Security - A UW Perspective

9/7/97


Click here to start


Table of Contents

Security - A UW Perspective

Agenda

Agenda

Agenda

Initial Premise

Current Demand

Authentication

Authentication Methods

Authentication Methods

Authorization

Authorization

Encryption

Cryptography

Private Key Encryption

1-Way Hash Functions

Public Key Encryption

Digital Signature

Public Key Certificate

Certificate Authority

Public Key Methods

Session Key

Email

“Secure” Email

“Secure” Email

Clinical Email Project

MINDscape Project

Bench to Bedside & Beyond

Bench to Bedside and Beyond

A Few of Our Goals

A Few of Our Goals

UW Security Challenges

UW Security Challenges

Security Case Study

Authentication Scaling

Authorization Scaling

System Scaling

Security Exposure

Where We’ve Been ...

Where We Think We’re Going ...

What We’ve Looked At ...

Architectures & Technologies

Architectures & Technologies ...

Architectures & Technologies

Architectures & Technologies ...

Architectures & Technologies ...

Architectures & Technologies ...

Architectures & Technologies …

Architectures & Technologies ...

Architectures & Technologies ...

Architectures & Technologies ...

Architectures & Technologies ...

Authentication/Authorization Model

What We’ve Done ...

What We’ve Done ...

What We’ve Done ...

What We’ve Done ...

Looking for Bumps in the Night

Discussion & Questions

Authors: Lori Stevens & Jim DeRoest