Funded by EC contract FP6-027599 Workshop on Software and Service Development, Security & Dependability 10-11 July 2007, Maribor Run-time Dynamic Security.

Slides:



Advertisements
Similar presentations
ICT research priorities and recommendations for strategy development in the WBC Ulrike Kunze / PT-DLR, Germany Consultation session on recommendations.
Advertisements

1 From Grids to Service-Oriented Knowledge Utilities research challenges Thierry Priol.
1 Integrity Service Excellence Complex Information Systems 19 Mar 13 Robert J. Bonneau, Ph.D. AFOSR/RTC.
Prof. A. Taleb-Bendiab, Talk: Brussels’07, Contact: Date: 01/06/2015, Slide: 1 Engineering Self-Organising Networks of.
Variability Oriented Programming – A programming abstraction for adaptive service orientation Prof. Umesh Bellur Dept. of Computer Science & Engg, IIT.
Software Engineering Techniques for the Development of System of Systems Seminar of “Component Base Software Engineering” course By : Marzieh Khalouzadeh.
Digital Systems Emphasis for Electrical Engineering Students Digital Systems skills are very valuable for electrical engineers Digital systems are the.
A 100,000 Ways to Fa Al Geist Computer Science and Mathematics Division Oak Ridge National Laboratory July 9, 2002 Fast-OS Workshop Advanced Scientific.
1 Quality Objects: Advanced Middleware for Wide Area Distributed Applications Rick Schantz Quality Objects: Advanced Middleware for Large Scale Wide Area.
SERC Security Systems Engineering Initiative Dr. Clifford Neuman, Director USC Center for Computer Systems Security Information Sciences Institute University.
Design of Fault Tolerant Data Flow in Ptolemy II Mark McKelvin EE290 N, Fall 2004 Final Project.
FREMA: e-Learning Framework Reference Model for Assessment David Millard Yvonne Howard IAM, DSSE, LTG University of Southampton, UK.
Strategic Directions in Real- Time & Embedded Systems Aatash Patel 18 th September, 2001.
EUROPEAN UNION Polish Infrastructure for Supporting Computational Science in the European Research Space User Oriented Provisioning of Secure Virtualized.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
Course Instructor: Aisha Azeem
Community Manager A Dynamic Collaboration Solution on Heterogeneous Environment Hyeonsook Kim  2006 CUS. All rights reserved.
Critical Infrastructure Protection: A 21 st Century Challenge Professor Madjid Merabti PROTECT: Research Centre for Critical Infrastructure Computer Technology.
Implementation of e-Learning in Tertiary Institutions in Ghana: A Case Study of KNUST MIT LINC CONFERENCE MAY 23-26, 2010 ROBERT KABUTEY OKINE & JOHN SERBE.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Strengthening the Strategic Cooperation between the EU and Western Balkan Region in the field of ICT Research Regional ICT R&D priorities, Jelena Pantelic,
1 Autonomic Computing An Introduction Guenter Kickinger.
Objective 1.2 Cloud Computing, Internet of Services and Advanced Software Engineering Arian Zwegers European Commission Information Society and Media Directorate.
INFSO-SSA International Collaboration to Extend and Advance Grid Education ICEAGE Forum Meeting at EGEE Conference, Geneva Malcolm Atkinson & David.
WETA (Web Engineering, Technology and Applications) Group members: Dr. S. Manoharan.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
USING METADATA TO FACILITATE UNDERSTANDING AND CERTIFICATION ABOUT THE PRESERVATION PROPERTIES OF A PRESERVATION SYSTEM Jewel H. Ward, Hao Xu, Mike C.
Pushing the Security Boundaries of Ubiquitous Computing ACSF 2006 —————— 13 th July 2006 —————— David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith.
Analysis and Detection of Access Violations in Componentised Systems David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith Advances in Computer Security.
Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School
CSS-TW1 Cooperation in Selfish Systems incorporating TagWorld I Welcome! David Hales, University of Bologna.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
IST programme Cultural Heritage in Tomorrow ’s Knowledge Society FUTURE PLANS FP6 Cultural Heritage in Tomorrow ’s Knowledge Society FUTURE PLANS FP6 RRRESE.
Composing Adaptive Software Authors Philip K. McKinley, Seyed Masoud Sadjadi, Eric P. Kasten, Betty H.C. Cheng Presented by Ana Rodriguez June 21, 2006.
Communication Networks (Kommunikationsnetværk) Specialisations: Distributed Application Engineering Network Planning & Management Ole Brun Madsen Professor.
Lecture about Software Engineering Mohammad A Kuhail M.Sc.(York,UK) November 2007 University of Palestine Applied and Urban Engineering College Orientation.
© DATAMAT S.p.A. – Giuseppe Avellino, Stefano Beco, Barbara Cantalupo, Andrea Cavallini A Semantic Workflow Authoring Tool for Programming Grids.
Secure Component Composition for Personal Ubiquitous Computing ProgNet Workshop December 2003 —————— 16 th December 2003 —————— Dr. David Llewellyn-Jones,
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
CyberInfrastructure workshop CSG May Ann Arbor, Michigan.
NETWORKED EUROPEAN SOFTWARE & SERVICES INITIATIVE Future research challenges in dependability - an industrial perspective from NESSI Aljosa Pasic Atos.
Model Checking and Model-Based Design Bruce H. Krogh Carnegie Mellon University.
1 Computing Challenges for the Square Kilometre Array Mathai Joseph & Harrick Vin Tata Research Development & Design Centre Pune, India CHEP Mumbai 16.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
CSIIR Workshop March 14-15, Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth.
1 Centre for Intelligent Systems and their Applications Division of Informatics, University of Edinburgh Draft for AKT July Workshop Jessica Chen-Burger.
Abstract A Structured Approach for Modular Design: A Plug and Play Middleware for Sensory Modules, Actuation Platforms, Task Descriptions and Implementations.
Computer Science in Context Evangelos E. Milios Professor and Graduate Coordinator Faculty of Computer Science Dalhousie University.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
 2001 John Mylopoulos STRAW’ Software Architectures as Social Structures John Mylopoulos University of Toronto First ICSE Workshop titled “From.
Towards an IoT Ecosystem Flavia C. Delicato 1, Paulo F. Pires 1, Thais Batista 2, Everton Cavalcante 2, Bruno Costa 1, Thomaz Barros 1 1 Department of.
Towards the New Framework Programme Vienna, 26 March 2001 Horst Forster European Commission WI0.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
NETWORKS OF EXCELLENCE KEY ISSUES David Fuegi
Chapter 1 Characterization of Distributed Systems
Bob Jones EGEE Technical Director
Security Requirements for ChinaGrid Applications - What the current grid security solutions cannot do Hai Jin Huazhong University of Science and Technology.
National e-Infrastructure Vision
Similarities between Grid-enabled Medical and Engineering Applications
Data and Applications Security Developments and Directions
Center for the Advancement of E-Commerce Technologies
Software Connectors – A Taxonomy Approach
Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy
Presentation transcript:

Funded by EC contract FP Workshop on Software and Service Development, Security & Dependability July 2007, Maribor Run-time Dynamic Security from a Ubiquitous Computing Perspective Dr David Llewellyn-Jones Liverpool John Moores University

Funded by EC contract FP ESFORS Software and Service Development, Security & Dependability Workshop 2 Liverpool John Moores University School of Computing & Mathematical Sciences –7 Undergraduate BSc courses –5 Masters MSc courses –49 Staff (+) –1,200 students –120 MSc –40+ PhD students Research Areas –Distributed Multimedia Systems and Security –Autonomic Software Engineering –Computer Game Research –Statistics & Neural Networks

Funded by EC contract FP ESFORS Software and Service Development, Security & Dependability Workshop 3 Challenge “… Systems will no longer be produced ab initio, but more and more as compositions and/or modifications of other, existing systems, often performed at runtime …” (ERCIM 2006, p 129). “… to harness, control and adapt to unplanned systems and environment changes whilst guaranteeing and preserving the required systems’ function and quality …” (ASCOMP 2007, p 17)

Funded by EC contract FP ESFORS Software and Service Development, Security & Dependability Workshop 4 Relevant research areas Security Networked Appliances Digital Forensics Agent-based IDS Intrusion Detection MANET Misbehaviour P2P Community DRM P2P Community micropayments WSN Fault Tolerance Security Management Framework NA Dynamic Composition Wireless Multimedia Health Critical Infrastructure NA/Virtual Environment Crossover Bridging Virtual and Physical NA SoS Security SoS Security Distributed Storage Human Life Memories Distributed Multimedia and Security WARP

Funded by EC contract FP ESFORS Software and Service Development, Security & Dependability Workshop 5 Ubiquitous Computing Pervasive Services and Networked Appliances –Home focus, smaller scale –Nonetheless service oriented –Hardware and software –Highly heterogeneous –Highly dynamic Enterprise Information Systems

Funded by EC contract FP ESFORS Software and Service Development, Security & Dependability Workshop 6 Home service composition

Funded by EC contract FP ESFORS Software and Service Development, Security & Dependability Workshop 7 Existing results Many existing results can be applied –Dataflow (Composable Assurance, NI etc) –Access Control –Data encryption –Policy reconciliation –Input validation All amenable to run-time, middleware, dynamic and agile approaches

Funded by EC contract FP ESFORS Software and Service Development, Security & Dependability Workshop 8 Mind the gap Some gaps were identified previously; however our position foresees a need for solutions to –How to formally (and consistently) describe such features –Agile composition –Translation into testing procedure Properties certification Instrumentation Where to perform checks, and by who in a cross-domain system

Funded by EC contract FP ESFORS Software and Service Development, Security & Dependability Workshop 9 Middleware approach Approach security using middleware –Networked Appliance middleware –Abstracts implementation specifics Emphasis on run-time security –Properties of interacting services –Block or automatically re-work dangerous federations –Based on existing composition results Guaranteeing properties and requirements

Funded by EC contract FP ESFORS Software and Service Development, Security & Dependability Workshop 10 Where we are coming from Direct parallels - crossing application areas –Home appliances (NAL, PUCSec) –eHealth (Clove, 2enrich) –Critical Infrastructure and Emergency Response (FRETSET) –eGovernment (WITSA) Security –Service composition (PUCSec, NISTL) –Perimeter/deperimeterised defence –Infrastructure security (WARP) Autonomic Service Oriented Systems of Engineering –Software engineering methodology (ASCOMP)

Funded by EC contract FP ESFORS Software and Service Development, Security & Dependability Workshop 11 Conclusion Networked Appliances approach –Middleware security solutions –Applying existing results –Run-time security to block problematic federations Highlights future directions and gaps –Feature description, certification, instrumentation, control