FRANCAIS CONFERENCE OVERVIEW PRE-CONFERENCE EVENTS SPONSORSHIP + EXHIBITION MEDIA/PRESS REGISTRATION, HOUSING, TRAVEL HELP PROMOTE INET'98
|
ReportsThese reports, written by volunteers, summarise information
for people not able to attend the sessions. Their comprehensiveness and
accuracy are not guaranteed. For more information, please contact the presenters
directly. Their e-mail addresses are available at http://www.isoc.org/inet98/program.shtml
Track 1: New Applications Session: Internet Security By Assina Bounis, 22 July 1998 The computer science experts discussed the net s security , insisting on the
importance of protecting www networks and information-based systems from external attacks
and unauthorised use. In this session, three different related subjects were treated and
more explanations given. LDAPv3 Versus X.511 DAP Security : Comparison and How to Sign LDAPv3 Operations
Vesna Hassler introduced the ELU project, describing briefly the features and
functionality of both the LDAPv3 and X.511 DAP protocols and giving a comparative overview
of them. For example, password authentication is provided for both of them , a strong
authentication is also provided for X500 and is in the standardisation for the LDAPv3. In
addition, it is possible to add to the first one but is in the standardisation for the
second In conclusion, according to the speaker, the X500 model is more complete and LDAPv3 is
more Internet oriented. Smart Access : Strong Authentication on the web T. Verschuren explained how information access is done nowadays, and went on to explain
smart access . He gave some details about its functionality, access conditions, as well as
details of issues and currents applications such as registration for courses and access to
exam results databases. He finished his presentation with a demonstration. The reference is : http://www.surfnet.nl/surfnet/projects/home-office
How to Organise Company?Wide Authentication and Email Encryption M. Lenz pointed out that all kinds of applications need authentication which would
require the use of public key cryptography . According to him, the problem is how the user
can obtain a public key ? the solution is a public key certification. He then went on to
talk about: * Organise a certification authority * Certificate meaning * Certificate process * Management of different key types * Personal keys * Application secure email (S/MIME, PGP) |
About the Internet Society | Conference Overview | Pre-Conference Events | Sponsorship + Exhibition |
Registration, Housing, Travel | Media/Press | FAQs | Home
All graphics and content copyright ©1998
Internet Society.
The INET'98 Web-site was designed by
Designright, Inc. http://www.designright.com