Presentation is loading. Please wait.

Presentation is loading. Please wait.

On the Path to International Co-operation … Dependable Embedded Systems & SW Group www.deeds.informatik.tu-darmstadt.de Neeraj Suri Dept. of Computer Science.

Similar presentations


Presentation on theme: "On the Path to International Co-operation … Dependable Embedded Systems & SW Group www.deeds.informatik.tu-darmstadt.de Neeraj Suri Dept. of Computer Science."— Presentation transcript:

1 On the Path to International Co-operation … Dependable Embedded Systems & SW Group www.deeds.informatik.tu-darmstadt.de Neeraj Suri Dept. of Computer Science TU Darmstadt, Germany

2 Opinions, Opinions, Opinions … Meaningful international co-operation  What doesn’t work  What could work  Possibilities, themes/areas, projects … © DEEDS Group

3 Nice but …  We think our stuff is great so it must excite the troops yonder too!  We’ll do out stuff, they’ll do theirs… © DEEDS Group

4 Better…  Problems & technologies of common interest where synergy would be meaningful & add “local” (technological legal, societal) depth?  Web x.0, Persona/Data mgmt (technologies and approaches, storage, access, data transfer rights/jurisdiction), privacy...  Problems where the interconnected trans-national world of “things” (& attacks, impact, enforcement) behooves us to join forces – where synergy is a no-brainer...  Web x.0, interlinked infrastructures (& their protection), testbeds  Can we jointly influence and leverage issues?   Web x.0?  Understanding the “other” sides priorities  The mechanisms do exist  Inco-Trust © DEEDS Group

5 EU FP7 Thrusts: Trustworthy Systems & Services Ambient Connectivity and Functionality Network infrastructures Dynamic reconfigurable service architectures Identity management, privacy, trust policies Underpinning technologies for trustworthy infrastructures (security enabling technologies, SOA’s, cross-layer networks, privacy preserving network monitoring…) Critical Infrastructure Protection

6 6 Thrust 1: Future Internet Design & its Security  Mixed-mode, mobility, WSN - heterogeneity galore!!!  Will need global inputs: Technical, implementation, + regulatory/legal involvement at varied levels/layers – design & monitoring Usage: end user/device compatibilities? Architectural? Protocols? layered /federated security?... (PlanetLab-intl.) CyberThreats? (Cylab involvement)  Reality: composition of “internet” is terribly diffuse with many many many international entities BUT this is also the critical and high impact co-operation area!  Influence via international standards groups? © DEEDS Group

7 7 Thrust 2: Global Persona Mgmt & Privacy  Technological base: biometrics, crypto …  Usage facets: User-in-the loop privacy, confidentiality Human/machine/device ID mgmt coverage: across enterprise lifecycle? partitioned access with multiple personas? Data storage, access rights across intl. data centers, intl. jurisdiction? Repudiation, intl. liability rights? abuse? Privacy: varied intl. legalities, varied social acceptability & conformance standards + regulation … data level (mobile content? DRM?) intl. issues? © DEEDS Group ISORC 2006

8 Thrust 3: Infrastructure Protection Users Businesses FI/Govt Tech/Info Conduits UI Servers Telcos DB Servers Impact Operational Operational Financial Financial Confidence Confidence Public Custom App Level App Level Sys Level Sys Level © DEEDS Group The Financial Infrastructure Protection (FIP) challenge is not just at a favorite (national) level or element(s) within the FI landscape, but the consolidated, coherent and consistent coverage of the overall environment – the technological, usage and user elements – on a global scale. Transactional & Data Confidentiality - Liability Driver Transactional & Data Integrity - Liability Driver Transactional & Data Availability - Usage Driver Transactional & Data Confidentiality - Liability Driver Transactional & Data Integrity - Liability Driver Transactional & Data Availability - Usage Driver

9 International Co-Operation Facilitators  Intl. Cooperation in ICT Security & Trust  USA (NSF, DHS), Japan, Australia, Canada, S. Korea INCO-TRUST The Consortium  Composite Social – Legal – Technical Issue considerations THINK-TRUST Personalisation, Security, Accountability Vs Privacy & Human Values! The Consortium

10 2006-2007 WS(EU 11‘06) 200820092010 WS (US) 4‘07 M9: (EU) M15: (US) M21: (JPN ) Final M27: (EU) Phase 2: Prioritization of mutual interests Phase 1: Understanding & connections of mutual beneficial interests Phase 0: Pre-Project EU-International Summit Series Workshops 1 + 2 Platform for international collaboration & consensus building Input to the design of future research programs * Call Prioritizations * Intl. Project Formulations The Timeline & Mechanics of Inco-Trust

11 Inco-Trust Working Groups: Participation Welcome!  WG – Core Technologies/Infrastructures  Security of the large “system of systems” covering networking and usage/data coupling and interdependencies. Security of the current Internet and the design of the security of the future Internet  WG - Environmental  Security of the applications, the services, the protection of the software property and data  WG – User-based  Mechanisms that guarantee privacy, traceability, anonymization and use of pseudonyms of the legitimate users, while enabling location, tracking and tracing of malevolent users at individual, group or organization levels.  Socio-technical-legal challenges moving into a ubiquitous, mobile Information Society, with mixed mode environments, and continually evolving networked environments.  Testbeds: Composition and usage of Future TSD test-beds: GENI, Planet-Lab-Intl: US, Europe, Japan

12  www.deeds.informatik.tu-darmstadt.de www.deeds.informatik.tu-darmstadt.de  suri@cs.tu-darmstadt.de © DEEDS Group


Download ppt "On the Path to International Co-operation … Dependable Embedded Systems & SW Group www.deeds.informatik.tu-darmstadt.de Neeraj Suri Dept. of Computer Science."

Similar presentations


Ads by Google