Using Ontologies for Privacy-Awareness in Network Monitoring Workflows

Size: px
Start display at page:

Download "Using Ontologies for Privacy-Awareness in Network Monitoring Workflows"

Transcription

1 Using Ontologies for Privacy-Awareness in Network Monitoring Workflows Georgios V. Lioudakis Institute of Communication and Computer Systems National Technical University of Athens Workshop on Collaborative Security and Privacy Technologies Cyber Security & Privacy EU Forum 2012

2 Motivating/Supporting Initiatives FP6 IST DISCREET Discreet Service Provision in Smart Environments FP7 ICT PRISM PRIvacy-aware Secure Monitoring FP7 ICT DEMONS DEcentralized, cooperative, and privacy-preserving MONitoring for trustworthiness ETSI ISG MOI Measurement Ontology for IP Traffic 2009

3 Passive Network Monitoring Inspection of the actual network traffic using special software and/or hardware equipment Range of applications: Operation and management of communication networks Identification of performance bottlenecks Network security (IDS, ADS, ) Network planning Accounting and billing of network services Validation of SLAs Observation and fine-tuning of QoS parameters Internet research based on collected traffic traces Law enforcement (data retention, lawful interception, )

4 Passive Network Monitoring Serious drawback: privacy implications! Relies natively on personal data collection and processing Various documented privacy violation mishaps Passive Network Monitoring special characteristics: Privacy-sensitive information exceeds payload and spans across various protocol headers and other communication metadata Too much personal information can be inferred and extracted using advanced processing techniques (statistical analysis, fingerprinting, ) Specific regulations govern the underlying services and data Very high data rates and consequent performance requirements Distributed and cooperative nature of operations and infrastructures Intra-domain Inter-domain

5 Fundamentals of the Approach Realisation of Privacy by Design Privacy-aware information flows and operations Enforcement of privacy-aware access control across the flows Contextual behaviour of the system Automatic integration of protection means Anonymisation, pseudonymisation, aggregation modules Complementary actions Consideration of the semantics of various concepts, such as: Data types, roles, operational processes, purposes for data collection and processing Use of ontologies for: Information modelling Workflow modelling Access and usage control rules specification

6 Execution Phase Planning Phase DEMONS Workflow Management Architecture Workflow Model Checker Reasoner <?xml version="1.0"?> <rdf:rdf xmlns:xsp= Policies WF Planning Environment Capabilities Matching Orchestration Layer Orchestration Interface Capabilities Bus Orchestrator Orchestrator Orchestrator Components Layer Components Interface Agent Agent Agent Agent Agent Control Message Bus Context Bus

7 DEMONS Workflows A workflow consists of tasks and their interactions w = T, F C, F D, where T = t 1, t 2,..., t n, t i = a i, op i, res i w F C : control flow associations F D : data flow associations + a declared purpose pu, e.g., NetworkSecurity + User role(s) r, e.g., NetworkAdministrator Overall WF = w, r k, pu or WF = w, r k, pu m for a stored workflow template GetUser Feeback [ MPF > 0.7 ] { uf } Start CaptureTraffic DetectBotnet [ MPF > 0.7 ] { MPF, uf } ReportToAUI [ Always ]

8 Workflow Verification Mechanism Ensures that the user-specified workflow is rendered privacy compliant before entering the execution phase A three steps procedure: 1. Purpose Verification: Checks regarding purpose compliance (relevance, consistency, etc.) 2. Skin Task Verification: User-specified tasks checked individually and in relation to each other 3. Decomposition: Composite skin tasks refinement and evaluation, until the level of atomic tasks Relies on a policy-based access control model Core components: Model Checker and Reasoner

9 Planning Phase Outcome GetUser Feeback [ MPF > 0.7 ] { uf } Start CaptureTraffic DetectBotnet [ MPF > 0.7 ] { MPF, uf } ReportToAUI [ Always ] GetUser Feeback [ 0.8 > MPF > 0.7 ] ProxyMode Anonymise [ MPF > 0.7 ] BlockingMode DetectBotnet CorrelateAlerts ReportToAUI [ MPF > 0.7 ] { uf } [ 1.0 > MPF > 0.9 ] [ 0.9 > MPF > 0.8 && uf == Int-m ] InteractionMode CaptureTraffic Start InformSecurityOfficer [ 0.9 > MPF > 0.8 && uf == Dis-m ] [ Always ] DisinfectionMode

10 Execution Phase Planning Phase Workflow Splitting and Dispatching Anonymise CaptureTraffic Start GetUser Feeback [ MPF > 0.7 ] DetectBotnet CorrelateAlerts ReportToAUI Orchestration Layer [ MPF > 0.7 ] InformSecurityOfficer { uf } WF Planning Environment [ 0.8 > MPF > 0.7 ] [ 1.0 > MPF > 0.9 ] [ 0.9 > MPF > 0.8 Reasoner Workflow && <?xml version="1.0"?> <rdf:rdf Model uf == Int-m ] xmlns:xsp= InteractionMode Checker Policies [ 0.9 > MPF > 0.8 && uf == Dis-m ] DisinfectionMode Capabilities Matching [ Always ] Orchestration Interface ProxyMode BlockingMode Capabilities Bus Orchestrator Orchestrator Orchestrator Components Layer Components Interface Agent Agent Agent Agent Agent Control Message Bus Context Bus

11 Workflows as Ontologies GetUser Feeback [ 0.8 > MPF > 0.7 ] ProxyMode Anonymise [ MPF > 0.7 ] { uf } [ 1.0 > MPF > 0.9 ] BlockingMode DetectBotnet CorrelateAlerts ReportToAUI [ MPF > 0.7 ] [ 0.9 > MPF > 0.8 && uf == Int-m ] InteractionMode CaptureTraffic Start InformSecurityOfficer [ 0.9 > MPF > 0.8 && uf == Dis-m ] [ Always ] DisinfectionMode DEMONS introduces an innovative approach for workflows description Motivation: the integration of typically disjoint BPM and scientific workflows Instead of legacy methods (e.g., BPMN), use of ontologies

12 Workflows as Ontologies GetUser Feeback [ 0.8 > MPF > 0.7 ] ProxyMode Anonymise [ MPF > 0.7 ] { uf } [ 1.0 > MPF > 0.9 ] BlockingMode DetectBotnet CorrelateAlerts ReportToAUI [ MPF > 0.7 ] [ 0.9 > MPF > 0.8 && uf == Int-m ] InteractionMode CaptureTraffic Start InformSecurityOfficer [ 0.9 > MPF > 0.8 && uf == Dis-m ] [ Always ] DisinfectionMode Class: TaskNode Annotation properties: actor, operation, resource, security policies, attributes, Object properties: describing connections with flow arrows

13 Workflows as Ontologies GetUser Feeback [ 0.8 > MPF > 0.7 ] ProxyMode Anonymise [ MPF > 0.7 ] DetectBotnet CorrelateAlerts ReportToAUI [ MPF > 0.7 ] { uf } [ 1.0 > MPF > 0.9 ] [ 0.9 > MPF > 0.8 && uf == Int-m ] BlockingMode InteractionMode CaptureTraffic Start InformSecurityOfficer [ 0.9 > MPF > 0.8 && uf == Dis-m ] [ Always ] DisinfectionMode Class: DataEdge Annotation properties: data type, condition, Object properties: source, destination

14 Workflows as Ontologies GetUser Feeback [ 0.8 > MPF > 0.7 ] ProxyMode Anonymise [ MPF > 0.7 ] DetectBotnet CorrelateAlerts ReportToAUI [ MPF > 0.7 ] { uf } [ 1.0 > MPF > 0.9 ] [ 0.9 > MPF > 0.8 && uf == Int-m ] BlockingMode InteractionMode CaptureTraffic Start InformSecurityOfficer [ 0.9 > MPF > 0.8 && uf == Dis-m ] [ Always ] DisinfectionMode Class: ControlEdge Annotation properties: parameter, condition, Object properties: source, destination

15 Workflows as Ontologies: Example GetUser Feeback [ MPF > 0.7 ] { uf } Start CaptureTraffic DetectBotnet [ MPF > 0.7 ] { MPF, uf } ReportToAUI [ Always ] Reference workflow, assuming: Purpose: BotnetMitigation Initiator: NetworkAdministrator

16 Workflows as Ontologies: Example GetUserFeedback1 ControlEdge hasdestination I I hasdestination I DataEdge hassource hassource Capture Traffic hasresource hasoperation CaptureTraffic1 hasactor I hassource MPF > 0.7 DetectBotnet1 hascondition I hassource 1 I hasdestination I DataEdge1 TaskNode hasdestination I hasdestination DataEdge2 hassource DataEdge4 I hassource I DataEdge3 hasdestination hascondition Always ReportToAUI1 I Purpose I BotnetMitigation Initiator I NetworkAdministrator

17 DEMONS Policy model The basis upon which Workflow Verification Procedure is grounded Provides the necessary knowledge for the operation of the system Two fundamental parts: Information Model, capturing all the concepts identified by the elaboration of the legal requirements and the network monitoring domain Rules, implementing the principles of necessity, proportionality, adequacy, minimisation, access limitation Fully implemented as an ontology

18 Information Model: Abstract Entities Purposes hasinputdata DataTypes mayactforpurposes mayservepurposes hasoutputdata hasinputalerts AlertTypes Roles Operations hasoutputalerts OrganisationTypes providesoperations Context MachineTypes hostscontainers OperationContainerTypes Various internal associations resulting in hierarchies

19 assignedwithroles isoforganisationtype isofmachinetype implementsoperation isofcontainertype isofdatatype isofalerttype Information Model: from Abstract to Concrete Entities Abstract Level mayactforpurposes Roles Purposes mayservepurposes DataTypes hasinputdata hasoutputdata AlertTypes hasinputalerts Operations hasoutputalerts Context Organisation Types MachineTypes hostscontainers providesoperations OperationContainer Types Data Users Operation Instances Alerts Organisations Machines hostscontainers providesoperationinstances OperationContainers Concrete Level

20 israw israw Information Model as an Ontology Example: Data Types hierarchies DataType YES YES isa IPv4Address lessdetailedthan contains IPv4Address NetworkID SourceIPv4 Address 6

21 israw israw Information Model as an Ontology Example: Data Types hierarchies DataType YES Ontological Class YES isa IPv4Address lessdetailedthan contains IPv4Address NetworkID SourceIPv4 Address 6

22 israw israw Information Model as an Ontology Example: Data Types hierarchies DataType YES YES isa IPv4Address lessdetailedthan contains IPv4Address NetworkID SourceIPv4 Address Individuals of the DataType class 6

23 israw israw Information Model as an Ontology Example: Data Types hierarchies DataType YES YES isa IPv4Address lessdetailedthan contains IPv4Address NetworkID SourceIPv4 Address Object properties 6

24 israw israw Information Model as an Ontology Example: Data Types hierarchies DataType YES YES isa IPv4Address lessdetailedthan contains IPv4Address NetworkID SourceIPv4 Address 6 Annotation Properties

25 Actions Whatever takes place in the context of DEMONS operation is seen as an operation of an actor on a resource Action Actor Operation Resource

26 Actions and Tasks By adding the organisation Org or the organisation type OrgT within which the action takes place: act i = a i, op i, res i, org An action act i being a part of a workflow w constitutes a task t i : t i = a i, op i, res i, org w or act i, w Not all the fields in the tuple need to be populated For instance, act i = *, op i, *, org, implies the execution of op i in org regardless the actor and resource Actions and tasks are atomic or composite following the hierarchical relations of operations

27 Three Levels of Abstraction R Op OpI hasactor Action hasoperation OpCT OpC U Op OpI R OpCT Op OpC U OpI AlT DT D Al MT M hasresource OrgT hasorganisation Org Abstract Concrete

28 Rules Permission Prohibition pu act preact cont postact Obligation DEMONS rules are defined over actions At every possible level of abstraction

29 Rules Permission Prohibition pu act preact cont postact Obligation act Act is the action that the rule applies to

30 Rules Permission Prohibition pu act preact cont postact Obligation pu Pu is the purpose for which act is permitted/ prohibitted/ obliged to be executed

31 Rules Permission Prohibition pu act preact cont postact Obligation preact Act is a structure of actions that should have be preceded in order for the rule to be enforced (e.g., another action, paths, etc.)

32 Rules Permission Prohibition pu act preact cont postact Obligation cont Con is a structure of contextual parameters (real time parameters + attributes evaluation)

33 Rules Permission Prohibition pu act preact cont postact Obligation postact Act refers to the action(s) that must be executed following the enforcement of the rule

34 Rules Permission Prohibition pu act preact cont postact Obligation Authorisations inherited across the Information Model s hierarchies Organisation concept not involved in the rule s body but included within each action The rule structure anticipates inter-domain scenarios, as act, preact and postact may take place within different organisations

35 Rules Permission Prohibition pu act preact cont postact Obligation Pre- and Post- Actions: single actions or Actions connected with logic operators AND, OR, NOT not implying sequence constraints Complex structures of actions named Skeletons Critical or non-critical Pre- and Post- Actions can be either tight or loose

36 Rules: Separation and Binding of Duty SoD / BoD Definition Permission Prohibition pu act preact cont postact Obligation Contextual constraints Static and dynamic SoD and BoD Defined by means of access and usage control rules Described as constraints between act and preact SoD and BoD apply to any combination of a, op, res, org act & a, op, res, org preact elements Contextual constraints apply (e.g., withinsameworkflow)

37 Rules: Ontological Representation Permission Prohibition pu act preact cont postact Obligation referstopurpose Purposes Rule appliesunder Context requirespreaction appliesforaction prescribespostaction Actions

38 For more information: Thank you for your attention! Any questions?

The DEMONS Integrated Access Control Model for Collaborative Network Monitoring

The DEMONS Integrated Access Control Model for Collaborative Network Monitoring The DEMONS Integrated Access Control Model for Collaborative Network Monitoring Eugenia I. Papagiannakopoulou Maria N. Koukovini Georgios V. Lioudakis Dimitra I. Kaklamani Iakovos S. Venieris The 4 th

More information

A Privacy-Aware Access Control Model for Distributed Network Monitoring

A Privacy-Aware Access Control Model for Distributed Network Monitoring A Privacy-Aware Access Control Model for Distributed Network Monitoring Eugenia I. Papagiannakopoulou a,, Maria N. Koukovini a, Georgios V. Lioudakis a, Joaquin Garcia-Alfaro b, Dimitra I. Kaklamani a,

More information

A contextual privacy-aware access control model for network monitoring workflows: work in progress

A contextual privacy-aware access control model for network monitoring workflows: work in progress A contextual privacy-aware access control model for network monitoring workflows: work in progress Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Joaquin Garcia Alfaro, Dimitra

More information

UML TUTORIALS THE USE CASE MODEL

UML TUTORIALS THE USE CASE MODEL UML TUTORIALS THE USE CASE MODEL www.sparxsystems.com.au Sparx Systems 2004 Page 1/5 describes the proposed functionality of the new system. A Use Case represents a discrete unit of interaction between

More information

The Enterprise Service Bus: Making Service-Oriented Architecture Real

The Enterprise Service Bus: Making Service-Oriented Architecture Real The Enterprise Service Bus: Making Service-Oriented Architecture Real M.T. Schmidt et al. Presented by: Mikael Fernandus Simalango SOA in Early Days Introduction Service Requester bind find Service Registry

More information

The Way to SOA Concept, Architectural Components and Organization

The Way to SOA Concept, Architectural Components and Organization The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new

More information

Service-Oriented Architectures

Service-Oriented Architectures Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems

More information

Monitoring within an Autonomic Network: A. Framework

Monitoring within an Autonomic Network: A. Framework Monitoring within an Autonomic Network: A GANA based Network Monitoring i Framework Anastasios Zafeiropoulos, Athanassios Liakopoulos, Alan Davy, Ranganai Chaparadza tzafeir@grnet.gr Greek Research and

More information

Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements

Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements Questions? Assignment Why is proper project management important? What is goal of domain analysis? What is the difference between functional and non- functional requirements? Why is it important for requirements

More information

Introducing Basic MPLS Concepts

Introducing Basic MPLS Concepts Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding

More information

The Service Revolution software engineering without programming languages

The Service Revolution software engineering without programming languages The Service Revolution software engineering without programming languages Gustavo Alonso Institute for Pervasive Computing Department of Computer Science Swiss Federal Institute of Technology (ETH Zurich)

More information

Dagstuhl seminar on Service Oriented Computing. Service design and development. Group report by Barbara Pernici, Politecnico di Milano

Dagstuhl seminar on Service Oriented Computing. Service design and development. Group report by Barbara Pernici, Politecnico di Milano Dagstuhl seminar on Service Oriented Computing Service design and development Group report by Barbara Pernici, Politecnico di Milano Abstract This paper reports on the discussions on design and development

More information

Flow Analysis Versus Packet Analysis. What Should You Choose?

Flow Analysis Versus Packet Analysis. What Should You Choose? Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation

More information

The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services.

The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services. The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services. Stephen McGibbon Microsoft EMEA Tel. +445511490070 Email. stephenm@microsoft.com Abstract:

More information

Business-Driven Software Engineering Lecture 3 Foundations of Processes

Business-Driven Software Engineering Lecture 3 Foundations of Processes Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster jku@zurich.ibm.com Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary

More information

The Need for a Choreography-aware Service Bus

The Need for a Choreography-aware Service Bus Institute of Architecture of Application Systems The Need for a Choreography-aware Service Bus Oliver Kopp, Tammo van Lessen, Jörg Nitzsche Institute of Architecture of Application Systems, University

More information

Combining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery

Combining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery Combining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery Dimitrios Kourtesis, Iraklis Paraskakis SEERC South East European Research Centre, Greece Research centre of the University

More information

Queensland recordkeeping metadata standard and guideline

Queensland recordkeeping metadata standard and guideline Queensland recordkeeping metadata standard and guideline June 2012 Version 1.1 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details Security

More information

Security Challenges & Opportunities in Software Defined Networks (SDN)

Security Challenges & Opportunities in Software Defined Networks (SDN) Security Challenges & Opportunities in Software Defined Networks (SDN) June 30 th, 2015 SEC2 2015 Premier atelier sur la sécurité dans les Clouds Nizar KHEIR Cyber Security Researcher Orange Labs Products

More information

ITU-T Kaleidoscope Conference Innovations in NGN. Managing NGN using the SOA Philosophy. Y. Fun Hu University of Bradford y.f.hu@bradford.ac.

ITU-T Kaleidoscope Conference Innovations in NGN. Managing NGN using the SOA Philosophy. Y. Fun Hu University of Bradford y.f.hu@bradford.ac. ITU-T Kaleidoscope Conference Innovations in NGN Managing NGN using the SOA Philosophy Y. Fun Hu University of Bradford y.f.hu@bradford.ac.uk Next Generation Network (NGN) A IP/IMS based network Provide

More information

Semantic EPC: Enhancing Process Modeling Using Ontologies

Semantic EPC: Enhancing Process Modeling Using Ontologies Institute for Information Systems IWi Institut (IWi) für at the German Research Wirtschaftsinformatik Center for im DFKI Saarbrücken Artificial Intelligence (DFKI), Saarland University Semantic EPC: Enhancing

More information

Semantic Variability Modeling for Multi-staged Service Composition

Semantic Variability Modeling for Multi-staged Service Composition Semantic Variability Modeling for Multi-staged Service Composition Bardia Mohabbati 1, Nima Kaviani 2, Dragan Gašević 3 1 Simon Fraser University, 2 University of British Columbia, 3 Athabasca University,

More information

Online Network Traffic Security Inspection Using MMT Tool

Online Network Traffic Security Inspection Using MMT Tool Online Network Traffic Security Inspection Using MMT Tool Wissam Mallouli, Bachar Wehbi, Edgardo Montes de Oca Michel Bourdellès, Denis Rocher and Arnaud Baloche Montimage EURL, 39 rue Bobillot, 75013

More information

draft-forwarding-label-ccn- 01.txt

draft-forwarding-label-ccn- 01.txt draft-forwarding-label-ccn- 01.txt Ravi Ravindran and Asit Chakraborti Huawei (IETF/ICNRG, Yokohama, 94) [ravi.ravindran@huawei.com] [asit.chakraborti@huawei.com] Agenda Draft Objectives Terminology Why

More information

Independent Insight for Service Oriented Practice. An SOA Roadmap. John C. Butler Chief Architect. A CBDI Partner Company. www.cbdiforum.

Independent Insight for Service Oriented Practice. An SOA Roadmap. John C. Butler Chief Architect. A CBDI Partner Company. www.cbdiforum. Independent Insight for Oriented Practice An SOA Roadmap John C. Butler Chief Architect A CBDI Partner Company www.cbdiforum.com Agenda! SOA Vision and Opportunity! SOA Roadmap Concepts and Maturity Levels!

More information

Service Oriented Networks Security. David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008

Service Oriented Networks Security. David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008 Service Oriented Networks Security David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008 While empowering new business models, SON leads to a proliferation of application networks

More information

Semantic Business Process Management

Semantic Business Process Management Arbeitsgruppe Lecture Semantic Business Process Management Prof. Dr. Adrian Paschke Corporate Semantic Web (AG-CSW) Institute for Computer Science, Freie Universitaet Berlin paschke@inf.fu-berlin.de http://www.inf.fu-berlin.de/groups/ag-csw/

More information

Automatic Composition of Web Services

Automatic Composition of Web Services Automatic Composition of Web Services N. Guermouche, O. Perrin, C. Ringeissen LORIA Réunion COPS 3. Guermouche, O. Perrin, C. Ringeissen (LORIA) Automatic Composition of Web Services Réunion COPS 3 1 /

More information

Cloud Federations in Contrail

Cloud Federations in Contrail Cloud Federations in Contrail Emanuele Carlini 1,3, Massimo Coppola 1, Patrizio Dazzi 1, Laura Ricci 1,2, GiacomoRighetti 1,2 " 1 - CNR - ISTI, Pisa, Italy" 2 - University of Pisa, C.S. Dept" 3 - IMT Lucca,

More information

A CLOUD SERVICE BROKER WITH LEGAL-RULE COMPLIANCE CHECKING AND QUALITY ASSURANCE CAPABILITIES

A CLOUD SERVICE BROKER WITH LEGAL-RULE COMPLIANCE CHECKING AND QUALITY ASSURANCE CAPABILITIES A CLOUD SERVICE BROKER WITH LEGAL-RULE COMPLIANCE CHECKING AND QUALITY ASSURANCE CAPABILITIES Cloud Forward 2015 7 October, 2015 Pisa, Scuola Normale Superiore Emiliano Casalicchio*, University of Rome

More information

Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity

Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity Sebastian Meissner Security Incident Information Sharing Workshop Berlin, 26.07.2013 Introduction Opening question Privacy & cybersecurity:

More information

Network Address Translation (NAT)

Network Address Translation (NAT) Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT. Taken from http://www.cs.virginia.edu/~itlab/ book/slides/module17-nat.ppt 1 Private Network Private IP network

More information

Prototype of a Platform for Business Collaboration

Prototype of a Platform for Business Collaboration Prototype of a Platform for Business Collaboration Marián Mach 1, Ján Hreňo 1, Karol Furdík 2 1 Faculty of Electrical Engineering and Informatics, Technical University of Košice, Letná 9, 042 00 Košice,

More information

NetFlow/IPFIX Various Thoughts

NetFlow/IPFIX Various Thoughts NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

Enabling Integrated Care

Enabling Integrated Care Enabling Integrated Care Harnessing personal health systems for better outcomes across the care continuum Briefing Note for a SmartPersonalHealth Workshop WoHIT, Thursday 18 March 2010, 13:00-17:00, Barcelona

More information

Security Domain Separation as Prerequisite for Business Flexibility. Igor Furgel T-Systems

Security Domain Separation as Prerequisite for Business Flexibility. Igor Furgel T-Systems Security Domain Separation as Prerequisite for Business Flexibility Igor Furgel T-Systems 23th-25th September, 2008, page 2 What are we speaking about? What is a Security Domain and what do we need it

More information

EU CUSTOMS BUSINESS PROCESS MODELLING POLICY

EU CUSTOMS BUSINESS PROCESS MODELLING POLICY EUROPEAN COMMISSION MASP Revision 2014 v1.1 ANNEX 4 DIRECTORATE-GENERAL TAXATION AND CUSTOMS UNION Customs Policy, Legislation, Tariff Customs Processes and Project Management Brussels, 03.11.2014 TAXUD.a3

More information

EXHIBIT A. Part IV Content Identification 1. the transmission of content, it is important to consider how content can be identified (e.g.

EXHIBIT A. Part IV Content Identification 1. the transmission of content, it is important to consider how content can be identified (e.g. EXHIBIT A Part IV Content Identification 1 As this article has been considering certain intellectual property ramifications relating to the transmission of content, it is important to consider how content

More information

On the general structure of ontologies of instructional models

On the general structure of ontologies of instructional models On the general structure of ontologies of instructional models Miguel-Angel Sicilia Information Engineering Research Unit Computer Science Dept., University of Alcalá Ctra. Barcelona km. 33.6 28871 Alcalá

More information

Service Modelling & Service Architecture:

Service Modelling & Service Architecture: Service Modelling & Service Architecture: From Service Renewal and Service Flows to Service Architecture Presenter: Professor Paul Buhler Head of the Global University Alliance SOA Research & Development

More information

TOWARDS ENVIRONMENTAL PROCESS SHARING FOR GEOSS

TOWARDS ENVIRONMENTAL PROCESS SHARING FOR GEOSS TOWARDS ENVIRONMENTAL PROCESS SHARING FOR GEOSS Lorenzino VACCARI, Mattia SANTORO, Max CRAGLIA, Lorenzo BIGAGLI, Michele CHINOSI, Stefano NATIVI EuroGEOSS Conference Madrid 25-27 January 2012 Summary Motivation

More information

Using TechExcel s DevSuite to Achieve FDA Software Validation Compliance For Medical Software Device Development

Using TechExcel s DevSuite to Achieve FDA Software Validation Compliance For Medical Software Device Development Using TechExcel s DevSuite to Achieve FDA Software Validation Compliance For Medical Software Device Development The FDA requires medical software development teams to comply with its standards for software

More information

Policy-based Service Management

Policy-based Service Management Policy-based Service Management John Strassner Masaki Fukushima draft-bi-supa-policy-model draft-zaalouk-supa-vpn-service-management-model Agenda PBSM and Its Relation to SUPA Policy Terminology Types

More information

Workshop on Collaborative Security and Privacy Technologies

Workshop on Collaborative Security and Privacy Technologies Workshop on Collaborative Security and Privacy Technologies Dr. Sathya Rao KYOS; Switzerland, Sathya.rao@kyos.ch CSP EU FORUM 2012, 25 April 2012, Berlin Trust and Society Trustworthy systems essential

More information

Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)

Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:

More information

Business Rule Standards -- Interoperability and Portability

Business Rule Standards -- Interoperability and Portability Rule Standards -- Interoperability and Portability April 2005 Mark H. Linehan Senior Technical Staff Member IBM Software Group Emerging Technology mlinehan@us.ibm.com Donald F. Ferguson IBM Fellow Software

More information

10 Years of Hype Cycles - Do We Forget Knowledge?

10 Years of Hype Cycles - Do We Forget Knowledge? 10 Years of Hype Cycles - Do We Forget Knowledge? Aaron McConnell Research Scientist IU-ATC School of Computing and Information Engineering University of Ulster at Coleraine Northern Ireland Aaron McConnell

More information

Ontologies for Enterprise Integration

Ontologies for Enterprise Integration Ontologies for Enterprise Integration Mark S. Fox and Michael Gruninger Department of Industrial Engineering,University of Toronto, 4 Taddle Creek Road, Toronto, Ontario M5S 1A4 tel:1-416-978-6823 fax:1-416-971-1373

More information

Savera Tanwir. Internet Protocol

Savera Tanwir. Internet Protocol Savera Tanwir Internet Protocol The IP Protocol The IPv4 (Internet Protocol) header. IP Packet Details Header and payload Header itself has a fixed part and variable part Version IPv4, IPv5 or IPv6 IHL,

More information

SPIKE 1 A Collaboration Platform for Short-Term Virtual Business Alliances

SPIKE 1 A Collaboration Platform for Short-Term Virtual Business Alliances SPIKE 1 A Collaboration Platform for Short-Term Virtual Business Alliances Christian Broser, Christoph Fritsch, Oliver Gmelch, Günther Pernul, Rolf Schillinger Department of Information Systems, University

More information

MODELING OF SERVICE ORIENTED ARCHITECTURE: FROM BUSINESS PROCESS TO SERVICE REALISATION

MODELING OF SERVICE ORIENTED ARCHITECTURE: FROM BUSINESS PROCESS TO SERVICE REALISATION MODELING OF SERVICE ORIENTED ARCHITECTURE: FROM BUSINESS PROCESS TO SERVICE REALISATION Marek Rychlý and Petr Weiss Faculty of Information Technology, Brno University of Technology, Czech Republic, rychly@fit.vutbr.cz,

More information

Overview of major concepts in the service oriented extended OeBTO

Overview of major concepts in the service oriented extended OeBTO Modelling business policies and behaviour based on extended Open edi Business Transaction Ontology (OeBTO) Introduction Model Driven Development (MDD) provides a basis for the alignment between business

More information

(BA122) Software Engineer s Workshop (SEW)

(BA122) Software Engineer s Workshop (SEW) Training for the Business Analyst (BA122) Software Engineer s Workshop (SEW) Duration: 4 days CDUs (Continuing Development Units): 28 Description: A practical workshop covering the role of the Business-Systems

More information

Service Broker for 3 Party Enabling

Service Broker for 3 Party Enabling Deutsche Telekom Laboratories An-Institut der Technischen Universität Berlin rd Service Broker for 3 Party Enabling Horst Stein, Niklas Blum (FhG Fokus) White Paper No. 5 August 2009 Abstract and Keywords

More information

Business Object Document (BOD) Message Architecture for OAGIS Release 9.+

Business Object Document (BOD) Message Architecture for OAGIS Release 9.+ Business Object Document (BOD) Message Architecture for OAGIS Release 9.+ an OAGi White Paper Document #20110408V1.0 Open standards that open markets TM Open Applications Group, Incorporated OAGi A consortium

More information

Lecture 03 (04.11.2013) Quality of the Software Development Process

Lecture 03 (04.11.2013) Quality of the Software Development Process Systeme hoher Qualität und Sicherheit Universität Bremen, WS 2013/14 Lecture 03 (04.11.2013) Quality of the Software Development Process Christoph Lüth Christian Liguda Your Daily Menu Models of Software

More information

COSC 3351 Software Design. Recap for the first quiz. Edgar Gabriel. Spring 2008. For the 1 st Quiz

COSC 3351 Software Design. Recap for the first quiz. Edgar Gabriel. Spring 2008. For the 1 st Quiz COSC 3351 Software Design Recap for the first quiz Spring 2008 For the 1 st Quiz Three large topic areas: UML syntax and diagrams Software architectural styles Object oriented design principles A couple

More information

A MORE FLEXIBLE MULTI-TENANT SOA FOR SAAS

A MORE FLEXIBLE MULTI-TENANT SOA FOR SAAS A MORE FLEXIBLE MULTI-TENANT SOA FOR SAAS Eric H. Nielsen, Ph.D. VP Platform Architecture CA Technologies e.h.nielsen@ieee.org For IEEE Software Technology Conference STC 2014 April 3, 2014 Long Beach,

More information

Challenges and Opportunities for formal specifications in Service Oriented Architectures

Challenges and Opportunities for formal specifications in Service Oriented Architectures ACSD ATPN Xi an China June 2008 Challenges and Opportunities for formal specifications in Service Oriented Architectures Gustavo Alonso Systems Group Department of Computer Science Swiss Federal Institute

More information

Service-Oriented Architecture and Software Engineering

Service-Oriented Architecture and Software Engineering -Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based

More information

TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES

TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES REALIZATION OF A RESEARCH AND DEVELOPMENT PROJECT (PRE-COMMERCIAL PROCUREMENT) ON CLOUD FOR EUROPE TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES ANNEX IV (D) TO THE CONTRACT NOTICE TENDER

More information

WOICE: a Decentralized System for Ubiquitous VoIP Services

WOICE: a Decentralized System for Ubiquitous VoIP Services : a Decentralized System for Ubiquitous VoIP Services Costas Kalogiros 1, Costas Courcoubetis 1, and Panayotis Antoniadis 2 1 Athens University of Economics and Business Department of Computer Science

More information

The SPES Methodology Modeling- and Analysis Techniques

The SPES Methodology Modeling- and Analysis Techniques The SPES Methodology Modeling- and Analysis Techniques Dr. Wolfgang Böhm Technische Universität München boehmw@in.tum.de Agenda SPES_XT Project Overview Some Basic Notions The SPES Methodology SPES_XT

More information

Use Case Diagrams. Tutorial

Use Case Diagrams. Tutorial Use Case Diagrams Tutorial What is a use case? A requirements analysis concept A case of a use of the system/product Describes the system's actions from a the point of view of a user Tells a story A sequence

More information

SOFTWARE DEFINED NETWORKS REALITY CHECK. DENOG5, Darmstadt, 14/11/2013 Carsten Michel

SOFTWARE DEFINED NETWORKS REALITY CHECK. DENOG5, Darmstadt, 14/11/2013 Carsten Michel SOFTWARE DEFINED NETWORKS REALITY CHECK DENOG5, Darmstadt, 14/11/2013 Carsten Michel Software Defined Networks (SDN)! Why Software Defined Networking? There s a hype in the industry!! Dispelling some myths

More information

Software Active Online Monitoring Under. Anticipatory Semantics

Software Active Online Monitoring Under. Anticipatory Semantics Software Active Online Monitoring Under Anticipatory Semantics Changzhi Zhao, Wei Dong, Ji Wang, Zhichang Qi National Laboratory for Parallel and Distributed Processing P.R.China 7/21/2009 Overview Software

More information

Defining Generic Architecture for Cloud Infrastructure as a Service Model

Defining Generic Architecture for Cloud Infrastructure as a Service Model Defining Generic Architecture for Cloud Infrastructure as a Service Model Yuri Demchenko 1 University of Amsterdam Science Park 904, Amsterdam, The Netherlands E-mail: y.demchenko@uva.nl Cees de Laat University

More information

McAfee Next Generation Firewall (NGFW) Administration Course

McAfee Next Generation Firewall (NGFW) Administration Course McAfee Product Education McAfee Next Generation Firewall (NGFW) Administration Course The McAfee NGFW Administration course from Education Services provides attendees with hands-on training on the design,

More information

S o l u t i o n O v e r v i e w. Optimising Service Assurance with Vitria Operational Intelligence

S o l u t i o n O v e r v i e w. Optimising Service Assurance with Vitria Operational Intelligence S o l u t i o n O v e r v i e w > Optimising Service Assurance with Vitria Operational Intelligence 1 Table of Contents 1 Executive Overview 1 Value of Operational Intelligence for Network Service Assurance

More information

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Agenda. Distributed System Structures. Why Distributed Systems? Motivation Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

Cordys Business Operations Platform

Cordys Business Operations Platform SERVICE DEFINITION Cordys Business Operations GCloud IV - PaaS Copyright 2012 Cordys B.V. All rights reserved. Table of Content Cordys Business Operations... 1 Table of Content... 2 Introduction... 4 Document

More information

Lecture Notes course 02267 Software Development of Web Services

Lecture Notes course 02267 Software Development of Web Services Lecture Notes course 02267 Software Development of Web Services Hubert Baumeister huba@dtu.dk Fall 2014 Contents 1 Web Service Coordination 1 1.1 What is Coordination.........................................

More information

Enterprise Architecture at Work

Enterprise Architecture at Work Marc Lankhorst et al. Enterprise Architecture at Work Modelling, Communication and Analysis Third Edition 4y Springer Contents 1 Introduction to Enterprise Architecture 1 1.1 Architecture 1 1.2 Enterprise

More information

Engineering Process Software Qualities Software Architectural Design

Engineering Process Software Qualities Software Architectural Design Engineering Process We need to understand the steps that take us from an idea to a product. What do we do? In what order do we do it? How do we know when we re finished each step? Production process Typical

More information

Processes, services and business agility

Processes, services and business agility Processes, services and business agility prof. dr. Wilfried Lemahieu K.U.Leuven Faculty of Business and Economics Department of Decision sciences and Information Management wilfried.lemahieu@econ.kuleuven.be

More information

Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University

Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University Computer Network Foundation Chun-Jen (James) Chung 1 Outline Network Addressing Subnetting Classless Inter-Domain Routing (CIDR) Route Aggregation Network Addressing How does the network decide where to

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

Implementing VoIP monitoring solutions. Deployment note

Implementing VoIP monitoring solutions. Deployment note Implementing VoIP monitoring solutions Deployment note Introduction With VoIP being an integral part of modern day business communications, enterprises are placing greater emphasis on the monitoring and

More information

Compliance ow - managing the compliance of dynamic and complex processes

Compliance ow - managing the compliance of dynamic and complex processes Loughborough University Institutional Repository Compliance ow - managing the compliance of dynamic and complex processes This item was submitted to Loughborough University's Institutional Repository by

More information

Software + Services Using WCF and WF

Software + Services Using WCF and WF Software + Services Using WCF and WF Michael Stiefel Reliable Software, Inc. www.reliablesoftware.com Pre-requisites for this presentation: 1) Understand WCF 2) Understand WFC Level: Intermediate Goals

More information

Business Process Modeling Information Systems in Industry (372-1-4207 )

Business Process Modeling Information Systems in Industry (372-1-4207 ) Business Process Modeling Information Systems in Industry (372-1-4207 ) Arnon Sturm The material of this presentation is adopted from various people including:, Pnina Soffer, Iris Reinhartz-Berger 1 Outline

More information

Oracle Service Bus: - When to use, where to use and when not to use

Oracle Service Bus: - When to use, where to use and when not to use Oracle Service Bus: - When to use, where to use and when not to use Session ID#: 244 Prepared by: Abhay Kumar Senior Consultant AST Corporation REMINDER Check in on the COLLABORATE mobile app Specialized.

More information

Software Defined Networking & Openflow

Software Defined Networking & Openflow Software Defined Networking & Openflow Autonomic Computer Systems, HS 2015 Christopher Scherb, 01.10.2015 Overview What is Software Defined Networks? Brief summary on routing and forwarding Introduction

More information

41. How Should Services Be Identified or Specified to Maximize Reuse?

41. How Should Services Be Identified or Specified to Maximize Reuse? CHAPTER 5 METHODS 103 41. How Should Services Be Identified or Specified to Maximize Reuse? A key tenet of understanding SOA is the focus on getting the organization to reuse versus a focus on the programmer

More information

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach Reusable Knowledge-based Components for Building Software Applications: A Knowledge Modelling Approach Martin Molina, Jose L. Sierra, Jose Cuena Department of Artificial Intelligence, Technical University

More information

Specification and Analysis of Contracts Lecture 1 Introduction

Specification and Analysis of Contracts Lecture 1 Introduction Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider gerardo@ifi.uio.no http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.

More information

Data-Aware Service Choreographies through Transparent Data Exchange

Data-Aware Service Choreographies through Transparent Data Exchange Institute of Architecture of Application Systems Data-Aware Service Choreographies through Transparent Data Exchange Michael Hahn, Dimka Karastoyanova, and Frank Leymann Institute of Architecture of Application

More information

How To Develop Software

How To Develop Software Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which

More information

Open S-BPM: Goals and Architecture

Open S-BPM: Goals and Architecture Open S-BPM: Goals and Architecture Albert Fleischmann Werner Schmidt Table of Content 1 Introduction... 2 2 Mission, Vision and Objectives... 2 3 Research and Development Areas... 3 4 Open S-BPM Architecture...

More information

SEMANTIC-BASED AUTHORING OF TECHNICAL DOCUMENTATION

SEMANTIC-BASED AUTHORING OF TECHNICAL DOCUMENTATION SEMANTIC-BASED AUTHORING OF TECHNICAL DOCUMENTATION R Setchi, Cardiff University, UK, Setchi@cf.ac.uk N Lagos, Cardiff University, UK, LagosN@cf.ac.uk ABSTRACT Authoring of technical documentation is a

More information

Cloud Monitoring and Auditing with CADF (Cloud Auditing and Data Federation)

Cloud Monitoring and Auditing with CADF (Cloud Auditing and Data Federation) July, 2013 Portland Cloud Monitoring and Auditing with CADF (Cloud Auditing and Data Federation) Jacques Durand (Fujitsu) Matt Rutkowski (IBM) Disclaimer The information in this presentation represents

More information

Intelligent Agents The New perspective Enhancing Network Security

Intelligent Agents The New perspective Enhancing Network Security Intelligent Agents The New perspective Enhancing Network Security Krystian Baniak 24 October 2007 Agenda Introduction Intelligent Agent Based Systems Agent Reinforced Reasoning Research description Law

More information

TECHNICAL SPECIFICATION: SECURE LEGISLATION-AWARE STORAGE SOLUTION

TECHNICAL SPECIFICATION: SECURE LEGISLATION-AWARE STORAGE SOLUTION REALIZATION OF A RESEARCH AND DEVELOPMENT PROJECT (PRE-COMMERCIAL PROCUREMENT) ON CLOUD FOR EUROPE TECHNICAL SPECIFICATION: SECURE LEGISLATION-AWARE STORAGE SOLUTION ANNEX IV (C) TO THE CONTRACT NOTICE

More information

Distributed Data Management

Distributed Data Management Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that

More information

An Oracle White Paper October 2013. Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus

An Oracle White Paper October 2013. Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus An Oracle White Paper October 2013 Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus Table of Contents Introduction...

More information

Fujitsu Service-Oriented Architecture (SOA) A Web Services Framework

Fujitsu Service-Oriented Architecture (SOA) A Web Services Framework Fujitsu Service-Oriented Architecture (SOA) A Web Services Framework Introduction Retaining customers depends on continuously supporting new types of services. The more services a customer purchases from

More information

Oracle Service Bus vs. Oracle Enterprise Service Bus vs. BPEL wann soll welche Komponente eingesetzt werden?

Oracle Service Bus vs. Oracle Enterprise Service Bus vs. BPEL wann soll welche Komponente eingesetzt werden? Oracle Service Bus vs. Oracle Enterprise Service Bus vs. BPEL wann soll welche Komponente eingesetzt werden? Guido Schmutz, Technology Manager / Partner Basel Baden Bern Lausanne Zürich Düsseldorf Frankfurt/M.

More information

Huawei Technologies ERC Position Statement: Towards a Future Internet Public Private Partnership

Huawei Technologies ERC Position Statement: Towards a Future Internet Public Private Partnership Huawei Technologies ERC Position Statement: Towards a Future Internet Public Private Partnership Kostas Pentikousis, Mirko Schramm, and Cornel Pampu Huawei Technologies European Research Centre Carnotstrasse

More information