Software Quality and Infrastructure Protection for Diffuse Computing FY2001 ONR CIP/SW URI Principal Investigator: Andre Scedrov Institution: University.

Slides:



Advertisements
Similar presentations
1 From Grids to Service-Oriented Knowledge Utilities research challenges Thierry Priol.
Advertisements

“Challenges and Methodologies
DELOS Highlights COSTANTINO THANOS ITALIAN NATIONAL RESEARCH COUNCIL.
anywhere and everywhere. omnipresent A sensor network is an infrastructure comprised of sensing (measuring), computing, and communication elements.
City-based Sematic Grids: Building the new urban utility infrastructure Jose Luiz Moutinho Globelics June 1 st, 2005.
7-1 INTRODUCTION: SoA Introduced SoA in Chapter 6 Service-oriented architecture (SoA) - perspective that focuses on the development, use, and reuse of.
8.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
02/12/00 E-Business Architecture
Incrementally Deployable Security for Interdomain Routing (TTA-4, Type-I) Jennifer Rexford, Princeton University Joan Feigenbaum, Yale University July.
Connecting the Invisible Extremes of Computing David Culler U.C. Berkeley Summer Inst. on Invisible Computing July,
Grids and Grid Technologies for Wide-Area Distributed Computing Mark Baker, Rajkumar Buyya and Domenico Laforenza.
Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Presented by, Sai Charan Obuladinne MYSEA Technology Demonstration.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Smart Home Technologies CSE 4392 / CSE 5392 Spring 2006 Manfred Huber
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Key Action II - Objectives Support the development and adoption of novel IST solutions for eCommerce & eWork aimed at enhancing: Support the development.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Critical Emerging Network-Centric Applications Tele-control/tele-presence Defense Tele-medicine Remote plane/vehicle/robot control Distance learning Real-time.
Copyright © 2001 Espial Group Inc. All rights reserved. Evolution of the Pervasive Internet Ella Mar VP Operations Dilshan De Silva Director, Product Development.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Brussels, 04 March 2004Workshop „New Communication Paradigms for 2020“ Semantic Routing, Service Discovery and Service Composition Gregor Erbach German.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
Network Architecture Research in SPYCE CIP/URI Project FY2001 ONR CIP/SW URI Jonathan M. Smith University of Pennsylvania
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
NSF Critical Infrastructures Workshop Nov , 2006 Kannan Ramchandran University of California at Berkeley Current research interests related to workshop.
Incentives, Privacy, and Anonymity in Diffuse Computing: Results and Future Directions Supported by the DoD URI program under ONR grant N
Lecture 0 Anish Arora CSE 6333 Introduction to Distributed Computing.
Evaluation and Testbed Development Bhavani Thuraisingham The University of Texas at Dallas Jim Massaro and Ravi Sandhu.
IST 2006 – 22/11/2006 Aljosa Pasic Atos Origin Security, Dependability and Trust in Service Infrastructures.
TripCom: Development of a patient summary at European level E. Della Valle, D. Cerizza, D. Foxvog, R. Krummenacher, L. J. B. Nixon, E.
Wireless Networks of Devices (WIND) Hari Balakrishnan and John Guttag MIT Lab for Computer Science NTT-MIT Meeting, January 2000.
DOCUMENT #: GSC15-GTSC8-06 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.2 CONTACT(S): Art Reilly ATIS Cybersecurity.
Software Quality and Infrastructure Protection for Diffuse Computing FY2001 ONR CIP/SW URI Principal Investigator: Andre Scedrov Institution: University.
Critical Infrastructure Protection and High Confidence Adaptive Software University Research Initiative Program Welcome to the “3 rd Year” Option Component.
AKARI New Generation Network Architecture SeungHo Lee.
CEOS Grid Task Team Yonsook Enloe, Allan Doyle, Ananth Rao March 8, 2005.
Software Quality and Infrastructure Protection for Diffuse Computing FY2001 ONR CIP/SW URI Principal Investigator: Andre Scedrov Institution: University.
ACM 511 Introduction to Computer Networks. Computer Networks.
Geneva, Switzerland, 17 October 2011 Summary of Session 4: SDP standardization status and requirements Huilan Lu, Ph.D. SG 13 Vice Chairman ITU Workshop.
Sensorweb Research Laboratory Georgia State University Fundamentals of Computer Security Song Tan Georgia State University.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Grid Computing & Semantic Web. Grid Computing Proposed with the idea of electric power grid; Aims at integrating large-scale (global scale) computing.
GRID ARCHITECTURE Chintan O.Patel. CS 551 Fall 2002 Workshop 1 Software Architectures 2 What is Grid ? "...a flexible, secure, coordinated resource- sharing.
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
NGCWE Expert Group EU-ESA Experts Group's vision Prof. Juan Quemada NGCWE Expert Group IST Call 5 Preparatory Workshop on CWEs 13th.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
SPYCE/May’04 coverage: A Cooperative Immunization System for an Untrusting Internet Kostas Anagnostakis University of Pennsylvania Joint work with: Michael.
1 Welcome Hans Andersson Der Yao Leong Yee Jiun Song Wendy Tobagus Yang Bei Sherif Yousef.
Main Theme: Diffuse Computing Managing and maintaining a computational infrastucture, distributed among many heterogeneous nodes that do not trust each.
Self-Organizing Architectures SOAR 2010 International Conference on Autonomic Computing and Communication, ICAC Washington DC, USA June 7, 2010.
Network Architecture Research in SPYCE CIP/URI Project Jonathan M. Smith University of Pennsylvania 3/31/03.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
Roadmap to Next Generation Internet: Indian Initiatives Subbu C-DAC, India.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Internet2 Strategic Directions October Fundamental Questions  What does higher education (and the rest of the world) require from the Internet.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Fuego Core 2005/7 Possible Directions Kimmo Raatikainen Principal Scientist Helsinki Institute for Information Technology
Towards ‘Ubiquitous’ Ubiquitous Computing: an alliance with ‘the Grid’ Oliver Storz, Adrian Friday, and Nigel Davies Computing Department, Lancaster University,
1 Enabling Smart Cities/Campuses to Serve the Internet of People Florence Hudson Senior Vice President & Chief Innovation Officer Internet2 TNC16 June.
Chapter 1 Characterization of Distributed Systems
Security Issues.
Detection and Analysis of Threats to the Energy Sector (DATES)
Edge and Cloud Computing Breakout Session CSR PI Meeting, June 2, 2017
Introduction to SOA Part II: SOA in the enterprise
Presentation transcript:

Software Quality and Infrastructure Protection for Diffuse Computing FY2001 ONR CIP/SW URI Principal Investigator: Andre Scedrov Institution: University of Pennsylvania URL: OPTION STARTED IN MAY 2004

The SPYCE Team lJoan Feigenbaum (Yale) lJoseph Y. Halpern (Cornell) lPatrick D. Lincoln lJohn C. Mitchell (Stanford) lAndre Scedrov (U Penn) lJonathan M. Smith (U Penn) (until December 2003)

External Collaborators lCynthia Dwork (Microsoft) lTim Griffin (Intel) lVitaly Shmatikov (SRI) lPaul Syverson (NRL)

Postdocs lBjorn Knutsson, Penn lNinghui Li, Stanford (till Summer 2003) lMichael Elkin, Yale (since Fall 2003) l16 Ph.D. Students

Project Vision: Diffuse Computing Managing and maintaining a computational infrastucture, distributed among many heterogeneous nodes that do not trust each other completely and may have incentives (needs, priorities).

Secure services through heterogeneous overlay networks  Communication  Cooperation  Incentives  Delivery

Diffuse Computing lParadigm developing rapidly as a result of - commercial computing markets - now-recognized potential of peer-to-peer computing and grid computing - the need for distributed network-centric systems lRaises challenges for - system design - software production - the development of mechanisms ensuring stable equilibria of diffuse systems

Critical Infrastructure Protection Many critical infrastructures, national and DoD- specific, are decentralized systems Computer networks have, in addition, become critical infrastructures Research Question: How to build large-scale, adaptive and robust next-gen. systems? Approach: New Diffuse Computing concept - results with extremely loosely-coupled modules

Critical Infrastructure Protection lMany critical infrastructures, national and DoD-specific, are decentralized lData sharing essential for operation, but data compromise can be catastrophic lResearch Question: How to share data safely, using policies that are easy to formulate, enforce, maintain lApproach: diffuse trust management

URI Objective Algorithms to model diffuse computing and achieve scaleable high assurance DoD capabilities enhanced Reduced cost, improved performance, and higher reliability for networked operations across untrusted networks Scientific/technical approach Computing and networking elements diffusing into the environment need: - Local incentive-compatibility in global distributed computing - Scaleable authorization mechanisms - Assured communication - Experimental evidence Sample Accomplishments Local conditions for stable routes in interdomain routing SPAM reduction algorithms Privacy in databases Content transcoding for heterogeneous clients Formal methods for cryptography Logics for reasoning about policies URI, 2001May, 2004 Software Quality and Infrastructure Protection for Diffuse Computing Smart devices diffuse into the environment…. … with control and assurance Desktop ‘80s Room ‘40s Wearable ‘90s Pervasive ‘00s Web URL:

SPYCE Objective: Scalable Distributed Assurance Develop fundamental understanding, models, algorithms, and network testbed, in order to reduce cost, improve performance, and provide higher reliability for networked operations across untrusted networks. Incentives, Privacy, and Anonymity Protocol Design and Analysis Trust Management Network Architecture Smart devices diffuse into the environment…. … with control and assurance Desktop ‘80s Room ‘40s Wearable ‘90s Pervasive ‘00s

SPYCE Objective: Scalable Distributed Assurance Develop fundamental understanding, models, algorithms, and network testbed, in order to reduce cost, improve performance, and provide higher reliability for networked operations across untrusted networks. Incentives, Privacy, and Anonymity PROTOCOL DESIGN AND ANALYSIS TRUST MANAGEMENT Network Architecture Smart devices diffuse into the environment…. … with control and assurance Desktop ‘80s Room ‘40s Wearable ‘90s Pervasive ‘00s

Today lTrust Management / Access Control - John Mitchell, Stanford - Vicky Weissman, Cornell lProtocols - Paul Syverson, NRL lLunch break poster session on any SPYCE topic lProtocols - Andre Scedrov, U Penn - Vitaly Shmatikov, SRI

Software Quality and Infrastructure Protection for Diffuse Computing FY2001 ONR CIP/SW URI Principal Investigator: Andre Scedrov Institution: University of Pennsylvania URL: OPTION STARTED IN MAY 2004