INET 2004: Strengthening the Net: Building an Open and Trusted Internet
FIRA BARCELONA, May 10-14, 2004, Barcelona, Spain
On Monday, May 10th, 2004 ISOC is organising two special pre-conference tutorials giving attendees the opportunity to get a more in-depth look at some topical Internet technologies - Internationalized Domain Names and IPv6:
Internationalized Domain Names (IDN)
This ISOC workshop will address general internationalisation questions as well as specific IDN issues together with an overview of currently proposed solutions. The workshop is aimed at a broad audience and will be of particular interest to registries/registrars, national regulators and government representatives, application developers and users.
Brought to you by: The Internet Society
Supported by: Public Interest Registry
Internationalization versus Localization.
A brief history of character sets and standards.
ARPANET and Internet Internationalization.
The Presentation Problem.
The domain name problem.
What lies ahead.
The New Internet (IPv6)
The Internet is based on the end to end model, a basic and simple architecture to enable end-nodes to communicate between each other on a peering level.
This concept is eroding on the current Internet as Network Address Translation (NAT), private addressing and client-server models predominate, driven primarily by web applications that fit very well for this kind of model.
This non end to end model serves very well non peer to peer applications, clearly demonstrated by the successful deployment of the worldwide Web
as the prime large scale application vehicle.
IPv6 Status Around The World
Emerging Security technologies
A balanced tutorial from the experts in the field
Communication networks have become the backbone of modern society. Such networks enable citizens to be connected to their virtual ambient environment irrespective of location. Recently deployed wireless terminals (Mobile phone, PDA, laptops), networks (WLAN, GSM/GPRS/3G) and applications allow the users to access the Internet from just about anywhere and the possibilities to connect everything from printers to refrigerators to the Internet. However, the present networks still have limited security and require some detailed security knowledge from their users. Therefore users often feel insecure when using the Internet due to fear of viruses, intrusion attempts etc. In the near future, security requirements will become even more important as networking and computing develop further and become more ubiquitous. Managing security has turned out to be a difficult and complex task, as the user has to deal with the availability, integrity, authenticity, and confidentiality of data and services. Due to the complexity of technology, many components and actors must interoperate, and human behaviour has become a crucial factor.
The new generation network based on IPv6 will provide peer-to-peer connectivity with extended security. This will help to develop and expand the way people use the Internet..
Improving information security is critical to the operations, reputation, and economic stability of any organisation. As an organisations dependency on computers and network communications increases, so does its vulnerability to information security compromises. Almost every week the media reports on new computer crimes, system break-ins, malicious code attacks, and the ever-growing threat of cyber terrorism. Current research on network security shows three realities that organisations must consider:
In addition to the legal ramifications of a security breach, it is well substantiated that malicious attacks result in actual financial costs, decreases in revenue, and have a severe negative impact on productivity. The security architecture that can help organisations to reduce incidents of security breach and to meet the requirements of new laws and regulations around the world is being addressed in many industrial and public organisations.
Every existing information systems rely on two families of technology:
and a worldwide mandatory usage of resource-wasting, uniform technology ruled by de-facto standards, diametrically opposed to real-life and its trust mechanisms.
The IPsec protocol has been defined to secure Internet communications. However, IPsec is not widely deployed in legacy networks. IPv6 protocol mandates the support of IPsec, to make the new generation Internet more secure. IPsec implementation in IPv6 provides security services such as data integrity, authenticity, confidentiality, and protection against spoofing and session replays. Furthermore, with IPv6, NAT boxes are no longer required, which allows a broad deployment of IPsec functionality.
These security services are provided using symmetric/asymmetric keying mechanisms. Hence there is a need for a security key management framework to truly enable end-to-end secure communication. Therefore, a Public Key Infrastructure (PKI) is required for wide scale deployment of a security infrastructure across the Internet. PKI, in combination with other key management systems, will function as an authoritative source for certified keys of hosts and services on the Internet and provide the possibility of interoperability with the Domain Name System (DNS) infrastructure.
The SEINIT FP6 Project proposes to extend the panel of security mechanisms by introducing new security models and to build a security framework to address this nomadic, pervasive, multi-players communication world.
Issues addressed in the tutorial: Emerging security technologies
Network security is a major concern for any user and organisation, independent of whether the network used is a LAN or a WAN, and whether it is connected to the Internet or not. This tutorial provides a practically focused perspective on network security and provides training on some emerging security technologies. Many of the advanced technologies are being developed at present.
Security concerns are presented with an eye towards useful, practical, applicable procedures and policies. Technologies for securing your network against threats from both inside your organization and outside intruders (including the Internet) will be discussed. The seminar covers preventative procedures, policies, and implementations. We discuss security systems, card keys, software, hardware, encryption, abstraction, authentication, and other security mechanisms.
The speakers will address
Topics to be covered include:
Click here: http://www.isoc.org/mailman/listinfo/inet04 to sign up to the INET/IGC 2004 conference mailing list to be kept informed about registration information, the conference program, and other important updates to information on this web site.