DomainParticipant will have its security attributes set to: If either check fails, the participant creation fails ∩ domainId. DPF.security_access_roles[] ≠ Ø ) ( DPF.security_access_roles[] AND (DPF.security_level == domainId.security_level) Check that:create participant(domainId)DDS DomainParticipantFactory (DPF) Changes to support securityoperationDDS Entity
  • 41. © 2007, Real-Time Innovations, Inc.41 If the check fails, the operation fails, otherwise it proceeds as stated by the DDS specification. ∩ Topic.security_write_roles[] ≠ Ø ) ( S.participant().security_roles[] Check that:create_datawriter(Topic)DDS Publisher (P) If the check fails, the operation fails, otherwise it proceeds as stated by the DDS specification. ∩ Topic.security_read_roles[] ≠ Ø ) ( S.participant().security_roles[] Check that:create_datareader(Topic)DDS Subscriber (S) Changes to support securityoperationDDS Entity
  • 42. © 2007, Real-Time Innovations, Inc.42 Agenda Motivation & Requirements DDS Concepts Security Concepts Is there a Conflict? Net-centric Security requirements Net-centric approach to Security Required DDS Extensions Conclusion
  • 43. © 2007, Real-Time Innovations, Inc.43 Conclusion Security requirements do not intrinsically conflict with the use of publish-subscribe or a net-centric global information space To be effective Security Models such as MAC and RBAC need to be mapped to global-information space concepts COTS technologies such as PKI and TLS can be used to provide Secure DDS domains and Confidential DDS Topics. Supporting fine-grained security may require some extensions to DDS