Initiatives for FP6 A few thoughts on IP-level research: Dependability-related Research the University of Lisboa Paulo E. Veríssimo

Slides:



Advertisements
Similar presentations
All rights reserved © 2006, Alcatel Grid Standardization & ETSI (May 2006) B. Berde, Alcatel R & I.
Advertisements

Distributed Data Processing
8.
02/12/00 E-Business Architecture
City University London
1 Quality Objects: Advanced Middleware for Wide Area Distributed Applications Rick Schantz Quality Objects: Advanced Middleware for Large Scale Wide Area.
LYU9802 Quality of Service in Wired/Wireless Communication Networks: Techniques and Evaluation Supervisor: Dr. Michael R. Lyu Marker: Dr. W.K. Kan Wan.
Grids and Grid Technologies for Wide-Area Distributed Computing Mark Baker, Rajkumar Buyya and Domenico Laforenza.
Applying the ISO RM-ODP Standard in e-Government B. Meneklis 1, A. Kaliontzoglou 2,3, D. Polemi 1, C. Douligeris 1 1 University of Piraeus, Department.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
©Ian Sommerville 2006Critical Systems Slide 1 Critical Systems Engineering l Processes and techniques for developing critical systems.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
The Design of System Architecture
ANSALDO: BACKGROUND experience in dependable Signalling Automation Systems experience in dependable Management Automation Systems experience in installation,
Distributed Real-Time Systems for the Intelligent Power Grid Prof. Vincenzo Liberatore.
Cryptography and Network Security
Research and Projects Name: Aloysius. A. EDOH Name: Alo Address: Ext 3344.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Invitation to Computer Science 5th Edition
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Internet de las Cosas The Internet of Things (IoT) Internet der Dinge Internet des Objects.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Brussels, 1 June 2005 WP Strategic Objective Embedded Systems Tom Bo Clausen.
Exploring the Network.
DISTRIBUTED COMPUTING
IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Wireless Networks Breakout Session Summary September 21, 2012.
Architectural Design To explain the advantages and disadvantages of different distributed systems architectures To discuss client-server and distributed.
Grid-based Sensor Network Service on Future Internet By Mohammad Mehedi Hassan Student ID:
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Architectural Design lecture 10. Topics covered Architectural design decisions System organisation Control styles Reference architectures.
Future Learning Landscapes Yvan Peter – Université Lille 1 Serge Garlatti – Telecom Bretagne.
Architectural Design Yonsei University 2 nd Semester, 2014 Sanghyun Park.
Grid-based Future Internet with Wireless sensor network By Mohammad Mehedi Hassan Student ID:
Fault Tolerance David Powell LAAS-CNRS, Toulouse.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 14 Database Connectivity and Web Technologies.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
MAFTIA Expression of Interest for DEFINE and DESIRE presented by Robert Stroud, University of Newcastle upon Tyne.
Information Technology Needs and Trends in the Electric Power Business Mladen Kezunovic Texas A&M University PS ERC Industrial Advisory Board Meeting December.
Rational Unified Process Fundamentals Module 7: Process for e-Business Development Rational Unified Process Fundamentals Module 7: Process for e-Business.
1 CALL 6 Key Action IV Introduction and Action Lines: IV.1.2, IV.2.1, IV.2.2, IV.2.4 Brussels, 16. Jan 2001 Colette Maloney European Commission.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
6. Protocol Standardization for IoT 1.  TCP/IP  HTML and HTTP  The difference between the Internet and the World Wide Web The Internet is the term.
WP2001 CPA4 Towards Dependable and Survivable Systems and Infrastructures Baton holder ANDREA SERVIDA European Commission DG Information Society C-4
1. Nortel Confidential Information BUSINESS MADE SIMPLE 2 The Future of Telecommunications John A. Phillips Nortel, ETSI General Assembly Chairman 2007.
Telecommunication Networks Group Technische Universität Berlin Towards Cooperating Objects: Communication for Cooperation Prof. Dr.-Ing. Adam Wolisz with.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Alex Adamec.  Any physical or virtual information system that controls, processes, transmits, receives, or stores electronic information in any form.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
Initiatives for FP6 A few thoughts on flip chart about: Open Infrastructures Paulo E. Veríssimo LaSIGe-FCUL, Univ. Lisboa
Challenges of Mobile ad-hoc Grids and their Applications in e-Healthcare Zhuoqun Li, Lingfen Sun and Emmanuel C. Ifeachor School of Computing, Communications.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Understanding IT Infrastructure Lecture 9. 2 Announcements Business Case due Thursday Business Analysis teams have been formed Business Analysis Proposals.
Embedded Systems - the Neural Backbone of Society ARTEMIS Industry Association ARTEMIS, from successful R&D to cutting-edge Innovation Rolf Ernst, TU Braunschweig.
Internet of Things – Getting Started
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 10Slide 1 Chapter 5:Architectural Design l Establishing the overall structure of a software.
Chapter 1 Characterization of Distributed Systems
Unit# 5: Internet and Worldwide Web
Presentation transcript:

Initiatives for FP6 A few thoughts on IP-level research: Dependability-related Research the University of Lisboa Paulo E. Veríssimo LaSIGe, Laboratory for Large-Scale Informatic Systems Univ. Lisboa

Methodology Current situation Problems Problems  Challenges/Opportunities Hopefully: –Industry will see problems –Research will see opportunities Industry  Research connections?

Situation More and more systems relying on “open network environments” (aka Internet), COTS components, inadept users, etc. Increase in the risk associated with using technologies not adequate to the role they are playing More exposure of highly-critical systems More not-so-critical systems exposed

change technologies, or make them work better Problems change technologies, or make them work better?

Problems/Opportunities change technologies, or make them work better? general concern with dependability, survivability, trustworthiness, and so forth architecture, paradigms, design assurance and assessment, amongst other factors

Main Problem/Opportunity areas Applications that are critical (e.g. SCADA, CCC), supported by semi-open geographically dispersed infrastructures Applications that are commercial (e.g. B2B, B2C), supported by very open extra-powerful site-based server compounds Applications of a mixed nature w.r.t. purpose, but whose distinguishing feature is being supported by ad-hoc collections of wireless and mobile entities, immersed in active environments of ubiquitous and inconspicuous devices.

Opportunities (IP-style applied research) New architectures New paradigms New gadgets New subsystems Well-defined and contained Remember:... don’t change technologies …... make them work better …

The perspective of U. Lisboa Intrusion-tolerant communication, checkpointing, key and replication management protocols based on hybrid failure modes. –Highly modular middleware building blocks for a number of systems and applications subject to faults and attacks (e.g. complex web sites, business and critical infrastructures), whose very high efficiency and resiliency come from the power of using architectural-hybrid fault models.

The perspective of U. Lisboa Real-time and secure distributed kernel design. –Self-contained, portable security kernels and control networks for both local and wide area scopes, to simplify the design of secure high- performance device clusters (e.g. servers, routers, controllers), particularly those having to fulfil timeliness constraints under faults and attacks (e.g. CCC, ATC, SCADA, OLTP, e-comm).

The perspective of U. Lisboa Secure operation of embedded systems –Mechanisms and protocols yielding secure real- time operation, namely in embedded systems (known to be a very hard problem) based on expanding recent results on the development of real-time security kernels and intrusion- tolerant protocols. –This problem emerges from the pervasive use of embedded systems in many areas, from car to home automation, and its progressive interconnection to open networks.

The perspective of U. Lisboa Distributed system support for ET-TT embedded systems –New architectural approaches to seamlessly support dependable Event- and Time-Triggered operation on field buses and control area networks (e.g. CAN, TTP, etc.), based on information flow integration between environment and control system, flexible event-state transformation, integrated ET-TT communication, and algorithmics-aware system dimensioning.

The perspective of U. Lisboa Dependable QoS assurance mechanisms in environments with uncertain timeliness –Mechanisms and protocols based on time- safety and time-elasticity, to perform dependable QoS assurance and adaptation in settings where the need for real-time behaviour conflicts with the uncertainty about the environment (host, network) timeliness (e.g., complex real-time and/or on-line transactional database servers, SCADA, active environments with mobile entities, etc.).

Where to find us Navigators Group at LaSiGE Univ. Lisboa, Portugal related research lines in the site: Fault and Intrusion Tolerance in Open Distributed Systems Timeliness and Adaptation in Dependable Systems Feel free to Paulo Veríssimo ---