SECURE Application Scenarios Ciarán Bryce, Giovanna Di Marzo Serugendo Glasgow meeting, 5-6th September 2002.

Slides:



Advertisements
Similar presentations
Service Composition Scenarios for Next Generation Networks Bhaskaran Raman, ICEBERG, EECS, U.C.Berkeley Presentation at Siemens, Munich, June 2001.
Advertisements

Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Emmanouel (Manos) Varvarigos Computer Technology Institute and Press "Diophantus“, CTI Greece Gathering and Processing Energy Consumption Data from Greek.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Page 1 of 29 Net-Scale Technologies, Inc. Network Based Personal Information and Messaging Services Urs Muller Beat Flepp
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
A global, public network of computer networks. The largest computer network in the world. Computer Network A collection of computing devices connected.
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
WINDOWS APPLICATIONS by Jane Cable Also called Accessories Also called Components.
Chapter Overview Network Communications.
CISB113 Fundamentals of Information Systems Telecommunications & Network.
1 Telematica di Base Applicazioni P2P. 2 The Peer-to-Peer System Architecture  peer-to-peer is a network architecture where computer resources and services.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
UNIT - 1Topic - 2 C OMPUTING E NVIRONMENTS. What is Computing Environment? Computing Environment explains how a collection of computers will process and.
By: Bill Stevenson Jose Plancarte Erik Magsino. Overview Messaging and collaboration server Send and Receive electronic mail and other forms of interactive.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
Un peu de recherche…. 2 LIRIS/DCS/DRIM 3 Nostalgia: an overview of the past 10 years Some contributions to the management of data in grids Some contributions.
University of Westminster – Y. Zetuny, G. Terstyanszky, S. Winter, P. Kacsuk Centre for Parallel Computing Cavendish School of Informatics.
Lecture 4 Title: Network Components and Types By: Mr Hashem Alaidaros MIS 101.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Two Installing and Configuring Exchange Server 2003.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Deepnet Unified Authentication for Outlook Anywhere.
Objectives Functionalities and services Architecture and software technologies Potential Applications –Link to research problems.
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
1 Adding Secure and Collaboration to Your Business with SCOoffice Server 4.1.
© Prentice Hall, 2005Excellence in Business, Revised Edition Chapter Fundamentals of Information Management, the Internet, and E-Commerce.
Semantic Web: The Future Starts Today “Industrial Ontologies” Group InBCT Project, Agora Center, University of Jyväskylä, 29 April 2003.
A global, public network of computer networks. Computer Network A collection of computing devices connected to share resources such as: Files Software.
Computer Networks Fall, 2007 Prof Peterson. CIS 235: Networks Fall, 2007 Western State College How’s it going??
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Networks Am I hooked up?. Networks definition sizes of networks types advantages and disadvantages how data is sent transmission media business uses.
Module 3: Planning Administrative Access. Overview Determining the Appropriate Administrative Model Designing Administrative Group Strategies Planning.
Your Name Your Title Hewlett-Packard Company Software Engineering for E-Business.
Distributed Computing Systems CSCI 4780/6780. Scalability ConceptExample Centralized servicesA single server for all users Centralized dataA single on-line.
1 Natural Store Me Migration and Technology Needs Anthony Johnson.
G041: Lecture 08 ICT Infrastructure Used By Organisations Mr C Johnston ICT Teacher
Global City Teams Challenge September 29-30, 2014 Report Out: Technology Enabling Human Networks in Emergency Response.
Society & Computers PowerPoint
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Introduction to Networks Mr. Grimming. Types of Networks Wide Area Network (WAN) Cover large geographic area Nodes connected by coaxial cable, microwave.
Microsoft Partner Conference Integrated Innovation Don Kerr Partner Technology Specialist.
Built atop SharePoint Online, WorkPoint 365 Offers a Project and Case Management Solution to Boost Business Productivity and Deliver Governance OFFICE.
Motivation - The Edge Lab Motivation Communication as a co-operative multi-party act: But interests diverge … Core question: how can we distribute control.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Peter Ziu Northrop Grumman ACS-WG Grid Provisioning Appliance Concept GGF13, March 14, 2005
Office 365 is cloud-based productivity, hosted by Microsoft.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Boomerang Adds Smart Calendar Assistant and Reminders to Office 365 That Increase Productivity and Simplify Meeting Scheduling OFFICE 365 APP BUILDER.
Walter Binder Giovanna Di Marzo Serugendo Jarle Hulaas
Unit 36: Internet Server Management
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
Smart Org Charts in Microsoft Office 365: Securely Create, Collaborate, Edit, and Share Org Charts in PowerPoint and Online with OrgWeaver Software OFFICE.
That Saves Money and Preserves Opportunities
Quick Comparison of workspaces
SocialBoards Self-Service, Multichannel Support Ticket Notifications in Microsoft Office 365 Groups Help Customer Care Teams to Provide Better Care OFFICE.
It’s About Time – ScheduleMe Outlook Add-In for Office 365 Enables Users to Schedule Meetings Easily with People Outside of Your Organization Partner Logo.
Comparison of LAN, MAN, WAN
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
ACTIVE DIRECTORY An Overview.. By Karan Oberoi.
Presentation transcript:

SECURE Application Scenarios Ciarán Bryce, Giovanna Di Marzo Serugendo Glasgow meeting, 5-6th September 2002

2 Selection criteria u Applications are targeted towards global computing u Use Cases u Applications scenarios: are being, or will be, implemented by a partner u Applications possess intricate trust relations involved äI.e., not simply a user trusting a super-user à la Unix u Applications are heterogeneous w.r.t. aspects of problem we are dealing with

3 Description u Informal Description u Actors: earn benefit u Principals: involved in scenario u Benefit: why actors take risk u Risk: measure of loss u Observation: basis for trust decision u Reputation, Recommendation: global opinion, and advice u Trust: who trusts who u Security Policy: how trust, and risk measures are exploited for access control decisions

4 Use Cases u Blackjack, Smart Spaces u Ad Hoc Network Routing u Restaurant u Coffee Machines u Distributed Post-its u On-line Auctions u Car Rental u Car Obstacle Avoidance u Medical Records u News Article u Amazon u P2P u Grid Computing

5 Application Scenarios u Overview: domain and description u Background: development context u Scenario: example of run of the scenario u Issues of Trust: Actors, Principals, …

6 Personalised Community Portal Agent Backbone Client Information Portal Internet Servers customer query agent query u Overview äPortal äCustomer query solved through an agent backbone u Actors äclients, producers, portal administrators, agent backbone providers

7 P2P Based Distributed File System u Overview äUsing peer-to-peer PC network to store backups äe.g., Chord file system u Actors: Publishers, Clients, Servers

8 PDA-based spontaneous networks u Business Fair äPDAs based recognition and information exchanges u Actors äVisitors

9 Smart Spaces u Distributed workspace for data sharing u Example application: äBlackjack u Actors äPlayers, space provider, ….. u …. u Any Volunteers ?

10 E-Purses on Mobile Devices u Overview äMobile telephones are “secure” computers  they each have smartcards äBluetooth allows free data exchange  Basis for micro-payment u Actors äUser, bank, bus company

11 Distributed Spam Filtering u filtering äSpam rejected on the basis of header äIP address, from, subject fields u Reject Spam mails on the basis of trust

12 Collaborative Information Sharing u Sharing of information based on trust (Cambridge) u PDA-based information exchange u Trust regarding information redistribution

13 Taxonomy u Applications Domains äBusiness äOffice äScientific äHealth äInformation Sharing äGames Network äTrust-Risk Model (?) äRecommendation- based äObservation-based äRisk-oriented äBenefit-oriented äTrust-based u Technologies äPDAs äVirtual Spaces äDecentralized Control äAgents äInternet Access/Web äPervasive