Research on Dependability and Security - Dr. Panagiotis Katsaros, Lecturer - Dr. Lefteris Angelis, Assistant Professor - collaboration with other academic.

Slides:



Advertisements
Similar presentations
Sanjay Ghemawat, Howard Gobioff and Shun-Tak Leung
Advertisements

Failure Detection The ping-ack failure detector in a synchronous system satisfies – A: completeness – B: accuracy – C: neither – D: both.
Formal verification of safety communication protocol for ETCS Chen Lijie  Introduction  Safety communication protocol in ETCS  CPN model.
MIS 385/MBA 664 Systems Implementation with DBMS/ Database Management Dave Salisbury ( )
Cluster Technologies University of Macedonia Thessaloniki - Greece Parallel & Distributed Processing Laboratory
EEC 688/788 Secure and Dependable Computing Lecture 12 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
1 Software Testing and Quality Assurance Lecture 33 – Software Quality Assurance.
Trust, Privacy, and Security Moderator: Bharat Bhargava Purdue University.
A Progressive Fault Detection and Service Recovery Mechanism in Mobile Agent Systems Wong Tsz Yeung Aug 26, 2002.
A Secure Fault-Tolerant Conference- Key Agreement Protocol Wen-Guey Tzeng Source : IEEE Transactions on computers Speaker : LIN, KENG-CHU.
CS603 Advanced Topics in Distributed Systems MWF 13:30-14:30 RHPH 162 Professor Chris Clifton.
Security in Databases. 2 Srini & Nandita (CSE2500)DB Security Outline review of databases reliability & integrity protection of sensitive data protection.
Transactional Services Ricardo Jiménez-Peris Marta Patiño-Martínez Technical University of Madrid 1 st Adapt Workshop 23 rd -24 th September 2002 Madrid,
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 12 Wenbing Zhao Department of Electrical and Computer Engineering.
1 CS 603: Advanced Topics in Distributed Systems Spring 2002 Professor Chris Clifton.
©Silberschatz, Korth and Sudarshan19.1Database System Concepts Lecture-10 Distributed Database System A distributed database system consists of loosely.
Security in Databases. 2 Outline review of databases reliability & integrity protection of sensitive data protection against inference multi-level security.
A Progressive Fault Tolerant Mechanism in Mobile Agent Systems Michael R. Lyu and Tsz Yeung Wong July 27, 2003 SCI Conference Computer Science Department.
Distributed Databases
Transactions and Recovery
Dr Andy Brooks1 FOR0383 Software Quality Assurance Lecture 1 Introduction Forkröfur/prerequisite: FOR0283 Programming II Website:
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
Cluster Reliability Project ISIS Vanderbilt University.
Distributed Algorithms – 2g1513 Lecture 9 – by Ali Ghodsi Fault-Tolerance in Distributed Systems.
Molecular Transactions G. Ramalingam Kapil Vaswani Rigorous Software Engineering, MSRI.
Chapter 19 Recovery and Fault Tolerance Copyright © 2008.
Parallel Distributed Programming Introduction.
Data and Applications Security Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security August.
PMIT-6102 Advanced Database Systems By- Jesmin Akhter Assistant Professor, IIT, Jahangirnagar University.
Framework for the Development and Testing of Dependable and Safety-Critical Systems IKTA 065/ Supported by the Information and Communication.
1 Recent work in the area: Requirement-Driven Development of Distributed Applications Gregor v. Bochmann School of Information Technology and Engineering.
Distributed Database Systems Overview
1 CS 430 Database Theory Winter 2005 Lecture 16: Inside a DBMS.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Fault-Tolerant Parallel and Distributed Computing for Software Engineering Undergraduates Ali Ebnenasir and Jean Mayo {aebnenas, Department.
Byzantine Fault Tolerance CS 425: Distributed Systems Fall 2012 Lecture 26 November 29, 2012 Presented By: Imranul Hoque 1.
CSCI1600: Embedded and Real Time Software Lecture 11: Modeling IV: Concurrency Steven Reiss, Fall 2015.
Course: COMS-E6125 Professor: Gail E. Kaiser Student: Shanghao Li (sl2967)
Tolerating Communication and Processor Failures in Distributed Real-Time Systems Hamoudi Kalla, Alain Girault and Yves Sorel Grenoble, November 13, 2003.
Revisiting failure detectors Some of you asked questions about implementing consensus using S - how does it differ from reaching consensus using P. Here.
CSCE 824 Secure (and Distributed) Database Management Systems FarkasCSCE
University of Westminster – Checkpointing Mechanism for the Grid Environment K Sajadah, G Terstyanszky, S Winter, P. Kacsuk University.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
CSC314 Day 16 Transaction processing Concurrency Control 1.
CS/CE/TE 6378 Advanced Operating Systems
Data and Applications Security
Outline Introduction Background Distributed DBMS Architecture
EEC 688/788 Secure and Dependable Computing
Data and Applications Security
Gabor Madl Ph.D. Candidate, UC Irvine Advisor: Nikil Dutt
Outline Announcements Fault Tolerance.
Fault Tolerance CSC 8320 : AOS Class Presentation Shiraj Pokharel
EEC 688/788 Secure and Dependable Computing
Database Security &Threats
Distributed Transactions
Decentralized Model-Based Testing of Distributed Systems
EEC 688/788 Secure and Dependable Computing
Data and Applications Security Developments and Directions
Transaction Management
Data and Applications Security Developments and Directions
Transaction Management Overview
EEC 688/788 Secure and Dependable Computing
WS Standards – WS-* Specifications
Data and Applications Security Developments and Directions
Distributed Systems (15-440)
Data and Applications Security
Design.
Data and Applications Security
Data and Applications Security
Presentation transcript:

Research on Dependability and Security - Dr. Panagiotis Katsaros, Lecturer - Dr. Lefteris Angelis, Assistant Professor - collaboration with other academic staff members

Research on Dependability and Security Dependable Distributed Systems (research started in 2003): Dependable system is a system that meets its expected behavior in all circumstances (performance, availability, reliability and system’s correctness properties like for example safety, atomicity and consistency). Dependability & Security are two interrelated problems (new journal: IEEE Transactions on Dependable and Secure Computing) - a security attack is possible to result in a system’s failure to meet its expected behavior example: recent incident in VODAFONE – Greece, where an insider conversation privacy attack caused an AXE-10 system failure in dispatching SMS messages - correctness property violation like for example an atomicity violation design flaw results in a non secure system

Research on Dependability and Security Areas of interest: quantitative evaluation and trade-offs between dependability attributes (performance, availability, reliability etc) in distributed systems  simulation  stochastic optimization formal methods in the analysis of safety, security and fault tolerance  model checking (SPIN, Colored Petri Nets, AVISPA)  theorem proving (Coq) issues related to access control, information flow control, concurrency control, atomicity and recovery

Research on Dependability and Security Research staff and students: 2 academic staff members 2 PhD students 1 M.Sc. student (thesis) 7 undergraduate students (thesis) Research & Development Projects: EU INTERREG IIIC South programme (MedWet CODDE) ARCHIMIDES II – Greek Ministry of Education (2 projects) Collaboration: Un. of Macedonia, Thessaloniki, Greece Athens Un. of Economics and Business, Athens, Greece CardiSoft, Thessaloniki, Greece

Research on Dependability and Security Recent publications – ongoing research: performance & availability trade-off for different transaction processing alternatives (ACID Sim Tools – ready prototype) ACID properties costs simulation for different Transaction Processing Models and their parameters (protocols for concurrency control, distributed atomic commit, recovery, deadlock handling and replication)

Research on Dependability and Security Recent publications – ongoing research: fault tolerance performance & effectiveness trade-off (replication based or message logging with/without checkpointing) an approach to compare different fault tolerance mechanisms, choose the most effective one and tune its parameters (e.g. checkpoint intervals, number of replicas) such as to achieve the required response times at the lowest possible fault tolerance cost model checking various atomicity properties (in payment transactions) by the use of Colored Petri Nets an approach that can be extended to model checking many other correctness properties in component software models and in models of systems with timing constraints (schedulability analysis)

Research on Dependability and Security Recent publications – ongoing research: new interlocking control algorithm based on the use of the so- called Distributed Signal Boxes, for safety-critical systems (to be published) (correctness properties proved for the Athens underground railway system by the SPIN model checker) new approach for the design of access control in distributed systems, such as to prevent sensitive information leakage formal analysis of smart card security – Public Key Infrastructures (ongoing work) More info: