Combining Theory and Systems Building Experiences and Challenges Sotirios Terzis University of Strathclyde.

Slides:



Advertisements
Similar presentations
SETTINGS AS COMPLEX ADAPTIVE SYSTEMS AN INTRODUCTION TO COMPLEXITY SCIENCE FOR HEALTH PROMOTION PROFESSIONALS Nastaran Keshavarz Mohammadi Don Nutbeam,
Advertisements

Intelligence Step 5 - Capacity Analysis Capacity Analysis Without capacity, the most innovative and brilliant interventions will not be implemented, wont.
Applying the Human Views for MODAF to the conception of energy-saving work solutions Dr Anne Bruseberg Systems Engineering & Assessment Ltd, UK on behalf.
Dr Jim Briggs Masterliness Not got an MSc myself; BA DPhil; been teaching masters students for 18 years.
Deanne Gannaway Facilitating Change in Higher Education Practices.
Lessons Learned in Initiating and Conducting Risk Assessments within a Risk Analysis Framework: A FDA/CFSAN Approach Robert Buchanan DHHS Food and Drug.
Performing a Fiduciary Review of Trust Administration FIRMA April 2009 Independent Fiduciary Services ® Independent Fiduciary Services, Inc.  th.
 Definition of Public Relations  1. ‘Public Relations are the management through communication of perceptions and strategic relations between an organisation.
Overview of OASIS SOA Reference Architecture Foundation (SOA-RAF)
Consistency of Assessment
Joost Westra, Frank Dignum,Virginia Dignum Scalable Adaptive Serious Games using Agent Organizations.
OASIS Reference Model for Service Oriented Architecture 1.0
Software Connectors. Attach adapter to A Maintain multiple versions of A or B Make B multilingual Role and Challenge of Software Connectors Change A’s.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Knowledge Acquisitioning. Definition The transfer and transformation of potential problem solving expertise from some knowledge source to a program.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #18-1 Chapter 18: Introduction to Assurance Overview Why assurance? Trust and.
Architectural Challenges in Developing a Web-Based Public Health Reporting System Workshop on Evaluating Software Architectural Solutions May.
Security Models for Trusting Network Appliances From : IEEE ( 2002 ) Author : Colin English, Paddy Nixon Sotirios Terzis, Andrew McGettrick Helen Lowe.
Chapter 22 Object-Oriented Design
Course Instructor: Aisha Azeem
Presentation on Integrating Management Systems
Matt Moxham EDUC 290. The Idaho Core Teacher Standards are ten standards set by the State of Idaho that teachers are expected to uphold. This is because.
Information Technology Audit
Developing Enterprise Architecture
Creating the relationship between good science and informed policy John C. Tracy, Director Idaho Water Resources Research Institute University of Idaho.
Foundations of Educating Healthcare Providers
Margaret J. Cox King’s College London
Evidence based research in education Cathy Gunn University of Auckland.
Interstate New Teacher Assessment and Support Consortium (INTASC)
Annual SERC Research Review, October 5-6, By Jennifer Bayuk Annual SERC Research Review October 5-6, 2011 University of Maryland Marriott Inn and.
Conceptual Framework for the College of Education Created by: Dr. Joe P. Brasher.
Towards an activity-oriented and context-aware collaborative working environments Presented by: Ince T Wangsa Supervised by:
Business Analysis and Essential Competencies
Thomas College Name Major Expected date of graduation address
Connecting Teachers Can there be models of effective practice for teachers with ICT? Chair: Christine Vincent, Becta Presenter: Margaret Cox King’s College.
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
Session 251 The purpose of establishing a public private partnership is to involve all stakeholders in a community in risk hazard management.
Ontology Summit2007 Survey Response Analysis -- Issues Ken Baclawski Northeastern University.
DRAFT – For Discussion Only HHSC IT Governance Executive Briefing Materials DRAFT April 2013.
© 2011 Underwriters Laboratories Inc. All rights reserved. This document may not be reproduced or distributed without authorization. ASSET Safety Management.
Aims of Workshop Introduce more effective school/University partnerships for the initial training of teachers through developing mentorship training Encourage.
TOPIC 12 STAKEHOLDERS AND SUSTAINABILITY. Introduction to Agenda 21 The Earth Summit held in Rio De Janerio, Brazil was attended by 178 country leaders.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
9 December 2005 Toward Robust European Air Pollution Policies Workshop, Göteborg, October 5-7, 2005.
JOINING UP GOVERNMENTS EUROPEAN COMMISSION Establishing a European Union Location Framework.
Assessing the influence on processes when evolving the software architecture By Larsson S, Wall A, Wallin P Parul Patel.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
1 What is OO Design? OO Design is a process of invention, where developers create the abstractions necessary to meet the system’s requirements OO Design.
Chapter 4 Developing and Sustaining a Knowledge Culture
March 2004 At A Glance NASA’s GSFC GMSEC architecture provides a scalable, extensible ground and flight system approach for future missions. Benefits Simplifies.
1 V&V Needs for NextGen of 2025 and Beyond A JPDO Perspective Maureen Keegan JPDO Integration Manager October 13, 2010.
What can Business Psychology do to map and measure Organisation Culture? A presentation for the Association of Business Psychologists 22nd September 2003.
Dynamic Trust Models for Ubiquitous Computing Environments Colin English, Paddy Nixon, Sotirios Terzis, Andrew McGettrick, Helen Lowe Department of Computer.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
New Perspective Based on how the system is used. What Is a Use Case? A case of how the system is used. –A behaviourally related sequence of interactions.
Computer Science and Engineering 1 Mobile Computing and Security.
Guidelines Recommandations. Role Ideal mediator for bridging between research findings and actual clinical practice Ideal tool for professionals, managers,
Basic Concepts and Definitions
Continual Service Improvement Methods & Techniques.
IS Security Policies and Strategies Dr Gurpreet Dhillon Virginia Commonwealth University.
Stage 1 Integrated learning Coffee Shop. LEARNING REQUIREMENTS The learning requirements summarise the knowledge, skills, and understanding that students.
Models of the OASIS SOA Reference Architecture Foundation Ken Laskey Chair, SOA Reference Model Technical Committee 20 March 2013.
Copyright © May 2014, Montessori Centre International.
1 Simulating Computational Societies Lloyd Kamara, Alexander Artikis, Brendan Neville, Jeremy Pitt Imperial College, London September 2002, Universidad.
Stages of Research and Development
Organizational Effectiveness
Model-Driven Analysis Frameworks for Embedded Systems
A Tutorial on the Zachman Framework for Enterprise Architecture
Unit 14 Emergency Planning IS 235
Presentation transcript:

Combining Theory and Systems Building Experiences and Challenges Sotirios Terzis University of Strathclyde

Pervasive and Global Computing SECURE Project (1)  Explore the human notion of trust as a basis for access control decision-making in a global computing environment  Subjective nature of trust – autonomous decision- making  Dynamic character of trust – form and evolve opinions about the likely behaviour of entities on the basis of evidence of their past behaviour  Observations and recommendations  Three models  A trust model – formally grounded  A risk model  A collaboration model  A trust-based decision making engine

Pervasive and Global Computing SECURE Project (2)  Theoretical outcomes  Abstract trust model  Trust domain with information and trustworthiness orderings  Entity trustworthiness as the fixed point of a global trust function (local trust policies with references)  Concrete instantiation of the trust model  Trust values as evidence (observable events) in support, inconclusive and in conflict to interaction outcome (event configurations)  Trust model operationalisation  Techniques for distributed computation of fixed point approximations in a global computing environment  A calculus for trust management enabling abstract description of entity behaviour with equivalence notions from process algebra  Reasoning techniques used to provide provable security guarantees in the trust model

Pervasive and Global Computing SECURE Project (3)  Systems building outcomes  Risk model  Risk as the combination of the likelihood of a trust- mediated action outcome occurring and its associated costs/benefits  Collaboration model  Decision-making process  Trust evaluation process  Risk evaluation process  A framework architecture for trust-based access control decision-making  SECURE kernel a Java-based instantiation –Generic implementation of the event-based instantiation of the trust model  Entity recognition scheme  Evidence distribution framework

Pervasive and Global Computing Challenges (1)  Largely separate theoretical and systems building research communities each with extensive literature  Limited awareness of progress to date and open challenges  Combine experts from both fields  Ensure research scope allows for contribution in both fields  Get experts from both fields involved from the beginning  Communication between theoreticians and systems builders can be difficult  Build a common basis for communication –Scenarios for concept exploration –Consistent and clearly defined terminology

Pervasive and Global Computing Challenges (2)  The real challenge lies in managing abstraction –Abstract models are useful only in so far as they support the analysis and development of real systems – theoretical models must be operational –Implementations should not muddle the differences between accidental and real complexities of the problem domain – systems builders should consider widely different implementations  Establishing good and open working relationship is key –Setting a clear common target is particularly useful  Some researchers trade on the boundary!  Have an important role to play in addressing the collaboration challenge  Recognising the potential benefits of a combined approach – the underlying challenge

Pervasive and Global Computing Addressing the challenges in SECURE (1)  Security domain particularly conducive to a combined approach  Potential benefits are clear  Security policy and protocol verification is a core requirement – set clearly the expected contribution of each field  Researchers quite often trade on the boundaries  Project strategy facilitated the combined approach  Researchers from both fields and trading on the boundary involved from the outset  SECURE kernel implementing models that enable policy verification set as a key objective

Pervasive and Global Computing Addressing the challenges in SECURE (2)  Emphasis on application scenarios facilitated communication  A key scenario (simple but with a great scope for development) played a central role  Independent development of multiple scenarios demonstrated the wide variation of approaches possible  Maintenance of a project glossary removed terminology problems  Emphasis on operationalisation & open collaboration  Management of abstraction through formal model instantiation  Distributed calculation of fixed point approximations motivated from emphasis  Wealth of literature on trust-related concepts was helpful

Pervasive and Global Computing Pervasive Computing Perspective  Significant work on the challenges of both fields is already taking place, but is currently largely separate  Research project combining researchers from both fields are not yet common  The need for a combined approach is advocated, but where the concrete benefits will be derived from is still unclear  Research on areas traditional trading on the boundary could be the way forward  A variety of independent implementation approaches are beginning to make the core characteristics clear, but there is still no consensus on central concepts  Lack of comparative studies makes things worse