10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking.

Slides:



Advertisements
Similar presentations
Configuration management
Advertisements

25 July, 2014 Hailiang Mei, TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei Remote Terminal Management.
5 August, 2014 Michel Chaudron,Johan Muskens, Johan J. Lukkien and Hailiang Mei TU/e Computer Science, System Architecture and Networking 1 Remote Terminal.
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
Android architecture overview
CS 795 – Spring  “Software Systems are increasingly Situated in dynamic, mission critical settings ◦ Operational profile is dynamic, and depends.
07/09/04 Johan Muskens ( TU/e Computer Science, System Architecture and Networking.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
Automated Analysis and Code Generation for Domain-Specific Models George Edwards Center for Systems and Software Engineering University of Southern California.
1 Quality Objects: Advanced Middleware for Wide Area Distributed Applications Rick Schantz Quality Objects: Advanced Middleware for Large Scale Wide Area.
Maintaining Terminal Integrity and Context-Aware Reconfiguration Johan Muskens (TU/e) Otso Virtanen (HIIT/BRU) Michel Chaudron (TU/e) Ronan Mac Laverty.
21-February-2003cse Architecture © 2003 University of Washington1 Architecture CSE 403, Winter 2003 Software Engineering
1 Dr. Frederica Darema Senior Science and Technology Advisor NSF Future Parallel Computing Systems – what to remember from the past RAMP Workshop FCRC.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
Figure 1.1 Interaction between applications and the operating system.
Strategic Directions in Real- Time & Embedded Systems Aatash Patel 18 th September, 2001.
1 Software Testing and Quality Assurance Lecture 1 Software Verification & Validation.
1 FM Overview of Adaptation. 2 FM RAPIDware: Component-Based Design of Adaptive and Dependable Middleware Project Investigators: Philip McKinley, Kurt.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
Course Instructor: Aisha Azeem
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
Plan Introduction What is Cloud Computing?
QoS-enabled middleware by Saltanat Mashirova. Distributed applications Distributed applications have distinctly different characteristics than conventional.
Clinic Security and Policy Enforcement in Windows Server 2008.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 18 Slide 1 Software Reuse.
Software Engineering Muhammad Fahad Khan
Software Reuse Prof. Ian Sommerville
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse.
Chapter 1- Introduction Lecture 1 Ready, fire, aim (the fast approach to software development). Ready, aim, aim, aim, aim... (the slow approach to software.
1 IBM Software Group ® Mastering Object-Oriented Analysis and Design with UML 2.0 Module 1: Best Practices of Software Engineering.
@2011 Mihail L. Sichitiu1 Android Introduction Platform Overview.
International Workshop on Web Engineering ACM Hypertext 2004 Santa Cruz, August 9-13 An Engineering Perspective on Structural Computing: Developing Component-Based.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Rational Unified Process Fundamentals Module 4: Disciplines II.
An Introduction to Software Architecture
1 Process Engineering A Systems Approach to Process Improvement Jeffrey L. Dutton Jacobs Sverdrup Advanced Systems Group Engineering Performance Improvement.
CHAPTER TEN AUTHORING.
Software Project Documentation. Types of Project Documents  Project Charter  Requirements  Mockups and Prototypes  Test Cases  Architecture / Design.
High Performance Embedded Computing © 2007 Elsevier Chapter 1, part 2: Embedded Computing High Performance Embedded Computing Wayne Wolf.
File: 06_RETS_Implementation Issues.PPT 1 RETS Implementation Issues  Business Case  Project Preliminaries  Resource Identification  RETS Service Supplier.
Refining middleware functions for verification purpose Jérôme Hugues Laurent Pautet Fabrice Kordon
Model Checking and Model-Based Design Bruce H. Krogh Carnegie Mellon University.
07/09/04 Johan Muskens ( TU/e Computer Science, System Architecture and Networking.
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK
Database Administration
Abstract A Structured Approach for Modular Design: A Plug and Play Middleware for Sensory Modules, Actuation Platforms, Task Descriptions and Implementations.
16/11/ Semantic Web Services Language Requirements Presenter: Emilia Cimpian
Gaia An Infrastructure for Active Spaces Prof. Klara Nahrstedt Prof. David Kriegman Prof. Dennis Mickunas
Elements of an ICT networks COMMUNICATION DEVICES: 1.Network interface card 2.Hub 3.Switch 4.Router STANDARDS AND PROCEDURES: 1.Enable devices to communicate.
Discussion on oneM2M and OSGi Interworking Group Name: ARC Source: Jessie, Huawei, Meeting Date: Agenda Item:
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
ARTEMIS SRA 2016 Trust, Security, Robustness, and Dependability Dr. Daniel Watzenig ARTEMIS Spring Event, Vienna April 13, 2016.
Decisive Themes, July, JL-1 ARTEMIS Decisive Theme for Integrasys Pedro A. Ruiz Integrasys July, 2011.
Towards a High Performance Extensible Grid Architecture Klaus Krauter Muthucumaru Maheswaran {krauter,
Software Reuse. Objectives l To explain the benefits of software reuse and some reuse problems l To discuss several different ways to implement software.
Android Mobile Application Development
Chapter 6: Securing the Cloud
IOT Critical Impact on DC Design
Chapter 18 Maintaining Information Systems
OO Methodology OO Architecture.
Chapter 18 MobileApp Design
The Extensible Tool-chain for Evaluation of Architectural Models
Mobile Computing.
Analysis models and design models
An Introduction to Software Architecture
Maintaining Terminal Integrity and Context-Aware Reconfiguration Johan Muskens (TU/e) Otso Virtanen (HIIT/BRU) Michel Chaudron (TU/e) Ronan Mac Laverty.
Automated Analysis and Code Generation for Domain-Specific Models
PLANNING A SECURE BASELINE INSTALLATION
Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy
Presentation transcript:

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 1 Johan MuskensMichel Chaudron Trust4All - Completing the Trilogy

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 2 Outline Background – Robocop – Space4U – Trust4All Motivation Trust4All Initial Ideas

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 3 – Define an open, component-based framework for the middle-ware layer in high-volume consumer devices (robustness/reliability, upgrading/extension, and trading) non – proprietary extendable Goal

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 4 Problem Domain

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 5 Scope External World  May be connected Robocop Device  Single Device Middleware Applications...App 2App 1App N... RC 2RC 1 Robocop Runtime Environment OS, Network & Drivers Device Hardware  OS + HW = Platform Middleware  Robocop scope in red Robocop Runtime Environment RC 2 RC 1...

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 6 Highlights Robocop Component Resource Model Simulation Model Documentation Executable Component Functional Model Source Code … Service 1 Infrastructure Runtime Environment IDL compiler Download Resource Management Predictable assembly based on models

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 7 – Extend and validate the Architecture Fault Management Power Management Terminal Management Goal

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 8 – Fault management – Power management – (Remote) Integrity Management – Support for Real Time Components – Visualization Highlights

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 9 – Invent techniques for the middleware for ensuring the proper working of systems whose software is dynamically extended and upgraded using components provided by a number of different parties. Goal

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 10 Outline Background – Robocop – Space4U – Trust4All Motivation Trust4All Initial Ideas

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 11 What we have / What we want We have: We want: Robust & Reliable Operation of closed system Secure communication Robust & Reliable & Secure / Safe Operation of open system Secure communication

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 12 Example Scenario A White components are provided by OCE and provide the core functionality of the device Red component are provided by third party and provide custom functionality for a specific user / client. Goal: Core functionality of the copier must operate robust, reliable, (and secure) even though not all the software on the device is trusted.

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 13 Example Scenario B Secure connection to corporate database using VPN White components are provided by Nokia and provide the core functionality of the device Blue and Red Components are provided by a third party and they are used to setup a VPN connection for a specific network infrastructure Goal: Establish a certain level of trust in the VPN connection Keep robust and reliable operation of the core phone functionality

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 14 Scenario C HOME X HOME Y Setting: - In home situation. - Multiple devices providing services - Service discovery Goal: Secure access to the services Is this solved by existing technologies? Yes and No

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 15 Scenario D Situation: - We have video surveillance camera - Media Renderer device capable of playing several media- formats -The device becomes out-dated due to out-dated decoder - Hardware is sufficient - New decoder components are provided by a third party Goal: -Upgrade the device (extend life-time) by allowing the third party components without jeopardizing - Robustness - Reliability - Security

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 16 Abstract from these examples Common theme – Establish confidence in reliable, robust and secure operation of a (dynamically changing system) system build out of components provided by multiple different parties.

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 17 Outline Background – Robocop – Space4U – Trust4All Motivation Trust4All Initial Ideas

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 18 Trust Model is Based on Different Aspects

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 19 Trust Model (Metrics / Mechanisms /...)

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 20 Maintain Integrity of a Software Configuration Open system Arbitrary Feature addition  Trusted Open system Trusted Feature addition Failed systemTrusted system Open system Arbitrary Feature addition  Trusted Open system Trusted Feature addition Failed systemTrusted system

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 21 Dynamically composed software using components of multiple different parties Models describing the current software configuration of a device. Based on these models: Diagnosis and Repair Detect mismatch in styles Support for extra functional properties Support for security Visualize Evolution Design flaws Composition of: -Robustness -Reliability -Security Model Based Diagnosis

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 22 Expected Emphasis for Integrity Maintenance Model based diagnosis Testing Run-timeDesign time TU/e

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 23 Reasoning about Real Time Aspects In Space4U we worked on prediction In Trust4All – Use Prediction for Acceptation – Suggestions for Improvement of Real Time behavior – Enforcement – Predictable assembly of other properties, using the same scheme (Reliability).

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 24 Reasoning about Security ? Driver ?.... ?

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 25 Reasoning about Security Observation – Composition of a number of secure Services can result in an insecure system. Initial Ideas – Services come equipped with Suitable configuration patterns Robustness, Reliability, and Security needs Assessment schemes – Map required Trust profile on available components Check for sufficient support by Service implementations

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 26 Visualization Visualization can aid in assessment of quality properties. – Metric View Visualization can aid in detection of Trust problems – Based on structure All trusted Mixed

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 27 Follow the Adventures

10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking 28 I Expect Hard work.... and a lot of fun !