On the Path to International Co-operation … Dependable Embedded Systems & SW Group www.deeds.informatik.tu-darmstadt.de Neeraj Suri Dept. of Computer Science.

Slides:



Advertisements
Similar presentations
Identity Network Ideals – Heterogeneity & Co-existence
Advertisements

Zürich, January 28, 2009 ERCIM WG eMobility Meeting Torsten Braun University of Bern, Switzerland
“Challenges and Methodologies
Security and dependability in FP6 Andrea SERVIDA Head of Sector European Commission DG Information Society - Unit D/4 Trust and Security
Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
FIA Prague Preparation February 6, Scenario planning approach We cannot predict the future We cannot predict the future We do understand the drivers.
Jacques Bus, Head of Unit DG Information Society and Media EU-US Cooperation in Network and Information Security 17 Mar, 2008 – Yale, US.
Cloud computing security related works in ITU-T SG17
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
FIA Budapest 18 May 2011 The socio-economic impacts of the Future Internet FIA Budapest 18 May 2011.
GENI: Global Environment for Networking Innovations Larry Landweber Senior Advisor NSF:CISE Joint Techs Madison, WI July 17, 2006.
Towards trustworthy ICT service infrastructures Yves PAINDAVEINE Directorate General Information Society and Media Unit F5 Security European Commission.
Open Workshop on e-Infrastructures, Helsinki October 4 – 5, 2006 Roadmap Parallel Session on last chapter of e-IRG Roadmap: Crossing the Boundaries of.
1 Next-Generation Secure Internet: Security Overview and Context Adrian Perrig in collaboration with Steven Bellovin, David Clark, Dawn Song.
Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European.
PRIVACY, TRUST, and SECURITY Bharat Bhargava (moderator)
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Alex Galis University College London
SECURE –FORCE Project Christodoulos Keratidis Atlantis Consulting S.A. 1 st SEE-INNOVATION Know How Event Skopje, December 2006.
Successful Deployment and Solid Management … Close Relatives Tim Sinclair, General Manager, Windows Enterprise Management.
Wireless Networks Breakout Session Summary September 21, 2012.
WISTP workshop Aljosa Pasic Atos Origin Trust, Security and Dependability in ICT – FP7.
Jacques Bus, Head of Unit Trust and Security DG Information Society and Media European Commission Trust & Privacy EU Research Activities Workshop Cyber.
A Practical Guide for Joining EduRoam EuroCAMP Torino A Practical Guide for Joining EduRoam 4 March 2005 Version 1.6.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
IST programme Cultural Heritage in Tomorrow ’s Knowledge Society FUTURE PLANS FP6 Cultural Heritage in Tomorrow ’s Knowledge Society FUTURE PLANS FP6 RRRESE.
Dependability in FP 6 Brian Randell Pisa Workshop, November 2002.
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
A Framework for Internetworking Heterogeneous High-Performance Networks via GMPLS and Web Services Xi Yang, Tom Lehman Information Sciences Institute (ISI)
Why Governance? SOA Governance allows to n Master complexity of IT n Support business process change.
AUTHORS: MIKE P. PAPAZOGLOU WILLEM-JAN VAN DEN HEUVEL PRESENTED BY: MARGARETA VAMOS Service oriented architectures: approaches, technologies and research.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Agency for International Science and Technology Development Programmes in Lithuania IST IN FP6: COVERAGE AND MAIN TARGETS Dr. Rimantas Skirmantas International.
GRID ARCHITECTURE Chintan O.Patel. CS 551 Fall 2002 Workshop 1 Software Architectures 2 What is Grid ? "...a flexible, secure, coordinated resource- sharing.
FIDIS & PRIME Project Views SecurIST Inaugural Workshop Brussels, Kai Rannenberg Goethe University Frankfurt
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
Ruth Pordes November 2004TeraGrid GIG Site Review1 TeraGrid and Open Science Grid Ruth Pordes, Fermilab representing the Open Science.
Challenge 6: Mobility, Environmental sustainability and energy efficiency Includes as driving objective: “Sustainable growth and environmental sustainability”
ECOTRADE AN ECOWAS ICT INITIATIVE TOWARDS GREATER TRADE FACILITATION A Presentation Of : The ECOWAS Computer Centre, Abuja, NIGERIA.
Future Internet: Some ideas from CINI Giorgio Ventre Università di Napoli Federico II & Consorzio Interuniversitario Nazionale per l’Informatica
Internet2 AdvCollab Apps 1 Access Grid Vision To create virtual spaces where distributed people can work together. Challenges:
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Realising the Community Vision of Concurrent Enterprising ICE 2003 Moderator Roberto Santoro, ESoCE NET Roberto Santoro, ESoCE NETwww.esoce.net.
1 Future Internet Research and Experimentation. 2  Mobility and pervasiveness  Security, trust, dependability  QoS for commercial video streaming applications.
LSEC H2020-DS - & CIP Ulrich Seldeslachts, Brussels, January 27th, 2016.
1 June 9 th, WARD ICT Mobile Summit W D 4 WP1 - BIRD Business Innovation, Regulation and Dissemination Luis M. Correia, IST-TUL, PT Klaus.
Cisco Systems Amy Kwan Annual Revenue: US $40 Billion Worldwide Presence: Culture: Innovation, Quality, Teamwork Changing the way we work, play and learn.
IoT R&I on IoT integration and platforms INTERNET OF THINGS
Dr. Ir. Yeffry Handoko Putra
Bob Jones EGEE Technical Director
Cloud Faxing for Law Firms
Dept. of Computer Science
Information Security, Theory and Practice.
FP7 – ICT Theme a motor for growth, competiveness and social inclusion
Federated IdM Across Heterogeneous Clouding Environment
Chapter 18 MobileApp Design
University of Technology
Trust Security Privacy Dependability (TSPD)
Secure & Unified Identity
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
NIST Cloud Computing Reference Architecture
Presentation transcript:

On the Path to International Co-operation … Dependable Embedded Systems & SW Group Neeraj Suri Dept. of Computer Science TU Darmstadt, Germany

Opinions, Opinions, Opinions … Meaningful international co-operation  What doesn’t work  What could work  Possibilities, themes/areas, projects … © DEEDS Group

Nice but …  We think our stuff is great so it must excite the troops yonder too!  We’ll do out stuff, they’ll do theirs… © DEEDS Group

Better…  Problems & technologies of common interest where synergy would be meaningful & add “local” (technological legal, societal) depth?  Web x.0, Persona/Data mgmt (technologies and approaches, storage, access, data transfer rights/jurisdiction), privacy...  Problems where the interconnected trans-national world of “things” (& attacks, impact, enforcement) behooves us to join forces – where synergy is a no-brainer...  Web x.0, interlinked infrastructures (& their protection), testbeds  Can we jointly influence and leverage issues?   Web x.0?  Understanding the “other” sides priorities  The mechanisms do exist  Inco-Trust © DEEDS Group

EU FP7 Thrusts: Trustworthy Systems & Services Ambient Connectivity and Functionality Network infrastructures Dynamic reconfigurable service architectures Identity management, privacy, trust policies Underpinning technologies for trustworthy infrastructures (security enabling technologies, SOA’s, cross-layer networks, privacy preserving network monitoring…) Critical Infrastructure Protection

6 Thrust 1: Future Internet Design & its Security  Mixed-mode, mobility, WSN - heterogeneity galore!!!  Will need global inputs: Technical, implementation, + regulatory/legal involvement at varied levels/layers – design & monitoring Usage: end user/device compatibilities? Architectural? Protocols? layered /federated security?... (PlanetLab-intl.) CyberThreats? (Cylab involvement)  Reality: composition of “internet” is terribly diffuse with many many many international entities BUT this is also the critical and high impact co-operation area!  Influence via international standards groups? © DEEDS Group

7 Thrust 2: Global Persona Mgmt & Privacy  Technological base: biometrics, crypto …  Usage facets: User-in-the loop privacy, confidentiality Human/machine/device ID mgmt coverage: across enterprise lifecycle? partitioned access with multiple personas? Data storage, access rights across intl. data centers, intl. jurisdiction? Repudiation, intl. liability rights? abuse? Privacy: varied intl. legalities, varied social acceptability & conformance standards + regulation … data level (mobile content? DRM?) intl. issues? © DEEDS Group ISORC 2006

Thrust 3: Infrastructure Protection Users Businesses FI/Govt Tech/Info Conduits UI Servers Telcos DB Servers Impact Operational Operational Financial Financial Confidence Confidence Public Custom App Level App Level Sys Level Sys Level © DEEDS Group The Financial Infrastructure Protection (FIP) challenge is not just at a favorite (national) level or element(s) within the FI landscape, but the consolidated, coherent and consistent coverage of the overall environment – the technological, usage and user elements – on a global scale. Transactional & Data Confidentiality - Liability Driver Transactional & Data Integrity - Liability Driver Transactional & Data Availability - Usage Driver Transactional & Data Confidentiality - Liability Driver Transactional & Data Integrity - Liability Driver Transactional & Data Availability - Usage Driver

International Co-Operation Facilitators  Intl. Cooperation in ICT Security & Trust  USA (NSF, DHS), Japan, Australia, Canada, S. Korea INCO-TRUST The Consortium  Composite Social – Legal – Technical Issue considerations THINK-TRUST Personalisation, Security, Accountability Vs Privacy & Human Values! The Consortium

WS(EU 11‘06) WS (US) 4‘07 M9: (EU) M15: (US) M21: (JPN ) Final M27: (EU) Phase 2: Prioritization of mutual interests Phase 1: Understanding & connections of mutual beneficial interests Phase 0: Pre-Project EU-International Summit Series Workshops Platform for international collaboration & consensus building Input to the design of future research programs * Call Prioritizations * Intl. Project Formulations The Timeline & Mechanics of Inco-Trust

Inco-Trust Working Groups: Participation Welcome!  WG – Core Technologies/Infrastructures  Security of the large “system of systems” covering networking and usage/data coupling and interdependencies. Security of the current Internet and the design of the security of the future Internet  WG - Environmental  Security of the applications, the services, the protection of the software property and data  WG – User-based  Mechanisms that guarantee privacy, traceability, anonymization and use of pseudonyms of the legitimate users, while enabling location, tracking and tracing of malevolent users at individual, group or organization levels.  Socio-technical-legal challenges moving into a ubiquitous, mobile Information Society, with mixed mode environments, and continually evolving networked environments.  Testbeds: Composition and usage of Future TSD test-beds: GENI, Planet-Lab-Intl: US, Europe, Japan

  © DEEDS Group