Www.mobilevce.com © 2009 Mobile VCE 6 October 2011 Core 4 Secure Applications ‘Instant Knowledge’ Programme Achievements Nigel Jefferies Huawei.

Slides:



Advertisements
Similar presentations
Sheldon Brown, UCSD, Site Director Milton Halem, UMBC Director Yelena Yesha, UMBC Site Director Tom Conte, Georgia Tech Site Director Fundamental Research.
Advertisements

© 2005 Mobile VCE Securing the Future: Device & Service Security Stephen Hope, FT R&D UK Ltd on behalf of Nigel Jefferies, Vodafone Chair.
TAC Vista Security. Target  TAC Vista & Security Integration  Key customer groups –Existing TAC Vista users Provide features and hardware for security.
Building Enterprise Applications Using Visual Studio ®.NET Enterprise Architect.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
Chapter 12: ADO.NET and ASP.NET Programming with Microsoft Visual Basic.NET, Second Edition.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
7.1 © 2007 by Prentice Hall 7 Chapter Telecommunications, the Internet, and Wireless Technology.
ErdOS Enabling opportunistic resources sharing in mobile Operating Systems Narseo Vallina-Rodríguez Jon Crowcroft University of Cambridge MUM 2010, Cyprus.
What is adaptive web technology?  There is an increasingly large demand for software systems which are able to operate effectively in dynamic environments.
Maintaining and Updating Windows Server 2008
Client/Server Architecture
Web-Enabling the Warehouse Chapter 16. Benefits of Web-Enabling a Data Warehouse Better-informed decision making Lower costs of deployment and management.
Installing software on personal computer
Charlie Crocker Vice President Farallon Geographics, Inc. An Overview of Internet Mapping Technology.
L EC. 01: J AVA FUNDAMENTALS Fall Java Programming.
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
February Semantion Privately owned, founded in 2000 First commercial implementation of OASIS ebXML Registry and Repository.
NETWORK CENTRIC COMPUTING (With included EMBEDDED SYSTEMS)
The Design Discipline.
By Mihir Joshi Nikhil Dixit Limaye Pallavi Bhide Payal Godse.
LIUPPA – Movies Team DSM’10 – Reno/Tahoe, Nevada, USA 17 October 2010 A DSML for Mobile Applications Testing Youssef RIDENE*/**, Nicolas BELLOIR*, Franck.
 Cloud computing  Workflow  Workflow lifecycle  Workflow design  Workflow tools : xcp, eucalyptus, open nebula.
Database Design - Lecture 1
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
System Development Process Prof. Sujata Rao. 2Overview Systems development life cycle (SDLC) – Provides overall framework for managing system development.
ErdOS: An energy-aware social operating system Further Reading: (*) Narseo Vallina-Rodriguez, Pan Hui, Jon Crowcroft, Andrew Rice. “Exhausting Battery.
Jeff Shiley. Start Point System Environment User Experience Our “Unique” Requirements Solution System Evaluation & Prototype Single Sign-on Component.
Creating Web Applications Using ASP.NET Chapter Microsoft Visual Basic.NET: Reloaded 1.
BeTelGeuse: Tool for Bluetooth Data Gathering Petteri Nurmi, Joonas Kukkonen, Eemil Lagerspetz, Jukka Suomela, Patrik Floréen Helsinki Institute for Information.
Privacy-Aware Personalization for Mobile Advertising
UOS 1 Ontology Based Personalized Search Zhang Tao The University of Seoul.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
The 2000 Decennial Census School District Project: Using Census Data for the School District Mapping System **** Development and Implementation Tai A.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Harvesting Social Knowledge from Folksonomies Harris Wu, Mohammad Zubair, Kurt Maly, Harvesting social knowledge from folksonomies, Proceedings of the.
© 2013, published by Flat World Knowledge Chapter 10 Understanding Software: A Primer for Managers 10-1.
FriendFinder Location-aware social networking on mobile phones.
UBN Software Solutions Pvt. Ltd. Bhubaneswar , Odisha, India ( ) UBN PROJECT CASE STUDY.
Decision Support Systems: An Overview by Dr.S.Sridhar,Ph.D., RACI(Paris),RZFM(Germany),RMR(USA),RIEEEProc. web-site :
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Introduction to Active Directory
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Features Of SQL Server 2000: 1. Internet Integration: SQL Server 2000 works with other products to form a stable and secure data store for internet and.
Achieving Semantic Interoperability at the World Bank Designing the Information Architecture and Programmatically Processing Information Denise Bedford.
 IS A COLLECTION OF PROGRAMS THAT MANAGES THE DATABASES STRUCTURE AND CONTROL ACCESS TO THE DATA STORED IN THE DATABASE.
ColdFusion MX 7 “Blackstone” Macromedia, Inc. macromedia 2005 Living With Today’s Internet Chronic problems continue to exist for users and developers.
August Video Management Software ViconNet Enterprise Video Management Software Hybrid DVR Kollector Strike Kollector Force Plug & Play NVR HDExpress.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
UNCLASSIFIED Matthew Bruce, Senior Solutions Consultant, Adobe Using Logic, Strategy, and DRM to Protect and Manage Content.
ZIMBRA ROADMAP. Contains proprietary and confidential information owned by Synacor, Inc. © / 2015 Synacor, Inc. Deliver an advanced, feature rich collaboration.
Maintaining and Updating Windows Server 2008 Lesson 8.
Database Principles: Fundamentals of Design, Implementation, and Management Chapter 1 The Database Approach.
Architecture Review 10/11/2004
Building Enterprise Applications Using Visual Studio®
Netscape Application Server
Peer-to-peer networking
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
Database Management System (DBMS)
System And Application Software
THREE TIER MOBILE COMPUTING ARCHITECTURE
Distributed Systems Bina Ramamurthy 4/22/2019 B.Ramamurthy.
Presentation transcript:

© 2009 Mobile VCE 6 October 2011 Core 4 Secure Applications ‘Instant Knowledge’ Programme Achievements Nigel Jefferies Huawei

© 2009 Mobile VCE Instant Knowledge: Secure Autonomous Business Collaboration Capture and share tacit knowledge within and across enterprises autonomically dynamically guaranteeing privacy and respecting security policies

© 2009 Mobile VCE Instant Knowledge: Secure Autonomous Business Collaboration Capture and share tacit knowledge within and across enterprises autonomically dynamically guaranteeing privacy and respecting security policies In summary – “Find an Expert”

© 2009 Mobile VCE Phone as a Social Sensor

© 2009 Mobile VCE Pictorially…

© 2009 Mobile VCE A history lesson… Effortless Autonomic Timely Doesn’t work Lethargy Ignorance Timeliness

© 2009 Mobile VCE Research Areas  Establishing User Requirements and Behaviour  Autonomous Interpersonal Networking  Pro-active Distributed Recommender System  Secure Policy-Based Information Access  Privacy-Enhancing Sharing Protocols

© 2009 Mobile VCE Building a toolbox  Context recording Device, application, user  Autonomous social network creation Who knows who  Profile generators Analysis of user skillset based on output  Recommender Pointers to relevant individuals based on context, relationship and task  UI recording and analysis  Privacy tools Centralised management system Distributed system All available as Industry Briefs

© 2009 Mobile VCE Context recording  Phone: number, date/time call started, duration, incoming/outgoing/missed  SMS: number, date/time sent, length, incoming/outgoing  Proximity: device MAC, device name, Bluetooth class  WiFi: SSID, BSSID, IP address, data rate  Cell ID: cell ID, location area code  Application/sub-activity  Battery state, charger plugged in or not  Touch screen, hardware keys, virtual keys  Headphones  Orientation change (portrait or landscape)  GPS usage

© 2009 Mobile VCE Context recording Rails Server Context Database REST REST Client Context Manager Clue Database Generators Web Browser N810

© 2009 Mobile VCE Autonomous social network creation  Recording and measuring ties between users  Sample implementation IK GUI Client OpenFire XMPP Network Visualiser  Graphing and analysis tools

© 2009 Mobile VCE Network Viewer

© 2009 Mobile VCE Network Viewer

© 2009 Mobile VCE Network Viewer

© 2009 Mobile VCE Running IK System

© 2009 Mobile VCE Running IK System

© 2009 Mobile VCE Running IK System

© 2009 Mobile VCE

© 2009 Mobile VCE Profile extraction  Automatic skills profile generation  Text gathered from application, or from body of documents  Word documents, s, wi-ki entries, etc  Deployed on Thales’ internal wiki

© 2009 Mobile VCE Pro-Active Distributed Recommender System  The IK system is designed to automatically recommend people based on keywords  We can extract keywords from any application running on the N810  Two versions of the demonstrator First takes input from applications such as running on Nokia N810, sends this to server and receives a list of recommendations Second uses additional context information and integrated with relational analyser to provide higher quality recommendations

© 2009 Mobile VCE Improving De-centralised Recommenders  Developed probabilistic recommendation algorithms to cope with very sparse data sets  Developed new low-rank approximation method which radically reduces the amount of computation to obtain a recommendation and hides private information on individual preference  Analysed clustering methods for reducing computational complexity of recommenders  Developed new multi-agent algorithm for coalition formation to improve performance of decentralised recommender

© 2009 Mobile VCE UI recording and analysis  Screen capture at 5 frames per second, half resolution  Screen touched: location and pressure  Hardware keys, virtual keys  Orientation change  Can effectively recreate entire user-phone interaction experience  Minimal impact on phone responsiveness & battery life

© 2009 Mobile VCE UI Recording Tool UI Event Recorder Context Recorder Screen Recorder Observer Playback Events Images Context Screen State UI Events Context Clues

© 2009 Mobile VCE N810 implementation - Also available on Android (see video)

© 2009 Mobile VCE Privacy & Security  New ID management systems and protocols allowing varying levels of privacy  Additions to centralised schemes to allow pseudonymity  Hierarchy of systems to provide k-anonymity in distributed systems

© 2009 Mobile VCE IK privacy – centralised solution Identity management (IdM) IK managedLeverage existing enterprise IdM IK communications Recorded transaction pseudonyms Reversible pseudonymity Unlinkability Unobservability IK Policy Enforcement

© 2009 Mobile VCE IK privacy – single sign on service Identity Provider PDP SSO 5.Evaluate 7. Decision IK user IK client Local policy 1. Request access 2. SAML query IK service Assertion consumer service IK server (recommender) 3. Logon 4. Query 6. Obtain 8. Response Enterprise policy PDP PEP 8. Response

© 2009 Mobile VCE IK Privacy – distributed solution Improve robustness against compromise: Rather than a single IK service collecting IK user data, multiple IK services each serve a subset of enterprise IK users Hierarchical IK system, in which a parent IK service aggregates IK context data from a subset of child IK services Recommendations can be requested from both the local IK service and top level IK service Provides an upgrade path from a centralised system: Each IK service can use the same recommender algorithms The height of the hierarchy determines the strength of anonymity achieved Scalable

© 2009 Mobile VCE IK Privacy – distributed solution IK service ID provider IK service ID provider IK service ID provider IK service ID provider IK service ID provider IK service ID provider IK service ID provider IK service

© 2009 Mobile VCE Conclusions Novel components in six key areas:  Context recording  Autonomous social network creation  Profile generators  Recommender  UI recording and analysis  Privacy tools What applications can you create?

© 2009 Mobile VCE