Presentation is loading. Please wait.

Presentation is loading. Please wait.

Software Quality and Infrastructure Protection for Diffuse Computing FY2001 ONR CIP/SW URI Principal Investigator: Andre Scedrov Institution: University.

Similar presentations


Presentation on theme: "Software Quality and Infrastructure Protection for Diffuse Computing FY2001 ONR CIP/SW URI Principal Investigator: Andre Scedrov Institution: University."— Presentation transcript:

1 Software Quality and Infrastructure Protection for Diffuse Computing FY2001 ONR CIP/SW URI Principal Investigator: Andre Scedrov Institution: University of Pennsylvania URL: http://www.cis.upenn.edu/spyce OPTION STARTED IN MAY 2004

2 The SPYCE Team lJoan Feigenbaum (Yale) lJoseph Y. Halpern (Cornell) lPatrick D. Lincoln lJohn C. Mitchell (Stanford) lAndre Scedrov (U Penn) lJonathan M. Smith (U Penn) (until December 2003)

3 External Collaborators lCynthia Dwork (Microsoft) lTim Griffin (Intel) lVitaly Shmatikov (SRI) lPaul Syverson (NRL)

4 Postdocs lBjorn Knutsson, Penn lNinghui Li, Stanford (till Summer 2003) lMichael Elkin, Yale (since Fall 2003) l16 Ph.D. Students

5 Project Vision: Diffuse Computing Managing and maintaining a computational infrastucture, distributed among many heterogeneous nodes that do not trust each other completely and may have incentives (needs, priorities).

6 Secure services through heterogeneous overlay networks  Communication  Cooperation  Incentives  Delivery

7 Diffuse Computing lParadigm developing rapidly as a result of - commercial computing markets - now-recognized potential of peer-to-peer computing and grid computing - the need for distributed network-centric systems lRaises challenges for - system design - software production - the development of mechanisms ensuring stable equilibria of diffuse systems

8 Critical Infrastructure Protection Many critical infrastructures, national and DoD- specific, are decentralized systems Computer networks have, in addition, become critical infrastructures Research Question: How to build large-scale, adaptive and robust next-gen. systems? Approach: New Diffuse Computing concept - results with extremely loosely-coupled modules

9 Critical Infrastructure Protection lMany critical infrastructures, national and DoD-specific, are decentralized lData sharing essential for operation, but data compromise can be catastrophic lResearch Question: How to share data safely, using policies that are easy to formulate, enforce, maintain lApproach: diffuse trust management

10 URI Objective Algorithms to model diffuse computing and achieve scaleable high assurance DoD capabilities enhanced Reduced cost, improved performance, and higher reliability for networked operations across untrusted networks Scientific/technical approach Computing and networking elements diffusing into the environment need: - Local incentive-compatibility in global distributed computing - Scaleable authorization mechanisms - Assured communication - Experimental evidence Sample Accomplishments Local conditions for stable routes in interdomain routing SPAM reduction algorithms Privacy in databases Content transcoding for heterogeneous clients Formal methods for cryptography Logics for reasoning about policies URI, 2001May, 2004 Software Quality and Infrastructure Protection for Diffuse Computing Smart devices diffuse into the environment…. … with control and assurance Desktop ‘80s Room ‘40s Wearable ‘90s Pervasive ‘00s scedrov@saul.cis.upenn.edu Web URL: http://www.cis.upenn.edu/spyce/

11 SPYCE Objective: Scalable Distributed Assurance Develop fundamental understanding, models, algorithms, and network testbed, in order to reduce cost, improve performance, and provide higher reliability for networked operations across untrusted networks. Incentives, Privacy, and Anonymity Protocol Design and Analysis Trust Management Network Architecture Smart devices diffuse into the environment…. … with control and assurance Desktop ‘80s Room ‘40s Wearable ‘90s Pervasive ‘00s

12 SPYCE Objective: Scalable Distributed Assurance Develop fundamental understanding, models, algorithms, and network testbed, in order to reduce cost, improve performance, and provide higher reliability for networked operations across untrusted networks. Incentives, Privacy, and Anonymity PROTOCOL DESIGN AND ANALYSIS TRUST MANAGEMENT Network Architecture Smart devices diffuse into the environment…. … with control and assurance Desktop ‘80s Room ‘40s Wearable ‘90s Pervasive ‘00s

13 Today lTrust Management / Access Control - John Mitchell, Stanford - Vicky Weissman, Cornell lProtocols - Paul Syverson, NRL lLunch break poster session on any SPYCE topic lProtocols - Andre Scedrov, U Penn - Vitaly Shmatikov, SRI

14 Software Quality and Infrastructure Protection for Diffuse Computing FY2001 ONR CIP/SW URI Principal Investigator: Andre Scedrov Institution: University of Pennsylvania URL: http://www.cis.upenn.edu/spyce OPTION STARTED IN MAY 2004


Download ppt "Software Quality and Infrastructure Protection for Diffuse Computing FY2001 ONR CIP/SW URI Principal Investigator: Andre Scedrov Institution: University."

Similar presentations


Ads by Google