Table of Contents
Security - A UW Perspective
Agenda
Agenda
Agenda
Initial Premise
Current Demand
Authentication
Authentication Methods
Authentication Methods
Authorization
Authorization
Encryption
Cryptography
Private Key Encryption
1-Way Hash Functions
Public Key Encryption
Digital Signature
Public Key Certificate
Certificate Authority
Public Key Methods
Session Key
Email
“Secure” Email
“Secure” Email
Clinical Email Project
MINDscape Project
Bench to Bedside & Beyond
Bench to Bedside and Beyond
A Few of Our Goals
A Few of Our Goals
UW Security Challenges
UW Security Challenges
Security Case Study
Authentication Scaling
Authorization Scaling
System Scaling
Security Exposure
Where We’ve Been ...
Where We Think We’re Going ...
What We’ve Looked At ...
Architectures & Technologies
Architectures & Technologies ...
Architectures & Technologies
Architectures & Technologies ...
Architectures & Technologies ...
Architectures & Technologies ...
Architectures & Technologies …
Architectures & Technologies ...
Architectures & Technologies ...
Architectures & Technologies ...
Architectures & Technologies ...
Authentication/Authorization Model
What We’ve Done ...
What We’ve Done ...
What We’ve Done ...
What We’ve Done ...
Looking for Bumps in the Night
Discussion & Questions
|