mipshop-12----Page:8
1  2  3  4  5  6  7  8  9 

Security
Identifies some broad security issues to be considered
How to analyse the mixed L2/L3 case
What it means to secure the discovery process
Baseline assumption: MIH support will provide a channel security service and make authenticated peer identities available to MIH services
Assumption of re-using standard security protocols
Protocol selection depends on deployment issues
MIH security analysis can only be done on the completed solution (including the MIH service itself)
Note: the major work that will have to be done (in mipshop) is to define the rules/policies for invoking the channel security protocol
E.g. for TLS: what sorts of names should be used in TLS certificates
What sort of attributes one should demand/expect in those certificates
PPT Version