4IEEE. Symposium on Policies for (POLICY 2011) Distributed Systems and Networks IEEE International. Pisa, Italy.

Size: px
Start display at page:

Download "4IEEE. Symposium on Policies for (POLICY 2011) Distributed Systems and Networks. 2011 IEEE International. Pisa, Italy."

Transcription

1 2011 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2011) Pisa, Italy 6-8 June IEEE IEEE Catalog Number: CFPl IPDS-PRT ISBN:

2 2011 IEEE International Symposium on Policies for Distributed Systems and Networks POLICY 2011 Table of Contents Preface Organizing Committee Technical Programme Committee Additional Reviewers ix x xi xii Session 1: Policy Models and Languages FLAVOR: A Formal Language for a Posteriori Verification of Legal Rules 1 Romuald Thion and Daniel Le Metayer Rigorous Analysis ofuml Access Control Policy Models 9 Wuliang Sun, Robert France, and Indrakshi Ray Realization of User Level Fault Tolerant Policy Management through a Holistic Approach for Fault Correlation 17 ByungH. Park, Thomas J. Naughton, Pratul Agarwal, David E. Bernholdt, Al Geist, and Jennifer L. Tippens Towards Run-Time Verification in Access Control 25 Fatih Turkmen, Eunjin (EJ) Jung, and Bruno Crispo Session 2: Applications A Virtualization Assurance Language for Isolation and Deployment 33 Soren Bleikertz and Thomas Grofi A Policy-Based Simulator for Assisted Adaptive Vertical Handover 41 IsmaeelAl Ridhawi, Nancy Samaan, andahmed Karmouch Distributed Overlay Construction to Support Policy-Based Access Control 49 BongJunKo, Starsky H.Y. Wong, Kang-WonLee, and Chi-Kin Chau V

3 Policy-Based Access Control in Mobile Social Ecosystems 57 Sara Hachem, Alessandra Toninelli, Animesh Pathak, and Valerie Issarny ilayer: Toward an Application Access Control Framework for Content Management Systems 65 Gorrell Cheek, Mohamed Shehab, Truong Ung, and Ebonie Williams Lifecycle Management of Relational Records for External Auditing and Regulatory Compliance 73 AhmedA. Ataullah and Frank Wm. Tompa Behavior-Based Policies for Preserving Confidentiality in PCE-based Multi-domain MPLS Networks 81 Molka Gharbaoui, Francesco Paolucci, Barbara Martini, Filippo Cugini, and Piero Castoldi Session 3: Privacy and Security Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies 89 Nataliia Bielova and Fabio Massacci Tool-Supported Refinement of High-Level Requirements and Constraints Into Low-Level Policies 97 Oliver Dohndorf, Jan Kriiger, Heiko Krwnm, Christoph Fiehe, Anna Litvina, Ingo Liick, and Franz-Josef Stewing A Framework for Managing and Analyzing Changes of Security Policies 105 Achim D. Brucker andhelmut Petritsch Short Papers Session 1 A Policy Language for Abstraction and Automation in Application-Oriented Access Controls: The Functionality-Based Application Confinement Policy Language 113 Z. Cliffe Schreuders, Christian Payne, and Tanya McGill GPF: A General Policy Framework 117 Steve Barker and Gillian Lowen Policy of Composition ^ Composition of Policies 121 Sebastian Speiser Automatic Policy Rule Extraction for Configuration Management 125 Ron Banner, Omer Barkol, Ruth Bergman, Shahar Golan, Yuval Carmel, Ido Ish-Hurwitz, and Oded Zilinsky vi

4 Short Papers Session 2 PrimAndroid: Privacy Policy Modelling and Analysis for Android 129 Applications Guillawne Benats, Arosha Bandara, Yijun Yu, Jean-Noel Colin, andbashar Nuseibeh Information Flow Control for Static Enforcement of User-Defined Privacy Policies, 133 Soren Preibusch Risk Assessment and Decision Support for Security Policies and Related Enterprise Operational Processes 137 Marco Casassa Mont and Richard Brown Short Papers Session 3 Addressing Data Reuse Issues at the Protocol Level 141 Oshani Senevitane and Lalana Kagal Profile-Based Selection of Accountability Policies in Grid Computing Systems 145 Wonjun Lee, Anna C. Squicciarini, andelisa Bertino Policy-Based Integration of Provenance Metadata 149 Ashish Gehani, Dawood Tariq, Basim Baig, and Tanu Malik A Load Time Policy Checker for Open Multi-application Smart Cards 153 Nicola Dragoni, Eduardo Lostal, Olga Gadyatskaya, Fabio Massacci, and Federica Paci Hard Disk Guard Based Policy Enforcement 157 Mark Beaumont, Chris North, Bradley Hopkins, andken Yiu Authoring and Deploying Business Policies Dynamically for Compliance Monitoring 161 Yurdaer Doganata, Keith Grueneberg, John Karat, and Nirmal Mukhi A Model-Driven Approach for Incorporating Reactive Rules in Declarative Interactive TV Applications 165 Patricia Dockhorn Costa, Joao Paulo A. Almeida, Igor Magri Vale, andlzon Thomaz Mielke Poster and Demo Session Inter-domain Multi-Hop Negotiation for the Internet 169 Hasan T. Karaoglu and Murat Yuksel CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using Policies 171 Wenjia Li, Pramod Jagtap, Laura Zavala, Anupam Joshi, and Tim Finin vii

5 Demonstration of Policy-Guided Data Preservation Using irods 173 Mike Conway, Reagan Moore, Arcot Rajasekar, and Jean-Yves Nief Enforcing Multi-user Access Policies to Encrypted Cloud Databases 175 Mihaela Ion, Giovanni Russello, and Bruno Crispo Policy Supersession in a Coalition ISR Network 178 Keith Grueneberg, David Wood, Xiping Wang, Seraphin Calo, and Maroun Tonma A Multi-environment Application of Privacy Data Envelopes 180 Mahmoud Ghorbel, Armen Aghasaryan, Marie-Pascale Dupont, Stephane Betge-Brezetz, Guy-Bertrand Kamga, and Sophie Piekarec A Security Framework for Systems of Systems 182 Daniel Trivellato, Nicola Zannone, and Sandro Etalle PPL: PrimeLife Privacy Policy Engine 184 Slim Trabelsi, Jakub Sendor, andstefanie Reinicke (SC)2: A System to Secure Off-Card Contract-Policy Matching in Security-by-Contract for Open Multi-application Smart Cards 186 Nicola Dragoni, Eduardo Lostal, and Davide Papini Using MiniZnMASC Middleware with Different Algorithms for Business-Driven Adaptation of Business Processes 188 Qinghua Lu and Vladimir Tosic WS-Governance Tooling: SOA Governance Policies Analysis and Authoring 191 Antonio Manuel Gutierrez, Jose Antonio Parejo, Pablo Fernandez, and Antonio Ruiz-Cortes Author Index 193 viii

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i. New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New

More information

The Open University s repository of research publications and other research outputs

The Open University s repository of research publications and other research outputs Open Research Online The Open University s repository of research publications and other research outputs PrimAndroid: privacy policy modelling and analysis for Android applications Conference Item How

More information

Log Design for Accountability

Log Design for Accountability Log Design for Accountability Denis Butin, Marcos Chicote and Daniel Le Métayer 1 / 18 Background Need for Accountability 2 / 18 Context Background Need for Accountability Data subjects share more & more

More information

Integrating Data Life Cycle into Mission Life Cycle. Arcot Rajasekar rajasekar@unc.edu sekar@diceresearch.org

Integrating Data Life Cycle into Mission Life Cycle. Arcot Rajasekar rajasekar@unc.edu sekar@diceresearch.org Integrating Data Life Cycle into Mission Life Cycle Arcot Rajasekar rajasekar@unc.edu sekar@diceresearch.org 1 Technology of Interest Provide an end-to-end capability for Exa-scale data orchestration From

More information

The DEMONS Integrated Access Control Model for Collaborative Network Monitoring

The DEMONS Integrated Access Control Model for Collaborative Network Monitoring The DEMONS Integrated Access Control Model for Collaborative Network Monitoring Eugenia I. Papagiannakopoulou Maria N. Koukovini Georgios V. Lioudakis Dimitra I. Kaklamani Iakovos S. Venieris The 4 th

More information

Smart Industrial Manufacturing

Smart Industrial Manufacturing Robots-as-a-Service 2016 TM Forum Live! 2016 1 Best New Catalyst Award TMF Live 2016, Nice, France 2016 TM Forum Live! 2016 2 This Catalyst goes beyond the scope of traditional Machineto-Machine (M2M)

More information

Fundamentals of Mobile and Pervasive Computing

Fundamentals of Mobile and Pervasive Computing Fundamentals of Mobile and Pervasive Computing Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert Technische Universitat Darmstadt FACHBEREICH INFORMATIK B1BLIOTHEK Inventar-Nr.:

More information

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)

More information

Accountability by Design for Privacy

Accountability by Design for Privacy Accountability by Design for Privacy Denis Butin, Marcos Chicote and Daniel Le Métayer 1 / 17 Introduction ICT growth adds to concern about sensitive data use Individuals share more & more PII Stronger

More information

Software Factories: Assembling Applications with Patterns, Models, Frameworks, and Tools

Software Factories: Assembling Applications with Patterns, Models, Frameworks, and Tools Software Factories: Assembling Applications with Patterns, Models, Frameworks, and Tools Jack Greenfield Keith Short WILEY Wiley Publishing, Inc. Preface Acknowledgments Foreword Parti Introduction to

More information

HANDBOOK OF SYSTEMS ENGINEERING AND MANAGEMENT

HANDBOOK OF SYSTEMS ENGINEERING AND MANAGEMENT HANDBOOK OF SYSTEMS ENGINEERING AND MANAGEMENT Second Edition Edited by Andrew P. Sage and William B. Rouse Preface Contributors xvii xxi An Introduction to Systems Engineering and Systems Management 1

More information

The Data Access Handbook

The Data Access Handbook The Data Access Handbook Achieving Optimal Database Application Performance and Scalability John Goodson and Robert A. Steward PRENTICE HALL Upper Saddle River, NJ Boston Indianapolis San Francisco New

More information

Security and Cloud Computing

Security and Cloud Computing Security and Cloud Computing Martin Borrett, Lead Security Architect NE Europe, WW Service Management Tiger Team IBM Software Optimising the World s Infrastructure 27th May - London Agenda Brief Introduction

More information

Dynamic Resource Management Architecture Patterns

Dynamic Resource Management Architecture Patterns Dynamic Resource Architecture Patterns Lonnie R. Welch Toni Marinucci School of EECS Ohio University Athens, OH welch@ohio.edu tmarinuc@cs.ohiou.edu Michael W. Masters Paul V. Werme Naval Surface Warfare

More information

RESILIENT. SECURE and SOFTWARE. Requirements, Test Cases, and Testing Methods. Mark S. Merkow and Lakshmikanth Raghavan. CRC Press

RESILIENT. SECURE and SOFTWARE. Requirements, Test Cases, and Testing Methods. Mark S. Merkow and Lakshmikanth Raghavan. CRC Press SECURE and RESILIENT SOFTWARE Requirements, Test Cases, and Testing Methods Mark S. Merkow and Lakshmikanth Raghavan CRC Press Taylor & Francis Group Boca Raton London New York CRC Press Is an imprint

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

Agent-Based Cloud Broker Architecture for Distributed Access Control

Agent-Based Cloud Broker Architecture for Distributed Access Control Agent-Based Cloud Broker Architecture for Distributed Access Control Manoj V. Thomas 1, and Chandra Sekaran K. Department of Computer Science and Engineering. NITK, Surathkal, Mangalore 575 025, India.

More information

Testing Decision Procedures for Security-by-Contract

Testing Decision Procedures for Security-by-Contract Testing Decision Procedures for Security-by-Contract Nataliia Bielova, Ida Siahaan University of Trento Joint Workshop on Foundations of Computer Security, Automated Reasoning for Security Protocol Analysis

More information

Managing and Analyzing Changes of Security Policies

Managing and Analyzing Changes of Security Policies A Framework for Managing and Analyzing Changes of Security Policies Achim D. Brucker Helmut Petritsch {achim.brucker, helmut.petritsch}@sap.com SAP esearch Karlsruhe Germany IEEE International Symposium

More information

Enabling. Context-Aware. Edited by. JianYu Schahram Dustdar 'TECHNISCHE UNIVERSITATSBIBLIOTHEK HANNOVER. CRC Press

Enabling. Context-Aware. Edited by. JianYu Schahram Dustdar 'TECHNISCHE UNIVERSITATSBIBLIOTHEK HANNOVER. CRC Press Enabling Context-Aware Web Services Methods, Architectures, and Technologies Edited by Quan Z.Sheng JianYu Schahram Dustdar 'TECHNISCHE INFORM ATIONSBIBLIOTHEK UNIVERSITATSBIBLIOTHEK HANNOVER CRC Press

More information

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

2011 Cyber Security and the Advanced Persistent Threat A Holistic View 2011 Cyber and the Advanced Persistent Threat A Holistic View Thomas Varney Cybersecurity & Privacy BM Global Business Services 1 31/10/11 Agenda The Threat We Face A View to Addressing the Four Big Problem

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

INTEGRATED RULE ORIENTED DATA SYSTEM (IRODS)

INTEGRATED RULE ORIENTED DATA SYSTEM (IRODS) INTEGRATED RULE ORIENTED DATA SYSTEM (IRODS) Todd BenDor Associate Professor Dept. of City and Regional Planning UNC-Chapel Hill bendor@unc.edu http://irods.org/ SESYNC Model Integration Workshop Important

More information

Oracle SOA Suite 11g: Essential Concepts Student Guide

Oracle SOA Suite 11g: Essential Concepts Student Guide Oracle SOA Suite 11g: Essential Concepts Student Guide D58786GC20 Edition 2.0 August 2011 D73588 Author Iris Li Technical Contributors and Reviewers Gary Barg Pete Daly Joe Greenwald David Mills David

More information

FIFTH EDITION. Oracle Essentials. Rick Greenwald, Robert Stackowiak, and. Jonathan Stern O'REILLY" Tokyo. Koln Sebastopol. Cambridge Farnham.

FIFTH EDITION. Oracle Essentials. Rick Greenwald, Robert Stackowiak, and. Jonathan Stern O'REILLY Tokyo. Koln Sebastopol. Cambridge Farnham. FIFTH EDITION Oracle Essentials Rick Greenwald, Robert Stackowiak, and Jonathan Stern O'REILLY" Beijing Cambridge Farnham Koln Sebastopol Tokyo _ Table of Contents Preface xiii 1. Introducing Oracle 1

More information

Fabio Massacci Ida Siahaan

Fabio Massacci Ida Siahaan Inline-Reference Monitor Optimization using Automata Modulo Theory (AMT) Fabio Massacci Ida Siahaan 2009-09-24 STM09 - UNITN - Siahaan 1 Inlined Reference Monitors Security Policy Original Application

More information

Contents. BBS Software as a Service (SaaS),7. EH introducing aoudco.pu.ing 1. Distinguishing Cloud Types 4. Exploring

Contents. BBS Software as a Service (SaaS),7. EH introducing aoudco.pu.ing 1. Distinguishing Cloud Types 4. Exploring Contents Preface xvii EH introducing aoudco.pu.ing 1 Web 2.0 and the Cloud 3 Distinguishing Cloud Types 4 Cloud Deployment Models 5 Cloud Service Models 6 Exploring Uses of the Cloud 9 Introducing Scalability

More information

Executive's Guide to

Executive's Guide to Executive's Guide to IT Governance Improving Systems Processes with Service Management, COBIT, and ITIL ROBERT R. MOELLER WILEY John Wiley & Sons, Inc. Contents Preface xiii PART I: IT GOVERNANCE CONCEPTS

More information

IaaS Federation. Contrail project. IaaS Federation! Objectives and Challenges! & SLA management in Federations 5/23/11

IaaS Federation. Contrail project. IaaS Federation! Objectives and Challenges! & SLA management in Federations 5/23/11 Cloud Computing (IV) s and SPD Course 19-20/05/2011 Massimo Coppola IaaS! Objectives and Challenges! & management in s Adapted from two presentations! by Massimo Coppola (CNR) and Lorenzo Blasi (HP) Italy)!

More information

Figure 1: Illustration of service management conceptual framework

Figure 1: Illustration of service management conceptual framework Dagstuhl Seminar on Service-Oriented Computing Session Summary Service Management Asit Dan, IBM Participants of the Core Group Luciano Baresi, Politecnico di Milano Asit Dan, IBM (Session Lead) Martin

More information

MS Information Security (MSIS)

MS Information Security (MSIS) MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in

More information

Outsourcing with secure accessibility in mobile cloud computing

Outsourcing with secure accessibility in mobile cloud computing Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract

More information

University of Parma, Italy. Nov. 1992 Oct. 1995 Ph.D. in Information Technology. Institutions: Date: From (months/year) To (months/year) Degree:

University of Parma, Italy. Nov. 1992 Oct. 1995 Ph.D. in Information Technology. Institutions: Date: From (months/year) To (months/year) Degree: CURRICULUM VITAE 1. Surname: Castoldi 2. Name: Piero 3. Date and place of birth: 30/05/1966, Trento (Italy) 4. Nationality: Italian 5. Civil Status: Married Address (phone/fax/e-mail): Strada Eia 25/1,

More information

Cloud Security: The Grand Challenge

Cloud Security: The Grand Challenge Dr. Paul Ashley IBM Software Group pashley@au1.ibm.com Cloud Security: The Grand Challenge Outline Cloud computing: the pros, the cons, the blind spots Security in the cloud - what are the risks now and

More information

Key Challenges in Cloud Computing to Enable Future Internet of Things

Key Challenges in Cloud Computing to Enable Future Internet of Things The 4th EU-Japan Symposium on New Generation Networks and Future Internet Future Internet of Things over "Clouds Tokyo, Japan, January 19th, 2012 Key Challenges in Cloud Computing to Enable Future Internet

More information

Matching Midlet's Security Claims with a Platform Security Policy using Automata Modulo Theory

Matching Midlet's Security Claims with a Platform Security Policy using Automata Modulo Theory Matching Midlet's Security Claims with a Platform Security Policy using Automata Modulo Theory Fabio Massacci, Ida Siahan (University of ) www.massacci.org www.s3ms-project.org NORDSEC-2007 1 Motivation

More information

Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures

Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures Towards Modeling and Transformation of Security Requirements for Service-oriented Architectures Sven Feja 1, Ralph Herkenhöner 2, Meiko Jensen 3, Andreas Speck 1, Hermann de Meer 2, and Jörg Schwenk 3

More information

IMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN

IMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN i I I I THE PRACTITIONER'S GUIDE TO DATA QUALITY IMPROVEMENT DAVID LOSHIN ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann

More information

Enhancing Data Availability of large Cloud Storage keys

Enhancing Data Availability of large Cloud Storage keys Enhancing Data Availability of large Cloud Storage keys Deepika S M. Tech., Computer Network Engg., BMS College of Engineering Bangalore, India deepikasmce@gmail.com Dr. M. Dakshayini Professor (ISE) BMS

More information

The Software. Audit Guide. ASQ Quality Press. Milwaukee, Wisconsin. John W. Helgeson

The Software. Audit Guide. ASQ Quality Press. Milwaukee, Wisconsin. John W. Helgeson The Software Audit Guide John W. Helgeson ASQ Quality Press Milwaukee, Wisconsin Contents Preface Acknowledgments xv Xlx Part I Audit Fundamentals 1 Chapter 1 Introduction 3 1.1 Definitions 7 1.2 Process

More information

Cloud Federations in Contrail

Cloud Federations in Contrail Cloud Federations in Contrail Emanuele Carlini 1,3, Massimo Coppola 1, Patrizio Dazzi 1, Laura Ricci 1,2, GiacomoRighetti 1,2 " 1 - CNR - ISTI, Pisa, Italy" 2 - University of Pisa, C.S. Dept" 3 - IMT Lucca,

More information

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou 3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University

More information

Wireless Sensor Networks (WSN) for Distributed Solar Energy in Smart Grids

Wireless Sensor Networks (WSN) for Distributed Solar Energy in Smart Grids Wireless Sensor Networks (WSN) for Distributed Solar Energy in Smart Grids Dr. Driss Benhaddou Associate Professor and Fulbright Scholar University of Houston, TX dbenhaddou@uh.edu 06/26/2014 Outline Background

More information

DISTRIBUTED SYSTEMS SECURITY

DISTRIBUTED SYSTEMS SECURITY DISTRIBUTED SYSTEMS SECURITY Issues, Processes and Solutions Abhijit Belapurkar, Yahoo! Software Development India Pvt. Ltd., India Anirban Chakrabarti, Infosys Technologies Ltd., India Harigopal Ponnapalli,

More information

OIT 307/ OIT 218: Web Programming

OIT 307/ OIT 218: Web Programming OIT 307/ OIT 218: Web Programming 1.0 INTRODUCTION Many applications nowadays work really well as a web application. Web programming is the practice of writing applications that run on a web server and

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

SOA Governance Essentials

SOA Governance Essentials SOA Governance Essentials Paul C. Brown Principal Software Architect Agenda SOA Governance Overview Run-Time Governance Design-Time Governance Organizational Issues Summary 2 SOA Governance Overview SOA

More information

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification

More information

Service Oriented Networks Security. David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008

Service Oriented Networks Security. David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008 Service Oriented Networks Security David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008 While empowering new business models, SON leads to a proliferation of application networks

More information

SECURITY AND QUALITY OF SERVICE IN AD HOC WIRELESS NETWORKS

SECURITY AND QUALITY OF SERVICE IN AD HOC WIRELESS NETWORKS SECURITY AND QUALITY OF SERVICE IN AD HOC WIRELESS NETWORKS Ensuring secure transmission and good quality of service (QoS) are key commercial concerns in ad hoc wireless networks as their application in

More information

Table of Contents. Preface. Chapter 1 Introduction 1.1 Background. 1.2 Problem description. 1.3 The role of standardization. 1.4 Scope and objectives

Table of Contents. Preface. Chapter 1 Introduction 1.1 Background. 1.2 Problem description. 1.3 The role of standardization. 1.4 Scope and objectives Table of Contents Table of Contents Preface Chapter 1 Introduction 1.1 Background 1.2 Problem description 1.3 The role of standardization 1.4 Scope and objectives 1.5 Approach 1.6 Related work 1.7 General

More information

Software Defined Cloud Security Architectures

Software Defined Cloud Security Architectures Software Defined Cloud Security Architectures Roy Campbell October 8 th 2014, AFRL, Rome, NY Towards Assured Clouds: Our Approach Concerns Software Defined Networks Virtual Machines and Virtualization

More information

Automated Firewall Analytics

Automated Firewall Analytics Automated Firewall Analytics Ehab Al-Shaer Automated Firewall Analytics Design, Configuration and Optimization 123 Ehab Al-Shaer University of North Carolina Charlotte Charlotte, NC, USA ISBN 978-3-319-10370-9

More information

Model Driven Development of Inventory Tracking System*

Model Driven Development of Inventory Tracking System* Model Driven Development of Inventory Tracking System* Gan Deng, Tao Lu, Emre Turkay Andrey Nechypurenko Aniruddha Gokhale, Douglas Schmidt ISIS, Vanderbilt University Siemens Nashville, TN 37221 Germany

More information

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,

More information

KPDAYS 13 Symposium on Software Performance: Joint Kieker/Palladio Days 2013. Karlsruhe, Germany, November 27 29, 2013 Proceedings

KPDAYS 13 Symposium on Software Performance: Joint Kieker/Palladio Days 2013. Karlsruhe, Germany, November 27 29, 2013 Proceedings Steffen Becker André van Hoorn Wilhelm Hasselbring Ralf Reussner (Eds.) KPDAYS 13 Symposium on Software Performance: Joint Kieker/Palladio Days 2013 Karlsruhe, Germany, November 27 29, 2013 Proceedings

More information

Cloud Archive Trends and Challenges PASIG Winter 2012

<Insert Picture Here> Cloud Archive Trends and Challenges PASIG Winter 2012 Cloud Archive Trends and Challenges PASIG Winter 2012 Raymond A. Clarke Enterprise Storage Consultant, Oracle Enterprise Solutions Group How Is PASIG Pronounced? Is it PASIG? Is it

More information

Cloud Storage Solution for WSN Based on Internet Innovation Union

Cloud Storage Solution for WSN Based on Internet Innovation Union Cloud Storage Solution for WSN Based on Internet Innovation Union Tongrang Fan 1, Xuan Zhang 1, Feng Gao 1 1 School of Information Science and Technology, Shijiazhuang Tiedao University, Shijiazhuang,

More information

irods Technologies at UNC

irods Technologies at UNC irods Technologies at UNC E-iRODS: Enterprise irods at RENCI Presenter: Leesa Brieger leesa@renci.org SC12 irods Informational Reception 1! UNC Chapel Hill Investment in irods DICE and RENCI: research

More information

Data Mining Governance for Service Oriented Architecture

Data Mining Governance for Service Oriented Architecture Data Mining Governance for Service Oriented Architecture Ali Beklen Software Group IBM Turkey Istanbul, TURKEY alibek@tr.ibm.com Turgay Tugay Bilgin Dept. of Computer Engineering Maltepe University Istanbul,

More information

Data Management Plan for the Fisheries Monitoring and Analysis Division at the AFSC 2015 (DRAFT)

Data Management Plan for the Fisheries Monitoring and Analysis Division at the AFSC 2015 (DRAFT) NOAA s National Marine Fisheries Service Data Management Plan for the Fisheries Monitoring and Analysis Division at the AFSC 2015 (DRAFT) Version: 1.0 Date published: April 2, 2015 Presented to: The Fisheries

More information

Evolution Feature Oriented Model Driven Product Line Engineering Approach for Synergistic and Dynamic Service Evolution in Clouds

Evolution Feature Oriented Model Driven Product Line Engineering Approach for Synergistic and Dynamic Service Evolution in Clouds Evolution Feature Oriented Model Driven Product Line Engineering Approach for Synergistic and Dynamic Service Evolution in Clouds Zhe Wang, Xiaodong Liu, Kevin Chalmers School of Computing Edinburgh Napier

More information

"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary

Charting the Course... ... to Your Success! MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test

More information

Mitigating Security Risks in Web Service Invocations: Contract-Based Approaches

Mitigating Security Risks in Web Service Invocations: Contract-Based Approaches Mitigating Security Risks in Web Service Invocations: Contract-Based Approaches Gabriele Costa University of Genova, Italy Roberto Mandati, Fabio Martinelli, Ilaria Matteucci, ArtsiomYautsiukhin Institute

More information

ENHANCING THE SECURITY FRAMEWORK SECURECLOUD WITH THE SWIFT IDENTITY MANAGEMENT FRAMEWORK

ENHANCING THE SECURITY FRAMEWORK SECURECLOUD WITH THE SWIFT IDENTITY MANAGEMENT FRAMEWORK ENHANCING THE SECURITY FRAMEWORK SECURECLOUD WITH THE SWIFT IDENTITY MANAGEMENT FRAMEWORK Abdulrahman H. Altalhi 1, Zailani Mohamed Sidek 2, Norjihan Abdul Ghani 3, Fazidah Othman 4 and Maged Abdelkhaleq

More information

irods and Metadata survey Version 0.1 Date March Abhijeet Kodgire akodgire@indiana.edu 25th

irods and Metadata survey Version 0.1 Date March Abhijeet Kodgire akodgire@indiana.edu 25th irods and Metadata survey Version 0.1 Date 25th March Purpose Survey of Status Complete Author Abhijeet Kodgire akodgire@indiana.edu Table of Contents 1 Abstract... 3 2 Categories and Subject Descriptors...

More information

Assessment of RLG Trusted Digital Repository Requirements

Assessment of RLG Trusted Digital Repository Requirements Assessment of RLG Trusted Digital Repository Requirements Reagan W. Moore San Diego Supercomputer Center 9500 Gilman Drive La Jolla, CA 92093-0505 01 858 534 5073 moore@sdsc.edu ABSTRACT The RLG/NARA trusted

More information

Communicating Systems

Communicating Systems Communicating Systems with UML 2 Modeling and Analysis ofnetwork Protocols David Garduno Barrera Michel Diaz LEEJTEE WILEY Table of Contents Preface xi Chapter 1. Why Use UML to Model Network Protocols?

More information

Exchange Server. Microsoft UNLEASHED SAM. Guy Yardeni. Technical Edit by Ed Crowley. Rand Morimo io Michael Noel. Chris Amaris.

Exchange Server. Microsoft UNLEASHED SAM. Guy Yardeni. Technical Edit by Ed Crowley. Rand Morimo io Michael Noel. Chris Amaris. Rand Morimo io Michael Noel Guy Yardeni Chris Amaris Andrew Abbate Technical Edit by Ed Crowley Microsoft Exchange Server 201 UNLEASHED SAM 800 East 96th Street, Indianapolis, Indiana 46240 USA Table of

More information

MOBILE VIDEO WITH MOBILE IPv6

MOBILE VIDEO WITH MOBILE IPv6 MOBILE VIDEO WITH MOBILE IPv6 DANIEL MINOLI WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS PREFACE ABOUT THE AUTHOR xi xiii 1 THE MOBILE USER ENVIRONMENT: SMART PHONES, PORTABLE MEDIA PLAYERS (PMPs),

More information

The Dark Side of SOA Testing: Towards Testing Contemporary SOAs Based on Criticality Metrics

The Dark Side of SOA Testing: Towards Testing Contemporary SOAs Based on Criticality Metrics The Dark Side of SOA Testing: Towards Testing Contemporary SOAs Based on Criticality Metrics Philipp Leitner 1, Stefan Schulte 1, Schahram Dustdar 1, Ingo Pill 2, Marco Schulz 2, Franz Wotawa 2 1 Distributed

More information

Realizing business flexibility through integrated SOA policy management.

Realizing business flexibility through integrated SOA policy management. SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished

More information

Software Reuse in the Emerging Cloud. Computing Era. Hongji Yang DeMontfort University, Xiaodong Liu Edinburg Napier University, UK REFERENCE

Software Reuse in the Emerging Cloud. Computing Era. Hongji Yang DeMontfort University, Xiaodong Liu Edinburg Napier University, UK REFERENCE Software Reuse in the Emerging Cloud Computing Era Hongji Yang DeMontfort University, UK Xiaodong Liu Edinburg Napier University, UK REFERENCE Detailed Table of Contents Preface x Acknowledgment XII Section

More information

Contact: Henry Torres, (870) 972-3033

Contact: Henry Torres, (870) 972-3033 Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures

More information

Six Challenges for the Privacy and Security of Health Information. Carl A. Gunter University of Illinois

Six Challenges for the Privacy and Security of Health Information. Carl A. Gunter University of Illinois Six Challenges for the Privacy and Security of Health Information Carl A. Gunter University of Illinois The Six Challenges 1. Access controls and audit 2. Encryption and trusted base 3. Automated policy

More information

Migration Improved Scheduling Approach In Cloud Environment

Migration Improved Scheduling Approach In Cloud Environment Migration Improved Scheduling Approach In Cloud Environment Ashu Rani [1], Jitender Singh [2] [1] Scholar in RPS College of Engineering & Technology, Balana, Mohindergarh [2] Asst. Prof. in RPS College

More information

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across

More information

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across

More information

Wireless Clinical Monitoring @ Scale!

Wireless Clinical Monitoring @ Scale! Wireless Clinical Monitoring @ Scale! Chenyang Lu! Cyber-Physical Systems Laboratory! Department of Computer Science and Engineering! Motivation!! Clinical deterioration in hospitalized patients! " 4-17%

More information

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help

More information

Beginning SQL Server. 2012 Administration. Apress. Rob Walters Grant Fritchey

Beginning SQL Server. 2012 Administration. Apress. Rob Walters Grant Fritchey Beginning SQL Server 2012 Administration Rob Walters Grant Fritchey Apress Contents at a Glance About the Authors About the Technical Reviewer Acknowledgments Introduction xv xvi xvii xviii Chapter 1:

More information

HP SOA Systinet software

HP SOA Systinet software HP SOA Systinet software Govern the Lifecycle of SOA-based Applications Complete Lifecycle Governance: Accelerate application modernization and gain IT agility through more rapid and consistent SOA adoption

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582 1582 AN EFFICIENT CRYPTOGRAPHIC APPROACH FOR PRESERVING PRIVACY IN DATA MINING T.Sujitha 1, V.Saravanakumar 2, C.Saravanabhavan 3 1. M.E. Student, Sujiraj.me@gmail.com 2. Assistant Professor, visaranams@yahoo.co.in

More information

15 th April 2010 FIA Valencia

15 th April 2010 FIA Valencia Autonomic Internet (AutoI) FP7 STREP Project Management of Virtual Infrastructure http://ist-autoi.eu/ 15 th April 2010 FIA Valencia Alex Galis University College London a.galis@ee.ucl.ac.uk www.ee.ucl.ac.uk/~agalis

More information

Attribute-Based Access Control. Stephen Schwab and Jay Jacobs. SPARTA ISSO Security Research Division (d.b.a. Cobham Analytic Solutions)

Attribute-Based Access Control. Stephen Schwab and Jay Jacobs. SPARTA ISSO Security Research Division (d.b.a. Cobham Analytic Solutions) March 18, 2010 Attribute-Based Access Control Stephen Schwab and Jay Jacobs SPARTA ISSO Security Research Division (d.b.a. Cobham Analytic Solutions) Topics ABAC Usage and Features RT 0 Credentials Delegation

More information

The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing

The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing Raymond Paul OSD NII Department of Defense Washington, DC W. T. Tsai Department of Computer Science and Engineering Arizona State

More information

CHAPMAN & HALL/CRC INNOVATIONS IN SOFTWARE ENGINEERING AND SOFTWARE DEVELOPMENT. Software Test Attacks to Break Mobile and Embedded Devices

CHAPMAN & HALL/CRC INNOVATIONS IN SOFTWARE ENGINEERING AND SOFTWARE DEVELOPMENT. Software Test Attacks to Break Mobile and Embedded Devices CHAPMAN & HALL/CRC INNOVATIONS IN SOFTWARE ENGINEERING AND SOFTWARE DEVELOPMENT Software Test Attacks to Break Mobile and Embedded Devices Jon Duncan Hagar (g) CRC Press Taylor & Francis Group Boca Raton

More information

A System for Interactive Authorization for Business Processes for Web Services

A System for Interactive Authorization for Business Processes for Web Services A System for Interactive Authorization for Business Processes for Web Services Hristo Koshutanski and Fabio Massacci Dip. di Informatica e Telecomunicazioni - Univ. di Trento via Sommarive 14-38050 Povo

More information

Business Commitments for Dynamic E-business Solution Management: Concept and Specification

Business Commitments for Dynamic E-business Solution Management: Concept and Specification Business Commitments for Dynamic E-business Solution Management: Concept and Specification Haifei Li, Jun-jang Jeng, and Henry Chang IBM Thomas J. Watson Research Center 1101 Kitchawan Road, Route 134

More information

A SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China

A SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China A SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China Zhongqiang Liu 1, Kaiyi Wang 1*, Shufeng Wang 1, Feng Yang 1 and Xiandi Zhang 1, 1 Beijing Research Center for

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

Cost Modelling for Cloud Computing utilisation in Long-Term Digital Preservation. Dr. Essam Shehab Miss Zaira Fernandez

Cost Modelling for Cloud Computing utilisation in Long-Term Digital Preservation. Dr. Essam Shehab Miss Zaira Fernandez Cost Modelling for Cloud Computing utilisation in Long-Term Digital Preservation Dr. Essam Shehab Miss Zaira Fernandez ENSURE Project ENSURE project (Enabling knowledge Sustainability Usability and Recovery

More information

Pro SQL Server 2008 Pol icy-based. Management. Ken Simmons. Colin Stasiuk. Jorge Segarra. Apress8

Pro SQL Server 2008 Pol icy-based. Management. Ken Simmons. Colin Stasiuk. Jorge Segarra. Apress8 Pro SQL Server 2008 Pol icy-based Management Ken Simmons Colin Stasiuk Jorge Segarra Apress8 Contents Contents at a Glance Contents About the Authors About the Technical Reviewers Acknowledgments Introduction

More information

Application Testing Suite Overview

<Insert Picture Here> Application Testing Suite Overview Application Testing Suite Overview Agenda Ats Overview OpenScript Functional Testing OpenScript Load Testing Forms/Siebel Modules Installation of Ats Oracle Load Tester Oracle Test

More information

Advances in Network Management

Advances in Network Management Advances in Network Management Jianguo Ding UC) CRC Press >5^ J Taylor & Francis Croup ^""""^ Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business AN AUERBACH

More information

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173

More information

Page 1. White Paper, December 2012 Gerry Conway. How IT-CMF can increase the Energy Efficiency of Data Centres

Page 1. White Paper, December 2012 Gerry Conway. How IT-CMF can increase the Energy Efficiency of Data Centres Page 1 White Paper, December 2012 Gerry Conway How IT-CMF can increase the Energy Efficiency of Data Centres Abstract Data centres and their management are under increasing pressure; to increase the efficiency

More information

Guiding SOA Evolution through Governance From SOA 101 to Virtualization to Cloud Computing

Guiding SOA Evolution through Governance From SOA 101 to Virtualization to Cloud Computing Guiding SOA Evolution through Governance From SOA 101 to Virtualization to Cloud Computing 3-day seminar The evolution of how companies employ SOA can be broken down into three phases: the initial phase

More information

A Survey of Quality Assurance Frameworks for Service Oriented Systems

A Survey of Quality Assurance Frameworks for Service Oriented Systems A Survey of Quality Assurance Frameworks for Service Oriented Systems Abstract Maria Allauddin, Farooque Azam, Mehmooda Jabeen Zia Department of Computer Engineering, National University of Sciences and

More information

Decentralized Information Accountability Framework for Information Sharing In Cloud Environment

Decentralized Information Accountability Framework for Information Sharing In Cloud Environment Decentralized Information Accountability Framework for Information Sharing In Cloud Environment Deepthi Srinivas, Shylaja BR, Rajeev RK, Muruli R 1 BNM Institute of technology 2,3,4 Rai Technology University

More information