1 Security and Dependability Organizational Patterns - A Proof of Concept Demo for SERENITY A. Saidane, F. Dalpiaz, V.H. Nguyen, F. Massacci.

Slides:



Advertisements
Similar presentations
An Adaptive Policy-Based Framework for Network Service Management Leonidas Lymberopoulos Emil Lupu Morris Sloman Department of Computing Imperial College.
Advertisements

No Purpose – No Data: Goal-Oriented Access Control for Ambient Assisted Living Università delgi Studi di Trento Fabio Massacci, Viet Hung Nguyen, Ayda.
Ch:8 Design Concepts S.W Design should have following quality attribute: Functionality Usability Reliability Performance Supportability (extensibility,
Identifying, Modifying, Creating, and Removing Monitor Rules for SOC Ricardo Contreras Andrea Zisman
H Apr-01 Clark Thomborson Software Security CompSci 725 Handout 28: Report Writing #2 (Sample Titles & Abstracts) Clark Thomborson University of.
Using the Semantic Web to Construct an Ontology- Based Repository for Software Patterns Scott Henninger Computer Science and Engineering University of.
MobiShare: Sharing Context-Dependent Data & Services from Mobile Sources Efstratios Valavanis, Christopher Ververidis, Michalis Vazirgianis, George C.
Object-Oriented Analysis and Design
Variability Oriented Programming – A programming abstraction for adaptive service orientation Prof. Umesh Bellur Dept. of Computer Science & Engg, IIT.
ASNA Architecture and Services of Network Applications Research overview and opportunities L. Ferreira Pires.
Introduction To System Analysis and Design
1 Software Testing and Quality Assurance Lecture 12 - The Testing Perspective (Chapter 2, A Practical Guide to Testing Object-Oriented Software)
An Application-led Approach for Security-related Research in Ubicomp Philip Robinson TecO, Karlsruhe University 11 May 2005.
Think. Learn. Succeed. Aura: An Architectural Framework for User Mobility in Ubiquitous Computing Environments Presented by: Ashirvad Naik April 20, 2010.
SE curriculum in CC2001 made by IEEE and ACM: Overview and Ideas for Our Work Katerina Zdravkova Institute of Informatics
Knowledge Acquisitioning. Definition The transfer and transformation of potential problem solving expertise from some knowledge source to a program.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Managing Agent Platforms with the Simple Network Management Protocol Brian Remick Thesis Defense June 26, 2015.
Interpret Application Specifications
Agent-Based Acceptability-Oriented Computing International Symposium on Software Reliability Engineering Fast Abstract by Shana Hyvat.
1 Introduction Introduction to database systems Database Management Systems (DBMS) Type of Databases Database Design Database Design Considerations.
Multi-Agent System for Online Auctions Jose Manuel Valladares Pernas CIS Master Project - Fall 2004 Advisor: Dr. Haiping Xu.
1. Context: Ambient Intelligence Ambient Intelligence (AmI) represents a vision of ubiquitous computing, sensing and actuating to unobtrusively enhance.
©Ian Sommerville 2006Critical Systems Slide 1 Critical Systems Engineering l Processes and techniques for developing critical systems.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Requirements Engineering
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Automatic Software Testing Tool for Computer Networks ARD Presentation Adi Shachar Yaniv Cohen Dudi Patimer
Anthony D. Wood, John A. Stankovic, Gilles Virone, Leo Selavo, Zhimin He, Qiuhua Cao, Thao Doan, Yafeng Wu, Lei Fang, and Radu Stoleru University of Virginia.
Windows.Net Programming Series Preview. Course Schedule CourseDate Microsoft.Net Fundamentals 01/13/2014 Microsoft Windows/Web Fundamentals 01/20/2014.
Introduction To System Analysis and design
E-Referral enabled collaborative health care Opportunities and considerations Presented by: Sasha Bojicic Emerging Technology Group Canada Health Infoway.
Supporting Resilence in Air Traffic Management A. Tedeschi, M. Felici, V. Meduri, C. Riccucci SERENE 2008 November 17-19, 2008, Newcastle upon Tyne, UK.
1 Autonomic Computing An Introduction Guenter Kickinger.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
-Nikhil Bhatia 28 th October What is RUP? Central Elements of RUP Project Lifecycle Phases Six Engineering Disciplines Three Supporting Disciplines.
Social Computing Networks: A New Paradigm for Engineering Pervasive Software Systems Naeem Esfahani Sam Malek 32th International Conference on Software.
MSF Requirements Envisioning Phase Planning Phase.
© 2007 Tom Beckman Features:  Are autonomous software entities that act as a user’s assistant to perform discrete tasks, simplifying or completely automating.
Software Agents: An Overview by Hyacinth S. Nwana and Designing Behaviors for Information Agents by Keith Decker, Anandeep Pannu, Katia Sycara and Mike.
Architecting Web Services Unit – II – PART - III.
Indo-US Workshop, June23-25, 2003 Building Digital Libraries for Communities using Kepler Framework M. Zubair Old Dominion University.
Introduction To System Analysis and Design
A Pervasive Architectural Framework for Providing Remote Medical Treatment Author:D. Vassis, P. Belsis, C.Skourlas,G.Pantziou 1.
Chapter 14 Part II: Architectural Adaptation BY: AARON MCKAY.
10 Software Architecture CSCU 411 Software Engineering.
© DATAMAT S.p.A. – Giuseppe Avellino, Stefano Beco, Barbara Cantalupo, Andrea Cavallini A Semantic Workflow Authoring Tool for Programming Grids.
1 Vigil : Enforcing Security in Ubiquitous Environments Authors : Lalana Kagal, Jeffrey Undercoffer, Anupam Joshi, Tim Finin Presented by : Amit Choudhri.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
1 Introduction to Software Engineering Lecture 1.
Requirements as Usecases Capturing the REQUIREMENT ANALYSIS DESIGN IMPLEMENTATION TEST.
Survival by Defense- Enabling Partha Pal, Franklin Webber, Richard Schantz BBN Technologies LLC Proceedings of the Foundations of Intrusion Tolerant Systems(2003)
Christoph F. Eick University of Houston Organization 1. What are Ontologies? 2. What are they good for? 3. Ontologies and.
 Problem Definition  Presented by Sushant and Alex Overview of the problem space Scenario Issues Example (plant care example) Discussion conclusion open.
Introduction to Semantic Web Service Architecture ► The vision of the Semantic Web ► Ontologies as the basic building block ► Semantic Web Service Architecture.
Service Discovery Protocols Mobile Computing - CNT Dr. Sumi Helal Professor Computer & Information Science & Engineering Department University.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 JSP Application Models.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
COP 4331 – OOD&P Lecture 7 Object Concepts. What is an Object Programming language definition: An instance of a class Design perspective is different.
Systems Architectures System Integration & Architecture.
IoT Mashup as a Service: Cloud-based Mashup Service for the Internet of Things By: Benny Bazumnik Lidor Otmazgin Date: 21/05/14.
Runtime Verification of Business Processes
Classifications of Software Requirements
Data and database administration
Chapter 4 – Requirements Engineering
Distribution and components
GROUP MEMBERS NAME ROLL NO SHAUBAN ALI 17-ARID-5650 UMAIR MUSHTAQ 17-ARID-5656 TARIQ SAEED 17-ARID-5657 MUSKAN WADOOD 17-ARID-5641.
Patterns.
Design and Implementation
Presentation transcript:

1 Security and Dependability Organizational Patterns - A Proof of Concept Demo for SERENITY A. Saidane, F. Dalpiaz, V.H. Nguyen, F. Massacci

Trento, 11 June Talk Outline 1. Introduction 2. Background S&D Organizational (SDO) Patterns SDO Patterns at runtime Serenity Runtime Framework 3. E-Health case study Description S&D Requirements Needed runtime SDO Patterns 4. Prototype Architecture Organizational Structure Manager 5. Pattern Implementation 6. Demonstration scene 2

Trento, 11 June Introduction Ambient Intelligence (AmI) systems are characterized by the combination of heterogeneity, mobility, dynamism in addition to the interaction with huge number of devices,.. Increasing difficulty to ensure Security and Dependability (S&D) in such environments  S&D requirements change at runtime  Complexity and the unbounded nature of AmI ecosystems Context awareness, Detection/Reaction at runtime, Adaptability, self-* computing Runtime use of S&D patterns

Trento, 11 June Background: S&D Organizational (SDO) patterns NOT fulfilled S&D Requirements Initial organizational structure Agents Goals Goals Resources Resources Tasks Tasks Relations: delegation, trust… Relations: delegation, trust… Fulfilled Revised organizational structure Add/Remove Agents Add/Remove Agents Add/Remove GoalsAdd/Remove Goals Add/Remove Resources Add/Remove Resources Add/Remove Tasks Add/Remove Tasks Add/Remove Relations Add/Remove Relations ContextSolution S&D Organizational Pattern S&D Organizational Pattern =

Trento, 11 June Background: S&D Organizational (SDO) patterns Secure i* (SI*)  Conceptual modeling language  Founded on i* conceptual framework  Tailored to describe secure socio-technical systems  Based on concepts such as agent, role, goal, task, trust, delegation, ownership, permission and resource  A possible language to express S&D Organizational patterns

Trento, 11 June Background: SDO patterns at runtime Definitions  Runtime pattern: a software/hardware/liveware system that applications can invoke at runtime (through the pattern interface) in order to fulfill some functional or non- functional requirements  SDO runtime pattern: A Runtime pattern providing solutions for Security and Dependability Organizational requirements Exploitation  Requires an autonomic S&D framework Autonomous pattern selection (rather than relying on experts) S&D solutions should be applied online

Trento, 11 June Background: Serenity Runtime Framework The Serenity Runtime Framework (SRF) is  An autonomic S&D framework  A result of the SERENITY project  Features Implemented as a service that listens to S&D Requests Has a library of S&D Patterns Applications perform S&D Requests that trigger a search in the S&D Patterns library The most appropriate S&D Pattern is translated into an S&D Solution that can be used by the requesting application Implemented S&D solutions are called Executable Components

Trento, 11 June Background: Serenity Runtime Framework 1. S&D Solution Request 2. S&D Library Query 3. Check preconditions 4. Activate Executable Component (EC) 5. Return EC handler 6. Send events 7. Check violations in monitoring rules 8. Respond to violations

Trento, 11 June E-Health case study: Description Bob is a 56 years old widowed man. Bob has been discharged from hospital after a cardiac arrest. Bob can take care of himself, but of course his health status needs to be monitored 24/7. To achieve this end, some AmI devices are used to monitor Bob health status. These devices regularly collect and process data in order to detect suspicious situations

Trento, 11 June E-Health case study: S&D Requirements Requirement 1: high reliability  Bob’s health monitoring should be provided with a high reliability and accuracy. Requirement 2: authorization  In case of emergency rescue teams should be autonomically authorized to access the house. teams sent by MERC require simple authentication teams sent by Emergency Response need a more complex authentication mechanism Requirement 3: need-to-know  The need-to-know property should be ensured in the management of private data displayed on monitors rescue teams can see private medical data (saturation, heart rate) social workers in charge of delivering medicines can see less data

Trento, 11 June E-Health case study: Needed runtime SDO Patterns Requirement 1: high reliability can be provided by the Redundancy for Reliability S&D pattern ContextSolution

Trento, 11 June E-Health case study: Needed runtime SDO Patterns Requirement 2: authorization can be provided by the Access Control S&D pattern ContextSolution

Trento, 11 June Prototype: Architecture 13 Organizational Structure Manager Smart Home Application MERC AmI Devices Register/Unregister Send events Set-up (roles,actors, …) Info on current situation Request info on current situation Send Alert Send monitoring info

Trento, 11 June Prototype: Architecture

Trento, 11 June Prototype: Organizational Structure Manager Organizational Structure Manager (OSM)  A fundamental component of our prototype  Stores the current organizational structure expressed in SI* language  Provides shared access to and update of the organizational structure  Contains static and dynamic information Roles are typically defined at deployment time Agents playing roles are added initially at deployment time, then updated (added or removed) at runtime Agents are expected to execute those goals that they inherit from their current roles Delegation of execution happens at runtime

Trento, 11 June Pattern Implementation We provide a description for pattern “Redundancy for Reliability”... ... and we derive general principles Reliability  the ability of a system or component to perform its required functions under stated conditions for a specified period of time [IEEE standard glossary for Software Engineering terminology]  In our pattern, it is enforced by having at least two providers for any critical service

Trento, 11 June Pattern implementation Parameters relate a class-level pattern to a specific context  the goal whose execution is expected (monitor patient health)  the agent who requests the goal (application)  the active service provider providing the goal (camera 1)  the role the provider is playing (HealthMonitor) Solution enactment description describes how to transit from the context to the solution Agent newProvider = findRedundantProvider(camera1,“HealthMonitor”); if (newProvider==null) return error; delegate execution(application, newProvider, “Monitor Patient”);

Trento, 11 June Monitoring rules are essential to detect and react to specific events that occur after the pattern has been instantiated  We should detect situations when redundancy is not provided anymore (providers failure) Reference to OSM is required to let the Executable Component (EC) change the Organizational Structure  Our OSM works with RMI: the EC needs IP address and port Preconditions are fundamental to express patterns applicability  If there is only one agent that can play role HealthManager, redundancy is not applicable

Trento, 11 June Demonstration scene Monitoring Bob Alert Bob falls down Smart Home MERC Alert: Bob falls down Reliability Requirement Smart Home Access Authorized Resource Access Requirement Rescue request

Trento, 11 June Demonstration scene Monitoring Bob Alert Bob falls down Smart Home MERC Alert: Bob falls down Redundancy Pattern Redundancy Pattern Smart Home Access Access Control Pattern Access Control Pattern Rescue request