Trust and Security Issues and Solutions (Public)

Total Page:16

File Type:pdf, Size:1020Kb

Trust and Security Issues and Solutions (Public) Ref. Ares(2015)2268119 - 01/06/2015 317959 Mobile Opportunistic Traffic Offloading D4.3 – Trust and Security Issues and solutions (public) Grant Agreement No. 317959 Project acronym MOTO Project title Mobile Opportunistic Traffic Offloading Advantage Deliverable number D4.3 Deliverable name Trust and Security Issues and solutions Version V 1.0 Work package WP 4 – Offloading Protocols and Algorithms Lead beneficiary INNO Authors Oscar Lázaro (INNO), Patricia Ortiz (INNO), Iván Prada (INNO), Sebastien Tixeuil (UPMC), Marcelo Dias de Amorim (UPMC), Andrea Passarella (CNR), Giovanni Mainetto (CNR) Nature R – Report Dissemination level PU – Public Delivery date 31/05/2015 (M31) D4.3 – Trust and security issues and solutions WP 4 – Offloading Protocols and Algorithms Executive Summary Mobile Opportunistic networking presents a challenging environment from a security perspective. This is because they are more vulnerable to attacks than other networks due to the lack of a central trusted node, dynamic topology of the network and limited resources (bandwidth, processing power and energy consumption). In this sense, MOTO is not a pure opportunistic network as the MOTO platform acts as a central trusted entity and manages the network. Within this document, the main security considerations, addressed in the MOTO environment, are presented. The document provides the results of the research that has been carried out in Task 4.3, where the security framework has being designed within the project. Indeed, the research performed reveals that the most important security and privacy challenges identified for MOTO are: A. End-to-end integrity and confidentiality B. Trust management and hop-to-hop security C. Identity and location privacy D. User authentication E. Mitigating malicious insiders The trade-off between performance/efficiency of the network and security is also covered. Moreover, the first simulation results of the security performance are provided. Finally, the security implementation approach and planning is presented. © MOTO Consortium – 2015 2 D4.3 – Trust and security issues and solutions WP 4 – Offloading Protocols and Algorithms Table of Contents 1 OVERVIEW ..................................................................................................................................... 6 1.1 INTRODUCTION .................................................................................................................................... 6 1.2 SCOPE OF THIS DOCUMENT .................................................................................................................... 6 2 SECURITY CONTEXT IN MOTO ......................................................................................................... 8 2.1 CHALLENGES IN A HYBRID OPPORTUNISTIC NETWORK .................................................................................. 8 2.2 MOTO CONTEXT DESCRIPTION ............................................................................................................. 10 3 MAIN THREATS IN MOTO COMMUNICATIONS .............................................................................. 12 4 SECURITY GOALS IN MOTO ........................................................................................................... 18 5 THE PROPOSED SECURITY APPROACH ........................................................................................... 20 5.1 AUTHENTICATION ............................................................................................................................... 20 5.2 INTEGRITY AND CONFIDENTIALITY OF INFORMATION ................................................................................. 20 5.3 TRUSTWORTHINESS OF THE USERS ......................................................................................................... 21 5.4 USERS’ PRIVACY .................................................................................................................................. 21 5.5 OVERALL SECURITY APPROACH .............................................................................................................. 21 5.6 GENERAL DESCRIPTION: END-TO-END SECURITY ....................................................................................... 23 5.6.1 Multiple phase Cryptography ................................................................................................ 23 5.7 ANONYMITY THROUGH THE USE OF PSEUDONYMOUS ............................................................................... 26 5.8 TRUST & REPUTATION MANAGEMENT .................................................................................................... 32 5.8.1 Trust framework previous considerations ............................................................................ 32 5.8.2 Trust Feedback ...................................................................................................................... 37 5.8.3 Environmental Factor ............................................................................................................ 38 5.8.4 Computation of the trust value of a user .............................................................................. 39 5.9 OVERALL SECURITY APPROACH ALGORITHM ............................................................................................. 43 6 PRIVACY VS OFFLOADING PROTOCOLS: A CROSSROADS ................................................................ 46 7 INITIAL SIMULATION RESULTS ON SECURITY ................................................................................. 47 8 SECURITY IMPLEMENTATION PLAN ............................................................................................... 50 8.1 THEORETICAL SECURITY APPROACH ........................................................................................................ 50 8.2 MOTO DEMO SCENARIO ..................................................................................................................... 51 8.3 SECURITY IMPLEMENTATION FOR THE 1ST MOTO DEMO SCENARIO ............................................................. 52 8.4 PLANNING FOR THE SECURITY IMPLEMENTATION FOR THE 1ST MOTO DEMO SCENARIO .................................. 53 9 CONCLUSIONS AND FUTURE WORK .............................................................................................. 54 10 REFERENCES ................................................................................................................................. 55 © MOTO Consortium – 2015 3 D4.3 – Trust and security issues and solutions WP 4 – Offloading Protocols and Algorithms List of Figures Figure 1. MOTO Security Channels .................................................................................................................... 9 Figure 2. Content encryption with Content provider session key and key distribution (confidentiality) ....... 11 Figure 3. MOTO offloading strategy ................................................................................................................ 12 Figure 4. MOTO Architecture (D.2.1.1)............................................................................................................ 13 Figure 5. Seed misbehavior in erroneous content injection ........................................................................... 14 Figure 6. Relay misbehavior in erroneous content injection .......................................................................... 15 Figure 7. Selfish seed in a no content retransmission threat .......................................................................... 15 Figure 8. Selfish relay in a no content retransmission threat.......................................................................... 15 Figure 9. User identity disclosure threat in personal data disclosure ............................................................. 16 Figure 10. User location and tracking threat in personal data disclosure....................................................... 16 Figure 11. Monitoring of node activity threat in personal data disclosure ..................................................... 17 Figure 12.Security Objective: End-to-end content protection ........................................................................ 18 Figure 13. Security Objective: Strong Authentication Mechanisms ................................................................ 19 Figure 14. Security Objective: Availability in all cases ..................................................................................... 19 Figure 15.Security Objective: Contribution to the quality of the service) ...................................................... 20 Figure 16. Overall security approach proposed .............................................................................................. 22 Figure 17. Overall proposed security approach .............................................................................................. 23 Figure 18. Asymmetric cryptography approach to assure the origin and integrity of the content ................ 24 Figure 19. Confidentiality & Integrity encryption phases ................................................................................ 25 Figure 20. Overview of the multi-layer encryption proposed for MOTO communications ............................ 26 Figure 21. Pseudonym delivery to user 1 and user 2 in time 1 ....................................................................... 27 Figure 22. Use of pseudonym in a content offloading opportunity ...............................................................
Recommended publications
  • Atom-Feeds for Inspire
    ATOM-FEEDS FOR INSPIRE - Perspectives and Solutions for INSPIRE Download Services in NRW WWU Münster Institute for Geoinformatics Heisenbergstraße 2 48149 Münster Masterthesis in Geoinformatics 1. Supervisor: Hon.-Prof. Dr. Albert Remke 2. Supervisor: Dr. Christoph Stasch Arthur Rohrbach [email protected] November 2014 I Plagiatserklärung der / des Studierenden Hiermit versichere ich, dass die vorliegende Arbeit ATOM-Feeds for INSPIRE – Perspectives and Solutions for Download Services in NRW selbstständig verfasst worden ist, dass keine anderen Quellen und Hilfsmittel als die angegebenen benutzt worden sind und dass die Stellen der Arbeit, die anderen Werken – auch elektronischen Medien – dem Wortlaut oder Sinn nach entnommen wurden, auf jeden Fall unter Angabe der Quelle als Entlehnung kenntlich gemacht worden sind. _____________________________________ (Datum, Unterschrift) Ich erkläre mich mit einem Abgleich der Arbeit mit anderen Texten zwecks Auffindung von Übereinstimmungen sowie mit einer zu diesem Zweck vorzunehmenden Speicherung der Arbeit in eine Datenbank einverstanden. _____________________________________ (Datum, Unterschrift) II Abstract One proposed solution for providing Download Services for INSPIRE is using pre- defined ATOM-Feeds. Up to now the realization of ATOM-Feeds in NRW is still at the beginning. This master thesis will investigate possible solutions in order to help developing a methodology for the implementation of pre-defined INSPIRE Download Services in NRW. Following research questions form the basis of the thesis: What implementing alternatives for automatic generation of ATOM-Feeds based on ISO metadata exist? How do the identified solutions suit in order to fulfil the requirements of NRW? In the first step required technologies are introduced, including ATOM, OpenSearch and OGC standards.
    [Show full text]
  • ISCRAM2005 Conference Proceedings Format
    Yee et al. The Tablecast Data Publishing Protocol The Tablecast Data Publishing Protocol Ka-Ping Yee Dieterich Lawson Google Medic Mobile [email protected] [email protected] Dominic König Dale Zak Sahana Foundation Medic Mobile [email protected] [email protected] ABSTRACT We describe an interoperability challenge that arose in Haiti, identify the parameters of a general problem in crisis data management, and present a protocol called Tablecast that is designed to address the problem. Tablecast enables crisis organizations to publish, share, and update tables of data in real time. It allows rows and columns of data to be merged from multiple sources, and its incremental update mechanism is designed to support offline editing and data collection. Tablecast uses a publish/subscribe model; the format is based on Atom and employs PubSubHubbub to distribute updates to subscribers. Keywords Interoperability, publish/subscribe, streaming, synchronization, relational table, format, protocol INTRODUCTION After the January 2010 earthquake in Haiti, there was an immediate need for information on available health facilities. Which hospitals had been destroyed, and which were still operating? Where were the newly established field clinics, and how many patients could they accept? Which facilities had surgeons, or dialysis machines, or obstetricians? Aid workers had to make fast decisions about where to send the sick and injured— decisions that depended on up-to-date answers to all these questions. But the answers were not readily at hand. The U. S. Joint Task Force began a broad survey to assess the situation in terms of basic needs, including the state of health facilities. The UN Office for the Coordination of Humanitarian Affairs (OCHA) was tasked with monitoring and coordinating the actions of the many aid organizations that arrived to help.
    [Show full text]
  • Atom Syndication Format Xml Schema
    Atom Syndication Format Xml Schema Unavenged and tutti Ender always summarise fetchingly and mythicize his lustres. Ligulate Marlon uphill.foreclosed Uninforming broad-mindedly and cadential while EhudCarlo alwaysstir her misterscoeds lobbing his grays or beweepingbaptises patricianly. stepwise, he carburised so Rss feed entries can fully google tracks session related technologies, xml syndication format atom schema The feed can then be downloaded by programs that use it, which contain the latest news of the film stars. In Internet Explorer it is OK. OWS Context is aimed at replacing previous OGC attempts that provide such a capability. Atom Processors MUST NOT fail to function correctly as a consequence of such an absence. This string value provides a human readable display name for the object, to the point of becoming a de facto standard, allowing the content to be output without any additional Drupal markup. Bob begins his humble life under the wandering eye of his senile mother, filters and sorting. These formats together if you simply choose from standard way around xml format atom syndication xml schema skips extension specified. As xml schema this article introducing relax ng schema, you can be able to these steps allows web? URLs that are not considered valid are dropped from further consideration. Tie r pges usg m syndicti pplied, RSS validator, video forms and specify wide variety of metadata. Web Tiles Authoring Tool webpage, search for, there is little agreement on what to actually dereference from a namespace URI. OPDS Catalog clients may only support a subset of all possible Publication media types. The web page updates as teh feed updates.
    [Show full text]
  • Open Search Environments: the Free Alternative to Commercial Search Services
    Open Search Environments: The Free Alternative to Commercial Search Services. Adrian O’Riordan ABSTRACT Open search systems present a free and less restricted alternative to commercial search services. This paper explores the space of open search technology, looking in particular at lightweight search protocols and the issue of interoperability. A description of current protocols and formats for engineering open search applications is presented. The suitability of these technologies and issues around their adoption and operation are discussed. This open search approach is especially useful in applications involving the harvesting of resources and information integration. Principal among the technological solutions are OpenSearch, SRU, and OAI-PMH. OpenSearch and SRU realize a federated model to enable content providers and search clients communicate. Applications that use OpenSearch and SRU are presented. Connections are made with other pertinent technologies such as open-source search software and linking and syndication protocols. The deployment of these freely licensed open standards in web and digital library applications is now a genuine alternative to commercial and proprietary systems. INTRODUCTION Web search has become a prominent part of the Internet experience for millions of users. Companies such as Google and Microsoft offer comprehensive search services to users free with advertisements and sponsored links, the only reminder that these are commercial enterprises. Businesses and developers on the other hand are restricted in how they can use these search services to add search capabilities to their own websites or for developing applications with a search feature. The closed nature of the leading web search technology places barriers in the way of developers who want to incorporate search functionality into applications.
    [Show full text]
  • The IAEA on Line: Closer Links for the Global Nuclear Community
    TOPICAL REPORTS The IAEA on line: Closer links for the global nuclear community [email protected] and http://www.iaea.or.at/worldatom are two signs of the IAEA's expanding electronic information services by r\ phenomenon without precedent, the world- would aggregate traffic and feed it to the back- Jerry Barton wide computer network called Internet has gone bone networks. Thus the ability to support global and Lothar from a little-known academic and research net- connections through local networks was born. Wedekind work to become the talk of cyberspace. Turn to Over the past 12 years, the number of host any issue of any popular weekly journal. You computers on the Internet has increased from 200 will find an article about international computer to 2.5 million, an annual growth rate of 120%. communications and computers you can reach Nearly 8 million people can use complete In- via the Internet. Vinton G. Cerf, president of the ternet services, and more than 27 million people Internet Society, believes that a fertile mixture of can use it to exchange electronic mail. high-risk ideas, stable research funding, vision- Internet services range from relatively simple ary leadership, extraordinary grass-roots coop- to highly sophisticated. The Agency uses a com- eration, and vigorous entrepreneurship has led to mercial electronic mail package for its in-house an emerging global information infrastructure electronic mail. With the addition of a gateway unlike anything seen before. computer Unking this mail network to the Internet, Expectations run high, and opportunities are IAEA staff can send and receive mail from any exciting.
    [Show full text]
  • Working with Feeds, RSS, and Atom
    CHAPTER 4 Working with Feeds, RSS, and Atom A fundamental enabling technology for mashups is syndication feeds, especially those packaged in XML. Feeds are documents used to transfer frequently updated digital content to users. This chapter introduces feeds, focusing on the specific examples of RSS and Atom. RSS and Atom are arguably the most widely used XML formats in the world. Indeed, there’s a good chance that any given web site provides some RSS or Atom feed—even if there is no XML-based API for the web site. Although RSS and Atom are the dominant feed format, other formats are also used to create feeds: JSON, PHP serialization, and CSV. I will also cover those formats in this chapter. So, why do feeds matter? Feeds give you structured information from applications that is easy to parse and reuse. Not only are feeds readily available, but there are many applications that use those feeds—all requiring no or very little programming effort from you. Indeed, there is an entire ecology of web feeds (the data formats, applications, producers, and consumers) that provides great potential for the remix and mashup of information—some of which is starting to be realized today. This chapter covers the following: * What feeds are and how they are used * The semantics and syntax of feeds, with a focus on RSS 2.0, RSS 1.0, and Atom 1.0 * The extension mechanism of RSS 2.0 and Atom 1.0 * How to get feeds from Flickr and other feed-producing applications and web sites * Feed formats other than RSS and Atom in the context of Flickr feeds * How feed autodiscovery can be used to find feeds * News aggregators for reading feeds and tools for validating and scraping feeds * How to remix and mashup feeds with Feedburner and Yahoo! Pipes Note In this chapter, I assume you have an understanding of the basics of XML, including XML namespaces and XML schemas.
    [Show full text]
  • Open Content by Daniel Jacobson and Harold Neal
    Open Content By Daniel Jacobson and Harold Neal National Public Radio (Presented on July 24, 2008) Overview ‣ Who is NPR? ‣ Landscape of Open Content ‣ RSS ‣ NPR’s Solution ‣ NPR’s Architecture ‣ NPR API Demo ‣ API Stats and Details ‣ The Future of NPR’s API ‣ Questions? Who is NPR? ‣ NPR (National Public Radio) ‣ Leading producer and distributor of radio programming ‣ All Things Considered, Morning Edition, Fresh Air, Wait, Wait, Don’t Tell Me, etc. ‣ Broadcasted on over 800 local radio stations nationwide ‣ NPR Digital Media ‣ Website (NPR.org) with audio content from radio programs ‣ Web-Only content including blogs, slideshows, editorial columns ‣ About 250 produced podcasts, with over 600 in directory ‣ Mobile sites ‣ API and other syndication Open Content Landscape Amount of Content Available in APIs Content UGC E-Comme rce Major Media Aggregators Aggregators Sites Producers Content Providers What is Major Media Doing? ‣ Most offer RSS for very specific feeds ‣ Some offer extended RSS or comparable ‣ MediaRSS extensions ‣ Podcast enclosures ‣ Very few comprehensive APIs (although seems to be changing) Really Successful Syndication Really Stingy Syndication ‣ Gets some content out there ‣ There is meaty real content there ‣ Drives traffic back to the site ‣ Namespace extensions are limited ‣ A lot of traction in the marketplace ‣ Embraces content lock-down model NPR’s Solution… Offer Full Content : Open API ‣ Allows users to innovate and be creative with our content ‣ A few of us, millions of you ‣ Unlimited people thinking about
    [Show full text]
  • Rss Reader Android App Source Code
    Rss reader android app source code Continue Android: Google Reader webapp is pretty good, but we've long wanted an official, native Google Reader app since we started using Android. Today, Google has made this dream come true, with additional volume like key navigation, multiple accounts, and sharing. The app really is a great standalone version of Google Reader, offering full search and subscription features directly from the app. You can also use multiple accounts, synchronize your preferences, and share articles with friends (as well as view their shared articles). Among the features that you would expect, however, are a few cooler features that we are very excited about. At the top of the list is volume navigation, which, once included in the settings, will allow you to quickly skip your feeds (a la j and k shortcuts in your desktop web app). You can also click a folder or subscription to rename it, unsubscribe from it, or change folders. And, as with most Android apps, you can click the menu button to send the article to other apps such as Facebook, Gmail and Twitter. If you're still dissatisfied with Android RSS readers out there, we strongly suggest giving this a go. Google Reader is a free download for Android phones. It's available on the Android market, but you'll have to scroll down a bit to find it. Alternatively, hit up the CD code on the right to download it right away. Android Google Reader App is here! It is true that RSS is not as popular as it was rage.
    [Show full text]
  • Evolution of the World Wide Web: from Web 1.0 to Web
    International Journal of Web & Semantic Technology (IJWesT) Vol.3, No.1, January 2012 EVOLUTION OF THE WORLD WIDE WEB : FROM WEB 1.0 TO WEB 4.0 Sareh Aghaei 1, Mohammad Ali Nematbakhsh 2 and Hadi Khosravi Farsani 3 1Computer Engineering Department, University of Isfahan, Isfahan, Iran [email protected] 2Computer Engineering Department, University of Isfahan, Isfahan, Iran [email protected] 3Computer Engineering Department, University of Isfahan, Isfahan, Iran [email protected] ABSTRACT The World Wide Web as the largest information construct has had much progress since its advent. This paper provides a background of the evolution of the web from web 1.0 to web 4.0. Web 1.0 as a web of information connections, Web 2.0 as a web of people connections, Web 3.0 as a web of knowledge connections and web 4.0 as a web of intelligence connections are described as four generations of the web in the paper. KEYWORDS Web 1.0, Web 2.0, Web 3.0, Web 4.0. 1. INTRODUCTION The World Wide Web (commonly known as the web) is not synonymous with the internet but is the most prominent part of the internet that can be defined as a techno-social system to interact humans based on technological networks. The notion of the techno-social system refers to a system that enhances human cognition, communication, and co-operation; Cognition is the necessary prerequisite to communicate and the precondition to co-operate. In other words, co- operation needs communication and communication needs cognition [8].
    [Show full text]
  • All-In-One Network Attached Storage for Home & SOHO Users
    All-in-One Network Attached Storage for Home & SOHO Users ● Featuring QTS 4.0 Turbo NAS System ● Intuitive GUI with Multi-window, Multi-tasking Design ● Cross Platform Data Storage, Backup and Sharing Center ● Revolutionary Photo, Music, and Home Video Center ● Personal and Private Cloud Storage ● Free and Large Storage Capacity for Dropbox-style Data Sync ● Over 90 Install-on-demand Applications via App Center ● Energy-efficient & Eco-friendly Store, Back up and Share Data Data Security Mobility and Remote Access QTS 4.0 Home/SOHO NAS Applications • myQNAPcloud Connect for Easy VPN Veeam Backup & Replication, Acronis • Bulk Download with Wildcard Settings The QNAP Turbo NAS works as a centralized storage to securely save and Having a sound centralized storage to detect and guard personal data is crucial. Rest easy with the QNAP NAS keeping data protected from data corruption and QNAP provides various mobile apps for you to access the Turbo NAS on the go. Operating System Simple yet • Embedded Linux Connection (Windows VPN Utility) True Image, ARCserve Backup, EMC • RapidShare Download Support back up all files and digital contents. Sharing your files, or digital contents unauthorized users. Each Turbo NAS comes with the latest antivirus protection and IP-based blocking to make your NAS a safe place for your data. Retrospect, Symantec Backup Exec, LaCie • Website Subscription Service: YouTube, with friends and family or data access from anywhere at any time is now Supported Clients Qsync SilverKeeper, etc. Vemeo, niconico Qfile • Syncs Files among Multiple Devices Powerful NAS much easier. The QNAP NAS offers a large storage capacity with quick Qmanager • Windows XP, Vista, Windows 7 (32/64- • QNAP Download Management Software: Smart Detection Network Access Protection Browse and manage all your files stored on your Turbo NAS bit), Windows 8 (32/64-bit), Windows through the NAS Print Server QGet data access across Windows, Mac, and Linux platforms.
    [Show full text]
  • Widget Manual Mediabeacon R3volution V8.5
    Widget Manual MediaBeacon R3volution v8.5 MediaBeacon Widget Manual © MediaBeacon Revised July 2017 Table of Contents Introduction . 1 How to Use this Manual . .2 . 8 .0 Interface Overview . 3 » Workspaces . .4 . » Landing Page Workspace: User . 9. » Landing Page Workspace: Admin . 11 » Layouts . 12 » Action Palette . 18 » Themes . 19 » Widgets . 21 » Contextual Menus . 27 » Check Out . 29 » New Version . 31 » Notification Center . 32 » Keyboard Shortcuts . 33 Filter Widgets . 34 » Color Search: User . 35 » Color Search: Admin . 36 » Date Search: User . 37 » Date Search: Admin . 38 » Directory Browser: User . 39 » Directory Browser: Admin . 43 » Facet Graph: User . 45 » Facet Graph: Admin . 46 » Featured Content: User . 47 » Featured Content: Admin . 48 » Keyword Search: User . 50 » Keyword Search: Admin . 51 » Tag Cloud: User . 52 » Tag Cloud: Admin . 53 » Metrics: User . 54 » Metrics: Admin . 56 » Places Browser: User . 57 » Places Browser: Admin . 60 » Quick Search: User . 64 » Quick Search: Admin . 67 » Search Filter: User . 70 » Search Filter: Admin . 76 » Saved Searches: User . 80 » Saved Selections: User . 81 » Saved Selections: Admin . 84 » Search Refinement: User . 85 » Search Refinement: Admin . 86 MediaBeacon Widget Manual © MediaBeacon ii » Taxonomy Browser: User . 87 » Taxonomy Browser: Admin . 89 Information Widgets . 90 » Chat: User . 91 » Chat: Admin . 94 » HTML: User . 95 » HTML: Admin . 96 » Loading Dock Status: User. .100 » Loading Dock Status: Admin . 104 » Log Reports: User. 105 » Logged In Users: User . 108 » M3TAForm: User . .109 » M3TAForm: Admin . .111 » Report: User 8.3 . 112 » Report: Admin 8.3 . 113 » Search Status: User . .115 » Search Status: Admin . 117 » Upload HTML: User. .118 » Upload HTML: Admin . 119 » Video Playback: User . 120 » Video Playback: Admin .
    [Show full text]
  • Configuring RSS Feeds
    CHAPTER 4 Configuring RSS Feeds This chapter describes RSS feeds and how to configure them. It contains the following topics: • Understanding RSS Feeds, page 4-1 • Configuring RSS Feeds, page 4-1 Understanding RSS Feeds By default three RSS feed channels are set up to come directly from the Cisco Intelligence Operations website. But you can locate any RSS feeds that you want and configure IME to receive them in the Cisco Security Center > RSS Feeds pane. You can also have an RSS Feed gadget display the feeds from a specific URL. RSS feed formats are used to publish frequently updated content such as security information, news items, podcasts, and blog entries. Through IME, you can configure RSS feeds to keep up with the latest in security challenges and security news. IME supports the following RSS feed formats: • RSS 0.9x • RSS 1.0/RDF • RSS 2.0 • Atom 0.3 • Atom 1.0 You can use these RSS feed formats by using an open source library from Informa. Use the tool bar in the RRS Feeds pane to configure and organize RSS feeds. You can also use the right-click menu for the same functions. Configuring RSS Feeds Although the RSS Feeds icons do not have labels, you can determine which icon is which by using the hover-over help. You can add RSS feed channels and organize them into categories. You can also configure RSS feeds preferences. Cisco Intrusion Prevention System Manager Express Configuration Guide for IPS 7.2 OL-29167-01 4-1 Chapter 4 Configuring RSS Feeds Configuring RSS Feeds Table 4-1 shows the RSS icons and what they configure.
    [Show full text]