Web Technologies and Privacy Policies for the Smart Grid
|
|
- Alison Jefferson
- 8 years ago
- Views:
Transcription
1 Web Technologies and Privacy Policies for the Smart Grid Sebastian Speiser, Andreas Wagner, Oliver Raabe and Andreas Harth Energieinformatik 2013 INSTITUTE OF APPLIED INFORMATICS AND FORMAL DESCRIPTION METHODS AND ZENTRUM FÜR ANGEWANDTE RECHTSWISSENSCHAFT KIT University of the State of Baden-Wuerttemberg and National Laboratory of the Helmholtz Association
2 Agenda 1 Introduction 2 ICT Architecture and Data Model 3 Use-Case I 4 Policies for a Privacy-aware Smart Grid 5 Use-Case II 6 Evaluation 7 Conclusion Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
3 Introduction Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
4 (Some) Key ICT Requirements Requirements, see [2, 3] R1 Lightweight data access. R2 Open and flexible data model. R3 Distinction between syntactic and semantic data content. R4 Users decide what data in which granularity to expose to whom. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
5 (Some) Key ICT Requirements Requirements, see [2, 3] R1 Lightweight data access. R2 Open and flexible data model. R3 Distinction between syntactic and semantic data content. R4 Users decide what data in which granularity to expose to whom. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
6 (Some) Key ICT Requirements Requirements, see [2, 3] R1 Lightweight data access. R2 Open and flexible data model. R3 Distinction between syntactic and semantic data content. R4 Users decide what data in which granularity to expose to whom. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
7 (Some) Key ICT Requirements Requirements, see [2, 3] R1 Lightweight data access. R2 Open and flexible data model. R3 Distinction between syntactic and semantic data content. R4 Users decide what data in which granularity to expose to whom. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
8 (Some) Key ICT Requirements Requirements, see [2, 3] R1 Lightweight data access. R2 Open and flexible data model. R3 Distinction between syntactic and semantic data content. R4 Users decide what data in which granularity to expose to whom. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
9 Contributions R1-R3: Semantic Web communication architecture (Section 2). R4: Policy model (Section 4). Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
10 Contributions R1-R3: Semantic Web communication architecture (Section 2). R4: Policy model (Section 4). Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
11 Communication Architecture Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
12 Overview: A Semantic Web-based Communication Architecture I Data access layers URIs for identification of participants. TCP/IP stack with HTTP as transfer protocol. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
13 Overview: A Semantic Web-based Communication Architecture I Data access layers URIs for identification of participants. TCP/IP stack with HTTP as transfer protocol. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
14 Overview of a Semantic Web-based Communication Architecture II Data representation layers RDF(S) (if necessary extended with OWL features) for machine-interpretable data encoding. Linked Data principles for data access: Use (HTTP) URIs for identification of entities. When someone looks up a URI, provide useful (RDF) data. Include links to other URIs. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
15 Overview of a Semantic Web-based Communication Architecture II Data representation layers RDF(S) (if necessary extended with OWL features) for machine-interpretable data encoding. Linked Data principles for data access: Use (HTTP) URIs for identification of entities. When someone looks up a URI, provide useful (RDF) data. Include links to other URIs. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
16 Overview of a Semantic Web-based Communication Architecture II Data representation layers RDF(S) (if necessary extended with OWL features) for machine-interpretable data encoding. Linked Data principles for data access: Use (HTTP) URIs for identification of entities. When someone looks up a URI, provide useful (RDF) data. Include links to other URIs. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
17 Overview of a Semantic Web-based Communication Architecture II Data representation layers RDF(S) (if necessary extended with OWL features) for machine-interpretable data encoding. Linked Data principles for data access: Use (HTTP) URIs for identification of entities. When someone looks up a URI, provide useful (RDF) data. Include links to other URIs. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
18 Overview of a Semantic Web-based Communication Architecture II Data representation layers RDF(S) (if necessary extended with OWL features) for machine-interpretable data encoding. Linked Data principles for data access: Use (HTTP) URIs for identification of entities. When someone looks up a URI, provide useful (RDF) data. Include links to other URIs. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
19 Use-Case I Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
20 Use-Case I (izeus) Smart Grid/Traffic Service Platform Data Management I Service Requests Smart Traffic Navigator Smart Meter Analyzer Service Platform... Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
21 Use-Case I (izeus) Smart Grid/Traffic Service Platform Data Management II car:uamp760e1 car:uamp760e2 RDF Data car:uamp760e rdf:type sg:vehicle ; foaf:name "UltraAmp 760e". geo:location _:loc _:loc dc:date " T12:23:45"; geo:lat " " ; geo:lon " ". Get additional data RDF Data car:uamp760e3 RDF Data Data logging Service Requests Linked Data Endpoint Smart Traffic Navigator Service Platform RDF Data Smart Meter Analyzer... Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
22 Use-Case I (izeus) Smart Grid/Traffic Service Platform Data Management III car:uamp760e2 car:uamp760e1 car:uamp760e3 Smart home at KIT Future work RDF Data Service Requests Get additional data Linked Data Endpoint Get additional data Smart Traffic Navigator Smart Meter Analyzer RDF Data Service Platform... RDF Data Data logging Get additional RDF data Data sm:meter RDF data logging RDF Data RDF sm:apt RDF RDF TCP/IP/HTTP RDF Data RDF Data WWW Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
23 Use-Case I (izeus) Smart Grid/Traffic Service Platform Data Management IV car:uamp760e1 car:uamp760e2 car:uamp760e3 Smart home at KIT Future work RDF Data Service Requests RDF Data Get additional data Linked Data Endpoint Get additional data WWW Smart Traffic Navigator Smart Meter Analyzer RDF Data Service Platform... RDF Data Data logging Get additional RDF data Data sm:meter Data logging Gridpedia as data model RDF Data RDF sm:apt RDF RDF TCP/IP/HTTP RDF Data Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
24 Privacy Policies Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
25 Policy Model Intuition Policies model user intent, thus, they help to preserve data privacy. A Policy is bound to its associated data. Policies are taken into account whenever data is accessed. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
26 Policy Model Intuition Policies model user intent, thus, they help to preserve data privacy. A Policy is bound to its associated data. Policies are taken into account whenever data is accessed. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
27 Policy Model Intuition Policies model user intent, thus, they help to preserve data privacy. A Policy is bound to its associated data. Policies are taken into account whenever data is accessed. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
28 Policy Model II Policy allows Usage purpose validfrom validto perspective recipient Date Purpose Perspective Agent Description Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
29 Policy-aware Data Access Access procedure i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e). ii) Web server returns an authorisation required response. iii) Requestor sends a request, i.e., a specification of identity and purpose. iv) Device matches the request with an applicable policy (either a law-based or a user policy) if request and policy match, requested data and (signed) policy is sent. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
30 Policy-aware Data Access Access procedure i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e). ii) Web server returns an authorisation required response. iii) Requestor sends a request, i.e., a specification of identity and purpose. iv) Device matches the request with an applicable policy (either a law-based or a user policy) if request and policy match, requested data and (signed) policy is sent. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
31 Policy-aware Data Access Access procedure i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e). ii) Web server returns an authorisation required response. iii) Requestor sends a request, i.e., a specification of identity and purpose. iv) Device matches the request with an applicable policy (either a law-based or a user policy) if request and policy match, requested data and (signed) policy is sent. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
32 Policy-aware Data Access Access procedure i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e). ii) Web server returns an authorisation required response. iii) Requestor sends a request, i.e., a specification of identity and purpose. iv) Device matches the request with an applicable policy (either a law-based or a user policy) if request and policy match, requested data and (signed) policy is sent. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
33 Policy-aware Data Access Access procedure i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e). ii) Web server returns an authorisation required response. iii) Requestor sends a request, i.e., a specification of identity and purpose. iv) Device matches the request with an applicable policy (either a law-based or a user policy) if request and policy match, requested data and (signed) policy is sent. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
34 Use-Case II Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
35 Use-Case II (izeus) Smart Grid/Traffic Service Platform Data Privacy I Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
36 Use-Case II (izeus) Smart Grid/Traffic Service Platform Data Privacy II Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
37 Evaluation Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
38 Scope of Evaluation Our previous works aimed at evaluation of privacy policies via German privacy laws [1, 4]. This works evaluates the practical feasibility of privacy policies stored (matched) on lower-power devices. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
39 Scope of Evaluation Our previous works aimed at evaluation of privacy policies via German privacy laws [1, 4]. This works evaluates the practical feasibility of privacy policies stored (matched) on lower-power devices. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
40 Evaluation Setting We implemented a policy matcher based on Rasqal 1. Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request Test data and source code at Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
41 Evaluation Setting We implemented a policy matcher based on Rasqal 1. Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request Test data and source code at Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
42 Evaluation Setting We implemented a policy matcher based on Rasqal 1. Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request Test data and source code at Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
43 Evaluation Setting We implemented a policy matcher based on Rasqal 1. Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request Test data and source code at Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
44 Evaluation Setting We implemented a policy matcher based on Rasqal 1. Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request Test data and source code at Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
45 Evaluation Setting We implemented a policy matcher based on Rasqal 1. Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request Test data and source code at Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
46 Evaluation Results matching time in seconds Allowed Core2Duo Denied Core2Duo Allowed ARM Denied ARM policy size Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
47 Conclusion Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
48 Conclusion By means of real-world use-cases we showed that Semantic Web technologies are applicable and highly useful Linked Data allows for efficient data access policies give effective means for technical privacy enforcement in a Smart Grid setting. We evaluated our policy approach in terms of technical feasibility w.r.t. lower-power devices. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
49 Conclusion By means of real-world use-cases we showed that Semantic Web technologies are applicable and highly useful Linked Data allows for efficient data access policies give effective means for technical privacy enforcement in a Smart Grid setting. We evaluated our policy approach in terms of technical feasibility w.r.t. lower-power devices. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
50 Conclusion By means of real-world use-cases we showed that Semantic Web technologies are applicable and highly useful Linked Data allows for efficient data access policies give effective means for technical privacy enforcement in a Smart Grid setting. We evaluated our policy approach in terms of technical feasibility w.r.t. lower-power devices. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
51 Conclusion By means of real-world use-cases we showed that Semantic Web technologies are applicable and highly useful Linked Data allows for efficient data access policies give effective means for technical privacy enforcement in a Smart Grid setting. We evaluated our policy approach in terms of technical feasibility w.r.t. lower-power devices. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
52 Conclusion By means of real-world use-cases we showed that Semantic Web technologies are applicable and highly useful Linked Data allows for efficient data access policies give effective means for technical privacy enforcement in a Smart Grid setting. We evaluated our policy approach in terms of technical feasibility w.r.t. lower-power devices. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
53 Slides will be available at Paper will be available at Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
54 Acknowledgements: izeus Project This work was supported by the German Federal Ministry of Economics and Technology (E-Energy izeus, Grant 01 ME12013). The authors are responsible for the content of the presentation. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
55 References Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
56 References I Oliver Raabe. Datenschutz im SmartGrid. Datenschutz und Datensicherheit, S. Rohjans, C. Danekas, and M. Uslar. Requirements for Smart Grid ICT-architectures. In ISGT, Andreas Wagner, Sebastian Speiser, and Andreas Harth. Semantic Web Technologies for a Smart Energy Grid: Requirements and Challenges. In ISWC, Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
57 References II Andreas Wagner, Sebastian Speiser, Oliver Raabe, and Andreas Harth. Linked Data for a Privacy-aware Smart Grid. In GI Jahrestagung, Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
58 Backup Slides Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
59 Use-Case I (izeus) Collaborative Smart Grid Ontology Gripedia I Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
60 Use-Case I (izeus) Collaborative Smart Grid Ontology Gripedia II Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
61 Use-Case I (izeus) Collaborative Smart Grid Ontology Gripedia III Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
62 Linked Data for the Smart Grid Example Legend Communication Flow Actor Domain Network Charging Station (off-premise) Metering Provider B (third party provider) Electric Vehicle ex:uamp760e ex:mary Customer Premise ex:apt Washing Machine ex:coolwash Smart Meter ex:sm Cool Wash Inc. Energy Efficiency Service Provider Metering Provider A Clearing Markets Billing Service Provider Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
63 Linked Data for the Smart Grid Example II Mary s Linked Data / / lookup on ex : coolwash ; data resides at washing machine ex : coolwash r d f : type sg : Appliance ; sg : manufacturer <h t t p : / / coolwash. com / company>; sg : owner ex : mary ; sg : washingdata washer : program40 ; sg : consumption sm: data Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
64 Linked RDF Data for the Smart Grid III Mary s Linked Data II / / lookup on sm: data ; data resides at smart meter sm: data r d f : type sg : Consumption ; r d f : value ˆ ˆ sg :kwh; i c a l : d t s t a r t T00 : 0 0 : 0 0 ; i c a l : dtend T01 : 0 0 : 0 0. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
65 Policy-aware Data Access II Matching procedure The matching procedure is implemented as a rule, checking whether... i) requestor is subsumed by the recipient description and ii) the requested purpose is subsumed by the allowed purpose (both w.r.t. the applicable policy) Assumption: the same purpose and recipient definition is employed subclass-of or same-as check is sufficient for realising the subsume operation. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
66 Policy Model III An example policy for Mary s UltraAmp 760e I washer : ecarpol r d f : type sg : P o l i c y ; i c a l : d t s t a r t T00 : 0 0 : 0 0 ˆ ˆ xs : datetime ; i c a l : dtend T23 : 5 9 : 5 9 ˆ ˆ xs : datetime ; sg : allows #ultraampuse. #ultraampuse r d f : type sg : Usage ; sg : purpose gov : Purpose# s e r v i c e ; sg : r e c i p i e n t <h t t p : / / ultraamp. com / company>; sg : perspective # ultraampperspective. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
67 Policy Model IV An example policy for Mary s Mary s UltraAmp 760e II # ultraampperspective r d f : type sg : Perspective ; sg : d e f i n i t i o n PREFIX... CONSTRUCT {?s?p?o } WHERE {?s r d f : type sg : Appliance.?s sg : manufacturer <h t t p : / / ultraamp. com / company>.?s?p?o. FILTER (? p!= sg : consumption ) }. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41
Linked Data and Complex Event Processing for the Smart Energy Grid
Linked Data and Complex Event Processing for the Smart Energy Grid Andreas Wagner 1, Darko Anicic 2, Roland Stühmer 2, Nenad Stojanovic 2, Andreas Harth 1, and Rudi Studer 1,2 1 Institute AIFB, Karlsruhe
More informationSmart Grid Challenges and Opportunities the Norwegian Perspective
Smart Grid Challenges and Opportunities the Norwegian Perspective Kjell Sand, Professor, Sintef Energy Research /NTNU/ The Norwegian Smart Grid Centre IEC Open Council Oslo 2012-10-05 The Norwegian Smartgrid
More informationHow To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)
Scalability Results Select the right hardware configuration for your organization to optimize performance Table of Contents Introduction... 1 Scalability... 2 Definition... 2 CPU and Memory Usage... 2
More informationSemantics and Ontology of Logistic Cloud Services*
Semantics and Ontology of Logistic Cloud s* Dr. Sudhir Agarwal Karlsruhe Institute of Technology (KIT), Germany * Joint work with Julia Hoxha, Andreas Scheuermann, Jörg Leukel Usage Tasks Query Execution
More informationSysAidTM Product Description
SysAidTM Product Description September 2006 IT Challenges As the ratio of computers to IT staff grows, so does the visibility of the IT department in organizations. Efficiency and responsiveness has become
More informationSeptember 2009 Cloud Storage for Cloud Computing
September 2009 Cloud Storage for Cloud Computing This paper is a joint production of the Storage Networking Industry Association and the Open Grid Forum. Copyright 2009 Open Grid Forum, Copyright 2009
More informationSecure and Semantic Web of Automation
Secure and Semantic Web of Automation Wolfgang Kastner 1, Andreas Fernbach 1, Wolfgang Granzer 2 1 Technische Universität Wien 2 NETxAutomation Software GmbH Automation Systems Group Computer Engineering/Software
More informationManaging IBM Lotus Notes Domino 7 Servers and Users. Course Description. Audience. Course Prerequisites. Machine Requirements.
Managing IBM Lotus Notes Domino 7 Servers and Users Course Code: 190-722 Course Title: Managing IBM Lotus Notes Domino 7 Servers and Users Duration: 3 classroom equivalent days Price: 990 USD + IVA Course
More informationYZP 480...495: SAUTER Vision Center
YZP 480...495: SAUTER Vision Center SAUTER Vision Center 3.0 - latest-generation modular building management software for energy-efficient buildings The SAUTER Vision Center (SVC) is a web-based building
More informationBasic Scheduling in Grid environment &Grid Scheduling Ontology
Basic Scheduling in Grid environment &Grid Scheduling Ontology By: Shreyansh Vakil CSE714 Fall 2006 - Dr. Russ Miller. Department of Computer Science and Engineering, SUNY Buffalo What is Grid Computing??
More informationBenchmarking the Performance of Storage Systems that expose SPARQL Endpoints
Benchmarking the Performance of Storage Systems that expose SPARQL Endpoints Christian Bizer 1 and Andreas Schultz 1 1 Freie Universität Berlin, Web-based Systems Group, Garystr. 21, 14195 Berlin, Germany
More informationBuilding Web-based Infrastructures for Smart Meters
Building Web-based Infrastructures for Smart Meters Andreas Kamilaris 1, Vlad Trifa 2, and Dominique Guinard 2 1 University of Cyprus, Nicosia, Cyprus 2 ETH Zurich and SAP Research, Switzerland Abstract.
More informationSmart Cities. Photo used under Creative Commons from nigelhowe
Smart Cities Photo used under Creative Commons from nigelhowe Photo used under Creative Commons from tim-166 Cities are for People Citier Smart cities as a web of people, things and services Workshop 2,
More informationWrap-Up & Way Forward A Perspective from the Edge of the Smart Grid
Wrap-Up & Way Forward A Perspective from the Edge of the Smart Grid Eve M. Schooler, PhD Intel s Europe Energy and Sustainability 10/23/2012 1 Commentary Sustainability, SmartGrid, Cybersecurity Beyond
More informationSecure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
More informationSierraVMI Sizing Guide
SierraVMI Sizing Guide July 2015 SierraVMI Sizing Guide This document provides guidelines for choosing the optimal server hardware to host the SierraVMI gateway and the Android application server. The
More informationVery Large Enterprise Network, Deployment, 25000+ Users
Very Large Enterprise Network, Deployment, 25000+ Users Websense software can be deployed in different configurations, depending on the size and characteristics of the network, and the organization s filtering
More informationSemantic EPC: Enhancing Process Modeling Using Ontologies
Institute for Information Systems IWi Institut (IWi) für at the German Research Wirtschaftsinformatik Center for im DFKI Saarbrücken Artificial Intelligence (DFKI), Saarland University Semantic EPC: Enhancing
More informationTUM & Siemens Corporate Technology. The "Internet of Things" for industrial applications
The "Internet of Things" for industrial applications IoT Technologies: Semantics Challenges in the Future of Embedded Networks Growing number of interconnected heterogeneous devices in different kind of
More informationInformation and Communication Technology. Firewall Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
More informationEnterprise Network Deployment, 10,000 25,000 Users
Enterprise Network Deployment, 10,000 25,000 Users Websense software can be deployed in different configurations, depending on the size and characteristics of the network, and the organization s filtering
More informationThis presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.
This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. WD31_VirtualApplicationSharedServices.ppt Page 1 of 29 This presentation covers the shared
More informationIntro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
More informationwww.airpatrolcorp.com 2012 AirPatrol Corporation White Paper: Wireless Endpoint Security
www.airpatrolcorp.com 2012 AirPatrol Corporation To enhance productivity and efficiency, employees are increasingly turning to wireless devices and networks to get the job done. The security experts at
More informationSymantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
More informationAuditMatic Enterprise Edition Installation Specifications
Enterprise Edition Installation Specifications Version: 4.0 Copyright 2005 F.A.S., Inc. All rights reserved. Copyright 2008 F.A.S., Inc. All rights reserved. Copyright Notice Information contained in this
More informationControlling and Monitoring Devices with REST
Controlling and Monitoring Devices with REST Francesco Lelli and Cesare Pautasso Faculty of Informatics University of Lugano via Buffi 13 6900 Lugano, Switzerland firstname.lastname@lu.unisi.ch Abstract.
More informationDepartment of Defense. Enterprise Information Warehouse/Web (EIW) Using standards to Federate and Integrate Domains at DOD
Department of Defense Human Resources - Enterprise Information Warehouse/Web (EIW) Using standards to Federate and Integrate Domains at DOD Federation Defined Members of a federation agree to certain standards
More informationTotal Defense Endpoint Premium r12
DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious
More information1 HARDWARE AND SOFTWARE REQUIREMENTS FOR HAL E-BANK SYSTEM
1 HARDWARE AND SOFTWARE REQUIREMENTS FOR HAL E-BANK SYSTEM 1.1 PRECONDITIONS FOR USING HAL E-BANK: An appropriate PC with Windows XP, Windows 2003, Windows Vista or Windows 7 operating system installed;
More informationInstalling GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
More informationVery Large Enterprise Network Deployment, 25,000+ Users
Very Large Enterprise Network Deployment, 25,000+ Users Websense software can be deployed in different configurations, depending on the size and characteristics of the network, and the organization s filtering
More informationImplementing the Application Control Engine Service Module
Course: Implementing the Application Control Engine Service Module Duration: 4 Day Hands-On Lab & Lecture Course Price: $ 2,995.00 Learning Credits: 30 Hitachi HiPass: 4 Description: Implementing the Application
More informationThe use of Semantic Web Technologies in Spatial Decision Support Systems
The use of Semantic Web Technologies in Spatial Decision Support Systems Adam Iwaniak Jaromar Łukowicz Iwona Kaczmarek Marek Strzelecki The INSPIRE Conference 2013, 23-27 June Wroclaw University of Environmental
More informationSpecifications SMART Bridgit software
PLEASE THINK BEFORE YOU PRINT Specifications SMART Bridgit software Version 4.2 Product description SMART Bridgit conferencing software is a cost-effective client/server application that lets you easily
More informationAn Energy-aware Multi-start Local Search Metaheuristic for Scheduling VMs within the OpenNebula Cloud Distribution
An Energy-aware Multi-start Local Search Metaheuristic for Scheduling VMs within the OpenNebula Cloud Distribution Y. Kessaci, N. Melab et E-G. Talbi Dolphin Project Team, Université Lille 1, LIFL-CNRS,
More informationLooking Ahead The Path to Moving Security into the Cloud
Looking Ahead The Path to Moving Security into the Cloud Gerhard Eschelbeck Sophos Session ID: SPO2-107 Session Classification: Intermediate Agenda The Changing Threat Landscape Evolution of Application
More informationStruxureWare TM Data Center Expert
StruxureWare TM Data Center Expert Infrastructure management from rack to row to room to building Deploy in minutes, manage from anywhere, analyze instantly, integrate with other management systems. End
More informationSecurity Overview Introduction Application Firewall Compatibility
Security Overview Introduction ShowMyPC provides real-time communication services to organizations and a large number of corporations. These corporations use ShowMyPC services for diverse purposes ranging
More informationAddressing Self-Management in Cloud Platforms: a Semantic Sensor Web Approach
Addressing Self-Management in Cloud Platforms: a Semantic Sensor Web Approach Rustem Dautov Iraklis Paraskakis Dimitrios Kourtesis South-East European Research Centre International Faculty, The University
More informationWindows Server 2012 2,500-user pooled VDI deployment guide
Windows Server 2012 2,500-user pooled VDI deployment guide Microsoft Corporation Published: August 2013 Abstract Microsoft Virtual Desktop Infrastructure (VDI) is a centralized desktop delivery solution
More informationCloud Computing mit mathematischen Anwendungen
Cloud Computing mit mathematischen Anwendungen Dr. habil. Marcel Kunze Engineering Mathematics and Computing Lab (EMCL) Institut für Angewandte und Numerische Mathematik IV Karlsruhe Institute of Technology
More informationLDIF - Linked Data Integration Framework
LDIF - Linked Data Integration Framework Andreas Schultz 1, Andrea Matteini 2, Robert Isele 1, Christian Bizer 1, and Christian Becker 2 1. Web-based Systems Group, Freie Universität Berlin, Germany a.schultz@fu-berlin.de,
More informationCourse Agenda: Managing Active Directory with NetIQ Directory and Resource Administrator and NetIQ Exchange Administrator
Course Agenda: Managing Active Directory with NetIQ Directory and Resource Administrator and NetIQ Exchange Administrator Products Covered: Who Should Attend: NetIQ Directory And Resource Administrator
More informationRequirements Document for ROI Print Assessment/Print Manager
Requirements Document for ROI Print Assessment/Print Manager Print Manager Pre-requisites for a successful deployment Contents 1. What is - a. Print Assessment? b. Print Manager? c. ROI Analytics? 2. About
More informationCapturing Barracuda Web Filter Activity in Reports
Capturing Barracuda Web Filter Activity in Reports IT administrators require detailed information about Internet usage on the network. This helps budget computing resources and ensure adherence to corporate
More informationHow To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
More informationUsing RDF Metadata To Enable Access Control on the Social Semantic Web
Using RDF Metadata To Enable Access Control on the Social Semantic Web James Hollenbach, Joe Presbrey, and Tim Berners-Lee Decentralized Information Group, MIT CSAIL, 32 Vassar Street, Cambridge, MA, USA,
More informationHardware Recommendations
Hardware Recommendations Alpha Anywhere is a Windows based system that will run on various Windows versions. The minimum requirement is Windows XP SP3 or Server 2003. However, it is recommended that at
More informationSemantic Interoperability
Ivan Herman Semantic Interoperability Olle Olsson Swedish W3C Office Swedish Institute of Computer Science (SICS) Stockholm Apr 27 2011 (2) Background Stockholm Apr 27, 2011 (2) Trends: from
More informationEnsim WEBppliance 3.0 for Windows (ServerXchange) Release Notes
Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes May 07, 2002 Thank you for choosing Ensim WEBppliance 3.0 for Windows. This document includes information about the following: About Ensim
More informationHEALTH INFORMATION MANAGEMENT ON SEMANTIC WEB :(SEMANTIC HIM)
HEALTH INFORMATION MANAGEMENT ON SEMANTIC WEB :(SEMANTIC HIM) Nasim Khozoie Department of Computer Engineering,yasuj branch, Islamic Azad University, yasuj, Iran n_khozooyi2003@yahoo.com ABSTRACT Information
More informationSystem Requirements for Microsoft Dynamics SL 2015
System for Microsoft Dynamics SL 2015 Overview This document contains the minimum client hardware requirements, server recommendations and Terminal Server minimum hardware requirements supported by the
More informationTravelling infrastructure - How to Build a Mobile Server Farm
REV.01 2013 p. 1/11 Roma, 16/01/2014 Dear Telefonica S.A. marketing department SUBJECT: Revenue Sharing Webee Telefonica INTRODUCTION Architecture will be the same as that already established in partnership
More informationWhere can I install GFI EventsManager on my network?
Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location
More informationIntroduction to Engineering Using Robotics Experiments Lecture 18 Cloud Computing
Introduction to Engineering Using Robotics Experiments Lecture 18 Cloud Computing Yinong Chen 2 Big Data Big Data Technologies Cloud Computing Service and Web-Based Computing Applications Industry Control
More informationGreen Cloud Computing: Case Study Sri Lanka & Pakistan
Green Cloud Computing: Case Study Sri Lanka & Pakistan 28-30 July 2015 Colombo, Sri Lanka Sameer Sharma, Senior Advisor Regional Office Asia-Pacific Recalling ITU TRCSL Workshop in 2013 ITU TRCSL Workshop
More informationNetIQ Advanced Authentication Framework. System Requirements. Version 5.1.0
NetIQ Advanced Authentication Framework System Requirements Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Infrastructure 4 Communication Channel Throughput
More informationDATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
More informationExtending SOA Infrastructure for Semantic Interoperability
Extending SOA Infrastructure for Semantic Interoperability Wen Zhu wzhu@alionscience.com Sumeet Vij svij@alionscience.com 3rd Annual DoD SOA & Semantic Technology Symposium July 14, 2011 www.alionscience.com
More informationOct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols
E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and
More informationHARDWARE, SOFTWARE AND CONFIGURATION REQUIREMENTS
Team Services PREMISE INSTALLATION REQUIREMENTS HARDWARE, SOFTWARE AND CONFIGURATION REQUIREMENTS Team Services may require reconfiguration of a client s existing environment to support our new dedicated
More informationServer Installation Procedure - Load Balanced Environment
Server Installation Procedure - Load Balanced Environment 1. Introduction This document explains a step-by-step procedure in case BackupAgent BV performs an installation of the BackupAgent Server Software
More informationDesktop Consolidation. Stéphane Verdy, CTO Devon IT
Desktop Consolidation Stéphane Verdy, CTO Devon IT Agenda - Desktop Consolidation Migrating from PCs to Hosted Desktops Desktop Centralization Deployment Graphics Compression PCs vs. Thin s TCO User segmentation
More informationPrinciples and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)
More informationPlanning Domain Controller Capacity
C H A P T E R 4 Planning Domain Controller Capacity Planning domain controller capacity helps you determine the appropriate number of domain controllers to place in each domain that is represented in a
More informationCisco Wireless Control System (WCS)
Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,
More informationDeveloping Web 3.0. Nova Spivak & Lew Tucker http://radarnetworks.com/ Tim Boudreau http://weblogs.java.net/blog/timboudreau/
Developing Web 3.0 Nova Spivak & Lew Tucker http://radarnetworks.com/ Tim Boudreau http://weblogs.java.net/blog/timboudreau/ Henry Story http://blogs.sun.com/bblfish 2007 JavaOne SM Conference Session
More informationSecure Web Appliance. Reverse Proxy
Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
More informationCheck Point FireWall-1 HTTP Security Server performance tuning
PROFESSIONAL SECURITY SYSTEMS Check Point FireWall-1 HTTP Security Server performance tuning by Mariusz Stawowski CCSA/CCSE (4.1x, NG) Check Point FireWall-1 security system has been designed as a means
More informationSysAidTM Freeware Installation Guide
SysAidTM Freeware Installation Guide Document Updated: 10 November 2009 Introduction SysAid free edition is built for organizations with fewer than 100 computers and users. This document will help you
More informationCloud computing based big data ecosystem and requirements
Cloud computing based big data ecosystem and requirements Yongshun Cai ( 蔡 永 顺 ) Associate Rapporteur of ITU T SG13 Q17 China Telecom Dong Wang ( 王 东 ) Rapporteur of ITU T SG13 Q18 ZTE Corporation Agenda
More informationGraph Database Performance: An Oracle Perspective
Graph Database Performance: An Oracle Perspective Xavier Lopez, Ph.D. Senior Director, Product Management 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Program Agenda Broad Perspective
More informationSemantic based Web Application Firewall (SWAF - V 1.6)
Semantic based Web Application Firewall (SWAF - V 1.6) Installation and Troubleshooting Manual Document Version 1.0 1 Installation Manual SWAF Deployment Scenario: Client SWAF Firewall Applications Figure
More informationNETWRIX FILE SERVER CHANGE REPORTER
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationSymantec Backup Exec.cloud
Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are
More informationServer Installation Manual 4.4.1
Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:
More informationSemantic Advertising for Web 3.0
Semantic Advertising for Web 3.0 Edward Thomas, Jeff Z. Pan, Stuart Taylor, Yuan Ren, Nophadol Jekjantuk, and Yuting Zhao Department of Computer Science University of Aberdeen Aberdeen, Scotland Abstract.
More informationPORTrockIT. Veeam : accelerating virtual machine replication with PORTrockIT
1 PORTrockIT Veeam : accelerating virtual machine replication 2 Executive summary Business continuity solutions such as Veeam offer the ability to recover quickly from disaster by creating a replica of
More information19531 - Telematics. 14th Tutorial - Proxies, Firewalls, P2P
19531 - Telematics 14th Tutorial - Proxies, Firewalls, P2P Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 10. February, 2011 Institute of Computer Science Telematics
More informationDelphi+ System Requirements
Delphi+ System Requirements Revision 1.1 Newmarket International, Inc. October 24, 2013 Delphi+ System Requirements Users Up to 15 Up to 25 Up to 50 Up to 90 Up to 200 Over 200 Minimum 2008 Server Hardware
More informationConfiguration Workshop 2014 Novi Sad/Нови Сад
Configuration Workshop 2014 Novi Sad/Нови Сад Integrating Distributed Configurations with RDFS and SPARQL Gottfried Schenner, Stefan Bischof, Axel Polleres, Simon Steyskal Use Case Large technical systems
More informationRadware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical
Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation
More informationCA Host-Based Intrusion Prevention System r8.1
PRODUCT BRIEF: CA HOST-BASED INTRUSION PREVENTION SYSTEM CA Host-Based Intrusion Prevention System r8.1 CA HOST-BASED INTRUSION PREVENTION SYSTEM (CA HIPS) BLENDS ENDPOINT FIREWALL, INTRUSION DETECTION,
More informationCombining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery
Combining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery Dimitrios Kourtesis, Iraklis Paraskakis SEERC South East European Research Centre, Greece Research centre of the University
More informationSMART Vantage. Installation guide
SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the
More informationNetworks 3. 2015 University of Stirling CSCU9B1 Essential Skills for the Information Age. Content
Networks 3 Lecture Networks 3/Slide 1 Content What is a communications protocol? Network protocols TCP/IP High-level protocols Firewalls Network addresses Host name IP address Domain name system (DNS)
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationCISCO WIRELESS CONTROL SYSTEM (WCS)
CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform
More informationPerformance Testing of a Cloud Service
Performance Testing of a Cloud Service Trilesh Bhurtun, Junior Consultant, Capacitas Ltd Capacitas 2012 1 Introduction Objectives Environment Tests and Results Issues Summary Agenda Capacitas 2012 2 1
More informationHow can the Future Internet enable Smart Energy?
How can the Future Internet enable Smart Energy? FINSENY overview presentation on achieved results Prepared by the FINSENY PMT April 2013 Outline Motivation and basic requirements FI-PPP approach FINSENY
More informationWebEx Security Overview Security Documentation
WebEx Security Overview Security Documentation 8/1/2003: WebEx Communications Inc. WebEx Security Overview WebEx Security Overview Introduction WebEx Communications, Inc. provides real-time communication
More informationPlanetData Showcases: Linked/Open/Big Data in Smart Cities Data Integration
PlanetData Showcases: Linked/Open/Big Data in Smart Cities Data Integration Andreas Harth (KIT), Oscar Corcho(UPM), Marko Grobelnik (JSI) 25 November 2013, Luxembourg Motivation The relevance of many types
More informationSage Grant Management System Requirements
Sage Grant Management System Requirements You should meet or exceed the following system requirements: One Server - Database/Web Server The following system requirements are for Sage Grant Management to
More informationCross-channel protection GSelector s exclusive cross-station protection prevents the same song from playing at the same time across your stations.
Music scheduling reinvented GSelector is the world s first goal music scheduler; perfect for the diverse ways radio programmers deliver their stations to the audience. Build a better log GSelector virtually
More informationOntology for Home Energy Management Domain
Ontology for Home Energy Management Domain Nazaraf Shah 1,, Kuo-Ming Chao 1, 1 Faculty of Engineering and Computing Coventry University, Coventry, UK {nazaraf.shah, k.chao}@coventry.ac.uk Abstract. This
More informationSPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness
Interoperability Summit 2002 SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness Gavenraj Sodhi Senior Technology Analyst Provisioning
More informationNetwork Service, Systems and Data Communications Monitoring Policy
Network Service, Systems and Data Communications Monitoring Policy Purpose This Policy defines the environment and circumstances under which Network Service, Systems and Data Communications Monitoring
More informationSystem Requirements for Microsoft Dynamics GP 2015
System Requirements for Microsoft Dynamics GP 2015 This document contains the minimum client hardware requirements, server recommendations and Terminal Server minimum hardware requirements supported by
More information