• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 10. Security

Chapter 10. Security

Chapter Objectives

  • Introduce security and threat models, security issues, concepts, and processes

  • Review various encryption methods

  • Explain relationship of iTV to the public key infrastructure

  • Present XML Digital Signature technologies

  • Review the transport layer security protocol including the secure sockets layer

  • Describe conditional access technologies and techniques

Security spans a wide range of issues. One needs to understand the context in which these issues are important. This chapter presents a security model that includes a simple threat model, and discusses some strategies to achieve security. The public key infrastructure is discussed briefly, followed by an explanation of the security sandbox concept. Next, the XML Digital Signature standard is presented, followed by a description of the transport layer security protocols that include the secure sockets layer.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint