Day 2 – Topic 1 (and 4) Dagstuhl Seminar 15151 8-10 April 2015.

Slides:



Advertisements
Similar presentations
Policy development workshop The role and characteristics of appropriate supportive policy within Bandwidth Management and Optimisation (BMO)
Advertisements

Socioeconomics knowledge cafe Wrap-up. Agreed the list of socioeconomic themes/issues that have dependencies with RWI research priorities Standardization.
Consortium Agreements and how we can learn to love them… Andrew Charlesworth Senior Research Fellow in IT & Law University of Bristol.
Strategy 2022: A Holistic View Tony Hayes International President ISACA © 2012, ISACA. All rights reserved.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
SOA and Web Services. SOA Architecture Explaination Transport protocols - communicate between a service and a requester. Messaging layer - enables the.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
Meta Data Repository Analysis Business Intelligence Road Map
Chapter 2 Data Models Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
Security Extensions to the DOD Architecture Framework Kevin Richardson Information Assurance Lab Auburn University Computer Science and Software Engineering.
Software Reuse Building software from reusable components Objectives
1 The role of social work in personalised adult social care and support Social Work and Personalisation: Skills for Care Wednesday 25 th June 2014 Lyn.
Challenge Questions How good is our strategic leadership?
Lecture Nine Database Planning, Design, and Administration
Course Instructor: Aisha Azeem
The Role of Risk Management and Assurance in Effective Organizational Governance Urton Anderson The University of Texas at Austin.
Lee Romero blog.leeromero.org November 2010 Enterprise taxonomy Six components of a vision.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Tan Jenny 23 September 2009 SESSION 4: Understanding Your IT Control Environment & Its Readiness.
What is Business Analysis Planning & Monitoring?
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SecureAware Building an Information Security Management System.
Database System Development Lifecycle © Pearson Education Limited 1995, 2005.
2 1 Chapter 2 Data Models Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Roles and Responsibilities
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Identity Ecosystem Framework and Charter Gap Analysis.
Overview Privacy Management Reference Model and Methodology (PMRM) John Sabo Co-Chair, PMRM TC.
Training Seminar on Implementation of Effective Quality Assurance Systems in Romanian Higher Education Institutions April 1-3, 2009 Sinaia Mapping Learning.
ISO GENERAL REQUIREMENTS. ISO Environmental Management Systems 2 Lesson Learning Goals At the end of this lesson you should be able to: 
Methodology - Conceptual Database Design
1 Analysis of Consumer Issues and Paths for Concrete Approaches Dr. Carsten Orwat Forschungszentrum Karlsruhe in the Helmholtz Association, Institute for.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
ISO DOCUMENTATION. ISO Environmental Management Systems2 Lesson Learning Goals At the end of this lesson you should be able to:  Name.
Challenge 6: Mobility, Environmental sustainability and energy efficiency Includes as driving objective: “Sustainable growth and environmental sustainability”
The development of the market infrastructure for payment and securities handling Ramzi Hamadeh Group 2 Frankfurt am Main,
Introducing WI Proposal about Authorization Architecture and Policy Group Name: WG4 Source: Wei Zhou, Datang, Meeting Date: Agenda Item:
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Introducing WI Proposal about Authorization Architecture and Policy Group Name: WG4 Source: Wei Zhou, Datang, Meeting Date: Agenda Item:
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Overview of OASIS SOA Reference Architecture Ken Laskey OASIS SOA-RM RA Subcommittee 19 February 2008 Ken Laskey OASIS SOA-RM RA Subcommittee 19 February.
HLA OMT Fundamentals Alessandro Specchia Carnegie Mellon University.
Models of the OASIS SOA Reference Architecture Foundation Ken Laskey Chair, SOA Reference Model Technical Committee 20 March 2013.
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Standards and Competences for Social work Education for working with children and youth Prof dr Nevenka Zegarac Ass MA Anita Burgund.
Web Services Quality Model Dugki Min Konkuk University.
1 The XMSF Profile Overlay to the FEDEP Dr. Katherine L. Morse, SAIC Mr. Robert Lutz, JHU APL
Security and resilience for Smart Hospitals Key findings
The Components of Information Systems
Information Assurance Policy and Management
Quality Management chapter 27.
Originating the role of Information Governance Officer
Module 8: Securing Network Traffic by Using IPSec and Certificates
Dugki Min Konkuk University
The Components of Information Systems
All data occupies physical space, even if we don't think of it as such.
UNDERSTANDING….. THE GRC FRAMEWORK.
Software Connectors.
Module 8: Securing Network Traffic by Using IPSec and Certificates
Chapter 29: Program Security
Social Practice of the language: Describe and share information
G061 - Data Dictionary.
Introduction to SOA Part II: SOA in the enterprise
Security Mechanisms Network Security.
Presentation transcript:

Day 2 – Topic 1 (and 4) Dagstuhl Seminar April 2015

SLA-driven system design (for composable systems and services) -> relationship to policy? (regulation, law?) We need to model and understand the resilience of (composed) interconnected and/or interdependent networks (  overcoming complexity) How to specify resilience at the enterprise level? and how to map this into the system layers and mechanisms? Issues / questions 1

Interface abstractions and tussles between entities that are unwilling to exchange information A study of trust boundaries in composed and multi- level systems policy and legal implications For safety-critical systems do we think about resilience differently? societal importance publication of information, etc. Issues / questions 2

We must ensure that resilience mechanisms do not make systems more fragile, even though we may have made them more complex In what ways are composed systems able to be structured to reduce complexity? where components are not necessarily fully described or understood Can we structure (or architecht) systems to create boundaries or interfaces that act as trust boundaries? or at least clear functional or ownership boundaries Issues / questions 3

Composed (virtualised) systems may cause difficulties with attributing liability (responsibility) --> (monitoring) recording? Towards autonomic operation: can removing the human in the loop make safer systems? (cf. human on the loop) --> implications and legal liability? (responsibility) Understanding and modeling the roles of humans in (composed) systems - how to assess risks, and how to assure resilience? Issues / questions 4

Improving trust / security by use of descriptions / language appropriate for the end user; not 'technical' language education / awareness / understanding (not marketing) How can end-users be assured that their system is secure / resilient active assurances? warnings of any dangers? Need to educate users (including young people) about te importance of avoiding security problems improving user interfaces (ethnography, usability) Issues / questions 5