Building on Existing Security Infrastructures

 
When?
Wednesday 18 May 2011, 15:00 to 16:00
Where?
39BB02
Open to:
Staff, Students
Speaker:
Professor Chris Mitchell, Royal Holloway

Professor Chris Mitchell, from Royal Holloway, will be our next speaker.  

Almost any large scale network security system requires the establishment of a security infrastructure of some kind.  For example, if network authentication or authenticated key establishment is to be implemented, then the communicating parties need access to a shared secret key or certificates for each other's public keys.  Setting up a new security infrastructure for a significant number of clients is by no means a trivial task.  It is therefore tempting to try to exploit an existing security infrastructure to avoid the need for the potentially costly roll-out of a new infrastructure.
The GAA architecture has been designed to enable the pre-existing mobile telephony security infrastructure to be exploited for the provision of generic security services.  We propose the adoption of the architecture used by GAA to enable a wide range of other pre-existing infrastructures to be similarly exploited.  We briefly look at two examples, namely what we refer to as TC-GAA and EMV-GAA.

Prof Mitchell's bio can be found here

Date:
Wednesday 18 May 2011
Time:

15:00 to 16:00


Where?
39BB02
Open to:
Staff, Students
Speaker:
Professor Chris Mitchell, Royal Holloway

Page Owner: eih206
Page Created: Wednesday 23 March 2011 10:17:22 by eih206
Last Modified: Monday 9 May 2011 11:48:04 by eih206
Expiry Date: Saturday 23 June 2012 10:15:20
Assembly date: Tue Mar 26 18:00:09 GMT 2013
Content ID: 52369
Revision: 2
Community: 1028