jump to navigation

Closing Nordsec 09 November 3, 2009

Posted by tcarlyle in identity management, Me, Sensors, SIM Cards, Thesis.
Tags: , , ,
trackback

I know it has been more less about half month since the ending of the Nordsec 09 and I was supposed to update about the last two days. However, after the conference (and some days off at the Belgium coast) I had a lot to catch up at work. Anyway, one good new is that the talks which does not correspond to paper presentation had their slides uploaded at the Nordsec Program Webiste.

The second day had some quite more technical (sometimes even more mathemathical) presentations. The ones I was most interested was the one about the usability of petname systems and the one about widget security.

Though due to the presentation on “A Parallelism-Based Approach to Network Anonymization” from Igor Margasinski, I got to know more about network anonymization which is a topic that I must admit not have heard before. It was nice to know that there are some options such as the tor project that tries to completly protect user privacy and enable users to bypass some content filters from some countries, therefore raising the freedom of communication.

However, the people that discussed about TOR said that in practice this anonimity routing, make the traffic flow pretty slow. Still, on the same day, Heiko Roßnagel discussed how the porn industry could in fact sponsor the development of TOR networks, as they correspond to users that would like the service and that are also willing to pay for it. On the other hand, this is a delicate topic as the porn industry can have some complex legality and ethic borders.

In the presentation of Karsten Peder Holth around widget security, the author points several of the security flaws that can be introduced when installing a widget. However, as he says, this is somehow a consequence of the simple development model of widgets and in fact it is this simple development model taht makes widgets so popular.

Audung Jøsang presented the paper his students have written about usability of petnames. He defended the need of making Identity Management more user centric with the usage of petnames and it makes a lot of sense. However, it looked like the Identity Selectors, as the ones part of identity schemas such as Geneva (“new name” of Microsoft Cardspace) and Higgins, already provide the user an alternative for the memorizing problem towards identities.

In the following day, we had another presentation around SIM cards and Identity. This one was given by Do Van Than, and although it also touched the aspects of the possible positioning of operatords towards IdM, it showed a bunch of cases on how this could be done and they have already tested. It is somehow sad to see that we could be already using the SIM as an IdM device with the EAP-SIM protocol and the federation standards (such as the ones from Liberty Alliance, which seem to have changed its name also, but I dont remember the new one), and unfortunatelly due to protective interests from several players in this heterogeneous market, we don’t.

Besides that we had more two SIM related presentations. One, where Heiko Roßnagel discuss the potential of the SIM as a the most suitable tool for delivering real-time information services. And my presentation covering the usage of high-end SIM cards enabling the possibility of sensing and chategorizing user relation. I’ll discuss my presentation a bit better in a next post (which hopefully wont take that long), but if you are interested in check it out the paper here is the springer link for it or you can see a 100% free preview at this googlebooks link. In fact, Ill verify if I can put it here in the blog as well.

It was really nice to present the paper and although I was a bit nervous before, the presentation went really well. I think I kind of have the knack for presentations.

Later (hope not much), I come back for talking a bit more about my paper, my master thesis and maybe also some frustrations and experiences with the N97 =)

Advertisements

Comments»

No comments yet — be the first.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: