SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
On Resilient Computing
ISSI 2011, Tokyo, Japan
February 16, 2012
Sven Wohlgemuth
Transdisciplinary Research Integration Center
National Institute of Informatics, Japan
Research Organization for Information and Systems, Japan
Agenda
I. Social Infrastructures and ICT
II. Adaptation and Interdependencies
III. Isolation Mechanisms
IV. Resilient Computing
2Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
Sensor and controller
ICT services
I. Social Infrastructures and ICT
Sensor and controller
Workflows
Energy supply
Communication network
ICT services
S1 S2 S3
S4
Physical
Cyber
Function Event-driven
S5 S6
S8
...
...
• ICT control systems implement functions of social infrastructures
• Real-time processing of context data and controlling location
• Centralized control
• Operated by public or private organizations
3Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
Sensor and controller
ICT services
I. Social Infrastructures and ICT
Sensor and controller
Workflows
Energy supply
Communication network
ICT services
S1 S2 S3
S4
Physical
Cyber
Function Event-driven
S5 S6
S8
...
...
• ICT control systems implement functions of social infrastructures
• Real-time processing of context data and controlling location
• Centralized control
• Operated by public or private organizations
Correctness threatened
by crime, terrorism, and natural disasters
3Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
Resilience and ICT
• An affected resilient ICT system delivers at least correct critical services in a hostile
environment (brittle) (Hollnagel et al., 2006)
• Ability of an ICT system to provide and maintain an acceptable level of service in the
face of various faults and challenges to normal operation (Sterbenz et al., 2010)
• Persistence of dependability when facing changes (Laprie, 2008)
Own illustration following (Sheffi, 2005; Günther et al., 2007; McNanus, 2009)
4Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
II. Adaptation and Interdependencies
Function
Specification Service
Sensor and controller
ICT services
d1 d2 c1
S1 S2 S3
S4
d1 d1, d1*
d1. d2, ...
c2
S4
Sn
d1. d2, ...
c2
d1
OS
Sj Sk
Si
Data flows describe interdependenciesAdaptation of an ICT system
5Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
Shared
service C
Shared
service C
Sensor
Service A
Actuator
d r
d
Case (a) - Passive attack
Sensor
Service A
Actuator
d r*
d*
Case (b) - Active attack
Sensor Actuator
Case (c) - Non-availability
Malicious interferences Non-malicious interference
d, d* : Input data for a data processing
: Shared used service
r, r* : Result of a data processing
d
Attacking
service B
Attacking
service B
Shared
service C
Service A
Service B
Covert Channels
Automatic detection of all cover channels is impossible (Wang and Ju, 2006)
Covert channels may be unknown and lead to a failure Fault isolation
6Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
III. Isolation Mechanisms
Mechanisms &
Methods
Policies
• Bell-LaPadula, Chinese Wall
• BiBa, Clark-Wilson
• Role-based access control
• Optimistic Security
• APPLE
• Obligation Specification Language (OSL)
• Extended Privacy Definition Tools
(ExPDT)
• Testing
• Simulation
• Model checking
• Security engineering
• Non-linkable Delegation of
Rights
• Monitors
• Virtualization
• Privacy-enhancing technologies
• Verifiable homomorphic encryption
• Secure data aggregation
• Certified security patterns
• Vulnerability analysis
• Model checking
• Penetration testing
• Process Rewriting
• Software patches
Fault acceptanceFault avoidance
7Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
Fault tolerance
Fault
forecasting
Fault
prevention
Fault removal
• Forensics
• Process mining
• Data provenance
• Redundancy
• Consensus protocols
• Recovery-oriented computing
Consensus and Adaptation
Objective: Majority on correct data (sensor data, computation result)
S4
S5
S6
Sj
Sl
Monitor
d1
d2
d3
d1, d2, d3
d1, d2, d3
Sk
Consensus protocols and malicious faults:
• Synchronous communication:
• Asynchronous communication: Consensus not possible if one process fails
• But: Bears risk of failure due to non-availability of data
• Tolerates t < n/3 faulty processes, with authenticated messages: t < n
dcorrect = (d1=d2=d3), (d1=d2), (d1=d3) OR (d2=d3)
?
Cachin et al. 2011
8Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
Challenge: Correct data processing in spite of covert channels
Fulfilled safety (correct) properties
Fulfilled liveness (adaptation) properties
Expected risk of failure
Error rate0% 100%
The Error rate represents the probability
of faulty services of a system according to its
specification
Safety Liveness
5On Resilient ComputingSven Wohlgemuth <wohlgemuth@nii.ac.jp>
IV. Resilient Computing
Challenge: Correct data processing in spite of covert channels
Error rate0% 100%
CriticalBrittleBrittleCritical
Fulfilled safety (correct) properties
Fulfilled liveness (adaptation) properties
Expected risk of failure
Safety Liveness
5On Resilient Computing
Failure due to safety
High capability of correct data
processing
Few on demand data
processing
Sven Wohlgemuth <wohlgemuth@nii.ac.jp>
IV. Resilient Computing
Failure due to liveness
Low capability
on correct data processing
High on demand data
processing
Challenge: Correct data processing in spite of covert channels
Error rate0% 100%
CriticalBrittleBrittleCritical
Fulfilled safety (correct) properties
Fulfilled liveness (adaptation) properties
Expected risk of failure
Safety Liveness
5On Resilient ComputingSven Wohlgemuth <wohlgemuth@nii.ac.jp>
IV. Resilient Computing
Acceptable states
Acceptable correctness of
data processing
Acceptable on demand
data processing
Challenge: Correct data processing in spite of covert channels
Error rate0% 100%
CriticalBrittleBrittleCritical
Fulfilled safety (correct) properties
Fulfilled liveness (adaptation) properties
Expected risk of failure
Safety Liveness
5On Resilient ComputingSven Wohlgemuth <wohlgemuth@nii.ac.jp>
IV. Resilient Computing
Generate Evidences
S4
S5
S6
Sj Sk
Sl
Risk Assessment with
Uncertainty
Usage Control Policy Select Services
S4
S5
S6
Sj Sk
Sl
De-Select Services
S4
S5
S6
Sj Sk
Sl
Security Architecture for Resilient Computing
10Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
Generate Evidences
S4
S5
S6
Sj Sk
Sl
Risk Assessment with
Uncertainty
Usage Control Policy Select Services
S4
S5
S6
Sj Sk
Sl
De-Select Services
S4
S5
S6
Sj Sk
Sl
Preliminary work: DREISAM (Delegation of Rights) & DETECTIVE (Data Provenance)
Security Architecture for Resilient Computing
10Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing

Mais conteúdo relacionado

Mais procurados

A tool suite for prototyping internet of things applications
A tool suite for prototyping internet of  things applicationsA tool suite for prototyping internet of  things applications
A tool suite for prototyping internet of things applicationsPankesh Patel
 
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...Edge AI and Vision Alliance
 
Enabling high level application development for internet of things
Enabling high level application development for internet of thingsEnabling high level application development for internet of things
Enabling high level application development for internet of thingsPankesh Patel
 
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline Monitoring
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline MonitoringWiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline Monitoring
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline MonitoringIJECEIAES
 
Wireless Data Processing System for IoT-Enabled Devices
Wireless Data Processing System for IoT-Enabled DevicesWireless Data Processing System for IoT-Enabled Devices
Wireless Data Processing System for IoT-Enabled DevicesEliDuggan
 
iThings-2012, Besançon, France, 20 November, 2012
iThings-2012, Besançon, France, 20 November, 2012iThings-2012, Besançon, France, 20 November, 2012
iThings-2012, Besançon, France, 20 November, 2012Charith Perera
 
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...Swapnil Jagtap
 
IoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & ChallengesIoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & ChallengesSatyaKVivek
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoTEdge computing and its role in architecting IoT
Edge computing and its role in architecting IoTKiran Kumar Pattanaik
 
K luo bera_poster
K luo bera_posterK luo bera_poster
K luo bera_posterlkcozy
 
Speeding Up Resting State Networks Recognition via a Hardware Accelerator
Speeding Up Resting State Networks Recognition via a Hardware AcceleratorSpeeding Up Resting State Networks Recognition via a Hardware Accelerator
Speeding Up Resting State Networks Recognition via a Hardware AcceleratorNECST Lab @ Politecnico di Milano
 
Internet of Things and i's Applications
Internet of Things and i's ApplicationsInternet of Things and i's Applications
Internet of Things and i's ApplicationsAakashjit Bhattacharya
 
IoT malware network traffic classification using visual representation and d...
IoT  malware network traffic classification using visual representation and d...IoT  malware network traffic classification using visual representation and d...
IoT malware network traffic classification using visual representation and d...Aboul Ella Hassanien
 
Connect Arduino to PubNub cloud slides by UI5CN webinar Part 1
Connect Arduino to PubNub cloud slides by UI5CN webinar Part 1Connect Arduino to PubNub cloud slides by UI5CN webinar Part 1
Connect Arduino to PubNub cloud slides by UI5CN webinar Part 1AJAY NAYAK
 
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET Journal
 
Bridging the Industrial IoT Gap
Bridging the Industrial IoT GapBridging the Industrial IoT Gap
Bridging the Industrial IoT GapJohn Speck
 
On detecting and identifying faulty internet of things devices and outages
On detecting and identifying faulty internet of things devices and outagesOn detecting and identifying faulty internet of things devices and outages
On detecting and identifying faulty internet of things devices and outagesjournalBEEI
 

Mais procurados (20)

A tool suite for prototyping internet of things applications
A tool suite for prototyping internet of  things applicationsA tool suite for prototyping internet of  things applications
A tool suite for prototyping internet of things applications
 
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
 
Enabling high level application development for internet of things
Enabling high level application development for internet of thingsEnabling high level application development for internet of things
Enabling high level application development for internet of things
 
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline Monitoring
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline MonitoringWiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline Monitoring
WiRoTip: an IoT-based Wireless Sensor Network for Water Pipeline Monitoring
 
IOT
IOTIOT
IOT
 
Wireless Data Processing System for IoT-Enabled Devices
Wireless Data Processing System for IoT-Enabled DevicesWireless Data Processing System for IoT-Enabled Devices
Wireless Data Processing System for IoT-Enabled Devices
 
iThings-2012, Besançon, France, 20 November, 2012
iThings-2012, Besançon, France, 20 November, 2012iThings-2012, Besançon, France, 20 November, 2012
iThings-2012, Besançon, France, 20 November, 2012
 
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
 
IoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & ChallengesIoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & Challenges
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoTEdge computing and its role in architecting IoT
Edge computing and its role in architecting IoT
 
K luo bera_poster
K luo bera_posterK luo bera_poster
K luo bera_poster
 
Speeding Up Resting State Networks Recognition via a Hardware Accelerator
Speeding Up Resting State Networks Recognition via a Hardware AcceleratorSpeeding Up Resting State Networks Recognition via a Hardware Accelerator
Speeding Up Resting State Networks Recognition via a Hardware Accelerator
 
Internet of Things and i's Applications
Internet of Things and i's ApplicationsInternet of Things and i's Applications
Internet of Things and i's Applications
 
IoT malware network traffic classification using visual representation and d...
IoT  malware network traffic classification using visual representation and d...IoT  malware network traffic classification using visual representation and d...
IoT malware network traffic classification using visual representation and d...
 
Is Your Software Development Process Green?
Is Your Software Development Process Green?Is Your Software Development Process Green?
Is Your Software Development Process Green?
 
Connect Arduino to PubNub cloud slides by UI5CN webinar Part 1
Connect Arduino to PubNub cloud slides by UI5CN webinar Part 1Connect Arduino to PubNub cloud slides by UI5CN webinar Part 1
Connect Arduino to PubNub cloud slides by UI5CN webinar Part 1
 
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
 
Sensor Cloud
Sensor CloudSensor Cloud
Sensor Cloud
 
Bridging the Industrial IoT Gap
Bridging the Industrial IoT GapBridging the Industrial IoT Gap
Bridging the Industrial IoT Gap
 
On detecting and identifying faulty internet of things devices and outages
On detecting and identifying faulty internet of things devices and outagesOn detecting and identifying faulty internet of things devices and outages
On detecting and identifying faulty internet of things devices and outages
 

Semelhante a On Resilient Computing

Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)shanshicn
 
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptxCPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptxMahendraShukla27
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cCharles Li
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyIRJET Journal
 
Ansaldo STS at CPExpo 2013: "Risks and Security Management in Logistics and ...
Ansaldo STS at CPExpo 2013:  "Risks and Security Management in Logistics and ...Ansaldo STS at CPExpo 2013:  "Risks and Security Management in Logistics and ...
Ansaldo STS at CPExpo 2013: "Risks and Security Management in Logistics and ...Leonardo
 
Cyber Security in Railways Systems, Ansaldo STS experience
Cyber Security in Railways Systems, Ansaldo STS  experienceCyber Security in Railways Systems, Ansaldo STS  experience
Cyber Security in Railways Systems, Ansaldo STS experienceCommunity Protection Forum
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IRJET Journal
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...Shah Sheikh
 
Digital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptxDigital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptxVinay Ms
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET Journal
 
Securing Critical Infrastructures with a cybersecurity digital twin
Securing Critical Infrastructures with a cybersecurity digital twin Securing Critical Infrastructures with a cybersecurity digital twin
Securing Critical Infrastructures with a cybersecurity digital twin Massimiliano Masi
 
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...Mokpo National University
 
IRJET - Bridge Monitoring System using IoT
IRJET -  	  Bridge Monitoring System using IoTIRJET -  	  Bridge Monitoring System using IoT
IRJET - Bridge Monitoring System using IoTIRJET Journal
 
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptxSuprithC2
 
Ch7 Data Transmission in Smart City, Summer Cours, AUST 2015
Ch7 Data Transmission in Smart City, Summer Cours, AUST  2015Ch7 Data Transmission in Smart City, Summer Cours, AUST  2015
Ch7 Data Transmission in Smart City, Summer Cours, AUST 2015Isam Shahrour
 
Finding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for NetworkFinding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for Networkijircee
 
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion DetectionEnsemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion DetectionIJCNCJournal
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environmentidescitation
 

Semelhante a On Resilient Computing (20)

Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)Cps security bitsworkshopdec15.2012 (1)
Cps security bitsworkshopdec15.2012 (1)
 
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptxCPSSecurityBITSWorkshopDec15.2012 (1).pptx
CPSSecurityBITSWorkshopDec15.2012 (1).pptx
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
 
Ansaldo STS at CPExpo 2013: "Risks and Security Management in Logistics and ...
Ansaldo STS at CPExpo 2013:  "Risks and Security Management in Logistics and ...Ansaldo STS at CPExpo 2013:  "Risks and Security Management in Logistics and ...
Ansaldo STS at CPExpo 2013: "Risks and Security Management in Logistics and ...
 
Cyber Security in Railways Systems, Ansaldo STS experience
Cyber Security in Railways Systems, Ansaldo STS  experienceCyber Security in Railways Systems, Ansaldo STS  experience
Cyber Security in Railways Systems, Ansaldo STS experience
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
Digital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptxDigital Twin ppt-2 (2).pptx
Digital Twin ppt-2 (2).pptx
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
 
Securing Critical Infrastructures with a cybersecurity digital twin
Securing Critical Infrastructures with a cybersecurity digital twin Securing Critical Infrastructures with a cybersecurity digital twin
Securing Critical Infrastructures with a cybersecurity digital twin
 
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...
 
IRJET - Bridge Monitoring System using IoT
IRJET -  	  Bridge Monitoring System using IoTIRJET -  	  Bridge Monitoring System using IoT
IRJET - Bridge Monitoring System using IoT
 
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptx
 
Ch7 Data Transmission in Smart City, Summer Cours, AUST 2015
Ch7 Data Transmission in Smart City, Summer Cours, AUST  2015Ch7 Data Transmission in Smart City, Summer Cours, AUST  2015
Ch7 Data Transmission in Smart City, Summer Cours, AUST 2015
 
Finding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for NetworkFinding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for Network
 
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion DetectionEnsemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
 

Mais de Sven Wohlgemuth

A Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity ManagementA Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity ManagementSven Wohlgemuth
 
Competitive Compliance with Blockchain
Competitive Compliance with BlockchainCompetitive Compliance with Blockchain
Competitive Compliance with BlockchainSven Wohlgemuth
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSven Wohlgemuth
 
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 個人情報の有効活用を可能にする (Enabling effective use of personal information) 個人情報の有効活用を可能にする (Enabling effective use of personal information)
個人情報の有効活用を可能にする (Enabling effective use of personal information)Sven Wohlgemuth
 
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacyTagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacySven Wohlgemuth
 
Privacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningPrivacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningSven Wohlgemuth
 
EN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleEN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleSven Wohlgemuth
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementSven Wohlgemuth
 
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...Sven Wohlgemuth
 
On Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsOn Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsSven Wohlgemuth
 
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementEN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementSven Wohlgemuth
 
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzEN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzSven Wohlgemuth
 
Privacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal InformationPrivacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal InformationSven Wohlgemuth
 
International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009Sven Wohlgemuth
 
Durchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenDurchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenSven Wohlgemuth
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementSven Wohlgemuth
 
Privacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementPrivacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementSven Wohlgemuth
 
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSchlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSven Wohlgemuth
 

Mais de Sven Wohlgemuth (20)

A Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity ManagementA Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity Management
 
Competitive Compliance with Blockchain
Competitive Compliance with BlockchainCompetitive Compliance with Blockchain
Competitive Compliance with Blockchain
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with Blockchains
 
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 個人情報の有効活用を可能にする (Enabling effective use of personal information) 個人情報の有効活用を可能にする (Enabling effective use of personal information)
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve PrivacyTagging Disclosure of Personal Data to Third Parties to Preserve Privacy
Tagging Disclosure of Personal Data to Third Parties to Preserve Privacy
 
Privacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process MiningPrivacy-Enhancing Trust Infrastructure for Process Mining
Privacy-Enhancing Trust Infrastructure for Process Mining
 
EN 6.3: 4 Kryptographie
EN 6.3: 4 KryptographieEN 6.3: 4 Kryptographie
EN 6.3: 4 Kryptographie
 
EN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleEN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 Sicherheitsmodelle
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
 
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
 
Privacy in e-Health
Privacy in e-HealthPrivacy in e-Health
Privacy in e-Health
 
On Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsOn Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health Records
 
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementEN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
 
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzEN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
 
Privacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal InformationPrivacy with Secondary Use of Personal Information
Privacy with Secondary Use of Personal Information
 
International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009
 
Durchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenDurchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in Dienstenetzen
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
 
Privacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementPrivacy in Business Processes by Identity Management
Privacy in Business Processes by Identity Management
 
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSchlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
 

Último

Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Onlineanilsa9823
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 

Último (20)

Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 

On Resilient Computing

  • 1. On Resilient Computing ISSI 2011, Tokyo, Japan February 16, 2012 Sven Wohlgemuth Transdisciplinary Research Integration Center National Institute of Informatics, Japan Research Organization for Information and Systems, Japan
  • 2. Agenda I. Social Infrastructures and ICT II. Adaptation and Interdependencies III. Isolation Mechanisms IV. Resilient Computing 2Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
  • 3. Sensor and controller ICT services I. Social Infrastructures and ICT Sensor and controller Workflows Energy supply Communication network ICT services S1 S2 S3 S4 Physical Cyber Function Event-driven S5 S6 S8 ... ... • ICT control systems implement functions of social infrastructures • Real-time processing of context data and controlling location • Centralized control • Operated by public or private organizations 3Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
  • 4. Sensor and controller ICT services I. Social Infrastructures and ICT Sensor and controller Workflows Energy supply Communication network ICT services S1 S2 S3 S4 Physical Cyber Function Event-driven S5 S6 S8 ... ... • ICT control systems implement functions of social infrastructures • Real-time processing of context data and controlling location • Centralized control • Operated by public or private organizations Correctness threatened by crime, terrorism, and natural disasters 3Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
  • 5. Resilience and ICT • An affected resilient ICT system delivers at least correct critical services in a hostile environment (brittle) (Hollnagel et al., 2006) • Ability of an ICT system to provide and maintain an acceptable level of service in the face of various faults and challenges to normal operation (Sterbenz et al., 2010) • Persistence of dependability when facing changes (Laprie, 2008) Own illustration following (Sheffi, 2005; Günther et al., 2007; McNanus, 2009) 4Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
  • 6. II. Adaptation and Interdependencies Function Specification Service Sensor and controller ICT services d1 d2 c1 S1 S2 S3 S4 d1 d1, d1* d1. d2, ... c2 S4 Sn d1. d2, ... c2 d1 OS Sj Sk Si Data flows describe interdependenciesAdaptation of an ICT system 5Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
  • 7. Shared service C Shared service C Sensor Service A Actuator d r d Case (a) - Passive attack Sensor Service A Actuator d r* d* Case (b) - Active attack Sensor Actuator Case (c) - Non-availability Malicious interferences Non-malicious interference d, d* : Input data for a data processing : Shared used service r, r* : Result of a data processing d Attacking service B Attacking service B Shared service C Service A Service B Covert Channels Automatic detection of all cover channels is impossible (Wang and Ju, 2006) Covert channels may be unknown and lead to a failure Fault isolation 6Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
  • 8. III. Isolation Mechanisms Mechanisms & Methods Policies • Bell-LaPadula, Chinese Wall • BiBa, Clark-Wilson • Role-based access control • Optimistic Security • APPLE • Obligation Specification Language (OSL) • Extended Privacy Definition Tools (ExPDT) • Testing • Simulation • Model checking • Security engineering • Non-linkable Delegation of Rights • Monitors • Virtualization • Privacy-enhancing technologies • Verifiable homomorphic encryption • Secure data aggregation • Certified security patterns • Vulnerability analysis • Model checking • Penetration testing • Process Rewriting • Software patches Fault acceptanceFault avoidance 7Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing Fault tolerance Fault forecasting Fault prevention Fault removal • Forensics • Process mining • Data provenance • Redundancy • Consensus protocols • Recovery-oriented computing
  • 9. Consensus and Adaptation Objective: Majority on correct data (sensor data, computation result) S4 S5 S6 Sj Sl Monitor d1 d2 d3 d1, d2, d3 d1, d2, d3 Sk Consensus protocols and malicious faults: • Synchronous communication: • Asynchronous communication: Consensus not possible if one process fails • But: Bears risk of failure due to non-availability of data • Tolerates t < n/3 faulty processes, with authenticated messages: t < n dcorrect = (d1=d2=d3), (d1=d2), (d1=d3) OR (d2=d3) ? Cachin et al. 2011 8Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
  • 10. Challenge: Correct data processing in spite of covert channels Fulfilled safety (correct) properties Fulfilled liveness (adaptation) properties Expected risk of failure Error rate0% 100% The Error rate represents the probability of faulty services of a system according to its specification Safety Liveness 5On Resilient ComputingSven Wohlgemuth <wohlgemuth@nii.ac.jp> IV. Resilient Computing
  • 11. Challenge: Correct data processing in spite of covert channels Error rate0% 100% CriticalBrittleBrittleCritical Fulfilled safety (correct) properties Fulfilled liveness (adaptation) properties Expected risk of failure Safety Liveness 5On Resilient Computing Failure due to safety High capability of correct data processing Few on demand data processing Sven Wohlgemuth <wohlgemuth@nii.ac.jp> IV. Resilient Computing
  • 12. Failure due to liveness Low capability on correct data processing High on demand data processing Challenge: Correct data processing in spite of covert channels Error rate0% 100% CriticalBrittleBrittleCritical Fulfilled safety (correct) properties Fulfilled liveness (adaptation) properties Expected risk of failure Safety Liveness 5On Resilient ComputingSven Wohlgemuth <wohlgemuth@nii.ac.jp> IV. Resilient Computing
  • 13. Acceptable states Acceptable correctness of data processing Acceptable on demand data processing Challenge: Correct data processing in spite of covert channels Error rate0% 100% CriticalBrittleBrittleCritical Fulfilled safety (correct) properties Fulfilled liveness (adaptation) properties Expected risk of failure Safety Liveness 5On Resilient ComputingSven Wohlgemuth <wohlgemuth@nii.ac.jp> IV. Resilient Computing
  • 14. Generate Evidences S4 S5 S6 Sj Sk Sl Risk Assessment with Uncertainty Usage Control Policy Select Services S4 S5 S6 Sj Sk Sl De-Select Services S4 S5 S6 Sj Sk Sl Security Architecture for Resilient Computing 10Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing
  • 15. Generate Evidences S4 S5 S6 Sj Sk Sl Risk Assessment with Uncertainty Usage Control Policy Select Services S4 S5 S6 Sj Sk Sl De-Select Services S4 S5 S6 Sj Sk Sl Preliminary work: DREISAM (Delegation of Rights) & DETECTIVE (Data Provenance) Security Architecture for Resilient Computing 10Sven Wohlgemuth <wohlgemuth@nii.ac.jp> On Resilient Computing