Chapter Objectives
Introduce security and threat models, security issues, concepts, and processes
Review various encryption methods
Explain relationship of iTV to the public key infrastructure
Present XML Digital Signature technologies
Review the transport layer security protocol including the secure sockets layer
Describe conditional access technologies and techniques
Security spans a wide range of issues. One needs to understand the context in which these issues are important. This chapter presents a security model that includes a simple threat model, and discusses some strategies to achieve security. The public key infrastructure is discussed briefly, followed by an explanation of the security sandbox concept. Next, the XML Digital Signature standard is presented, followed by a description of the transport layer security protocols that include the secure sockets layer.