High Assurance in Multi-Layer Cloud Infrastructures
|
|
|
- Claud Jennings
- 10 years ago
- Views:
Transcription
1 SEcure Cloud computing for CRitical Infrastructure IT High Assurance in Multi-Layer Cloud Infrastructures PhD Research Agenda[1] Austrian Institute of Technology (AIT) / Technical Univsersity of Vienna Aleksandar Hudic [1] Hudic A., Mauthe A., Caceres S., Hecht T., Tauber M. : "Towards continuous Cloud Service Assurance for Critical Infrastructure IT", IEEE FiCloud-2014 AIT Austrian Institute of Technology ETRA Investigación y Desarrollo Fraunhofer Institute for Experimental Software Engineering IESE Karlsruhe Institute of Technology NEC Europe Lancaster University Mirasys Hellenic Telecommunications Organization OTE Ayuntamiento de Valencia Amaris
2 Research questions How to assure that security properties are met across distinct cloud layers with different stake holders? Levels of Abstraction (The SECCRIT architecture) How to derive continuous assessment of security properties across the clouds architecture? How can security be assessed, measured or scaled in respect to a certain predefined set of security properties (assurance levels)? How to aggregate/inherit security across different stake holders in Cloud? R. Bless, Flittner, M., Horneber, J., Hutchison, D., Jung, C., Pallas, F., Schöller, M., Shirazi, S. Noor ul Ha, Simpson, S., and Smith, P., Whitepaper "AF 1.0" SECCRIT Architectural Framework (and IEEE CloudCom) 10/07/2014 SECCRIT Consortium 2
3 Research Activities Establish a catalogue of the most relevant security concerns (based on established work) o Classify them per classes o Distinguish their relevance Provide a compact methodology for assessment and aggregation of these security concerns horizontally and vertically Define policy of aggregation for certain set security properties Propose an empirical evaluation of the methodologies proposed 10/07/2014 SECCRIT Consortium 3
4 Security properties Security-aware SLA specification language and cloud security dependency model Certification models Core Certification mechanisms Methodologies for Risk Assessment and Management The Notorious Nine: Cloud Computing Top Threats in /07/2014 SECCRIT Consortium 4
5 Assurance Assessment Framework ABSTRACTION LEVEL User Level Application Level Critical Infrastructure Target of Evaluation Dependencies CI Service Framework elements: Component of Evaluation (CoE) o Component dependencies (CD) o Association (AS) Group of Evaluation (GoE) Target of Evaluation (ToE) Virtual Infrastructure Level Tenant Physical Infrastructure Level Cloud Infrastructure Assurance Profile: o o o o o GROUP OF EVALUATION GROUP OF EVALUATION Assurance Type (AT) Assurance Properties (AP) Assurance Class (AC) Security Objectives (SO) Assessment Interval (AI) Common Criteria Framework for Information Technology Security Evaluation, CCDB USB Working Group, 2012, part 1-3. Online available: 10/07/2014 SECCRIT Consortium 5
6 Aggregation Policies (1) Tree model: CoE A AL=3 CoE B CoE C AL=3 AL=4 Aleksandar Hudic, Thomas Hecht, Markus Tauber, Andreas Mauthe, and Santiago Caceres Elvira, "Towards Continuous Cloud Service Assurance for Critical Infrastructure IT", IEEE International Conference on Future Internet of Things and Cloud (FiCloud 2014) 10/07/2014 SECCRIT Consortium 6
7 Aggregation Policies (2) Policy Elements: Dependency Assurance Class (DAC) - defines the requirement for the underplaying objects in terms of security properties Dependency Security Properties (DSP) - defined set of properties for the underplaying objects Dependency Assurance Class (DBM) bitmask which defines minimum requirements per Security Property for underplaying objects 10/07/2014 SECCRIT Consortium 7
8 Aggregation Policies (3) Tree model: CoE A AL=2 CoE B CoE C Features: Recursive assurance aggregation Overall assurance Dynamic infrastructure assessment Flexible object assessment AC 1 =100 AC 2 =110 AC 3 =101 AC 1 =111 AC 2 =110 AC 3 =101 CoE B SP 1 SP 2 SP 3 AC AC AC CoE C SP 1 SP 2 SP 3 AC AC AC /07/2014 SECCRIT Consortium 8
9 Assurance levels Tree model: CoE A AL=2 CoE B SP 1 SP 2 SP 3 AC AC AC CoE B AC 1 =100 AC 2 =110 AC 3 =101 CoE C AC 1 =111 AC 2 =110 AC 3 =101 CoE C SP 1 SP 2 SP 3 AC AC AC SP 1 SP 2 SP 3 CoE B {AC 1 } CoE C {AC 1 } CoE B {AC 1 } CoE B {AC 1 } /07/2014 SECCRIT Consortium 9
10 Conclusion Strong security assessment framework for Cloud infrastructures is required Flexible Technology independent Both User and Provider centric Non invasive on the Cloud infrastructure 10/07/2014 SECCRIT Consortium 10
11 SEcure Cloud computing for CRitical Infrastructure IT Thank you for your attention! Contact Aleksandar Hudic AIT AIT Austrian Institute of Technology ETRA Investigación y Desarrollo Fraunhofer Institute for Experimental Software Engineering IESE Karlsruhe Institute of Technology NEC Europe Lancaster University Mirasys Hellenic Telecommunications Organization OTE Ayuntamiento de Valencia Amaris
Secure Cloud Computing for Critical Infrastructures
SEcure Cloud computing for CRitical Infrastructure IT Secure Cloud Computing for Critical Infrastructures Aleksandar Hudic and Christian Wagner AIT Austrian Institute of Technology AIT Austrian Institute
Cloud Inspector A Cooperative Tool to Increase Trust in Cloud Computing
SEcure computing for CRitical IT Inspector A Cooperative Tool to Increase Trust in Computing Roland Bless, Matthias Flittner, Robert Bauer Karlsruhe Institute of Technology (KIT) {bless, flittner, robert.bauer}@kit.edu
Techno-Legal Motivation
SEcure Cloud computing for CRitical Infrastructure IT Techno-Legal Motivation Ass. iur. Silvia Balaban 24/11/2015 AIT Austrian Institute of Technology ETRA Investigación y Desarrollo Fraunhofer Institute
How To Write A Secure Cloud Computing For Critical Infrastructure
SEcure Clud cmputing fr CRitical Infrastructure IT Methds and Technlgies fr Secure Clud Cmputing fr Critical InfrastructureIT Dr Markus Tauber SECCRIT Crdinatr AIT Austrian Institute f Technlgy AIT Austrian
How can security requirements of critical Infrastructure IT shape Cloud Computing research?
SEcure Clud cmputing fr CRitical Infrastructure IT Hw can security requirements f critical Infrastructure IT shape Clud Cmputing research? Dr. Markus Tauber [email protected] Austrian Institute f
SEcure Cloud computing for CRitical infrastructure IT
SEcure Cloud computing for CRitical infrastructure IT Contract No 312758 Deliverable: 4.2 Resilient Cloud Management AIT Austrian Institute of Technology ETRA Investigación y Desarrollo Fraunhofer Institute
Cybersecurity Risk Assessment in Smart Grids
Cybersecurity Risk Assessment in Smart Grids Lucie Langer, Paul Smith, Thomas Hecht [email protected] AIT Austrian Institute of Technology ComForEn Symposium 2014 Sept 30, 2014 1 Risk Assessment:
Fuld Skolerapport for Søhusskolen, i Odense kommune, for skoleår 2013/2014 for klassetrin(ene) 9. med reference Tilsvarende klassetrin i kommunen
Side 1 af 41 Side 2 af 41 Side 3 af 41 Side 4 af 41 Side 5 af 41 Side 6 af 41 Side 7 af 41 Side 8 af 41 Side 9 af 41 Side 10 af 41 Side 11 af 41 Side 12 af 41 Side 13 af 41 Side 14 af 41 Side 15 af 41
Fuld Skolerapport for Hunderupskolen, i Odense kommune, for skoleår 2013/2014 for klassetrin(ene) 7. med reference Tilsvarende klassetrin i kommunen
Side 1 af 43 Side 2 af 43 Side 3 af 43 Side 4 af 43 Side 5 af 43 Side 6 af 43 Side 7 af 43 Side 8 af 43 Side 9 af 43 Side 10 af 43 Side 11 af 43 Side 12 af 43 Side 13 af 43 Side 14 af 43 Side 15 af 43
Hong Kong Information Security Group TRAINING AGENDA
TRAINING AGENDA THE ITIL FOUNDATION CERTIFICATE IN IT SEVICE MANAGEMENT The purpose of the ITIL Foundation certificate in IT Service Management is to certify that the candidate has gained knowledge of
Service Level AgreementMonitoring for Resilience in Computer Networks
Service Level AgreementMonitoring for Resilience in Computer Networks Noor-ul-hassan Shirazi, Alberto Schaeffer-Filho and David Hutchison School of Computing and Communications InfoLab21, Lancaster University
Backshoring of Production Activities in
European Manufacturing Survey Bulletin Number December 2014 3 Backshoring of Production Activities in European Manufacturing Bernhard Dachs 1, Christoph Zanker 2 In cooperation with Susana Azevedo (University
ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE
OVERVIEW Critial infrastructures are increasingly dependent on information and communication technology. ICT-systems are getting more and more complex, and to enable the implementation of secure applications
Preface Introduction
Preface Introduction Cloud computing is revolutionizing all aspects of technologies to provide scalability, flexibility and cost-effectiveness. It has become a challenge to ensure the security of cloud
A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services
, pp.21-30 http://dx.doi.org/10.14257/ijsia.2013.7.6.03 A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services Changsoo Lee 1, Daewon Jung 2 and Keunwang Lee 3 1 Dept.
Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao
Requirements Analysis Concepts & Principles Instructor: Dr. Jerry Gao Requirements Analysis Concepts and Principles - Requirements Analysis - Communication Techniques - Initiating the Process - Facilitated
Secure Cloud Identity Wallet
1 CREDENTIAL Secure Cloud Identity Wallet DS-02-2014 Dr. Arne Tauber u 2 CREDENTIAL Research Project Call: H2020-DS-2014-1 Acronym: CREDENTIAL Type of Action: IA Number: 653454 Partners: 12 Duration: 36
PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH
PRISMACLOUD Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH FOC2015 Vienna / 17.06.2015 Challenges for Future ICT Systems Cloud computing
Huawei One Net Campus Network Solution
Huawei One Net Campus Network Solution 2 引 言 3 园 区 网 面 临 的 挑 战 4 华 为 园 区 网 解 决 方 案 介 绍 6 华 为 园 区 网 解 决 方 案 对 应 产 品 组 合 6 结 束 语 Introduction campus network is an internal network of an enterprise or organization,
Resilience in Networks: Elements and Approach for a Trustworthy Infrastructure. Andreas Fischer and Hermann de Meer
Resilience in Networks: Elements and Approach for a Trustworthy Infrastructure Andreas Fischer and Hermann de Meer The ResumeNet project Resilience & Survivability for future networking framework, mechanisms
Outlook. Corporate Research and Technologies, Munich, Germany. 20 th May 2010
Computing Architecture Computing Introduction Computing Architecture Software Architecture for Outlook Corporate Research and Technologies, Munich, Germany Gerald Kaefer * 4 th Generation Datacenter IEEE
ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
etom- ITIL mapping NORDUnet Nordic Infrastructure for Research & Education 3 rd TF-NOC meeting, June 28 th Zurich Stefan Liström
Nordic Infrastructure for Research & Education etom- ITIL mapping 3 rd TF-NOC meeting, June 28 th Zurich Stefan Liström Project manager NORDUnet Agenda Overview etom overview and drilldown etom and ITIL
AVAYA WLAN ACCESS POINT 9123
AVAYA NETWORKING AVAYA WLAN ACCESS POINT 9123 (REGULATORY MODEL WAP9103) The Avaya WLAN Access Point 9123 is a high performance 802.11n (software upgradeable to 802.11ac) Access Point (AP). It is part
PERFORMANCE TESTING OF BITUMINOUS MIXES USING FALLING WEIGHT DEFLECTOMETER
ABSTRACT NO. 6 PERFORMANCE TESTING OF BITUMINOUS MIXES USING FALLING WEIGHT DEFLECTOMETER Prof Praveen Kumar Dr G D Ransinchung Lt. Col. Mayank Mehta Nikhil Saboo IIT Roorkee IIT Roorkee IIT Roorkee IIT
Security Techniques for Protecting Data in Cloud Computing one SHOULD know WHAT...
Security Techniques for Protecting Data in Cloud Computing one SHOULD know WHAT... Venkata Sravan Kumar Maddineni, Blekinge Institute of Technology IT Security for the Next Generation European Cup, Prague
Copyright 2010 NTT DATA AgileNet L.L.C. 12/06/2010 NTT DATA Agilenet L.L.C. Kenji Motohashi
Global Inter-Cloud Technology Forum (GICTF) 12/06/2010 NTT DATA Agilenet L.L.C. Kenji Motohashi Agenda 1. What is the GICTF 2. GICTF s Past Cloud Activities 3. GICTF's Current and Future Cloud Plans 4.
Team A SaaS Strategy
Team A SaaS Strategy What is a strategy? Strategy is the direction and scope of an organization over the long-term term: : which achieves advantages for the organization through its configuration of resources
Product Specifications
Data Sheet Cisco Aironet 1850 Series Access Points Product Overview Ideal for small and medium-sized networks, the Cisco Aironet 1850 Series delivers industry-leading performance for enterprise and service
Making the case for OpenStack in the Enterprise. Francesco Paola, CEO, Solinea Seth Fox, VP Operations, Solinea
Making the case for OpenStack in the Enterprise Francesco Paola, CEO, Solinea Seth Fox, VP Operations, Solinea Who we are Accelerating Open Infrastructure Adoption! Purpose-built for cloud Cloud is the
Dynamic Monitoring Interval to Economize SLA Evaluation in Cloud Computing Nor Shahida Mohd Jamail, Rodziah Atan, Rusli Abdullah, Mar Yah Said
Dynamic Monitoring to Economize SLA Evaluation in Cloud Computing Nor Shahida Mohd Jamail, Rodziah Atan, Rusli Abdullah, Mar Yah Said Abstract Service level agreement (SLA) is a contract between service
Solution for Automation of Reinsurance Processes
Solution for Automation of Reinsurance Processes Solution for Automation of Reinsurance Processes Gratex International has designed and developed DeNovius(re) the information system for insurance companies
Digitizing European Industry: Digital Industrial Platform Building
Digitizing European Industry: Digital Industrial Platform Building EFFRA General Assembly Dr Max Lemke Head of Unit DG CONNECT A3 European Commission 1 The political context Speech of Commissioner Oettinger
Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study
in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction
Applied and Integrated Security. C. Eckert
Applied and Integrated Security 1 Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass
Disclosure of Proprietary Data Notice
SigNet Technologies Disclosure of Proprietary Data Notice SigNet Technologies, Inc. (herein SigNet ) material, which follows, contains information and data which are privileged, confidential, and/or proprietary.
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
Cloud Computing Standards: Overview and first achievements in ITU-T SG13.
Cloud Computing Standards: Overview and first achievements in ITU-T SG13. Dr ITU-T, Chairman of Cloud Computing Working Party, SG 13 Future Networks Orange Labs Networks, Cloud & Future Networks Standard
An Approach Towards Customized Multi- Tenancy
I.J.Modern Education and Computer Science, 2012, 9, 39-44 Published Online September 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2012.09.05 An Approach Towards Customized Multi- Tenancy
Monitoring sítí pomocí NetFlow dat od paketů ke strategiím
Monitoring sítí pomocí NetFlow dat od paketů ke strategiím Martin Rehák, Karel Bartoš, Martin Grill, Jan Stiborek a Michal Svoboda ATG, České vysoké učení technické v Praze Jiří Novotný, Pavel Čeleda a
CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs
CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs Eric Simmon January 28 th, 2014 BACKGROUND Federal Cloud Computing Strategy Efficiency improvements will shift resources towards higher-value
Data and Control Plane Interconnect solutions for SDN & NFV Networks Raghu Kondapalli August 2014
Data and Control Plane Interconnect solutions for SDN & NFV Networks Raghu Kondapalli August 2014 Title & Abstract Title: Data & Control Plane Interconnect for SDN & NFV networks Abstract: Software defined
The deployment of OHMS TM. in private cloud
Healthcare activities from anywhere anytime The deployment of OHMS TM in private cloud 1.0 Overview:.OHMS TM is software as a service (SaaS) platform that enables the multiple users to login from anywhere
MACHINE TO MACHINE COMMUNICATIONS. ETSI TC M2M Overview June 2011
MACHINE TO MACHINE COMMUNICATIONS ETSI TC M2M Overview June 2011 About the ETSI TC M2M ETSI: the European Telecommunication Standards Institute One of the 3 European SDOs (CEN, CENELEC, ETSI). ETSI is
Information Security @ Blue Valley Schools FEBRUARY 2015
Information Security @ Blue Valley Schools FEBRUARY 2015 Student Data Privacy & Security Blue Valley is committed to providing an education beyond expectations to each of our students. To support that
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
DeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks
: Deuce-Based Fast Handoff Scheme in IEEE 82.11 Wireless Networks Yuh-Shyan Chen, Chung-Kai Chen, and Ming-Chin Chuang Department of Computer Science and Information Engineering National Chung Cheng University,
Cyber Security in Austria
Cyber Security in Austria The Austrian Cyber Security Strategy Andreas Reichard 18 th May, 2015 Roadmap Austrian Cyber Security Strategy 1/2 MRV MRV 11/2011 03/2012 06/2012 09/2012 10/2012 03/2013 Fed.
Corporate Presentation. Intense Technologies Limited
Corporate Presentation Intense Technologies Limited Intense Intense Technologies Technologies Limited Limited www.in10stech.com About Us We enable digitalization of customer centric business processes
IT Operations Managed Services A Perspective
IT Operations Managed Services A Perspective 1 Introduction This paper examines the concept of Managed Services for IT Operations, the real business drivers, the key factors to be considered, the types
Smart grid security analysis
Smart grid security analysis Paul Smith et al. [email protected] SPARKS Stakeholder Workshop 20 th May, 2014, Graz SPARKS Objectives The SPARKS project has three main objectives regarding security analysis:
Horizontal IoT Application Development using Semantic Web Technologies
Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: [email protected] Roadmap Introduction Challenges
Open-Mesh MR Series. Cloud managed networking for less money.
MR SERIES DATASHEET Open-Mesh MR Series Cloud managed networking for less money. Open-Mesh creates smarter, simpler networks. Built with the needs of business, education, retail and hospitalty in mind,
The Open Group Perspective on Public Sector Cloud
The Open Group Perspective on Public Sector Cloud Public Sector Cloud Conference Reston VA, March 19-20 2012 Andras Szakal Chief Architect, IBM Federal Software Group, Distinguished Engineer and Senior
CASE STUDY. Unius Reinsurance System. Reinsurance solution in Allianz Țiriac Asigurari S.A., Romania
CASE STUDY Unius Reinsurance System Reinsurance solution in Allianz Țiriac Asigurari S.A., Romania Contacts: Gratex International, a. s. (Headquarters) GBC IV Galvaniho 17/C 821 04 Bratislava Slovak Republic
Software as a Service (SaaS) and Platform as a Service (PaaS) (ENCS 691K Chapter 1)
Roch Glitho, PhD Software as a Service (SaaS) and Platform as a Service (PaaS) (ENCS 691K Chapter 1) Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Software
A Secure System Development Framework for SaaS Applications in Cloud Computing
A Secure System Development Framework for SaaS Applications in Cloud Computing Eren TATAR, Emrah TOMUR AbstractThe adoption of cloud computing is ever increasing through its economical and operational
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information
Fundamental Concepts and Models
Fundamental Concepts and Models 1 1. Roles and Boundaries Could provider The organization that provides the cloud based IT resources Cloud consumer An organization (or a human) that has a formal contract
NSW Government. Wireless services (WiFi) Standard
NSW Government Wireless services (WiFi) Standard May 2014 CONTENTS 1. CONTEXT 2 1.1. Background 2 1.2. Purpose 2 1.3. Scope and application 2 2. STANDARDS GOVERNANCE 2 2.1. Standards to support the ICT
Storage Cloud Infrastructures
Storage Cloud Infrastructures Detection and Mitigation of MITM Attacks Presenter: Jaqueline Carmilema CyberSecurity for the Next Generation South American Round, Quito 31 January 1 February, 2013 PAGE
CURRICULUM VITAE. Li Chen
CURRICULUM VITAE Li Chen Ph.D., Department of Management, School of Business and Economics, Fayetteville State University 1200 Murchison Road, Fayetteville, NC, 28301 Phone: (910)-672-1665 (office); (860)-942-0972
Big Data Analytics and Decision Analysis for Manufacturing Intelligence to Empower Industry 3.5
ISMI2015, Oct. 16-18, 2015 KAIST, Daejeon, South Korea Big Data Analytics and Decision Analysis for Manufacturing Intelligence to Empower Industry 3.5 Tsinghua Chair Professor Chen-Fu Chien, Ph.D. Department
Vinay Parisa 1, Biswajit Mohapatra 2 ;
Predictive Analytics for Enterprise Modernization Vinay Parisa 1, Biswajit Mohapatra 2 ; IBM Global Business Services, IBM India Pvt Ltd 1, IBM Global Business Services, IBM India Pvt Ltd 2 [email protected]
Product Navigator User Guide
Product Navigator User Guide Table of Contents Contents About the Product Navigator... 1 Browser support and settings... 2 Searching in detail... 3 Simple Search... 3 Extended Search... 4 Browse By Theme...
Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya [email protected]
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya [email protected] Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
Horizontal Integration - Unlocking the Cloud Stack. A Technical White Paper by FusionLayer, Inc.
Horizontal Integration - Unlocking the Cloud Stack A Technical White Paper by FusionLayer, Inc. August 2013 Copyright 2015 FusionLayer, Inc. All rights reserved. No part of this publication may be reproduced,
Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures
4th Workshop on Mobile Cloud Networking, June 19th, 2014, Lisbon, Portugal Cloudified IP Multimedia Subsystem (IMS) for Network Function Virtualization (NFV)-based architectures Giuseppe Carella, Marius
Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis
Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis Andreas Fuchs and Roland Rieke {andreas.fuchs,roland.rieke}@sit.fraunhofer.de Fraunhofer Institute for
Helix Nebula: Secure Brokering of Cloud Resources for escience. Dr. Jesus Luna Garcia
Helix Nebula: Secure Brokering of Cloud Resources for escience Dr. Jesus Luna Garcia Outline Background The Blue-Box architecture Security Goals and Requirements Let s imagine Why a Public-Private Partnership
Enabling Data and Analytics. for Enterprise Asset management (EAM) Devang Patel & Arun Narayanan. SEAL Consulting Inc SESSION CODE: EM2098
Enabling Data and Analytics for Enterprise Asset management (EAM) Devang Patel & Arun Narayanan SEAL Consulting Inc SESSION CODE: EM2098 Agenda: What is EAM? Business Challenges / Benefits Why EAM? Architecture
