Skip to main content

The secure conferencing user agent A tool to provide secure conferencing with Mbone multimedia conferencing applications

  • Session 4: Enhanced Multimedia Conferencing
  • Conference paper
  • First Online:
Book cover Interactive Distributed Multimedia Systems and Services (IDMS 1996)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1045))

Abstract

This report briefly describes the Secure Conferencing User Agent (SCUA), which provides secure conferencing with privacy and authentication. The SCUA was implemented using the MICE multimedia conferencing applications with built-in encryption and the security infrastructure developed in the Password Project. Both MICE and PASSWORD were projects of the European Union. The paper describes the first prototype of the SCUA which was developed by GMD in the MICE project and the planned enhancements of it.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. P. T. Kirstein, M. J. Handley, M. A. Sasse: Piloting of Multimedia Integrated Communications for European Researchers (MICE), Proc.INET 1993.

    Google Scholar 

  2. Casner: Frequently Asked Questions (FAQ) on the Multicast Backbone (MBONE), available by anonymous ftp from venera.isi.edu in the mbone/faq.txt, May 6th93.

    Google Scholar 

  3. V. Jacobson:’ VAT’ manual pages, Lawrence Berkeley Laboratory (LBL), February 17th 93, available by anonymous ftp from ee.lbl.gov.

    Google Scholar 

  4. V. Jacobson:’ WB’ README file, Lawrence Berkeley Laboratory (LBL), August 12th 93, available by anonymous ftp from ee.lbl.gov.

    Google Scholar 

  5. V. Jacobson: 'sD’ README file, Lawrence Berkeley Laboratory (LBL), March 30th 93, available by anonymous ftp from ee.lbl.gov.

    Google Scholar 

  6. C. Huitema, T. Turletti: Packetization of H.261 video streams, INTERNET-DRAFT, December 5, 1993.

    Google Scholar 

  7. T. Turletti: H.261 Software Codec for Videoconferencing Over the Internet, Research report No 1834, INRIA, January 1993.

    Google Scholar 

  8. S. McCanne, V. Jacobson:’ VIC’ maual pages, Lawrence Berkeley Laboratory (LBL), November, 1994, available by anonymous ftp from ee.lbl.gov. Encryption was included by Ian Wakeman (UCL)

    Google Scholar 

  9. ISO/IEC DIS 10745: Information technology — Open Systems Interconnection — Upper layers security model.

    Google Scholar 

  10. ISO/IEC DIS 10181-4: Information technology — Open Systems Interconnection — Security frameworks in Open Systems.

    Google Scholar 

  11. P. Kirstein, P. Williams: Piloting Authentication and Security Services within OSI Applications for RTD Information, Computer Networks and ISDN Systems 25, 1992 pp. 483–489.

    Google Scholar 

  12. W. Schneider, PASSWORD: Ein EG-Projekt zur pilotmäßigen Erprobung von Authentisierungsdiensten, Kommunikation und Sicherheit, Teletrust Deutschland e.V., 1992.

    Google Scholar 

  13. PASSWORD Reports, available by anonymous ftp from cs.ucl.ac.uk.

    Google Scholar 

  14. W. Schneider (Hrsg.): SecuDE Overview, Version 4.1, Arbeitspapiere der GMD 775, Sept. 1993

    Google Scholar 

  15. SecuDE Documentation, available by anonymous ftp from darmstadt.gmd.de: W. Schneider (Hrsg.): SecuDE, Vol.1 Principles of Security Operations, Vol.2 Security Commands, Functions and Interfaces, Vol.3 Security Application's Guide

    Google Scholar 

  16. US Internet RFC 1113-1115

    Google Scholar 

  17. K. Bahr, E. Hinsch, G. Schulze: Incorporating Security Functions in Multimedia Conferencing Applications in the Context of the MICE Project, second international workshop, IWACA '94, Heidelberg, Germany, September 26–28, 1994; proceedings/Steinmetz, Ralf [Hrsg], ISBN 3-540-58494-3

    Google Scholar 

  18. E. Hinsch, G. Schulze: Security Requirements and Proposed Facilities, Draft Version 4.0, June 1995 (Deliverable of WP6 of the MICE Project)

    Google Scholar 

  19. S. Kolletzki: GMD Security Technology — SecuDE Overview availabe in WWW: http://www.darmstadt.gmd.de/TKT/security.

    Google Scholar 

  20. K. Guenther: The DISCO Project available in WWW: http://www.darmstadt.gmd.de/TKT/projects.html

    Google Scholar 

Download references

Authors

Editor information

Berthold Butscher Eckhard Moeller Herwart Pusch

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hinsch, E., Jaegemann, A., Roper, I.C., Wang, L. (1996). The secure conferencing user agent A tool to provide secure conferencing with Mbone multimedia conferencing applications. In: Butscher, B., Moeller, E., Pusch, H. (eds) Interactive Distributed Multimedia Systems and Services. IDMS 1996. Lecture Notes in Computer Science, vol 1045. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-60938-5_10

Download citation

  • DOI: https://doi.org/10.1007/3-540-60938-5_10

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60938-4

  • Online ISBN: 978-3-540-49742-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics