Chapter 10. Security


Chapter Objectives

  • Introduce security and threat models, security issues, concepts, and processes

  • Review various encryption methods

  • Explain relationship of iTV to the public key infrastructure

  • Present XML Digital Signature technologies

  • Review the transport layer security protocol including the secure sockets layer

  • Describe conditional access technologies and techniques

Security spans a wide range of issues. One needs to understand the context in which these issues are important. This chapter presents a security model that includes a simple threat model, and discusses some strategies to achieve security. The public key infrastructure is discussed briefly , followed by an explanation of the security sandbox concept. Next, the XML Digital Signature standard is presented, followed by a description of the transport layer security protocols that include the secure sockets layer.



ITV Handbook. Technologies and Standards
ITV Handbook: Technologies and Standards
ISBN: 0131003127
EAN: 2147483647
Year: 2003
Pages: 170

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net