ITV Handbook: Technologies and Standards

Chapter Objectives

  • Introduce security and threat models, security issues, concepts, and processes

  • Review various encryption methods

  • Explain relationship of iTV to the public key infrastructure

  • Present XML Digital Signature technologies

  • Review the transport layer security protocol including the secure sockets layer

  • Describe conditional access technologies and techniques

Security spans a wide range of issues. One needs to understand the context in which these issues are important. This chapter presents a security model that includes a simple threat model, and discusses some strategies to achieve security. The public key infrastructure is discussed briefly , followed by an explanation of the security sandbox concept. Next, the XML Digital Signature standard is presented, followed by a description of the transport layer security protocols that include the secure sockets layer.

Категории