The Internet Society's 12th Annual INET Conference: Internet Crossroads: Where Technology and Policy Intersect
including the IPv6 Forum's IPv6 Technology Deployment Summit
Full-DayTF1: IP Version 6
TF2: Legal and Regulatory Issues: A Primer
Half-Day - AMTA1: IP Telephony
TA2: Internet Security: Problems, Solutions and Trends
TA4: A Tour of XML Standards
TA6: Domain Names and ICANN
Half-Day - PM
TP1: Mobile IP Networks
|09:00-17:00||Full Day Tutorials|
|TF1: IP Version 6|
Marc Blanchet, Viagénie
IPv6 is the new version of the IP protocol. It is designed to meet scaling requirements imposed by the explosive growth of the Internet and to meet the demand for greater functionality at the Internet layer, including strong security, mobility, and plug and play configuration. IPv6 is under deployment around the world, and commercial providers in the US, Europe and Asia are now providing IPv6 service to their customers. This full-day tutorial provides an in-depth exploration of the new IPv6 protocol, its architecture and extensible mechanisms, and strategies for moving from IPv4 to IPv6. The tutorial will conclude with a discussion of the present status of IPv6 deployment and industry trends.
Marc Blanchet has given numerous courses on IPv6, security and TCP/IP. He is an active member of the Internet Engineering Task Force (IETF), and has authored several Internet-drafts. He is currently co-chair of the internationalized domain names working group and co-chair of the IPv6 Exchange working group. Additionally, he is a co-founder of the IPv6 Forum and a member of the IPv6 Forum board. He is the author of the books "TCP/IP Simplifié" and "Migrating to IPv6".Return to top
|TF2: Legal and Regulatory Issues: A Primer|
Jim Dempsey, Mike Godwin and John Morris, Center for Democracy and Technology
This day-long tutorial will provide an in-depth examination of four key sets of legal issues affecting the Internet: government surveillance and cybercrime, free expression, copyright, and consumer privacy. These detailed presentations will be framed by shorter contextual overviews of the regulatory framework within which the Internet exists. The session on government surveillance will cover, among other topics, search and seizure law, with specific reference to searches of computers; real-time interception, as applied to both traditional telephony and data communications; the changes wrought by the USA PATRIOT Act in the wake of September 11; the debate over design standards and data retention; obligations of systems operators; and international developments, including the Council of Europe Cybercrime Treaty.
In terms of free expression, the tutorial will examine: the U.S. First Amendment and international human rights protection of free expression; the filtering debate; the French Yahoo! decision; ISP liability/immunity; and online defamation. Under copyright, the tutorial will provide a basic understanding of the principles of copyright law and their extension to the Internet, focusing on the WIPO treaty and recent cases and controversies (Napster, DeCSS, Sklyarov) as well as the Hollings legislation, which would require DRM technology to be built into all digital devices. The consumer privacy segment will examine fair information principles and their inclusion (or non-inclusion) in law and policy in the U.S., Europe, and other countries, including an analysis of pending privacy legislation in the U.S.
The tutorial will be pitched to non-lawyers, but will be scalable so that lawyers should learn something too. The presentations will focus largely on US law, but will also include significant reference to international developments including surveillance standards, international treaties on copyright, self-regulation and content controls in Europe, the European Union's Data Protection Directive, etc, as well as trans-border jurisdiction in cyberspace.
Jim Dempsey is deputy director of the Center for Democracy and Technology (CDT), where he works primarily on privacy and electronic surveillance issues and heads CDT's international project, the Global Internet Policy Initiative (GIPI). He testifies frequently before the U.S. Congress on Internet policy issues and speaks widely at seminars and conferences. He is the co-author of the book "Terrorism and the Constitution: Sacrificing Civil Liberties in the Name of National Security", as well as law journal articles on communications privacy, legal aspects of Internet security and online freedom of expression.
Mike Godwin, a well-known Internet activist and writer, is Policy Fellow at CDT. He has had extensive involvement with the legal and social issues affecting cyberspace and has served as the first staff counsel for the Electronic Frontier Foundation, where among other activities he instructed criminal lawyers and law-enforcement personnel about computer civil-liberties issues. He is the author of "Cyber Rights: Defending Free Speech in the Digital Age", as well as numerous articles in the American Lawyer, Internet World, WIRED, HotWired, Time, Reason and other publications.
John Morris is the Director of CDT's Internet Standards, Technology and Policy Project. Prior to joining CDT, Mr. Morris was a partner in the law firm of Jenner & Block, where he litigated groundbreaking cases in Internet and First Amendment law, including ACLU v. Reno and American Library Association v. DOJ, in which the Supreme Court unanimously overturned the Communications Decency Act of 1996 and extended to speech on the Internet the highest level of constitutional protection. Prior to becoming a lawyer, Mr. Morris worked in the computer industry as a programmer and system designer.Return to top
|TA1: IP Telephony|
Igor Faynberg and Hui-Lan Lu, Bell Laboratories/Lucent Technologies
This tutorial will provide an in-depth overview of voice-over-IP technologies, architectures and standards and their applicability to today's networks. Topics covered will include user scenarios such as PC-to-PC and phone-to-PC connections, voice codecs, relevant transport protocols (UDP, RTP and RTCP), QoS protocols impacting voice performance (RSVP, DIFFSERV and MPLS), and signaling protocols (H.323, H.248, TRIP and SIP). Voice interworking with the PSTN and wireless networks will be covered, including a review of ENUM, the E.164 to IP domain name telephone number mapping standard, and discussion of its regulatory, technical, and political implications. In addition, the economics of IP telephony will be briefly discussed.
Igor Faynberg is Director, Standards and Technologies at Bell Laboratories/Lucent Technologies and adjunct professor of Computer and Information Science, Stevens Institute of Technologies. He is an author of two books, "Intelligent Network Standards, their Applications to Service" and "Converged Networks and Services: Internetworking IP with PSTN", is active in the IETF and ITU-T, and is frequently invited to speak at major conferences and events related to his research area. He holds two US patents for inventions relevant to Intelligent Networks and Converged Services.
Hui-Lan Lu is Bell Labs Fellow and Consultant in Bell Laboratories /Lucent Technologies. A distinguished researcher, she is well known for her publications in the areas of Physics, Operations Research, Compiler Theory, and Telecommunications protocols. She is an author of the book on PSTN/Internet integration "Converged Networks and Services: Internetworking IP with PSTN". She also frequently teaches seminars on IP Telephony and Converged Services around the world, and holds two US patents for inventions relevant to service creation and multimedia.Return to top
|TA2: Internet Security - Problems, Solutions, and Trends|
Sead Muftic, George Washington University
This tutorial will provide a comprehensive overview of problems, solutions and trends in the area of Internet security. The problems to be discussed range from common threats, such as illegal or incorrect messages, denial-of-service attacks, viruses, worms and Trojan horses, to very sophisticated threats organized as anonymous distributed system attacks. In addition, problems involving insiders and requirements for secure and reliable business transactions will be covered.
Several major technologies will be reviewed as potential solutions, ranging from standard technologies (firewalls, virtual private networks, SSL, virus protection and intrusion detection systems) to advanced network security architectures involving public key infrastructures, authentication and authorization schemes, and trusted third-party services, with special emphasis given to biometrics and smart cards. Finally, we will overview current organizational and legislative regulation of computer security, including public-key cryptography policies, national security, and authorizations of financial transactions.
Sead Muftic is professor of computer security at Stockholm University and Royal Institute of Technology in Sweden. He is currently also professor of computer security and secure E-commerce, and Director of Research in the Cyberspace Policy Institute, at George Washington University in Washington, DC. He is the author of three books in the area of computer security and approximately 50 published papers. He coordinated the international research project "COST-11: Security Mechanisms for Computer Networks", sponsored by the Commission of the European Communities, holds three patents, and was the founder, Chairman and CTO of the security company Entegrity Corporation. He has been working in the area of computer security for over 25 years.Return to top
|TA4: A Tour of XML Standards|
Liam Quin, W3C
Despite all the acronyms, a shared vision exists for XML technology. This vision is based on structured information, explicit representation of relationships, and the concept of the URI as a universal name. This tutorial will provide a broad overview of the XML-based standards coming from the World Wide Web Consortium (W3C). Base XML specifications such as XML 1.0, XML Schema, XML Query, XML Link, XPath and XPointer will be covered, as well as standards building on XML such as Digital Signatures, HTML, SVG, XSL, Web Services, RDF and the Semantic Web. The W3C processes, IPR and patent policy will also be discussed. Attendees should have basic familiarity with HTML and the World Wide Web.
Liam Quin is the W3C XML Activity Lead. He has been involved in the design and development of XML since its inception, and joined the W3C as XML Team Contact in August, 2001. Before joining W3C he worked for SoftQuad Inc., where he was technical lead for the HTML editor HoTMetaL Pro and the web-enabled SGML browser SoftQuad Panorama. He has spoken at SGML and XML conferences, and written and co-authored three books on XML.Return to top
|TA6: Domain Names and ICANN|
Hans Klein, Georgia Tech
The problems associated with creating and controlling top-level domain names such as .com and .biz, and of providing domain names to companies and individuals, have taken on increasing importance and controversy as the Internet has expanded. From a technical perspective, the Domain Name System (DNS) provides the implementation of the name-to-address translations required to make the Internet work. For policy and governance, the Internet Corporation for Assigned Names and Numbers (ICANN) was created in 1998 to deal with Internet names and addresses and to oversee the operation of the DNS.
After first providing a technical overview of DNS operation and technical issues, the tutorial will provide an overview and exploration of DNS policy and governance issues and mechanisms, including the evolution and present status of ICANN. The complex linkages between DNS technology and policy will be examined, including intellectual property, US government administrative law, and international sovereignty. Most importantly, the tutorial will review today's issues, including: revisions to ICANN's governance structure, ICANN's relationships to national governments and ccTLD administrators, and the policy implications of different designs of the DNS root.
This session will be useful to anyone who is interested in domain name issues and operation but has not had the time to fully follow the issues. The tutorial will offer a rare overview that brings all the pieces together.
Hans Klein is an Assistant Professor of Public Policy at Georgia Tech's School of Public Policy, and is Chair of Computer Professionals for Social Responsibility. He has written numerous research articles on ICANN and also publishes the Cyber-Federalist newsletter. He has a BS EECS from Princeton University and MS and PhD in Technology Policy from MIT.Return to top
|10:300-11:00||Morning Coffee Break|
|TP1: Mobile IP Networks|
Régis Desmeules, Viagénie
As wireless networks proliferate within the Internet, new protocols are required to allow mobile IP nodes to maintain transparent end-to-end operation. This tutorial is an introduction to the Mobile IP protocol standard defined by the IETF, which permits nodes using either IPv4 or IPv6 to seamlessly roam among different IP networks and media. The tutorial will cover the issues of mobility with IP, the design and architecture of the Mobile IP protocol, an example commercial Mobile IPv4 implementation, and an overview of Mobile IPv6.
Régis Desmeules is a network engineer with Viagénie in Canada. He specializes in IP and IPv6 protocols, and has developed and taught courses related to multimedia over IP. He has given tutorials and workshops on IPv6 and Mobile IP at Networld+Interop and IPv6 Forum conferences. Prior to joining Viagénie, he worked for Tele-university, the largest distance education university in Canada.Return to top
|TP2: Wireless Security: 802.11b and Beyond|
Gary McGraw, Cigital
Wireless security is becoming increasingly important as wireless applications and systems become widely adopted. Numerous organizations have already installed or are busy installing wireless local area networks (WLANs). These networks, based on the IEEE 802.11b standard, are very easy to deploy and are inexpensive. However, the risks associated with the adoption of wireless networking are only now coming to light -- both active and passive attacks are possible, and have been heavily publicized. As was the case in the wired computing world, early wireless security is focused almost entirely on cryptography and secure transmission (leaning heavily on WTLS and WEP, for example). This approach is too limited to produce the end-to-end security necessary for critical wireless applications and systems now on the drawing board.
After discussing wireless risks in detail, this tutorial will concentrate on mitigating them. We will cover proper deployment of both existing and new WLAN installations based on current technology, and discuss auditing techniques. We will also discuss why mature software security practices and sound systems security engineering should be used when designing and building wireless applications. Finally we'll look to the future with a description of Enhanced Security Network (ESN), the next generation wireless security architecture.
Gary McGraw is the Chief Technology Officer at Cigital and a noted authority on software security. He serves as the principal investigator on grants from Air Force Research Labs, DARPA, National Science Foundation, and NIST's Advanced Technology Program, and recently chaired the National Infosec Research Council's Malicious Code Infosec Science and Technology Study Group. He has co-authored the following books: "Java Security: Hostile Applets, Holes, & Antidotes", "Securing Java: Getting Down to Business with Mobile Code", "Software Fault Injection: Inoculating Programs Against Errors", and "Building Secure Software", and regularly contributes to popular trade publications and national press articles.Return to top
|TP3: Web Accessibility: Technology and Policy for an Inclusive Future|
Judy Brewer and Wendy Chisholm, W3C
Web accessibility is emerging as a key issue in information technology and policy development around the world. In this tutorial, speakers from the World Wide Web Consortium (W3C) Web Accessibility Initiative (WAI) will provide an overview of the latest in guidelines, techniques, educational resources, and international policy context.
The tutorial will begin with a brief exploration of barriers that people with various disabilities encounter on the Web, and how those relate to similar user requirements for device-independent access, low-bandwidth connectivity, second language access, low literacy levels and more. We will explore the expansion of policies relating to Web and Internet accessibility from the perspectives of human rights, information technology procurement, and other regulatory processes, and discuss the benefits of standards harmonization for Web content and Web-related software. The session will demonstrate evaluation and repair of inaccessible Web sites, and leave you with educational and outreach resources for additional technical support and for promotion of Web accessibility in your country or organization. The speakers will address both your technical and policy related questions according to the interests of attendees.
Judy Brewer joined the World Wide Web Consortium (W3C) in September 1997 as Domain Leader for the Web Accessibility Initiative (WAI) and Director of the WAI International Program Office. She coordinates five areas of work for W3C with regard to Web accessibility: ensuring that W3C technologies support accessibility; developing accessibility guidelines for Web content, user agents, authoring tools, and XML applications; developing tools for evaluation and repair of Web sites; conducting education and outreach on Web accessibility solutions; and monitoring research and development which may impact the future accessibility of the Web. She has a background in management, technical writing, education, applied linguistics, and disability advocacy.
Wendy Chisholm joined the W3C in October 1999 to coordinate the development of tools and create guidelines that will facilitate an accessible Web. Before joining the W3C, she was a human factors engineer at the Trace R & D Center at the University of Wisconsin researching the accessibility of evolving Web technologies and Java. She is co-editor of the W3C's Web Content Accessibility Guidelines 1.0, which provides instruction on how to make Web content accessible to all users. She has a background in Industrial Engineering, Computer Science, and Psychology.Return to top
|TP4: Internet Grid Computing: The New Application Utility|
Kate Keahey, Argonne National Laboratory
Grid computing has emerged as an important new area, distinguished from conventional distributed computing by its focus on large-scale resource sharing, innovative applications, and, in some cases, high-performance orientation. The Globus Project is leading the definition of standard Grid protocols and APIs, in areas such as security, resource management, data management, and information discovery. The open source Globus Toolkit, which provides a reference implementation of these Grid protocols and APIs, has been adopted by most of the major Grid projects world-wide, providing a common, robust infrastructure for building applications that exploit distributed, heterogeneous resources.
This tutorial is a practical introduction to Grid computing, the Globus Toolkit, and the Open Grid Services Architecture. The tutorial begins with an introduction to the Grid problem, which we define as flexible, secure, coordinated resource sharing among dynamic collections of individuals, institutions, and resources. Next, we present an extensible and open Grid architecture, in which protocols, services, application programming interfaces, and software development kits are categorized according to their roles in enabling resource sharing. We then introduce the Globus Toolkit, and briefly describe its core components. Finally, we present how the Globus Toolkit is moving forward with the Open Grid Services Architecture, building on concepts and technologies from the Grid and Web services communities.
Kate Keahey is an Assistant Computer Scientist in the Distributed Systems Laboratory in the Mathematics and Computer Science Division at Argonne National Laboratory. She received a Ph.D. in Computer Science from Indiana University where she worked on parallel extensions to CORBA. Her research interests focus on high-performance, distributed, Grid computing and component architectures. She is an active member of the Common Component Architecture (CCA) Forum.Return to top
|TP5: Internet Communities, Part 2: From E-Readiness to E-Reality|
Roslyn Docktor, McConnell International and Steve Wendel, bridges.org.
E-readiness -- the ability for a country or community to benefit from information technology -- is portrayed as the best way to increase market competitiveness and improve the lives of citizens. Going beyond the news clippings, how does a country actually improve e-readiness? What is meant by national and community-level e-readiness assessments, and what should they include? What lessons have been learned internationally in e-readiness assessment and improvement, and what type of assessment is best for your country? What concrete steps are needed to find and implement locally relevant, sustainable methods of improving e-readiness? What is needed to inform, engage, and train the key actors? What are the potential roles of government, businesses, academia, and civil society? How do you know if the process has been successful?
This session focuses primarily on policy changes and major initiatives by government, private sector, and civic organizations. Attendees will gain a firm understanding of the field, knowledge of what assessments have been conducted in their region, and knowledge of how to plan and improve e-readiness in their countries and communities. In addition, participants will be encouraged to begin the e-readiness improvement process by finding out about assessments in their country (using information supplied during the session), by learning about and choosing assessment methods that fit their goals, and by producing a framework for action to assess and improve their e-readiness.
Roslyn Docktor is the Vice President and co-founder of McConnell International, a global technology policy and management consulting firm based in Washington, DC. Her international experience strengthening local and global networks across governments, businesses, and communities spans nearly all continents. As the deputy director for the United Nations-supported International Y2K Cooperation Center, she established an effective Internet-connected network of over 170 national Y2K leaders. As the associate director for communications for the Council of Opportunity in Education, Docktor developed an interactive framework for regional coordination that significantly increased revenues. In addition, she helped structure a program to create community-based technology centers increasing low-income students' access to technology.
Steve Wendel, bridges.org project manager, is currently leading bridges.org's assessment of Cape Town's Digital Divide. This assessment is one of the first of its kind to provide a comprehensive look at both the experiences and needs of average citizens for information technology and the underlying policy and economic environments that shape e-readiness. Bridges.org is an international organization helping to span the digital divide through extensive research into information technology best practices and targeted policy interventions. He is the primary author of a number of key bridges.org documents on e-readiness and the digital divide.Return to top
|TP6: New Internet Standards from the IETF|
Scott Bradner, Harvard University
The Internet Engineering Task Force (IETF) continues to be a primary force in the successful operation and growth of the Internet, reflecting the ongoing efforts of a worldwide team from industry, governments and academia. This tutorial provides an overview of important recent and emerging standards-track work in the IETF. It will cover activities in each of the seven IETF technical areas: Applications, Internet, Operations and Management, Routing, Security, Sub-IP and Transport. Work in other standards organizations such as the ITU-T, ETSI, 3GPP, 3GPP2 and the ATM Forum will be included where it is related to work in the IETF.
Scott Bradner is a senior technical consultant at the Harvard Office of the Provost. He is the codirector of the Transport Area in the IETF, is a member of the Internet Engineering Steering Committee (IESG), and serves as the Vice President for Standards for the Internet Society. He was also codirector of the IETF's IPv6 effort and is coeditor of the book "IPng: Internet Protocol Next Generation". He is a frequent speaker at technical conferences and a weekly columnist for Network World. He has been involved in the design, operation and use of data networks since the early days of the ARPANET.Return to top
|15:00-15:30||Afternoon Coffee Break|