Enhancing Security in Enterprise Distributed Real-time and Embedded Systems using Domain-specific Modeling Akshay Dabholkar, Joe Hoffert, Aniruddha Gokale,

Slides:



Advertisements
Similar presentations
1 Service Oriented Architectures (SOA): What Users Need to Know. OGF 19: January 31, 2007 Charlotte, NC John Salasin, Ph.D, Visiting Researcher National.
Advertisements

Configuration management
Unveiling ProjectWise V8 XM Edition. ProjectWise V8 XM Edition An integrated system of collaboration servers that enable your AEC project teams, your.
Copyright © 2011 Cloud Security Alliance Trusted Cloud Initiative Work Group Session.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
22 May 2015Joe Hoffert Quality of Service Configuration DSML for the Data Distribution Service Joe Hoffert
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Illinois Security Lab Using Attribute-Based Access Control to Enable Attribute- Based Messaging Rakesh Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter.
1 12/10/03CCM Workshop QoS Engineering and Qoskets George Heineman Praveen Sharma Joe Loyall Richard Schantz BBN Technologies Distributed Systems Department.
Ensuring Non-Functional Properties. What Is an NFP?  A software system’s non-functional property (NFP) is a constraint on the manner in which the system.
Model Driven Architecture (MDA) Partha Kuchana. Agenda What is MDA Modeling Approaches MDA in a NutShell MDA Models SDLC MDA Models (an Example) MDA -
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Accounts management software simplifies the process of accounting for any individual or for an organization. 3 Star Info takes utmost effort so that beyond.
Issues and Ideas in Software Reliability for FCS Joe Loyall BBN Technologies.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse.
Managing Software Quality
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
XML in Development of Distributed Systems Tooling Programming Runtime.
 To explain the importance of software configuration management (CM)  To describe key CM activities namely CM planning, change management, version management.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
Cluster Reliability Project ISIS Vanderbilt University.
Co-design Environment for Secure Embedded Systems Matt Eby, Janos L. Mathe, Jan Werner, Gabor Karsai, Sandeep Neema, Janos Sztipanovits, Yuan Xue Institute.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
Generative Middleware Specializations for Distributed, Real-time and Embedded Systems Institute for Software Integrated Systems Dept of EECS, Vanderbilt.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
Network and Grid Monitoring Ludek Matyska CESNET Czech Republic.
June 3, 2016 CS 388: Model Integrated Computing 1 Security QoS Modeling (SQML) for Enterprise DRE Systems (eDRE) By Akshay V. Dabholkar Adviser Dr. Aniruddha.
DataReader 2 Enhancing Security in Ultra-Large Scale (ULS) Systems using Domain- specific Modeling Joe Hoffert, Akshay Dabholkar, Aniruddha Gokhale, and.
Investigating Survivability Strategies for Ultra-Large Scale (ULS) Systems Vanderbilt University Nashville, Tennessee Institute for Software Integrated.
CoSMIC: Tool-suite for Weaving Deployment & Configuration Crosscutting Concerns of CCM-based DRE Systems Dr. Aniruddha Gokhale (PI) Institute for Software.
© 1999, Cisco Systems, Inc. 1-1 Chapter 2 Overview of a Campus Network © 1999, Cisco Systems, Inc.
SONIC-3: Creating Large Scale Installations & Deployments Andrew S. Neumann Principal Engineer, Progress Sonic.
Architecture-Driven Context-Specific Middleware Specializations for Distributed Real-time and Embedded Systems Akshay Dabholkar, and Aniruddha Gokhale.
FDT Foil no 1 On Methodology from Domain to System Descriptions by Rolv Bræk NTNU Workshop on Philosophy and Applicablitiy of Formal Languages Geneve 15.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
Service Service metadata what Service is who responsible for service constraints service creation service maintenance service deployment rules rules processing.
1 Key design time challenges Convert commander’s intent, along with static/dynamic environment, into QoS policies Quantitatively evaluate & explore complex.
Resolving QoS Policy Configuration Challenges for Publish/Subscribe Middleware Platforms AFRL JBI PI Meeting.
Aniruddha Gokhale and Jeff Gray Institute for Software Integrated Systems (ISIS) Vanderbilt University Software Composition and Modeling Laboratory University.
NetQoPE: A Middleware-based Netowork QoS Provisioning Engine for Distributed Real-time and Embedded Systems Jaiganesh Balasubramanian
18 December 2015Joe Hoffert, Aniruddha Gokhale, Doug Schmidt Enabling Trustworthy Systems with the DDS Quality of Service Modeling Language Joe Hoffert,
A QoS Policy Modeling Language for Publish/Subscribe Middleware Platforms A QoS Policy Modeling Language for Publish/Subscribe Middleware Platforms Joe.
KnowARC objectives & challenges Balázs Kónya/Lund University Oslo, 1 st KnowARC Conference.
Towards a Holistic Approach for Integrating Middleware with Software Product Lines Research Institute for Software Integrated Systems Dept of EECS, Vanderbilt.
2015 NetSymm Overview NETSYMM OVERVIEW December
Topic 2: The Role of Open Standards, Open-Source Development, & Different Development Models & Processes (on Industrializing Software) ARO Workshop Outbrief,
POSAML: A Visual Language for Middleware Provisioning Dimple Kaul, Arundhati Kogekar, Aniruddha Gokhale ISIS, Dept.
Introduction to Active Directory
1 Key design time challenges Convert commander’s intent, along with static/dynamic environment, into QoS policies Quantitatively evaluate & explore complex.
Towards A QoS Modeling and Modularization Framework for Component-based Systems Sumant Tambe* Akshay Dabholkar Aniruddha Gokhale Amogh Kavimandan (Presenter)
20 February 2016Joe Hoffert Quality of Service Configuration DSML for the Data Distribution Service Joe Hoffert
Fault-tolerance for Component-based Systems – An Automated Middleware Specialization Approach Sumant Tambe* Akshay Dabholkar Aniruddha Gokhale Abhishek.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
Copyright 2007, Information Builders. Slide 1 iWay Web Services and WebFOCUS Consumption Michael Florkowski Information Builders.
TMN Architecture and EMS/NMS Overview
Systematic Specialization of General-Purpose Middleware for Cyber-Physical Systems Akshay Dabholkar, Aniruddha Gokhale, and Sumant Tambe Dept. of EECS,
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Simple, End-to-End Performance Management Application Performance.
Trustworthy Conferencing via Domain-specific Modeling and Low Latency Reliable Protocols Joe Hoffert, Douglas Schmidt (Vanderbilt University); Mahesh Balakrishnan,
Dr. Ir. Yeffry Handoko Putra
CompSci 280 S Introduction to Software Development
Sumant Tambe* Akshay Dabholkar Aniruddha Gokhale
Applying Domain-Specific Modeling Languages to Develop DRE Systems
Tools for Composing and Deploying Grid Middleware Web Services
Service Oriented Architectures (SOA): What Users Need to Know.
ONAP Architecture Principle Review
Presentation transcript:

Enhancing Security in Enterprise Distributed Real-time and Embedded Systems using Domain-specific Modeling Akshay Dabholkar, Joe Hoffert, Aniruddha Gokale, and Doug Schmidt March 20, 2007 Modeling CCM role-based access control (RBAC) rules and rights at design time Eliminates tedious and error-prone role-based checking at run-time Allows definition of platform-specific rights families like a PIM Allowing multilevel Security QoS provisioning through a configurable security policy framework Eliminates time consuming and inefficient runtime checks for consistency, conflicts, redundancy. Tailored to meet domain & application specific QoS requirements Providing fine-grained as well as coarse-grained access control and security guarantees Facilitates flexibility as well as customization Defining annotations for configuring security in component middleware Allows middleware configurations specific to the needs of different parts of a system Enables secure application deployment through middleware configuration Provisioning for defining Workflow/Business Process/Critical Path security Addressing Security via the Security Quality of Service (QoS) Modeling Language (SQML) Addressing Trust & Resiliency via the DDS Quality of Service (QoS) Modeling Language (DQML) Enhances trust by supporting correct-by-construction QoS configurations at design time Eliminates complex, tedious, and error-prone QoS compatibility and consistency checking at run- time or compile-time Provides separation of concerns to facilitate configuration analysis better Generates application artifacts (e.g., configuration files) Supports resiliency research by providing a base for higher level DDS resiliency services Model redundant replicas with desired properties in DQML Basis for DDS fault-tolerant service Data flows as intended via correct-by-construction QoS configurations (e.g., Power Grid ULS System) Durability- Volatile Durability- Transient Reliability- Reliable Reliability- Reliable Deadline- 10ms Deadline- 20ms Liveliness- Manual By Topic Liveliness- Automatic Nuclear Reactor Status Timebased- 5ms Nuclear Reactor Control Room Power Grid Control Room Power Substation Status Deadline- 10ms Deadline- 15ms Power Substation 1 Nuclear Reactor Deadline- 10ms Power Substation 2 Power Substation 3 Deadline- 15ms Reliability- Reliable Ongoing Research Creation of higher level DDS services built on DQML work Discovery and documentation of DDS patterns Creation of DDS fault-tolerance service (e.g., using ownership/ownership strength, durability policies, multiple readers and writers, hot-swap and failover DDS pattern) Creation of DDS real-time data service (e.g., using deadline, transport priority, latency budget policies, continuous data pattern) Generation of security mapping and security platform independent model (PIM) Map SQML’s RBAC onto DDS security service Develop security PIM with SQML and DQML security services as input Motivating Example: Ultra-Large Scale (ULS) Systems ULS systems require: Security – capability of the system to provide confidentiality, integrity, and availability on the ULS system data and services both locally and globally Trust – extent to which users of the ULS system will be able to rely on the data and services of the ULS system Resiliency – capability of the ULS system to maintain an acceptable level of service while under stress from adverse environmental conditions such as attacks or cascading failures National/International Power Grid Air Traffic Management Constellations of Satellites Homeland Defense Challenges for EDRE Middleware: End-to-end Security – security must be incorporated into all aspects and layers of the application Correctness – design of the application must be ensured when deployed Redundancy – backups of critical pieces of the application must be configured properly and take over when needed Durability- Volatile Durability- Transient Reliability- Reliable Reliability- Reliable Deadline- 10ms Deadline- 20ms Liveliness- Automatic Nuclear Reactor Status Nuclear Reactor Control Room Nuclear Reactor Timebased- 5ms Deadline- 10ms Liveliness- Manual By Topic Map SQML security onto DQML Security PIM SQML input to security PIM DQML input to security PIM Interface Security QoS Domain-Specific Security Policy Component Security QoS Conforms to Policy