TRUST:Team for Research in Ubiquitous Secure Technologies

Slides:



Advertisements
Similar presentations
Model Driven Generative Programming Reza Azimi February 6, 2003 ECE1770: Trends in Middleware Systems.
Advertisements

Job No/ 1 © British Crown Copyright 2008/MOD Developing a High Integrity Code Generator Using iUML/iCCG Sam Moody AWE plc, Aldermaston, Berkshire, United.
Automatic Verification of Component-Based Real-Time CORBA Applications Gabor Madl Sherif Abdelwahed
From Natural Language Requirements to Executable Models of Software Components.
1 Using Scalable and Secure Web Technologies to Design Global Format Registry Muluwork Geremew, Sangchul Song and Joseph JaJa Institute for Advanced Computer.
UC Berkeley: Chess Vanderbilt University: ISIS University of Memphis: MSI CHESS Review May 10, 2004 Berkeley, CA Model-Based Design Edited by Janos Sztipanovits,
27 September 1999 Crisis Management William L. Scherlis Carnegie Mellon University School of Computer Science.
Frameworks and Tools for High-Confidence Design of Adaptive, Distributed Embedded Control Systems - Project Overview - Janos Sztipanovits ISIS-Vanderbilt.
AspectJ2EE/Clasa Israel Institute of Technology The Computer Science department Itay Maman.
Foundations of Hybrid and Embedded Software Systems UC Berkeley: Chess Vanderbilt University: ISIS University of Memphis: MSI NSF Model-Based Design DSML.
Verifying Distributed Real-time Properties of Embedded Systems via Graph Transformations and Model Checking Gabor Madl
On the Correctness of Model Transformations Gabor Karsai ISIS/Vanderbilt University.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
Course Instructor: Aisha Azeem
Levels of Independence in Aspect-Oriented Modeling Workshop on Model-driven Approaches to Middleware Applications Development June 17, 2003 Jeff Gray,
NSF/ITR: Foundations of Hybrid and Embedded Software Systems Model-Integrated Computing: Foundations DSML Composition Model Synthesis and Model Transformation.
XML in Development of Distributed Systems Tooling Programming Runtime.
Designing the Future of Embedded Systems at DARPA IXO Dr. Douglas C. Schmidt Program Manager Information Exploitation Office Authorized.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Co-design Environment for Secure Embedded Systems Matt Eby, Janos L. Mathe, Jan Werner, Gabor Karsai, Sandeep Neema, Janos Sztipanovits, Yuan Xue Institute.
ASG - Towards the Adaptive Semantic Services Enterprise Harald Meyer WWW Service Composition with Semantic Web Services
Containment and Integrity for Mobile Code Security policies as types Andrew Myers Fred Schneider Department of Computer Science Cornell University.
Institute for Software Integrated Systems Vanderbilt University Cyber Physical Systems: New Challenges for Model-based Design Janos Sztipanovits ISIS,
Integration of Clinical Workflows with Privacy Policies on a Common Semantic Domain Jan Werner, Bradley Malin, Yonghwan Lee, Akos Ledeczi, Janos Sztipanovits.
Integrating Systems: models and fault modes SESAM-möte, 19 Oktober, 2005 Jonas Elmqvist Real-Time Systems Laboratory Department of Computer and Information.
INRIA - LaBRICharles Consel Jan-06 1 Domain-Specific Software Engineering Charles Consel Phoenix Research Group LaBRI /INRIA-Futurs January 2006.
Model Checking and Model-Based Design Bruce H. Krogh Carnegie Mellon University.
FDT Foil no 1 On Methodology from Domain to System Descriptions by Rolv Bræk NTNU Workshop on Philosophy and Applicablitiy of Formal Languages Geneve 15.
1 Key design time challenges Convert commander’s intent, along with static/dynamic environment, into QoS policies Quantitatively evaluate & explore complex.
Integrating Security Modeling in Embedded System Design Jan Werner, Matt Eby, Janos Mathe, Gabor Karsai, Yuan Xue, Janos Sztipanovits Institute for Software.
Banaras Hindu University. A Course on Software Reuse by Design Patterns and Frameworks.
© Andrew IrelandGrand Challenges for Computing Research 2004 The Verifying Compiler Andrew Ireland Dependable Systems Group School of Mathematical & Computer.
T imed Languages for Embedded Software Ethan Jackson Advisor: Dr. Janos Szitpanovits Institute for Software Integrated Systems Vanderbilt University.
TRUST September 13, 2004 NSF STC Review TRUST:Team for Research in Ubiquitous Secure Technologies Developing Human Resources Connections to the Critical.
Introduction to Software Engineering 1. Software Engineering Failures – Complexity – Change 2. What is Software Engineering? – Using engineering approaches.
Review of last class Software Engineering Modeling Problem Solving
Sumant Tambe* Akshay Dabholkar Aniruddha Gokhale
TRUST Area 3 Overview: Privacy, Usability, & Social Impact
Object-Oriented Software Engineering Using UML, Patterns, and Java,
Problems of Object-Oriented Design and Implementation
Design Patterns Damian Gordon.
Software Reuse ©Ian Sommerville 2006.
Rapid Application Development Model
Pre-assessment Questions
TRUST:Team for Research in Ubiquitous Secure Technologies
TRUST:Team for Research in Ubiquitous Secure Technologies
Designing Software for Ease of Extension and Contraction
Many-core Software Development Platforms
Model-Driven Analysis Frameworks for Embedded Systems
Integrating Security Modeling in Embedded System Design
Retargetable Model-Based Code Generation in Ptolemy II
TRUST:Team for Research in Ubiquitous Secure Technologies
TRUST:Team for Research in Ubiquitous Secure Technologies
Tools for Composing and Deploying Grid Middleware Web Services
Multiple Aspect Modeling of the Synchronous Language Signal
TRUST:Team for Research in Ubiquitous Secure Technologies
Automatic Derivation, Integration and Verification
TRUST:Team for Research in Ubiquitous Secure Technologies
Chapter 5 Architectural Design.
Constructing MDA-based Application Using Rational XDE for .NET
OOPSLA Workshop on Domain-Specific Modeling Tools Workgroup
Model Comparison: A Key Challenge for Transformation Testing and Version Control in Model Driven Software Development Yuehua Lin, Jing Zhang, Jeff Gray.
A Refinement Calculus for Promela
Automated Analysis and Code Generation for Domain-Specific Models
Dept. of Computation, UMIST
TRUST:Team for Research in Ubiquitous Secure Technologies
Aspect Oriented Software Design
IoT Modelling Framework and Papyrus Shuai Li, CEA
Since 2004 Phoniro has provided digital key technology to secure and manage home access
Presentation transcript:

TRUST:Team for Research in Ubiquitous Secure Technologies TRUSTed Model-Integrated Computing Gabor Karsai ISIS/Vanderbilt University NSF STC Review September 13, 2004

Towards TRUSTed Model-Integrated Computing Multiple-aspect modeling languages for systems/security co-design Understanding & modeling inter- dependence between security aspects & core systems aspects Analysis tools for co-verifying security, performance & safety properties Domain-Specific Modeling Languages Matlab Code-Gen. Matlab Code-Gen. Config. Generator Model-Driven Generator Technology Modeling of generators Generating generators Provably correct generators Embeddable generators if (inactiveInterval != -1) { if (thisInterval > inactiveInterval) { (int)(System.currentTimeMillis() - lastAccessed) / 1000; int thisInterval = invalidate(); } ssm.removeSession(this); ServerSessionManager ssm = ServerSessionManager.getManager(); private long lastAccessedTime = creationTime; * session, as the number of milliseconds since midnight, January 1, 1970 /** * Return the last time the client sent a request associated with this */ public long getLastAccessedTime() { * a value associated with the session, do not affect the access time. * GMT. Actions that your application takes, such as getting or setting return (this.lastAccessedTime); this.lastAccessedTime = time; * should be called by the context when a request comes in for a particular * Update the accessed time information for this session. This method this.lastAccessedTime = this.thisAccessedTime; this.thisAccessedTime = System.currentTimeMillis(); public void access() { * session, even if the application does not reference it. lastAccessedTime = ((Long) stream.readObject()).longValue(); lastAccessedTime = 0L; this.isNew=false; isNew = ((Boolean) stream.readObject()).booleanValue(); maxInactiveInterval = ((Integer) stream.readObject()).intValue(); 2 Configuration Specification Code Analysis Tool NSF STC Review NSF STC Review September 13, 2004

MIC Solution for Secure Systems Meta-modeling & Model Weaving TRUST MIC Solution for Secure Systems Meta-modeling & Model Weaving Multiple-aspect modeling languages are defined by formal meta-models Security models are built independently from platforms & expressed as patterns Model weaving technology is used to generate integrated security/systems models Model-based generators are used to generate systems on Secure Platforms Access Control Meta-Model Composition Meta-Models GME Meta-Modeling built by generated from Security Models Composition Models GME S-ESML Modeling built by generated from Integrated Model Model Weaver weaved by 3 generated from Secure Platform NSF STC Review NSF STC Review September 13, 2004

TRUSTed MIC: Summary Key concepts Desired TRUST properties are explicitly captured on the model level Model checkers verify emerging system properties Tools are available for maintaining, adapting, and verifying security models Trusted software systems are automatically generated for diverse platforms Research issues Modeling language for TRUST properties Model verification algorithms Model weaving tools Tools for TRUST model management Integration on TRUSTed platforms TRUSTed certifiable generators and model transformation tools Integration Direct use of security technology results: principles, algorithms, techniques Bridge towards social science aspects: integration of duties of care, privacy, and information policy study results as explicit TRUST models NSF STC Review September 13, 2004