Opera Group Presentation: Policies in Accountable Contracts Brian Shand 16 April 2002.

Slides:



Advertisements
Similar presentations
CIVICUS World Alliance for Citizen Participation Transparency Key messages to increase the transparency and the predictability of aid.
Advertisements

GRID Economies Breakout Group 3. Economies What are you selling? Pricing Transaction/access to resource Security attribute (e.g. price drops if security.
Professionalise | re-prioritise | standardise | benchmark | improve industry relationships and industry performance | lead reform The Real Price? Corrina.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
Lakshmi Narayana Gupta Kollepara 10/26/2009 CSC-8320.
Climate Change Adaptation A Framework for the City of Philadelphia Chastain C., Ferguson J., Gudernatch S., Kondracki E, Levy J., Tran L.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
The Active Streams approach to adaptive distributed systems Fabián E. Bustamante, Greg Eisenhauer, Karsten Schwan, and Patrick Widener
Cereus: CyberInfrastructure Environments for Resource Exchange and Utility Services Duke University, Department of Computer Science
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
Grid Resources for Industrial Applications Steve Taylor IT Innovation Centre 19 October 2004.
First Year Talk: Self-Enforcing Automatic Rational Contracts between Computers Brian Shand Supervisor: Dr Jean Bacon.
Introduction To Windows NT ® Server And Internet Information Server.
Brian Shand Jean Bacon
Globus Computing Infrustructure Software Globus Toolkit 11-2.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
NASA Johnson Space Center Contracting Officer and Contracting Officer’s Technical Representative.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Filename\location Agent Mediated Electronic Commerce Dr. Chris Preist HP Labs.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Report Tile Training & Management Assistance Branch UNITED STATES OFFICE OF PERSONNEL MANAGEMENT Project Kick-Off Meeting for with Project Manager Name,
Active Network Applications Tom Anderson University of Washington.
Module 8: Risk Management, Monitoring and Project Control We would like to acknowledge the support of the Project Management Institute and the International.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
November, 2000 Slide 1 Project Services Division RISK MANAGEMENT Project Services Division Presentation By: Adam Malkhassian November, 2000.
Day 2.  Questions??  Blackboard updates  IP Projects discussions  Why project management??  Assignment 1 posted in Blackboard ◦ Due in one week;
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
London e-Science Centre Imperial College London Making the Grid Pay Economic Services - Pricing and Payment William Lee.
Uncertainty management in Statoil (Risk and opportunity management)
GT Components. Globus Toolkit A “toolkit” of services and packages for creating the basic grid computing infrastructure Higher level tools added to this.
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
University of Kaiserslautern Department of Computer Science Integrated Communication Systems ICSY License4Grid: Adopting DRM for Licensed.
National Computational Science National Center for Supercomputing Applications National Computational Science NCSA-IPG Collaboration Projects Overview.
Interception and Analysis Framework for Win32 Scripts (not for public release) Tim Hollebeek, Ph.D.
TeamCluster Project Real time project management solutions Harry Hvostov April 27, 2002.
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Integrated Risk Management Charles Yoe, PhD Institute for Water Resources 2009.
sec1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: TGa_Proposal_Antonio_Izquierdo (Protecting the Information Service.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Module 12 Integrating Exchange Server 2010 with Other Messaging Systems.
 A Web service is a method of communication between two electronic devices over World Wide Web.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
Reputation Management in Grid-based Virtual Organisations Benjamin Aziz (e-Science Centre, STFC Rutherford Appleton Laboratory, UK) Joint work with Alvaro.
Web 2.0 Melanie Hartgraves Director of New Media Governor David. A. Paterson Jessica Harrison Social Media Coordinator New York State Department of Labor.
SecPAL Presented by Daniel Pechulis CS5204 – Operating Systems1.
1 BBN Technologies Quality Objects (QuO): Adaptive Management and Control Middleware for End-to-End QoS Craig Rodrigues, Joseph P. Loyall, Richard E. Schantz.
Project Costing & Cost Risk. Business is a game And we use money to keep score.
7 October 1998© 1998 University of Salford1 Intelligent Computation of Trust David W Chadwick
Computer Science and Engineering 1 Mobile Computing and Security.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Task Force CoRD Meeting / XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA.
Unit – I Presentation. Unit – 1 (Introduction to Software Project management) Definition:-  Software project management is the art and science of planning.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Fall 2006CS 395: Computer Security1 Key Management.
Introduction to: Tycoon A Market Based Resource Allocation System by Alejandro García López.
AuthZ WG Conceptual Grid Authorization Framework document Presentation of Chapter 2 GGF8 Seattle June 25th 2003 Document AID 222 draft-ggf-authz-framework pdf.
Machine Language Computer languages cannot be directly interpreted by the computer – they are not in binary. All commands need to be translated into binary.
Insurance is a method to transfer the loss of person to the insurance company which can easily spread it over a large number of policy holders.
Trusted Component Deployment Trusted Components Bernd Schoeller January 30 th, 2006.
Ryan Wade, Nathan Volkert, Daniel Griffen, Alex Berns
Mobile Agents.
Cereus: CyberInfrastructure Environments for Resource Exchange and Utility Services Duke University, Department of Computer Science
Presentation transcript:

Opera Group Presentation: Policies in Accountable Contracts Brian Shand 16 April 2002

2 Overview PhD Research: Self-Enforcing Automatic Rational Contracts between Computers –Contract Framework, Resource Accounting, Trust Model Application Scenarios –Public compute servers (GRID computation) –Flexible prioritisation in large distributed systems –Web services 1.Contract Negotiation 2.Signing 3.Performance

3 Key Terms Contracts Non-repudiable promises to act. Allow planning. But: Need to be prioritised. Resource Model Basis for accounting. Flexible resource economy. Accounting Functions Bind contracts and resources together. Can prioritise and monitor contracts. But: Need sanctions for cheats. Trust Model Models expected contract payment. Constantly re-assessed. Accountable Contracts Scheduled according to expected profitability. { { { { {

4 Contract Framework Contracts specify promises between participants Multi-level contracts allow introspection 1. Participant identities 2. Estimated resource consumption 3. Accounting function (payment policy) 4. Actions to perform Allows risk estimates, with limited resource outlay All accounting messages signed and timestamped –Message passing substrate assumed

5 Resource Accounting Homogeneous model –of scarce resources: bandwidth, CPU cycles, trust, currency Constrained language for accounting functions –A subset of the Python language –Predictable execution times –Example code: def processResourceAtom(self, atom, imports): if atom.type != resources.cpuTime: return [] # Charge for CPU only rate = imports[0] if self.totalCPU < 10: result = rate+0.01 else: result = rate self.totalCPU += atom.quantity return [ResourceAtom(resources.money, '£', result*atom.quantity) ]

6 Trust Model Subjective Trust Model (Jøsang, A Logic for Uncertain Probabilities, 2001) –Local assessments of trustworthiness –Second-order model incorporates uncertainty –Moderates contractual promises –Constantly updated Transfer of Trust: Trust delegation certificates –Web of trust, c.f. PGP recommendations –Subsume reputation agencies –Distributed trust management Trust Uncertainty Distrust (1,0,0)(1,0,0) (0,0,1)(0,0,1) (0,1,0)(0,1,0)

7 Accountable Contracts Separation of task acceptance and performance –introspectible contracts –explicit risk assessments Multi-scale representation Accounting of all resources –economic services Distributed trust model deters cheats Overhead in a PBIL application: –about 20% of bandwidth, 2% of CPU

8 Further Work Explicit integration of reputation into contracts Prototype applications –Compute Servers Complex negotiation, pricing by servers Clients that plan –Active City Event prioritisation in publish-subscribe Theoretical basis for trust model –SECURE collaboration –Model risks of stolen signatures Distrust in own actions