SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Session
 Mobility
A Device Oriented
    Solution
The Pitch




    2
Introduction
Session Mobility
The migration of a! elements of an operating
system environment between machines



   The Internet is too slow to support
   Session Mobility



                      3
Introduction
Dynamic Data Update
  The integration of online data into a
  mobile session via opportunistic
  connections to wireless networks




                   4
System Architecture
                                               3&4"#&"4

  .'/012             ,"#-"#




                                                 6%#"("77
                                               )8//"77)9:%&4
                                       6%#"("77
                                       >:&&"/4%:&




                 ;,.)+<=                     ;,.)+<=
                              5"-%/"
                                                          !"#$%&'()+
    !"#$%&'()*
Devices
Computation
Storage
Wireless Networking
Link Speed
Form Factor
Power


               6
Modes of
      Operation

Attached
  connected to a terminal

Detached
  roaming




                 7
Terminals

Open access terminals
VMWare Virtual Machines
May or may not be connected to the
Internet




                8
VMWare
Backup Servers

Data resides on device
Vulnerable to damage, loss and theft
Automated and efficient backup of
data is necessary




                10
Device Mobility

Mobile IP
Access Point Detection




               11
Synchronization

Update of data using
  Proxy
  Device

Integration of data into session




                 12
Email

Technologies used
  Javamail
  VMWare mount tool
  Apache James Mail Server




                13
Proxy Architecture
      9-$67

                                                  5".*0"
    4*+"

              8/%"-/"%


   3-$67                                 4*+"
   0+*"/%




                         "#)*+
                         ,"-."-                 ("((*$/
  8/%"-/"%                                       0+*"/%




                             1("-&               ,"((*$/
                           233+*0)%*$/



  !"#$%"&
   '$(%
Device Architecture
                                )"*+,"
                                ,-+".%
                                               6"*+,"




           7.%"1."%                   5+-"




 !"#$%"&
  '$(%                "#/+-
                      0"1*"1                 ("((+$.
                                              ,-+".%




                          2("1&               0"((+$.
                        344-+,/%+$.
Interesting Bits
Platform independent
No changes necessary to
  Remote Email Servers
  Client Software

User data secure



                   16
Performance
      Performance        Suse Linux     Suse Linux       Suse Linux     Suse Linux
            -            + Harddrive    w/VMWare        w/ WMWare          iPod
            -                   -       + Harddrive        + iPod            -
 Average Cache Read        1345.065       999.015         1156.425       1377.472
 Std. Dev Cache Read         61.604       170.089           65.998        101.821
   Min Cache Read           1258.93        736.32           657.09       1005.65
   Max Cache Read           1450.22       1219.67          1240.53        1503.48
     Average Read           14.7662      116.2162         117.7391        14.574
    Std. Dev Read        0.186383877    15.57866994      10.6832118        0.719
       Min Read               14.44        73.69             79.46         11.76
       Max Read               15.2         139.99           137.72         15.19

 Table 1: A comparison of the cache and hard drive reads with VMWare


7.1   Overview
There are many different problems with the mobile data approach with
respect to security. The most pressing of those concerns is the integrity
and security of the data on the mobile device. A user will be unwilling to
use this system if the data stored on the device is not safe from attackers.
                                       17
This is especially important for users who want to use this type of system
to transport data from work to their homes given that the data may be
Security

Device from Host
Host from Device
Device from Wireless Network




               18
Trusted
     Computing

Tamper proof hardware
Authenticated Boot
Boot Assertions




                  19
Trusted
     Computing

Several Different Approaches
  TCG Specification
  NGSCB, formerly Palladium
  Terra




               20
Unsolved Security
   Problems

Root Security
Data Validation in detached mode of
operation




                21
Discussion &
  Improvements

Need for automated backup
Deployment of the system impacts
usefulness
User friendliness is key to acceptance




                 22
Session Mobility

Device Oriented

VMWare

Trusted Computing

Sandbox

Data mobility - email




                        23
                             Conclusion

Weitere ähnliche Inhalte

Andere mochten auch

Modern SEO Techniques Part 1:New SEO Methods for Medical Device Marketers
Modern SEO Techniques Part 1:New SEO Methods for Medical Device MarketersModern SEO Techniques Part 1:New SEO Methods for Medical Device Marketers
Modern SEO Techniques Part 1:New SEO Methods for Medical Device MarketersGrey Matter Marketing
 
TruTouch Medical Device pitch
TruTouch Medical Device pitchTruTouch Medical Device pitch
TruTouch Medical Device pitchTim Tigner
 
The Best Startup Investor Pitch Deck & How to Present to Angels & Venture Cap...
The Best Startup Investor Pitch Deck & How to Present to Angels & Venture Cap...The Best Startup Investor Pitch Deck & How to Present to Angels & Venture Cap...
The Best Startup Investor Pitch Deck & How to Present to Angels & Venture Cap...J. Skyler Fernandes
 

Andere mochten auch (6)

Medical Industry Sales Pitch
Medical Industry Sales PitchMedical Industry Sales Pitch
Medical Industry Sales Pitch
 
Modern SEO Techniques Part 1:New SEO Methods for Medical Device Marketers
Modern SEO Techniques Part 1:New SEO Methods for Medical Device MarketersModern SEO Techniques Part 1:New SEO Methods for Medical Device Marketers
Modern SEO Techniques Part 1:New SEO Methods for Medical Device Marketers
 
TruTouch Medical Device pitch
TruTouch Medical Device pitchTruTouch Medical Device pitch
TruTouch Medical Device pitch
 
L 7 ct physics
L 7 ct physics L 7 ct physics
L 7 ct physics
 
The Best Startup Investor Pitch Deck & How to Present to Angels & Venture Cap...
The Best Startup Investor Pitch Deck & How to Present to Angels & Venture Cap...The Best Startup Investor Pitch Deck & How to Present to Angels & Venture Cap...
The Best Startup Investor Pitch Deck & How to Present to Angels & Venture Cap...
 
How to Pitch B2B
How to Pitch B2BHow to Pitch B2B
How to Pitch B2B
 

Ähnlich wie Computing-Session Mobility

Positive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-raysPositive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-raysqqlan
 
CloudBees - Sacha Labourey - May 2011
CloudBees - Sacha Labourey - May 2011CloudBees - Sacha Labourey - May 2011
CloudBees - Sacha Labourey - May 2011JUG Lausanne
 
Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...
Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...
Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...mfrancis
 
HTML5 on Mobile
HTML5 on MobileHTML5 on Mobile
HTML5 on MobileAdam Lu
 
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh clevernetsystemsgeneva
 
Webinar: Untethering Compute from Storage
Webinar: Untethering Compute from StorageWebinar: Untethering Compute from Storage
Webinar: Untethering Compute from StorageAvere Systems
 
Scada Strangelove - 29c3
Scada Strangelove - 29c3Scada Strangelove - 29c3
Scada Strangelove - 29c3qqlan
 
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...Sergey Gordeychik
 
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...APNIC
 
The top 10 security issues in web applications
The top 10 security issues in web applicationsThe top 10 security issues in web applications
The top 10 security issues in web applicationsDevnology
 
Mobile web-debug
Mobile web-debugMobile web-debug
Mobile web-debugFINN.no
 
Whatever it takes - Fixing SQLIA and XSS in the process
Whatever it takes - Fixing SQLIA and XSS in the processWhatever it takes - Fixing SQLIA and XSS in the process
Whatever it takes - Fixing SQLIA and XSS in the processguest3379bd
 
It’s All In The Name - Deral Heiland
It’s All In The Name - Deral HeilandIt’s All In The Name - Deral Heiland
It’s All In The Name - Deral HeilandEC-Council
 
JavaScript all the things! - FullStack 2017
JavaScript all the things! - FullStack 2017JavaScript all the things! - FullStack 2017
JavaScript all the things! - FullStack 2017Jan Jongboom
 
Building Real-Time Applications with Android and WebSockets
Building Real-Time Applications with Android and WebSocketsBuilding Real-Time Applications with Android and WebSockets
Building Real-Time Applications with Android and WebSocketsSergi Almar i Graupera
 
Azure en Nutanix: your journey to the hybrid cloud
Azure en Nutanix: your journey to the hybrid cloudAzure en Nutanix: your journey to the hybrid cloud
Azure en Nutanix: your journey to the hybrid cloudICT-Partners
 
[convergese] Adaptive Images in Responsive Web Design
[convergese] Adaptive Images in Responsive Web Design[convergese] Adaptive Images in Responsive Web Design
[convergese] Adaptive Images in Responsive Web DesignChristopher Schmitt
 
InduSoft Water Wastewater Webinar 2012
InduSoft Water Wastewater Webinar 2012InduSoft Water Wastewater Webinar 2012
InduSoft Water Wastewater Webinar 2012AVEVA
 
Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)Andrew Case
 

Ähnlich wie Computing-Session Mobility (20)

Positive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-raysPositive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-rays
 
CloudBees - Sacha Labourey - May 2011
CloudBees - Sacha Labourey - May 2011CloudBees - Sacha Labourey - May 2011
CloudBees - Sacha Labourey - May 2011
 
Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...
Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...
Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...
 
HTML5 on Mobile
HTML5 on MobileHTML5 on Mobile
HTML5 on Mobile
 
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh
 
Webinar: Untethering Compute from Storage
Webinar: Untethering Compute from StorageWebinar: Untethering Compute from Storage
Webinar: Untethering Compute from Storage
 
Scada Strangelove - 29c3
Scada Strangelove - 29c3Scada Strangelove - 29c3
Scada Strangelove - 29c3
 
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
 
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
IBCAST 2021: Observations and lessons learned from the APNIC Community Honeyn...
 
The top 10 security issues in web applications
The top 10 security issues in web applicationsThe top 10 security issues in web applications
The top 10 security issues in web applications
 
Mobile web-debug
Mobile web-debugMobile web-debug
Mobile web-debug
 
Whatever it takes - Fixing SQLIA and XSS in the process
Whatever it takes - Fixing SQLIA and XSS in the processWhatever it takes - Fixing SQLIA and XSS in the process
Whatever it takes - Fixing SQLIA and XSS in the process
 
It’s All In The Name - Deral Heiland
It’s All In The Name - Deral HeilandIt’s All In The Name - Deral Heiland
It’s All In The Name - Deral Heiland
 
JavaScript all the things! - FullStack 2017
JavaScript all the things! - FullStack 2017JavaScript all the things! - FullStack 2017
JavaScript all the things! - FullStack 2017
 
Node azure
Node azureNode azure
Node azure
 
Building Real-Time Applications with Android and WebSockets
Building Real-Time Applications with Android and WebSocketsBuilding Real-Time Applications with Android and WebSockets
Building Real-Time Applications with Android and WebSockets
 
Azure en Nutanix: your journey to the hybrid cloud
Azure en Nutanix: your journey to the hybrid cloudAzure en Nutanix: your journey to the hybrid cloud
Azure en Nutanix: your journey to the hybrid cloud
 
[convergese] Adaptive Images in Responsive Web Design
[convergese] Adaptive Images in Responsive Web Design[convergese] Adaptive Images in Responsive Web Design
[convergese] Adaptive Images in Responsive Web Design
 
InduSoft Water Wastewater Webinar 2012
InduSoft Water Wastewater Webinar 2012InduSoft Water Wastewater Webinar 2012
InduSoft Water Wastewater Webinar 2012
 
Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)Unmasking Careto through Memory Forensics (video in description)
Unmasking Careto through Memory Forensics (video in description)
 

Kürzlich hochgeladen

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Kürzlich hochgeladen (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Computing-Session Mobility

  • 1. Session Mobility A Device Oriented Solution
  • 3. Introduction Session Mobility The migration of a! elements of an operating system environment between machines The Internet is too slow to support Session Mobility 3
  • 4. Introduction Dynamic Data Update The integration of online data into a mobile session via opportunistic connections to wireless networks 4
  • 5. System Architecture 3&4"#&"4 .'/012 ,"#-"# 6%#"("77 )8//"77)9:%&4 6%#"("77 >:&&"/4%:& ;,.)+<= ;,.)+<= 5"-%/" !"#$%&'()+ !"#$%&'()*
  • 7. Modes of Operation Attached connected to a terminal Detached roaming 7
  • 8. Terminals Open access terminals VMWare Virtual Machines May or may not be connected to the Internet 8
  • 10. Backup Servers Data resides on device Vulnerable to damage, loss and theft Automated and efficient backup of data is necessary 10
  • 11. Device Mobility Mobile IP Access Point Detection 11
  • 12. Synchronization Update of data using Proxy Device Integration of data into session 12
  • 13. Email Technologies used Javamail VMWare mount tool Apache James Mail Server 13
  • 14. Proxy Architecture 9-$67 5".*0" 4*+" 8/%"-/"% 3-$67 4*+" 0+*"/% "#)*+ ,"-."- ("((*$/ 8/%"-/"% 0+*"/% 1("-& ,"((*$/ 233+*0)%*$/ !"#$%"& '$(%
  • 15. Device Architecture )"*+," ,-+".% 6"*+," 7.%"1."% 5+-" !"#$%"& '$(% "#/+- 0"1*"1 ("((+$. ,-+".% 2("1& 0"((+$. 344-+,/%+$.
  • 16. Interesting Bits Platform independent No changes necessary to Remote Email Servers Client Software User data secure 16
  • 17. Performance Performance Suse Linux Suse Linux Suse Linux Suse Linux - + Harddrive w/VMWare w/ WMWare iPod - - + Harddrive + iPod - Average Cache Read 1345.065 999.015 1156.425 1377.472 Std. Dev Cache Read 61.604 170.089 65.998 101.821 Min Cache Read 1258.93 736.32 657.09 1005.65 Max Cache Read 1450.22 1219.67 1240.53 1503.48 Average Read 14.7662 116.2162 117.7391 14.574 Std. Dev Read 0.186383877 15.57866994 10.6832118 0.719 Min Read 14.44 73.69 79.46 11.76 Max Read 15.2 139.99 137.72 15.19 Table 1: A comparison of the cache and hard drive reads with VMWare 7.1 Overview There are many different problems with the mobile data approach with respect to security. The most pressing of those concerns is the integrity and security of the data on the mobile device. A user will be unwilling to use this system if the data stored on the device is not safe from attackers. 17 This is especially important for users who want to use this type of system to transport data from work to their homes given that the data may be
  • 18. Security Device from Host Host from Device Device from Wireless Network 18
  • 19. Trusted Computing Tamper proof hardware Authenticated Boot Boot Assertions 19
  • 20. Trusted Computing Several Different Approaches TCG Specification NGSCB, formerly Palladium Terra 20
  • 21. Unsolved Security Problems Root Security Data Validation in detached mode of operation 21
  • 22. Discussion & Improvements Need for automated backup Deployment of the system impacts usefulness User friendliness is key to acceptance 22
  • 23. Session Mobility Device Oriented VMWare Trusted Computing Sandbox Data mobility - email 23 Conclusion

Hinweis der Redaktion

  1. including the contents of hard disk and execution stack