GRID Economies Breakout Group 3. Economies What are you selling? Pricing Transaction/access to resource Security attribute (e.g. price drops if security.

Slides:



Advertisements
Similar presentations
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing Xinwen Zhang Francesco Parisi-Presicce Ravi Sandhu
Advertisements

Security Challenges for Future Internet Design Cybertrust PI Meeting Breakout.
© 2012 Open Grid Forum Simplifying Inter-Clouds October 10, 2012 Hyatt Regency Hotel Chicago, Illinois, USA.
Scenario 2: Safety Critical Instruments. Threats/Risk Analysis o All the usual grid problems o Greater risk of overlapping resource usage o Risk of confidentiality.
THE DEVELOPMENT BANK OF SOUTHERN AFRICA
Multi-level SLA Management for Service-Oriented Infrastructures Wolfgang Theilmann, Ramin Yahyapour, Joe Butler, Patrik Spiess consortium / SAP.
Efficient, Productive Solutions SECURITY SOLUTIONS for LAWSON SOFTWARE Part of our RISK MANAGEMENT SUITE FOR LAWSON S3 Thank you for taking the time to.
Agreement-based Distributed Resource Management Alain Andrieux Karl Czajkowski.
PlanetLab Architecture Larry Peterson Princeton University.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
CLOUD COMPUTING AN OVERVIEW & QUALITY OF SERVICE Hamzeh Khazaei University of Manitoba Department of Computer Science Jan 28, 2010.
SmartER Semantic Cloud Sevices Karuna P Joshi University of Maryland, Baltimore County Advisors: Dr. Tim Finin, Dr. Yelena Yesha.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
1 Federal Communications Commission Public Safety and Homeland Security Bureau NARUC Summer Committee Meetings Dallas, Texas July 13, 2014 Clete D. Johnson.
Prof. A. Taleb-Bendiab, Talk: Brussels’07, Contact: Date: 01/06/2015, Slide: 1 Engineering Self-Organising Networks of.
CoreGRID Workpackage 5 Virtual Institute on Grid Information and Monitoring Services Authorizing Grid Resource Access and Consumption Erik Elmroth, Michał.
AP Economics Mr. Bernstein Module 31: Money Policy and the Interest Rate March 3, 2015.
MiFID - Technology Solutions In Search of IT Excellence
Implementing a risk-based Title IV audit program Presented by: Jarod Paulson, Compliance Manager Erin Hage, Audit and Compliance Specialist.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
File: 05_RETS_Implementation_Best_Practices.PPT 1 RETS Implementation Practices RETS Implementation Best Practices Business Case Project Start-up Resource.
Introduction Challenges of Managing in a Network Economy.
4-th International Conference for Confidence and Security in the Information Society Mikhail Senatorov Andrey Shcherbakov Trusted information and telecommunication.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
Risk Assessment Farrokh Alemi, Ph.D. Monday, July 07, 2003.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
Aspects of application security Jens Jensen, STFC 3 rd T&S workshop, NeSC July 2008.
Delivery mechanisms for cash and voucher programs MBRRR Training Session 5.1.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
File: 06_RETS_Implementation Issues.PPT 1 RETS Implementation Issues  Business Case  Project Preliminaries  Resource Identification  RETS Service Supplier.
VIRTUAL WORLDS IN EDUCATIONAL RESEARCH © LOUIS COHEN, LAWRENCE MANION & KEITH MORRISON.
NETWORKED EUROPEAN SOFTWARE & SERVICES INITIATIVE Future research challenges in dependability - an industrial perspective from NESSI Aljosa Pasic Atos.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The privacy risks and rewards of distributed identity Conference Presentation (8 September 2003) Surveillance and Privacy 2003, University of New South.
Slide 1 Mike Trigg Group Money Laundering Reporting Officer.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
File: 05_AEI Implementation Best Practices.PPT 1 RETS Implementation Issues Yogi Schulz RETS Implementation Best Practices Business Case Project Start-up.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
CSCE 548 Secure Software Development Security Operations.
Consumer Protection Definition. 1 Current General Frameworks For CP. 2 Gaps/Risk areas in current Frameworks. 3 Consumer Protection Pillars. 4 NGN/Convergence.
Strong Internal Audit Association of International Bank Auditors – Regulatory Panel June 9, 2011 Carlos D. Henández International Banking Supervision Comptroller.
UCT-COE Seminar Page 1 January 23, 2016 Vitalis G.O Neco Ventura Charging QoS-Enabled Services in Inter-domain IMS Frameworks Department of Electrical.
Computer Science and Engineering 1 Mobile Computing and Security.
GESA: Grid Economic Services Architecture Steven Newhouse Jon MacLaren
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
29 th May Agenda 9.15 Arrival – Tea/Coffee served 9.30 Breakfast served 9.45 The importance of the Framework within the world of Service Companies
SAS No. 70, Service Organizations A standard for reporting on a service organization’s controls affecting user entities' financial statements. Only for.
Developing an Audit Program By Rodney Kocot President Systems Control and Security Incorporated Copyright © 2005 Rodney Kocot.
INSERT PROJECT ACRONYM HERE BY EDITING THE MASTER SLIDE (VIEW / MASTER / SLIDE MASTER) Using WS-Agreement for Risk Management in the Grid European Commission.
Role of the management boards, supervisory boards, audit committees, statutory auditors and supervision authorities in the supervision of capital adequacy.
Issues in Cloud Computing. Agenda Issues in Inter-cloud, environments  QoS, Monitoirng Load balancing  Dynamic configuration  Resource optimization.
Towards a High Performance Extensible Grid Architecture Klaus Krauter Muthucumaru Maheswaran {krauter,
Bob Jones EGEE Technical Director
Improving finance function effectiveness in IT company
Information Technology Sector
Integrated Management System and Certification
Week Thirteen – Continuous Auditing/CAATs and QA/QC
Week Thirteen – CAATs & Continuous Auditing
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
NSF CSR PI Meeting Breakout Session: Integrated Networked Systems and Internet of Things Saurabh Bagchi Purdue University.
Trust Relationships Meeting Notes September 26, 2003 Dartmouth College.
Project Management Chapter 11.
IS4680 Security Auditing for Compliance
Reengineering the Audit with Blockchain and Smart Contracts
Identity and Trust Management Platform in DICOM
NIST Cloud Computing Reference Architecture
The Attribute and the ecosystem
Presentation transcript:

GRID Economies Breakout Group 3

Economies What are you selling? Pricing Transaction/access to resource Security attribute (e.g. price drops if security drops) QoS attribute (including proof/auditing – externally certified) Challenge: Dynamic Negotiation

What is the economic model Business Financial motivation – real money Financial motivation – real moneyAcademic Different motivation – different economy of awards Different motivation – different economy of awards Not real money – what comeback for failure to deliver Not real money – what comeback for failure to deliverReputation/Credibility Needs to be measures/assessed Needs to be measures/assessed

Issues Roles/StakeholdersTrust/ReputationPoliciesTraining Technology Gaps Threat/Risk Analysis Security Issues Auditing

Stakeholders/Roles Service Owners Agents Service Brokers Service Brokers Service Aggregators Service Aggregators QoS auditing QoS auditing End users GGF GESA Use Cases Resource Provider Resource Provider Computation Resource Reseller Computation Resource Reseller Application Service Provider Application Service Provider Computation Broker Provider Computation Broker Provider Software License Provider Software License Provider

Hidden Stakeholders/Roles SysAdmin Role Resource Provisioning E.g. UKERNA Role E.g. UKERNA Role E.g. Dynamic QoS/bandwidth booking E.g. Dynamic QoS/bandwidth bookingSpecialists Economist Economist Mechanism for setting prices etc? Lawyers Lawyers System vendors

Trust/Reputation Trust as in identity/security Trust of reliability i.e. Reputation based i.e. Reputation based Brokering causes branching chains of trust How to logically/mathematical calculate security trust through chain (e.g. via CA)?

Policies Managing multiple policies Intersection of visible policies Intersection of visible policies Single common policy language as part of GESA Do we need/Can we have focal/common policy framework? From where? (OFGRID?)

Training How do you train autonomous agents? Training specific to role Training/qualification of intermediaries should be certified? Training vs useable tools Is now right time? (tools liable to change) Yes for SysAdmins Yes for SysAdmins No for end-users No for end-users

Technology Gap Controlling resource allocation Controlled execution of uploaded code and execution validation Monitor/auditing QoS/SLA (but not infringe privacy) Fine grained security which doesnt impact ability to manage systems/problem fix Interdomain policy management Useability of tools/systems by non-SysAdmin