AMPol: Adaptive Messaging Policy Raja N. Afandi, Jianqing Zhang, Munawar Hafiz, Carl A. Gunter Computer Science Department, University of Illinois Urbana-Champaign.

Slides:



Advertisements
Similar presentations
Using PHINMS and Web-Services for Interoperability The findings and conclusions in this presentation are those of the author and do not necessarily represent.
Advertisements

0 McLean, VA August 8, 2006 SOA, Semantics and Security.
An Approach to Wrap Legacy Applications into Web Services Wesal Al Belushi, Youcef Baghdadi Department of Computer Science, Sultan Qaboos University, Sultanate.
Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
SOA and Web Services. SOA Architecture Explaination Transport protocols - communicate between a service and a requester. Messaging layer - enables the.
Web Services and the Semantic Web: Open Discussion Session Diana Geangalau Ryan Layfield.
Illinois Security Lab Using Attribute-Based Access Control to Enable Attribute- Based Messaging Rakesh Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter.
A New Computing Paradigm. Overview of Web Services Over 66 percent of respondents to a 2001 InfoWorld magazine poll agreed that "Web services are likely.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
WS-PolicyNegotiate A Web Service Standard for Policy Negotiation by Nicholis Bufmack.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Feb. 23, 2004CS WPI1 CS 509 Design of Software Systems Lecture #5 Monday, Feb. 23, 2004.
1 Extending SIP Speaker: Hsuan-Ming Chen Adviser: Ho-Ting Wu Date: 2005/04/26.
Application of Attribute Certificates in S/MIME Greg Colla & Michael Zolotarev Baltimore Technologies 47 th IETF Conference Adelaide, March 2000.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Web Services Michael Smith Alex Feldman. What is a Web Service? A Web service is a message-oriented software system designed to support inter-operable.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
THE NEXT STEP IN WEB SERVICES By Francisco Curbera,… Memtimin MAHMUT 2012.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
WS Based on Web Services Kevin Lux, Michael May, Nayan Bhattad University of Pennsylvania Carl A. Gunter University of Illinois Urbana-Champaign.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Masud Hasan Secue VS Hushmail Project 2.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
Managing Service Metadata as Context The 2005 Istanbul International Computational Science & Engineering Conference (ICCSE2005) Mehmet S. Aktas
THE GITB TESTING FRAMEWORK Jacques Durand, Fujitsu America | December 1, 2011 GITB |
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
DISTRIBUTED COMPUTING
NCOIC MSD Initiative: Net-Centric Operations 2.0, Domain-Specific SOA Frameworks, and M&S Testbed Demos Bob Marcus
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
AMPol-Q: Adaptive Middleware Policy to support QoS Raja Afandi, Jianqing Zhang, Carl A. Gunter Computer Science Department, University of Illinois Urbana-Champaign.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
MESSAGE ORIENTED MODEL (MOM). Slide 2CITE 4420 Message Oriented Model Message-Oriented Model (MOM)
1 Emergency Alerts as RSS Feeds with Interdomain Authorization Filippo Gioachin 1, Ravinder Shankesi 1, Michael J. May 1,2, Carl A. Gunter 1, Wook Shin.
Web Services Based on SOA: Concepts, Technology, Design by Thomas Erl MIS 181.9: Service Oriented Architecture 2 nd Semester,
1 4/23/2007 Introduction to Grid computing Sunil Avutu Graduate Student Dept.of Computer Science.
Random Logic l Forum.NET l Web Services Enhancements for Microsoft.NET (WSE) Forum.NET ● October 4th, 2006.
Slide 1 © 2004 Reactivity The Gap Between Reliability and Security Eric Gravengaard Reactivity.
563.4 Web Services Presented by: Carl A. Gunter University of Illinois Spring 2006.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Assignment of JAVA id : BSSE-F10-M-10-JAVA1 Overview of J2EE/Session 2/Slide 1 of 38.
Secure Web Services Arvind Easwaran CIS/TCOM 551 Spring 2004 Slide Set 7.
18-1 Summary (Day 2) Learning Summary – What is JXTA ? – Understand the fundamental concepts of JXTA – Learn about the various implementations of.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Andrew J. Hewatt, Gayatri Swamynathan and Michael T. Wen Department of Computer Science, UC-Santa Barbara A Case Study of the WS-Security Framework.
© The ATHENA Consortium. CI3 - Practices of Interoperability in SMEs Proposed Solutions.
Emerging Standards for SOA Seminar Robert Marcus
Service Oriented Architecture (SOA) Prof. Wenwen Li School of Geographical Sciences and Urban Planning 5644 Coor Hall
Internet Business Associate v2.0
Distributed web based systems
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Implementing a service-oriented architecture using SOAP
Inventory of Distributed Computing Concepts and Web services
Working at a Small-to-Medium Business or ISP – Chapter 7
Security & .NET 12/1/2018.
InfiNET Solutions 5/21/
Presentation transcript:

AMPol: Adaptive Messaging Policy Raja N. Afandi, Jianqing Zhang, Munawar Hafiz, Carl A. Gunter Computer Science Department, University of Illinois Urbana-Champaign Dec 05, 2006 Presentation Date

Adaptive Policy Large scale systems often have diverse policies –Many administrative domains –Difficult or impossible to impose a uniform policy on all participants (“Global standards make the system brittle” – Alan Karp) Support for non-functional (QoS) features such as security and reliability breaks the interoperability of the system –Constraints may change frequently Slide 01 of 18

Strategy Service Oriented Architectures (SOAs) based on Web services offer a promising platform Basic strategy: responder advertises WS-based policy, initiator adapts dynamically Basic architecture based on three components –Policy model describes declarative domain-specific policy rules –Policy discovery governs how to publish, find, and merge policies –Extension and Enforcement (EE) provides means to add capabilities and enforce policies Slide 02 of 18

Our Contribution New Case Study - WS extension with novel features Dynamic Extension - Policy Extension - System Extension Multi-node operations - Message Sender, Recipient and Multiple Intermediaries Slide 03 of 18

WS WS Internet messaging based on Web services Uses XML, SOAP, XMLDSIG, WS-Policy, etc. rather than SMTP, IMAP, POP, S/MIME, etc. Improves security, flexibility, integration Lux May Bhattad Gunter ICWS 05 Slide 04 of 18

AMPol Adaptive Messaging Policy (AMPol) is an SOA for policy adaptation in messaging systems such as , instant messaging, etc. Instantiates three components: Policy model, Policy discovery, Enforcement and Extension Extends WS with modest changes to underlying system Illustrates benefits to adaptive policies Slide 05 of 18

Problem Scenario SMTA wonderland RMTA reality Sender MUA Recipient MUA To: From: Slide 06 of 18

Specifying the Policies SMTA wonderland RMTA reality Sender MUA Recipient MUA To: From: Egress policy of Wonderland Ingress policy of Reality Ingress policy of Bob Egress policy of Alice Alice must not sent.bmp extensions Alice must use encryption All messages must be signed Slide 07 of 18

Policy Model The policy constructs should be distinct, modular and extensible Static policy and dynamic policy Supports –Meta-specification for policy enforcement –Rule prioritization to resolve conflicts –Public vs. private rules Domain specific policy rules: APES –Attachment –Payment –Encryption –Signature Slide 08 of 18

APES Attachment. Types of attachments allowed in mail messages. Example: No.pif extension file can be attached. Payment. Type of cost imposed on message senders. Example: A message sender must solve an RTT (Reverse Turing Test) Puzzle. Encryption. Type of Encryption Mechanism. Example: 3DES encryption is used. Signature. Type of Signature Mechanism. Example: Messages are signed with SHA-1 Hash. Novel Technologies supported by our policy model * Hashcash * Reverse Turing Test (RTT) * Identity Based Encryption (IBE) Fenton Thomas P.E.T.Mail, Voltage IBE Library Slide 09 of 18

Policy Advertisement Policy Merging Policy Query (Policy Query Protocol) Policy Discovery Slide 10 of 18

Policy Advertisement SMTA wonderland RMTA reality Sender MUA Recipient MUA Merged Static Receiving Policy of reality domain Alice must use IBE Enforcement Point: reality Alice must solve Hashcash Enforcement Point: Bob Merged Static Sending Policy of wonderland domain Alice must sign packet Enforcement Point: wonderland Egress policy of Wonderland Egress policy of Alice Ingress policy of Reality Ingress policy of Bob Alice must sign packet Enforcement Point: wonderland Alice must use IBE Enforcement Point: reality Alice must solve Hashcash Enforcement Point: Bob Slide 11 of 18

SMTA wonderland RMTA reality Sender MUA Recipient MUA Policy Merging Dynamic Policy To: From: Static sending policy of wonderland domain Static receiving policy of reality domain Alice must sign packets Enforcement Point: wonderland Alice must use IBE Enforcement Point: reality Alice must solve Hashcash Enforcement Point: Bob Slide 12 of 18

Extension Requires Extension for Hashcash SMTA wonderland RMTA reality Sender MUA Recipient MUA To: From: Hashcash plugin Slide 13 of 18

Enforcement Finally! --- Sincerely, Alice Dynamic Policy Alice must sign packets Enforcement Point: wonderland Alice must use IBE Enforcement Point: reality Alice must solve Hashcash Enforcement Point: Bob Check that packets are signed Check that packets are encrypted with IBE Check the Hashcash puzzle solution SMTA wonderland RMTA reality Sender MUA Recipient MUA Slide 14 of 18

Enforcement and Extension Policy Framework –Extracts the policy conformance and enforcement logic into independent and dynamically pluggable extensions –Core policy engine is generic enough to process many complex constraints –Unlike WS-Policy framework in which assertions are domain specific and any new addition requires an update to core policy engine Extension Framework –Manages extensions –Have policies to control the download and execution of extensions –Download plug-ins from secure third-party plug-in server Slide 15 of 18

EE Sub-components Slide 16 of 18

Summary End-to-end solution for supporting non-functional (QoS) policies Reference architecture for adaptive middleware for messaging systems Application of this middleware for system based on Web services Validation of proposed approach through a case study Addresses gaps in prior work: –Multi-node operation –Dynamic extension Slide 17 of 18

Current and Future Work 1.Semantic Web QoS (AMPol-Q) 2.Policy Merging (Based on Defeasible Logic) 3.Attribute Based Messaging (ABM) 4.WS- for Health Alerts 5.Learn More: Slide 18 of 18

Backup Slides

AMPol Policy Model Backup Slide 01

WS Case Study Backup Slide 02