Panel Session: Dependability and Security in Complex and Critical Information Systems Department of Communications and Information Engineering University.

Slides:



Advertisements
Similar presentations
New Security Services Based on PKI
Advertisements

D SEA Group Software Engineering and Architecture Group i On Exploiting DIVERSITY e-professionals scenario Paola Inverardi Dipartimento di Informatica.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
1 Publishing Linked Sensor Data Semantic Sensor Networks Workshop 2010 In conjunction with the 9th International Semantic Web Conference (ISWC 2010), 7-11.
Planning for Flexible Integration via Service-Oriented Architecture (SOA) APSR Forum – The Well-Integrated Repository Sydney, Australia February 2006 Sandy.
The UMU-PBNM Antonio F. Gomez Skarmeta Gregorio Martínez
Copyright© Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Tightening the Network: Network.
Mashing Up with User-Centric Identity America Online LLC John Panzer, Praveen Alavilli.
VLab Web Application Architecture Xinyi Dong 10/1/
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
Global Cloud Services Telefónica S.A. 0 0 Telefónica Servicios Audiovisuales S.A. / Telefónica España S.A. Título de la ponencia / Otros datos de interés.
Policy-based Accounting: Accounting Issues Georg Carle, Sebastian Zander, Tanja Zseby GMD FOKUS - German National Research Center for Information Technology.
Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European.
Digital Object: A Virtual Online Storage Solution 598C Course Project Huajing Li.
Sierra Systems itSMF Development Days Presentation March 4 th, 2014 Colin James Assyst Implementation Specialist.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Prof. A. Taleb-Bendiab, Talk: Research Clustering Workshop: “eGovernment Interoperability”, Brussels, Date: 01/03/04, Pages:
Strengthening the Strategic Cooperation between the EU and Western Balkan Region in the field of ICT Research Regional ICT R&D priorities, Jelena Pantelic,
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
(Josef Noll) -> MasterThesis Masteroppgaver 2008 Josef Noll, Prof. stip. Mohammad M. R. Chowdhury, PhD student.
WP3: the ÆSOP architecture Methods issues: how we did it. Explaining the architecture: –latest version of the pictures Identity management –Registrars.
Brussels, 04 March 2004Workshop „New Communication Paradigms for 2020“ Semantic Routing, Service Discovery and Service Composition Gregor Erbach German.
Database Architecture Introduction to Databases. The Nature of Data Un-structured Semi-structured Structured.
1 TAPAS Workshop Nicola Mezzetti - TAPAS Workshop Bologna Achieving Security and Privacy on the Grid Nicola Mezzetti.
Presenter - Bob Kinicki Internet of Things Fall 2015
Authentication & Authorization: Security and Integrity in the Cloud Desmond White July 3,
15/06/1999HP OVUA Workshop - Bologna - Italy1 An Integrated Environment for the Management of Network Resources and Services Paolo Bellavista, Antonio.
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
© Synergetics Portfolio Security Aspecten.
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
PLoS ONE Application Journal Publishing System (JPS) First application built on Topaz application framework Web 2.0 –Uses a template engine to display.
Social Semantic Web 林光德. Problems Why should I apply Semantic Web technologies on Social Web? What can I benefit?
Application Policy on Network Functions (APONF) G. Karagiannis and T.Tsou 1.
, Josef NollNISnet NISnet meeting Mobile Applied Trusted Computing Josef Noll,
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Secure Active Network Prototypes Sandra Murphy TIS Labs at Network Associates March 16,1999.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
NGCWE Expert Group EU-ESA Experts Group's vision Prof. Juan Quemada NGCWE Expert Group IST Call 5 Preparatory Workshop on CWEs 13th.
ReSeTrus Development of a digital library technology based on redundancy elimination and semantic elevation, with special emphasis on trust management.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Telecommunications regulatory developments and its new horizons Workshop contribution on “Broken concepts - the Australian communications legislative landscape”
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Globus: A Report. Introduction What is Globus? Need for Globus. Goal of Globus Approach used by Globus: –Develop High level tools and basic technologies.
1 The Features of the IoT and Some Extension Considerations China Communications Standards Association Subin Shen 21th meeting CJK.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
The Trusted Network · · · LEFIS PKI · · · 2 nd June, 2006 · Sofia by Leonardo Catalinas · May 2006
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
By Jeremy Burdette & Daniel Gottlieb. It is an architecture It is not a technology May not fit all businesses “Service” doesn’t mean Web Service It is.
Session 1: Technology Development August 15 NSF Workshop.
Panel: "QoS Provisioning at the Network Edge" John Vicente Intel Corporation / Columbia University USENIX Special Workshop on Intelligence at the Network.
SMARTIE Area of Activity: Framework Programme 7Framework Programme 7 ICT Objective 1.4 IoT (Smart Cities) Period:1 st September st August 2016.
[ [ Inter-Trust Interoperable Trust Assurance Infrastructure Project Presentation.
The FederID project The First Identity Management and Federation Free Software.
The GEMBus Architecture and Core Components
Federated IdM Across Heterogeneous Clouding Environment
Internet of Things: State of the Art
Trust Security Privacy Dependability (TSPD)
Understanding Cisco TrustSec (Secure Group Access)
PLUG-N-HARVEST ID: H2020-EU
Security & .NET 12/1/2018.
1st International Conference on Semantics, Knowledge and Grid
PREPARED BY: RIDDHI PATEL (09CE085)
ASCAA Principles for Next-Generation Role-Based Access Control
Advanced Computer Networks
Next-generation Internet architecture
Presentation transcript:

Panel Session: Dependability and Security in Complex and Critical Information Systems Department of Communications and Information Engineering University of Murcia (Spain) The First International Workshop on Dependability and Security in Complex and Critical Information Systems DEPEND 2008 August 25-31, Cap Esterel, France Antonio F. Gómez Skarmeta University of Murcia Spain

DEPEND 2008 (Cap Esterel,France) 2 Challenges  Information System Management increase the complexity of the models to work with in relation to classical network management systems and PBNM  Need for flexible and powerful models for service provision, data governance and system configuration allowing for affordable management functions  Trust and dependability can not be built in isolation neither can it rely on technologies of one layer only, there is need to provide integrated view and considered some hierarchy of models  Interoperable (policy-aware) architectures from trusted communications to the application, including to the data; Web Service technologies to support interoperability.  Usage of a common models and abstraction of the underlying system providing and overlay view of IT the business objectives behind.  Architectural design to support the flexibility and the dynamicity of the trust management in a vertical approach from application to the network and data layer.

University of Murcia DEPEND 2008 (Cap Esterel,France) 3 Challenges  Dynamic in the trust relations to allow flexible and spontaneous trust relation to be created based on the communications needs. Confederation concepts  There is a need homogeneous naming of entities (natural and legal persons, objects, virtual entities, devices, content, processes, applications, etc) and trust attribution schemes (identity management, authentication, authorization, accountability, reputation).  Semantic security layer need to be considered as an additional component in the trust relation to allow the possibility to enrich the trust models  Internet of things implies to be able to associate trust and behaviours tags to the digital objects and their relation