Using Ontologies for Privacy-Awareness in Network Monitoring Workflows
|
|
- Noah Whitehead
- 8 years ago
- Views:
Transcription
1 Using Ontologies for Privacy-Awareness in Network Monitoring Workflows Georgios V. Lioudakis Institute of Communication and Computer Systems National Technical University of Athens Workshop on Collaborative Security and Privacy Technologies Cyber Security & Privacy EU Forum 2012
2 Motivating/Supporting Initiatives FP6 IST DISCREET Discreet Service Provision in Smart Environments FP7 ICT PRISM PRIvacy-aware Secure Monitoring FP7 ICT DEMONS DEcentralized, cooperative, and privacy-preserving MONitoring for trustworthiness ETSI ISG MOI Measurement Ontology for IP Traffic 2009
3 Passive Network Monitoring Inspection of the actual network traffic using special software and/or hardware equipment Range of applications: Operation and management of communication networks Identification of performance bottlenecks Network security (IDS, ADS, ) Network planning Accounting and billing of network services Validation of SLAs Observation and fine-tuning of QoS parameters Internet research based on collected traffic traces Law enforcement (data retention, lawful interception, )
4 Passive Network Monitoring Serious drawback: privacy implications! Relies natively on personal data collection and processing Various documented privacy violation mishaps Passive Network Monitoring special characteristics: Privacy-sensitive information exceeds payload and spans across various protocol headers and other communication metadata Too much personal information can be inferred and extracted using advanced processing techniques (statistical analysis, fingerprinting, ) Specific regulations govern the underlying services and data Very high data rates and consequent performance requirements Distributed and cooperative nature of operations and infrastructures Intra-domain Inter-domain
5 Fundamentals of the Approach Realisation of Privacy by Design Privacy-aware information flows and operations Enforcement of privacy-aware access control across the flows Contextual behaviour of the system Automatic integration of protection means Anonymisation, pseudonymisation, aggregation modules Complementary actions Consideration of the semantics of various concepts, such as: Data types, roles, operational processes, purposes for data collection and processing Use of ontologies for: Information modelling Workflow modelling Access and usage control rules specification
6 Execution Phase Planning Phase DEMONS Workflow Management Architecture Workflow Model Checker Reasoner <?xml version="1.0"?> <rdf:rdf xmlns:xsp= Policies WF Planning Environment Capabilities Matching Orchestration Layer Orchestration Interface Capabilities Bus Orchestrator Orchestrator Orchestrator Components Layer Components Interface Agent Agent Agent Agent Agent Control Message Bus Context Bus
7 DEMONS Workflows A workflow consists of tasks and their interactions w = T, F C, F D, where T = t 1, t 2,..., t n, t i = a i, op i, res i w F C : control flow associations F D : data flow associations + a declared purpose pu, e.g., NetworkSecurity + User role(s) r, e.g., NetworkAdministrator Overall WF = w, r k, pu or WF = w, r k, pu m for a stored workflow template GetUser Feeback [ MPF > 0.7 ] { uf } Start CaptureTraffic DetectBotnet [ MPF > 0.7 ] { MPF, uf } ReportToAUI [ Always ]
8 Workflow Verification Mechanism Ensures that the user-specified workflow is rendered privacy compliant before entering the execution phase A three steps procedure: 1. Purpose Verification: Checks regarding purpose compliance (relevance, consistency, etc.) 2. Skin Task Verification: User-specified tasks checked individually and in relation to each other 3. Decomposition: Composite skin tasks refinement and evaluation, until the level of atomic tasks Relies on a policy-based access control model Core components: Model Checker and Reasoner
9 Planning Phase Outcome GetUser Feeback [ MPF > 0.7 ] { uf } Start CaptureTraffic DetectBotnet [ MPF > 0.7 ] { MPF, uf } ReportToAUI [ Always ] GetUser Feeback [ 0.8 > MPF > 0.7 ] ProxyMode Anonymise [ MPF > 0.7 ] BlockingMode DetectBotnet CorrelateAlerts ReportToAUI [ MPF > 0.7 ] { uf } [ 1.0 > MPF > 0.9 ] [ 0.9 > MPF > 0.8 && uf == Int-m ] InteractionMode CaptureTraffic Start InformSecurityOfficer [ 0.9 > MPF > 0.8 && uf == Dis-m ] [ Always ] DisinfectionMode
10 Execution Phase Planning Phase Workflow Splitting and Dispatching Anonymise CaptureTraffic Start GetUser Feeback [ MPF > 0.7 ] DetectBotnet CorrelateAlerts ReportToAUI Orchestration Layer [ MPF > 0.7 ] InformSecurityOfficer { uf } WF Planning Environment [ 0.8 > MPF > 0.7 ] [ 1.0 > MPF > 0.9 ] [ 0.9 > MPF > 0.8 Reasoner Workflow && <?xml version="1.0"?> <rdf:rdf Model uf == Int-m ] xmlns:xsp= InteractionMode Checker Policies [ 0.9 > MPF > 0.8 && uf == Dis-m ] DisinfectionMode Capabilities Matching [ Always ] Orchestration Interface ProxyMode BlockingMode Capabilities Bus Orchestrator Orchestrator Orchestrator Components Layer Components Interface Agent Agent Agent Agent Agent Control Message Bus Context Bus
11 Workflows as Ontologies GetUser Feeback [ 0.8 > MPF > 0.7 ] ProxyMode Anonymise [ MPF > 0.7 ] { uf } [ 1.0 > MPF > 0.9 ] BlockingMode DetectBotnet CorrelateAlerts ReportToAUI [ MPF > 0.7 ] [ 0.9 > MPF > 0.8 && uf == Int-m ] InteractionMode CaptureTraffic Start InformSecurityOfficer [ 0.9 > MPF > 0.8 && uf == Dis-m ] [ Always ] DisinfectionMode DEMONS introduces an innovative approach for workflows description Motivation: the integration of typically disjoint BPM and scientific workflows Instead of legacy methods (e.g., BPMN), use of ontologies
12 Workflows as Ontologies GetUser Feeback [ 0.8 > MPF > 0.7 ] ProxyMode Anonymise [ MPF > 0.7 ] { uf } [ 1.0 > MPF > 0.9 ] BlockingMode DetectBotnet CorrelateAlerts ReportToAUI [ MPF > 0.7 ] [ 0.9 > MPF > 0.8 && uf == Int-m ] InteractionMode CaptureTraffic Start InformSecurityOfficer [ 0.9 > MPF > 0.8 && uf == Dis-m ] [ Always ] DisinfectionMode Class: TaskNode Annotation properties: actor, operation, resource, security policies, attributes, Object properties: describing connections with flow arrows
13 Workflows as Ontologies GetUser Feeback [ 0.8 > MPF > 0.7 ] ProxyMode Anonymise [ MPF > 0.7 ] DetectBotnet CorrelateAlerts ReportToAUI [ MPF > 0.7 ] { uf } [ 1.0 > MPF > 0.9 ] [ 0.9 > MPF > 0.8 && uf == Int-m ] BlockingMode InteractionMode CaptureTraffic Start InformSecurityOfficer [ 0.9 > MPF > 0.8 && uf == Dis-m ] [ Always ] DisinfectionMode Class: DataEdge Annotation properties: data type, condition, Object properties: source, destination
14 Workflows as Ontologies GetUser Feeback [ 0.8 > MPF > 0.7 ] ProxyMode Anonymise [ MPF > 0.7 ] DetectBotnet CorrelateAlerts ReportToAUI [ MPF > 0.7 ] { uf } [ 1.0 > MPF > 0.9 ] [ 0.9 > MPF > 0.8 && uf == Int-m ] BlockingMode InteractionMode CaptureTraffic Start InformSecurityOfficer [ 0.9 > MPF > 0.8 && uf == Dis-m ] [ Always ] DisinfectionMode Class: ControlEdge Annotation properties: parameter, condition, Object properties: source, destination
15 Workflows as Ontologies: Example GetUser Feeback [ MPF > 0.7 ] { uf } Start CaptureTraffic DetectBotnet [ MPF > 0.7 ] { MPF, uf } ReportToAUI [ Always ] Reference workflow, assuming: Purpose: BotnetMitigation Initiator: NetworkAdministrator
16 Workflows as Ontologies: Example GetUserFeedback1 ControlEdge hasdestination I I hasdestination I DataEdge hassource hassource Capture Traffic hasresource hasoperation CaptureTraffic1 hasactor I hassource MPF > 0.7 DetectBotnet1 hascondition I hassource 1 I hasdestination I DataEdge1 TaskNode hasdestination I hasdestination DataEdge2 hassource DataEdge4 I hassource I DataEdge3 hasdestination hascondition Always ReportToAUI1 I Purpose I BotnetMitigation Initiator I NetworkAdministrator
17 DEMONS Policy model The basis upon which Workflow Verification Procedure is grounded Provides the necessary knowledge for the operation of the system Two fundamental parts: Information Model, capturing all the concepts identified by the elaboration of the legal requirements and the network monitoring domain Rules, implementing the principles of necessity, proportionality, adequacy, minimisation, access limitation Fully implemented as an ontology
18 Information Model: Abstract Entities Purposes hasinputdata DataTypes mayactforpurposes mayservepurposes hasoutputdata hasinputalerts AlertTypes Roles Operations hasoutputalerts OrganisationTypes providesoperations Context MachineTypes hostscontainers OperationContainerTypes Various internal associations resulting in hierarchies
19 assignedwithroles isoforganisationtype isofmachinetype implementsoperation isofcontainertype isofdatatype isofalerttype Information Model: from Abstract to Concrete Entities Abstract Level mayactforpurposes Roles Purposes mayservepurposes DataTypes hasinputdata hasoutputdata AlertTypes hasinputalerts Operations hasoutputalerts Context Organisation Types MachineTypes hostscontainers providesoperations OperationContainer Types Data Users Operation Instances Alerts Organisations Machines hostscontainers providesoperationinstances OperationContainers Concrete Level
20 israw israw Information Model as an Ontology Example: Data Types hierarchies DataType YES YES isa IPv4Address lessdetailedthan contains IPv4Address NetworkID SourceIPv4 Address 6
21 israw israw Information Model as an Ontology Example: Data Types hierarchies DataType YES Ontological Class YES isa IPv4Address lessdetailedthan contains IPv4Address NetworkID SourceIPv4 Address 6
22 israw israw Information Model as an Ontology Example: Data Types hierarchies DataType YES YES isa IPv4Address lessdetailedthan contains IPv4Address NetworkID SourceIPv4 Address Individuals of the DataType class 6
23 israw israw Information Model as an Ontology Example: Data Types hierarchies DataType YES YES isa IPv4Address lessdetailedthan contains IPv4Address NetworkID SourceIPv4 Address Object properties 6
24 israw israw Information Model as an Ontology Example: Data Types hierarchies DataType YES YES isa IPv4Address lessdetailedthan contains IPv4Address NetworkID SourceIPv4 Address 6 Annotation Properties
25 Actions Whatever takes place in the context of DEMONS operation is seen as an operation of an actor on a resource Action Actor Operation Resource
26 Actions and Tasks By adding the organisation Org or the organisation type OrgT within which the action takes place: act i = a i, op i, res i, org An action act i being a part of a workflow w constitutes a task t i : t i = a i, op i, res i, org w or act i, w Not all the fields in the tuple need to be populated For instance, act i = *, op i, *, org, implies the execution of op i in org regardless the actor and resource Actions and tasks are atomic or composite following the hierarchical relations of operations
27 Three Levels of Abstraction R Op OpI hasactor Action hasoperation OpCT OpC U Op OpI R OpCT Op OpC U OpI AlT DT D Al MT M hasresource OrgT hasorganisation Org Abstract Concrete
28 Rules Permission Prohibition pu act preact cont postact Obligation DEMONS rules are defined over actions At every possible level of abstraction
29 Rules Permission Prohibition pu act preact cont postact Obligation act Act is the action that the rule applies to
30 Rules Permission Prohibition pu act preact cont postact Obligation pu Pu is the purpose for which act is permitted/ prohibitted/ obliged to be executed
31 Rules Permission Prohibition pu act preact cont postact Obligation preact Act is a structure of actions that should have be preceded in order for the rule to be enforced (e.g., another action, paths, etc.)
32 Rules Permission Prohibition pu act preact cont postact Obligation cont Con is a structure of contextual parameters (real time parameters + attributes evaluation)
33 Rules Permission Prohibition pu act preact cont postact Obligation postact Act refers to the action(s) that must be executed following the enforcement of the rule
34 Rules Permission Prohibition pu act preact cont postact Obligation Authorisations inherited across the Information Model s hierarchies Organisation concept not involved in the rule s body but included within each action The rule structure anticipates inter-domain scenarios, as act, preact and postact may take place within different organisations
35 Rules Permission Prohibition pu act preact cont postact Obligation Pre- and Post- Actions: single actions or Actions connected with logic operators AND, OR, NOT not implying sequence constraints Complex structures of actions named Skeletons Critical or non-critical Pre- and Post- Actions can be either tight or loose
36 Rules: Separation and Binding of Duty SoD / BoD Definition Permission Prohibition pu act preact cont postact Obligation Contextual constraints Static and dynamic SoD and BoD Defined by means of access and usage control rules Described as constraints between act and preact SoD and BoD apply to any combination of a, op, res, org act & a, op, res, org preact elements Contextual constraints apply (e.g., withinsameworkflow)
37 Rules: Ontological Representation Permission Prohibition pu act preact cont postact Obligation referstopurpose Purposes Rule appliesunder Context requirespreaction appliesforaction prescribespostaction Actions
38 For more information: Thank you for your attention! Any questions?
The DEMONS Integrated Access Control Model for Collaborative Network Monitoring
The DEMONS Integrated Access Control Model for Collaborative Network Monitoring Eugenia I. Papagiannakopoulou Maria N. Koukovini Georgios V. Lioudakis Dimitra I. Kaklamani Iakovos S. Venieris The 4 th
More informationA Privacy-Aware Access Control Model for Distributed Network Monitoring
A Privacy-Aware Access Control Model for Distributed Network Monitoring Eugenia I. Papagiannakopoulou a,, Maria N. Koukovini a, Georgios V. Lioudakis a, Joaquin Garcia-Alfaro b, Dimitra I. Kaklamani a,
More informationA contextual privacy-aware access control model for network monitoring workflows: work in progress
A contextual privacy-aware access control model for network monitoring workflows: work in progress Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Joaquin Garcia Alfaro, Dimitra
More informationUML TUTORIALS THE USE CASE MODEL
UML TUTORIALS THE USE CASE MODEL www.sparxsystems.com.au Sparx Systems 2004 Page 1/5 describes the proposed functionality of the new system. A Use Case represents a discrete unit of interaction between
More informationThe Enterprise Service Bus: Making Service-Oriented Architecture Real
The Enterprise Service Bus: Making Service-Oriented Architecture Real M.T. Schmidt et al. Presented by: Mikael Fernandus Simalango SOA in Early Days Introduction Service Requester bind find Service Registry
More informationThe Way to SOA Concept, Architectural Components and Organization
The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new
More informationService-Oriented Architectures
Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems
More informationMonitoring within an Autonomic Network: A. Framework
Monitoring within an Autonomic Network: A GANA based Network Monitoring i Framework Anastasios Zafeiropoulos, Athanassios Liakopoulos, Alan Davy, Ranganai Chaparadza tzafeir@grnet.gr Greek Research and
More informationQuestions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements
Questions? Assignment Why is proper project management important? What is goal of domain analysis? What is the difference between functional and non- functional requirements? Why is it important for requirements
More informationIntroducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
More informationThe Service Revolution software engineering without programming languages
The Service Revolution software engineering without programming languages Gustavo Alonso Institute for Pervasive Computing Department of Computer Science Swiss Federal Institute of Technology (ETH Zurich)
More informationDagstuhl seminar on Service Oriented Computing. Service design and development. Group report by Barbara Pernici, Politecnico di Milano
Dagstuhl seminar on Service Oriented Computing Service design and development Group report by Barbara Pernici, Politecnico di Milano Abstract This paper reports on the discussions on design and development
More informationFlow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
More informationThe case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services.
The case for service oriented architecture in realising trusted, interoperable, pan-european egovernment services. Stephen McGibbon Microsoft EMEA Tel. +445511490070 Email. stephenm@microsoft.com Abstract:
More informationBusiness-Driven Software Engineering Lecture 3 Foundations of Processes
Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster jku@zurich.ibm.com Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary
More informationThe Need for a Choreography-aware Service Bus
Institute of Architecture of Application Systems The Need for a Choreography-aware Service Bus Oliver Kopp, Tammo van Lessen, Jörg Nitzsche Institute of Architecture of Application Systems, University
More informationCombining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery
Combining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery Dimitrios Kourtesis, Iraklis Paraskakis SEERC South East European Research Centre, Greece Research centre of the University
More informationQueensland recordkeeping metadata standard and guideline
Queensland recordkeeping metadata standard and guideline June 2012 Version 1.1 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details Security
More informationSecurity Challenges & Opportunities in Software Defined Networks (SDN)
Security Challenges & Opportunities in Software Defined Networks (SDN) June 30 th, 2015 SEC2 2015 Premier atelier sur la sécurité dans les Clouds Nizar KHEIR Cyber Security Researcher Orange Labs Products
More informationITU-T Kaleidoscope Conference Innovations in NGN. Managing NGN using the SOA Philosophy. Y. Fun Hu University of Bradford y.f.hu@bradford.ac.
ITU-T Kaleidoscope Conference Innovations in NGN Managing NGN using the SOA Philosophy Y. Fun Hu University of Bradford y.f.hu@bradford.ac.uk Next Generation Network (NGN) A IP/IMS based network Provide
More informationSemantic EPC: Enhancing Process Modeling Using Ontologies
Institute for Information Systems IWi Institut (IWi) für at the German Research Wirtschaftsinformatik Center for im DFKI Saarbrücken Artificial Intelligence (DFKI), Saarland University Semantic EPC: Enhancing
More informationSemantic Variability Modeling for Multi-staged Service Composition
Semantic Variability Modeling for Multi-staged Service Composition Bardia Mohabbati 1, Nima Kaviani 2, Dragan Gašević 3 1 Simon Fraser University, 2 University of British Columbia, 3 Athabasca University,
More informationOnline Network Traffic Security Inspection Using MMT Tool
Online Network Traffic Security Inspection Using MMT Tool Wissam Mallouli, Bachar Wehbi, Edgardo Montes de Oca Michel Bourdellès, Denis Rocher and Arnaud Baloche Montimage EURL, 39 rue Bobillot, 75013
More informationdraft-forwarding-label-ccn- 01.txt
draft-forwarding-label-ccn- 01.txt Ravi Ravindran and Asit Chakraborti Huawei (IETF/ICNRG, Yokohama, 94) [ravi.ravindran@huawei.com] [asit.chakraborti@huawei.com] Agenda Draft Objectives Terminology Why
More informationIndependent Insight for Service Oriented Practice. An SOA Roadmap. John C. Butler Chief Architect. A CBDI Partner Company. www.cbdiforum.
Independent Insight for Oriented Practice An SOA Roadmap John C. Butler Chief Architect A CBDI Partner Company www.cbdiforum.com Agenda! SOA Vision and Opportunity! SOA Roadmap Concepts and Maturity Levels!
More informationService Oriented Networks Security. David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008
Service Oriented Networks Security David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008 While empowering new business models, SON leads to a proliferation of application networks
More informationSemantic Business Process Management
Arbeitsgruppe Lecture Semantic Business Process Management Prof. Dr. Adrian Paschke Corporate Semantic Web (AG-CSW) Institute for Computer Science, Freie Universitaet Berlin paschke@inf.fu-berlin.de http://www.inf.fu-berlin.de/groups/ag-csw/
More informationAutomatic Composition of Web Services
Automatic Composition of Web Services N. Guermouche, O. Perrin, C. Ringeissen LORIA Réunion COPS 3. Guermouche, O. Perrin, C. Ringeissen (LORIA) Automatic Composition of Web Services Réunion COPS 3 1 /
More informationCloud Federations in Contrail
Cloud Federations in Contrail Emanuele Carlini 1,3, Massimo Coppola 1, Patrizio Dazzi 1, Laura Ricci 1,2, GiacomoRighetti 1,2 " 1 - CNR - ISTI, Pisa, Italy" 2 - University of Pisa, C.S. Dept" 3 - IMT Lucca,
More informationA CLOUD SERVICE BROKER WITH LEGAL-RULE COMPLIANCE CHECKING AND QUALITY ASSURANCE CAPABILITIES
A CLOUD SERVICE BROKER WITH LEGAL-RULE COMPLIANCE CHECKING AND QUALITY ASSURANCE CAPABILITIES Cloud Forward 2015 7 October, 2015 Pisa, Scuola Normale Superiore Emiliano Casalicchio*, University of Rome
More informationLegal Aspects of the MonIKA-Project - Privacy meets Cybersecurity
Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity Sebastian Meissner Security Incident Information Sharing Workshop Berlin, 26.07.2013 Introduction Opening question Privacy & cybersecurity:
More informationNetwork Address Translation (NAT)
Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT. Taken from http://www.cs.virginia.edu/~itlab/ book/slides/module17-nat.ppt 1 Private Network Private IP network
More informationPrototype of a Platform for Business Collaboration
Prototype of a Platform for Business Collaboration Marián Mach 1, Ján Hreňo 1, Karol Furdík 2 1 Faculty of Electrical Engineering and Informatics, Technical University of Košice, Letná 9, 042 00 Košice,
More informationNetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
More informationIntroduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
More informationEnabling Integrated Care
Enabling Integrated Care Harnessing personal health systems for better outcomes across the care continuum Briefing Note for a SmartPersonalHealth Workshop WoHIT, Thursday 18 March 2010, 13:00-17:00, Barcelona
More informationSecurity Domain Separation as Prerequisite for Business Flexibility. Igor Furgel T-Systems
Security Domain Separation as Prerequisite for Business Flexibility Igor Furgel T-Systems 23th-25th September, 2008, page 2 What are we speaking about? What is a Security Domain and what do we need it
More informationEU CUSTOMS BUSINESS PROCESS MODELLING POLICY
EUROPEAN COMMISSION MASP Revision 2014 v1.1 ANNEX 4 DIRECTORATE-GENERAL TAXATION AND CUSTOMS UNION Customs Policy, Legislation, Tariff Customs Processes and Project Management Brussels, 03.11.2014 TAXUD.a3
More informationEXHIBIT A. Part IV Content Identification 1. the transmission of content, it is important to consider how content can be identified (e.g.
EXHIBIT A Part IV Content Identification 1 As this article has been considering certain intellectual property ramifications relating to the transmission of content, it is important to consider how content
More informationOn the general structure of ontologies of instructional models
On the general structure of ontologies of instructional models Miguel-Angel Sicilia Information Engineering Research Unit Computer Science Dept., University of Alcalá Ctra. Barcelona km. 33.6 28871 Alcalá
More informationService Modelling & Service Architecture:
Service Modelling & Service Architecture: From Service Renewal and Service Flows to Service Architecture Presenter: Professor Paul Buhler Head of the Global University Alliance SOA Research & Development
More informationTOWARDS ENVIRONMENTAL PROCESS SHARING FOR GEOSS
TOWARDS ENVIRONMENTAL PROCESS SHARING FOR GEOSS Lorenzino VACCARI, Mattia SANTORO, Max CRAGLIA, Lorenzo BIGAGLI, Michele CHINOSI, Stefano NATIVI EuroGEOSS Conference Madrid 25-27 January 2012 Summary Motivation
More informationUsing TechExcel s DevSuite to Achieve FDA Software Validation Compliance For Medical Software Device Development
Using TechExcel s DevSuite to Achieve FDA Software Validation Compliance For Medical Software Device Development The FDA requires medical software development teams to comply with its standards for software
More informationPolicy-based Service Management
Policy-based Service Management John Strassner Masaki Fukushima draft-bi-supa-policy-model draft-zaalouk-supa-vpn-service-management-model Agenda PBSM and Its Relation to SUPA Policy Terminology Types
More informationWorkshop on Collaborative Security and Privacy Technologies
Workshop on Collaborative Security and Privacy Technologies Dr. Sathya Rao KYOS; Switzerland, Sathya.rao@kyos.ch CSP EU FORUM 2012, 25 April 2012, Berlin Trust and Society Trustworthy systems essential
More informationCisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:
More informationBusiness Rule Standards -- Interoperability and Portability
Rule Standards -- Interoperability and Portability April 2005 Mark H. Linehan Senior Technical Staff Member IBM Software Group Emerging Technology mlinehan@us.ibm.com Donald F. Ferguson IBM Fellow Software
More information10 Years of Hype Cycles - Do We Forget Knowledge?
10 Years of Hype Cycles - Do We Forget Knowledge? Aaron McConnell Research Scientist IU-ATC School of Computing and Information Engineering University of Ulster at Coleraine Northern Ireland Aaron McConnell
More informationOntologies for Enterprise Integration
Ontologies for Enterprise Integration Mark S. Fox and Michael Gruninger Department of Industrial Engineering,University of Toronto, 4 Taddle Creek Road, Toronto, Ontario M5S 1A4 tel:1-416-978-6823 fax:1-416-971-1373
More informationSavera Tanwir. Internet Protocol
Savera Tanwir Internet Protocol The IP Protocol The IPv4 (Internet Protocol) header. IP Packet Details Header and payload Header itself has a fixed part and variable part Version IPv4, IPv5 or IPv6 IHL,
More informationSPIKE 1 A Collaboration Platform for Short-Term Virtual Business Alliances
SPIKE 1 A Collaboration Platform for Short-Term Virtual Business Alliances Christian Broser, Christoph Fritsch, Oliver Gmelch, Günther Pernul, Rolf Schillinger Department of Information Systems, University
More informationMODELING OF SERVICE ORIENTED ARCHITECTURE: FROM BUSINESS PROCESS TO SERVICE REALISATION
MODELING OF SERVICE ORIENTED ARCHITECTURE: FROM BUSINESS PROCESS TO SERVICE REALISATION Marek Rychlý and Petr Weiss Faculty of Information Technology, Brno University of Technology, Czech Republic, rychly@fit.vutbr.cz,
More informationOverview of major concepts in the service oriented extended OeBTO
Modelling business policies and behaviour based on extended Open edi Business Transaction Ontology (OeBTO) Introduction Model Driven Development (MDD) provides a basis for the alignment between business
More information(BA122) Software Engineer s Workshop (SEW)
Training for the Business Analyst (BA122) Software Engineer s Workshop (SEW) Duration: 4 days CDUs (Continuing Development Units): 28 Description: A practical workshop covering the role of the Business-Systems
More informationService Broker for 3 Party Enabling
Deutsche Telekom Laboratories An-Institut der Technischen Universität Berlin rd Service Broker for 3 Party Enabling Horst Stein, Niklas Blum (FhG Fokus) White Paper No. 5 August 2009 Abstract and Keywords
More informationBusiness Object Document (BOD) Message Architecture for OAGIS Release 9.+
Business Object Document (BOD) Message Architecture for OAGIS Release 9.+ an OAGi White Paper Document #20110408V1.0 Open standards that open markets TM Open Applications Group, Incorporated OAGi A consortium
More informationLecture 03 (04.11.2013) Quality of the Software Development Process
Systeme hoher Qualität und Sicherheit Universität Bremen, WS 2013/14 Lecture 03 (04.11.2013) Quality of the Software Development Process Christoph Lüth Christian Liguda Your Daily Menu Models of Software
More informationCOSC 3351 Software Design. Recap for the first quiz. Edgar Gabriel. Spring 2008. For the 1 st Quiz
COSC 3351 Software Design Recap for the first quiz Spring 2008 For the 1 st Quiz Three large topic areas: UML syntax and diagrams Software architectural styles Object oriented design principles A couple
More informationA MORE FLEXIBLE MULTI-TENANT SOA FOR SAAS
A MORE FLEXIBLE MULTI-TENANT SOA FOR SAAS Eric H. Nielsen, Ph.D. VP Platform Architecture CA Technologies e.h.nielsen@ieee.org For IEEE Software Technology Conference STC 2014 April 3, 2014 Long Beach,
More informationChallenges and Opportunities for formal specifications in Service Oriented Architectures
ACSD ATPN Xi an China June 2008 Challenges and Opportunities for formal specifications in Service Oriented Architectures Gustavo Alonso Systems Group Department of Computer Science Swiss Federal Institute
More informationService-Oriented Architecture and Software Engineering
-Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based
More informationTECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES
REALIZATION OF A RESEARCH AND DEVELOPMENT PROJECT (PRE-COMMERCIAL PROCUREMENT) ON CLOUD FOR EUROPE TECHNICAL SPECIFICATION: LEGISLATION EXECUTING CLOUD SERVICES ANNEX IV (D) TO THE CONTRACT NOTICE TENDER
More informationWOICE: a Decentralized System for Ubiquitous VoIP Services
: a Decentralized System for Ubiquitous VoIP Services Costas Kalogiros 1, Costas Courcoubetis 1, and Panayotis Antoniadis 2 1 Athens University of Economics and Business Department of Computer Science
More informationThe SPES Methodology Modeling- and Analysis Techniques
The SPES Methodology Modeling- and Analysis Techniques Dr. Wolfgang Böhm Technische Universität München boehmw@in.tum.de Agenda SPES_XT Project Overview Some Basic Notions The SPES Methodology SPES_XT
More informationUse Case Diagrams. Tutorial
Use Case Diagrams Tutorial What is a use case? A requirements analysis concept A case of a use of the system/product Describes the system's actions from a the point of view of a user Tells a story A sequence
More informationSOFTWARE DEFINED NETWORKS REALITY CHECK. DENOG5, Darmstadt, 14/11/2013 Carsten Michel
SOFTWARE DEFINED NETWORKS REALITY CHECK DENOG5, Darmstadt, 14/11/2013 Carsten Michel Software Defined Networks (SDN)! Why Software Defined Networking? There s a hype in the industry!! Dispelling some myths
More informationSoftware Active Online Monitoring Under. Anticipatory Semantics
Software Active Online Monitoring Under Anticipatory Semantics Changzhi Zhao, Wei Dong, Ji Wang, Zhichang Qi National Laboratory for Parallel and Distributed Processing P.R.China 7/21/2009 Overview Software
More informationDefining Generic Architecture for Cloud Infrastructure as a Service Model
Defining Generic Architecture for Cloud Infrastructure as a Service Model Yuri Demchenko 1 University of Amsterdam Science Park 904, Amsterdam, The Netherlands E-mail: y.demchenko@uva.nl Cees de Laat University
More informationMcAfee Next Generation Firewall (NGFW) Administration Course
McAfee Product Education McAfee Next Generation Firewall (NGFW) Administration Course The McAfee NGFW Administration course from Education Services provides attendees with hands-on training on the design,
More informationS o l u t i o n O v e r v i e w. Optimising Service Assurance with Vitria Operational Intelligence
S o l u t i o n O v e r v i e w > Optimising Service Assurance with Vitria Operational Intelligence 1 Table of Contents 1 Executive Overview 1 Value of Operational Intelligence for Network Service Assurance
More informationAgenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
More informationIPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
More informationCordys Business Operations Platform
SERVICE DEFINITION Cordys Business Operations GCloud IV - PaaS Copyright 2012 Cordys B.V. All rights reserved. Table of Content Cordys Business Operations... 1 Table of Content... 2 Introduction... 4 Document
More informationLecture Notes course 02267 Software Development of Web Services
Lecture Notes course 02267 Software Development of Web Services Hubert Baumeister huba@dtu.dk Fall 2014 Contents 1 Web Service Coordination 1 1.1 What is Coordination.........................................
More informationEnterprise Architecture at Work
Marc Lankhorst et al. Enterprise Architecture at Work Modelling, Communication and Analysis Third Edition 4y Springer Contents 1 Introduction to Enterprise Architecture 1 1.1 Architecture 1 1.2 Enterprise
More informationEngineering Process Software Qualities Software Architectural Design
Engineering Process We need to understand the steps that take us from an idea to a product. What do we do? In what order do we do it? How do we know when we re finished each step? Production process Typical
More informationProcesses, services and business agility
Processes, services and business agility prof. dr. Wilfried Lemahieu K.U.Leuven Faculty of Business and Economics Department of Decision sciences and Information Management wilfried.lemahieu@econ.kuleuven.be
More informationComputer Network Foundation. Chun-Jen (James) Chung. Arizona State University
Computer Network Foundation Chun-Jen (James) Chung 1 Outline Network Addressing Subnetting Classless Inter-Domain Routing (CIDR) Route Aggregation Network Addressing How does the network decide where to
More informationIEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
More informationImplementing VoIP monitoring solutions. Deployment note
Implementing VoIP monitoring solutions Deployment note Introduction With VoIP being an integral part of modern day business communications, enterprises are placing greater emphasis on the monitoring and
More informationCompliance ow - managing the compliance of dynamic and complex processes
Loughborough University Institutional Repository Compliance ow - managing the compliance of dynamic and complex processes This item was submitted to Loughborough University's Institutional Repository by
More informationSoftware + Services Using WCF and WF
Software + Services Using WCF and WF Michael Stiefel Reliable Software, Inc. www.reliablesoftware.com Pre-requisites for this presentation: 1) Understand WCF 2) Understand WFC Level: Intermediate Goals
More informationBusiness Process Modeling Information Systems in Industry (372-1-4207 )
Business Process Modeling Information Systems in Industry (372-1-4207 ) Arnon Sturm The material of this presentation is adopted from various people including:, Pnina Soffer, Iris Reinhartz-Berger 1 Outline
More informationOracle Service Bus: - When to use, where to use and when not to use
Oracle Service Bus: - When to use, where to use and when not to use Session ID#: 244 Prepared by: Abhay Kumar Senior Consultant AST Corporation REMINDER Check in on the COLLABORATE mobile app Specialized.
More informationSoftware Defined Networking & Openflow
Software Defined Networking & Openflow Autonomic Computer Systems, HS 2015 Christopher Scherb, 01.10.2015 Overview What is Software Defined Networks? Brief summary on routing and forwarding Introduction
More information41. How Should Services Be Identified or Specified to Maximize Reuse?
CHAPTER 5 METHODS 103 41. How Should Services Be Identified or Specified to Maximize Reuse? A key tenet of understanding SOA is the focus on getting the organization to reuse versus a focus on the programmer
More informationReusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach
Reusable Knowledge-based Components for Building Software Applications: A Knowledge Modelling Approach Martin Molina, Jose L. Sierra, Jose Cuena Department of Artificial Intelligence, Technical University
More informationSpecification and Analysis of Contracts Lecture 1 Introduction
Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider gerardo@ifi.uio.no http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.
More informationData-Aware Service Choreographies through Transparent Data Exchange
Institute of Architecture of Application Systems Data-Aware Service Choreographies through Transparent Data Exchange Michael Hahn, Dimka Karastoyanova, and Frank Leymann Institute of Architecture of Application
More informationHow To Develop Software
Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which
More informationOpen S-BPM: Goals and Architecture
Open S-BPM: Goals and Architecture Albert Fleischmann Werner Schmidt Table of Content 1 Introduction... 2 2 Mission, Vision and Objectives... 2 3 Research and Development Areas... 3 4 Open S-BPM Architecture...
More informationSEMANTIC-BASED AUTHORING OF TECHNICAL DOCUMENTATION
SEMANTIC-BASED AUTHORING OF TECHNICAL DOCUMENTATION R Setchi, Cardiff University, UK, Setchi@cf.ac.uk N Lagos, Cardiff University, UK, LagosN@cf.ac.uk ABSTRACT Authoring of technical documentation is a
More informationCloud Monitoring and Auditing with CADF (Cloud Auditing and Data Federation)
July, 2013 Portland Cloud Monitoring and Auditing with CADF (Cloud Auditing and Data Federation) Jacques Durand (Fujitsu) Matt Rutkowski (IBM) Disclaimer The information in this presentation represents
More informationIntelligent Agents The New perspective Enhancing Network Security
Intelligent Agents The New perspective Enhancing Network Security Krystian Baniak 24 October 2007 Agenda Introduction Intelligent Agent Based Systems Agent Reinforced Reasoning Research description Law
More informationTECHNICAL SPECIFICATION: SECURE LEGISLATION-AWARE STORAGE SOLUTION
REALIZATION OF A RESEARCH AND DEVELOPMENT PROJECT (PRE-COMMERCIAL PROCUREMENT) ON CLOUD FOR EUROPE TECHNICAL SPECIFICATION: SECURE LEGISLATION-AWARE STORAGE SOLUTION ANNEX IV (C) TO THE CONTRACT NOTICE
More informationDistributed Data Management
Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that
More informationAn Oracle White Paper October 2013. Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus
An Oracle White Paper October 2013 Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus Table of Contents Introduction...
More informationFujitsu Service-Oriented Architecture (SOA) A Web Services Framework
Fujitsu Service-Oriented Architecture (SOA) A Web Services Framework Introduction Retaining customers depends on continuously supporting new types of services. The more services a customer purchases from
More informationOracle Service Bus vs. Oracle Enterprise Service Bus vs. BPEL wann soll welche Komponente eingesetzt werden?
Oracle Service Bus vs. Oracle Enterprise Service Bus vs. BPEL wann soll welche Komponente eingesetzt werden? Guido Schmutz, Technology Manager / Partner Basel Baden Bern Lausanne Zürich Düsseldorf Frankfurt/M.
More informationHuawei Technologies ERC Position Statement: Towards a Future Internet Public Private Partnership
Huawei Technologies ERC Position Statement: Towards a Future Internet Public Private Partnership Kostas Pentikousis, Mirko Schramm, and Cornel Pampu Huawei Technologies European Research Centre Carnotstrasse
More information