Tuesday October 25, 2005 Preview SoBeNeT- II project.

Slides:



Advertisements
Similar presentations
2009 – E. Félix Security DSL Toward model-based security engineering: developing a security analysis DSML Véronique Normand, Edith Félix, Thales Research.
Advertisements

Course: e-Governance Project Lifecycle Day 1
Alternate Software Development Methodologies
Guidelines and Tools for ADM
WebRatio BPM: a Tool for Design and Deployment of Business Processes on the Web Stefano Butti, Marco Brambilla, Piero Fraternali Web Models Srl, Italy.
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
Reseach in DistriNet (department of computer science, K.U.Leuven) General overview and focus on embedded systems task-force.
© 2006 IBM Corporation IBM Software Group Relevance of Service Orientated Architecture to an Academic Infrastructure Gareth Greenwood, e-learning Evangelist,
1 MAIS Student Administration Advisory Group Meeting #31 October 4, 2006.
R R R CSE870: Advanced Software Engineering (Cheng): Intro to Software Engineering1 Advanced Software Engineering Dr. Cheng Overview of Software Engineering.
SwE 434. Rational Quality Manager Rational Quality Manager is a collaborative, Web-based tool that offers comprehensive test planning, test construction,
- 1 - Component Based Development R&D SDM Theo Schouten.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Product Life Cycle Management Innovation to Execution
Merlin ITEA Symposium Merlin Overview2 Problem domain Companies hardly develop embedded products completely on their own Embedded systems need.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 1 Slide 1 System and Software Engineering.
Information Technology Audit
Chapter 6– Artifacts of the process
Effective Methods for Software and Systems Integration
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
SEC835 Database and Web application security Information Security Architecture.
Rational Unified Process Fundamentals Module 4: Disciplines II.
Software Models (Cont.) 9/22/2015ICS 413 – Software Engineering1 -Component-based software engineering -Formal Development Model.
OASIS WSQM TC Meeting Dugki Min. 컴퓨터공학부 건국대학교 Agenda 1. Roll Call 2. Review and approval of the agenda 3. Review and approval of the previous.
Introduction to Software Engineering
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
Tuesday October 25, 2005 SoBeNeT project User group meeting 25/10/2005.
An Introduction to Design Patterns. Introduction Promote reuse. Use the experiences of software developers. A shared library/lingo used by developers.
1 10/14/2015ã 2007, Spencer Rugaber The Waterfall Process Software plans and requirements Validation System feasibility Validation Product design Verification.
IT Requirements Management Balancing Needs and Expectations.
Friday December 7, 2007 SoBeNeT project 5 th User group meeting 07/12/2007.
IS Methodologies. Systems Development Life Cycle - SDLC Planning Planning define the system to be developed define the system to be developed Set the.
1 Introduction to Software Engineering Lecture 1.
The Systems Development Life Cycle
Survival by Defense- Enabling Partha Pal, Franklin Webber, Richard Schantz BBN Technologies LLC Proceedings of the Foundations of Intrusion Tolerant Systems(2003)
Web Engineering and Technology Unit I. Categories/Types of Web-Based Systems CategoryExamples Document centricOnline newspapers, manuals InteractiveRegistration.
Historical Aspects Origin of software engineering –NATO study group coined the term in 1967 Software crisis –Low quality, schedule delay, and cost overrun.
GREG CAPPS [ ASUG INSTALLATION MEMBER MEMBER SINCE:1998 ISRAEL OLIVKOVICH [ SAP EMPLOYEE MEMBER SINCE: 2004 GRETCHEN LINDQUIST [ ASUG INSTALLATION MEMBER.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
Object-Oriented Software Engineering using Java, Patterns &UML. Presented by: E.S. Mbokane Department of System Development Faculty of ICT Tshwane University.
Software Engineering - Abdul Majeed. What is software? Definition of Software Engineering Software Process Generic view of Software Engineering Software.
Chapter 6 CASE Tools Software Engineering Chapter 6-- CASE TOOLS
Information Technology Division Executive Office for Administration and Finance Service Oriented Architecture An Enterprise Approach to Enabling the Business.
An Introduction to Software Engineering (Chapter 1 from the textbook)
MSE Portfolio Presentation 1 Doug Smith November 13, 2008
1 Introduction SEARCH-LAB Ltd.. 2 Introduction of SEARCH-LAB SEARCH Laboratory established at the Budapest University of Technology in 1999 SEARCH-LAB.
CSE 303 – Software Design and Architecture
Overview of RUP Lunch and Learn. Overview of RUP © 2008 Cardinal Solutions Group 2 Welcome  Introductions  What is your experience with RUP  What is.
Government and Industry IT: one vision, one community Vice Chairs April Meeting Agenda Welcome and Introductions GAPs welcome meeting with ACT Board (John.
Unit – I Presentation. Unit – 1 (Introduction to Software Project management) Definition:-  Software project management is the art and science of planning.
CS223: Software Engineering Lecture 15: Software construction.
FOSE-MAS Session Wrap-UP. Major Points (1) Scott DeLoach –We have yet to demonstrate benefits of MAS, address industrial needs –Lack of key concepts,
Grid as a Service. Agenda Targets Overview and awareness of the obtained material which determines the needs for defining Grid as a service and suggest.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
CHESS Methodology and Tool Federico Ciccozzi MBEES Meeting Sälen, January 2011 January 2011.
Grid as a Service. Agenda Targets Overview and awareness of the obtained material which determines the needs for defining Grid as a service and suggest.
Advanced Software Engineering Dr. Cheng
Software Engineering “Practical Approach”
Bob Jones EGEE Technical Director
Data and database administration
The Development Process of Web Applications
DT249/4 Information Systems Engineering Lecture 0
Chapter 2 – Software Processes
Object-Oriented Systems Development Life Cycle (CH-3)
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
Agenda Purpose for Project Goals & Objectives Project Process & Status Common Themes Outcomes & Deliverables Next steps.
Chapter 17 - Component-based software engineering
UML Design for an Automated Registration System
Presentation transcript:

Tuesday October 25, 2005 Preview SoBeNeT- II project

Tuesday November 14, Agenda 16:00hIntroduction and project status 17:00hDiscussion: feedback and opportunities for validation 17:15h Preview of the SoBeNeT-II project 17:50hConclusion and wrap-up 18:00hInformal gathering and drinks

Tuesday November 14, The new project in a nutshell Natural follow-up of SoBeNeT project  Strategic, fundamental research for enabling secure software (IWT SBO)  Specific accents and focused efforts  Verification upgraded to become one of the project’s cornerstones (Towards “assurance”) Project consortium is identical  DistriNet, COSIC, Ubizen (Cybertrust)  Increased level of collaboration User group is continued –anyway!!!  Evolving group driven by collaborations, interests, company priorities

Tuesday November 14, Project structure and work plan 4 or 5 major tracks  Software development technologies for security  Software engineering for security  Techniques to protect sensitive parts in secure software  Assurance: Verification of security requirements and Attestation  Monitoring and management technology

Tuesday November 14, Security middleware Component Models Operating systems systems security Applications: drivers and validation means From SoBeNeT E-financeE-healthE-publishing SEC SODA Integrated approach to develop and deploy secure software Programming language technology Secure Software Engineering (Process, Artifacts, Automation…) Secure Deployment (Monitoring and management) Assurance ( verification, trusted computing, sealing…) 2 tracks

Tuesday November 14, Discussion 1/4 Software development technologies will focus on  State-of-the art programming languages  Standard platforms.NET WS* J2EE Not on traditional C/C++ programming Based on majority of the user group

Tuesday November 14, Discussion 2/4 Software engineering will focus on  Architecture driven design  Increased Automation (MDD)  Also address: Introducing metrics (hard) Broadening set of requirements (track 5) Not on Agile methods Backed by majority of the user group

Tuesday November 14, Discussion 3/4 Introduce efforts towards assurance  Attestation  Verification  WIN-WIN COSIC DISTRINET  Sealing Less relevant for the user group? Yet essential for world class results in the long run…

Tuesday November 14, Discussion 4/4 “Shielding and interception” has evolved to become secure deployment.  Includes focus on business management  Introduces new types of requirements Ability to do forensics Practice of audit, business continuity  Hence great synergy with track on secure software engineering Long term vision: integration with the overall life cycle management of security (methodology to be public – backed by Cybertrust)

Tuesday October 25, 2005 Track level details

Tuesday November 14, Track 1: software development technology (DistriNet) WP1: Identification of critical vulnerability classes  Ongoing monitoring of vulnerability trends  Proactive analysis of new technologies (e.g., AOSD, AJAX) WP2: Programming models  Definition of methodology for designing programming models  Supporting compositions of programming models WP3: Component models and composition  Component contracts  Load-time and run-time contract checking  Extending support for advanced composition (AOSD, DSL’s)  Secure composition of aspects WP4: Validation for web application and services  Demonstrate combinations of programming models for web applications  Define a library of reusable, composeable security services

Tuesday November 14, Track 2: Software engineering (DistriNet, Ubizen) WP1: Enablers  Supporting SoA security requirements  Creating security metrics  Up-to-date overview of vulnerabilities and requirements WP2: Architecture driven development  Architecture definition (method, patterns)  Feature interaction for security  Traceability of architectural decisions  Maintaining architectural integrity  Supporting architectural consistency WP3: Model driven development  Definition of notations that enable transformation and verification  Definition of DSL’s for specific security concerns  Exploration of transformation techniques  Support for traceability (from requirements to implementation)  Property-preserving refinements (e.g., for security principles)

Tuesday November 14, Track 3: Protection techniques (COSIC) WP1: Self-checking code  State-of-the-art study  Improvements (e.g., mutually checking software guards)  Proof-of-concept / implementation WP2: Self-modifying code  State-of-the-art study  Analysis and attacks  Improvements: code encryption  Implementation WP3: Obfuscation and white-box crypto interaction  Use of random functions to improve obfuscation techniques  Continuation of sobenet1 research WP4: Encrypted code execution and encrypted data processing  Homomorphic encryption

Tuesday November 14, Track 4: Verification (COSIC, DistriNet) WP1: Software attestation  Study of the state-of-the art software attestation  Currently only software based  Identification of problems  Research how to use (existing an new) software techniques and hardware to address these problems e.g. use of a TPM to solve the timing problem; use of smartcard WP2: Trusted computing platforms (use of TPM)  How to use trusted computing platforms to enhance software security ….

Tuesday November 14, Track 5: Management and monitoring (Ubizen, DistriNet) WP1: Requirements  Audit requirements and solutions  Business management requirements and solutions  Administration requirements and solutions WP2: Deployment architectures WP3: Patterns for software engineering track (ADD)

Tuesday October 25, 2005 Discussion Suggestions for improvement, focus, … ?