SlideShare une entreprise Scribd logo
1  sur  28
Télécharger pour lire hors ligne
Aniketos: Ensuring Trustworthiness and
    Security in Service Composition
       Exploitation and Impact
               David Llewellyn-Jones
                     Zeta Dooly
               Marina Egea González
                 http://aniketos.eu


                   6th September 2012
        Effectsplus Clustering Event, Padua, Italy

                                                     1
Contents
 Aniketos overview
    Security policies
    Trustworthiness
    Threats
    Composition and adaptation
    Social-Technical Modelling
 Exploitation and Impact
    Tutorials and training
    Demonstrations
    Community building and standardisation
    Dissemination and exploitation
 Case studies



                       Effectsplus, Padua, Italy, 6 September 2012   2
Aniketos Project

 Main objective
   Help establish and maintain trustworthiness and secure behaviour
   in a dynamically changing environment of composite services
 ICT FP7 Objective 1.4
   Secure, dependable and trusted infrastructures
 Duration
   August 2010 until February 2014
 Website
   http://aniketos.eu




                        Effectsplus, Padua, Italy, 6 September 2012   3
Aniketos Workflow




           Effectsplus, Padua, Italy, 6 September 2012   4
Security Policies                        <specification>
                                           <scope>session</scope>
                                           <rule>
                                             <before>
                                               <identifier>*</identifier>
 Define properties of a service or           </before>
                                             <perform>
 service composition                           <reaction>
                                                 <guard>
 Used in several forms                             <invocation>
                                                     <identifier>
    Service developer/provider’s                       eu.aniketos.predicates.dSOD
                                                     </identifier>
    claimed properties for a service                 <argument>
                                                       <identifier>
    Service user’s desired                               s1.method1
                                                       </identifier>
    properties                                       </argument>
                                                     <argument>
    Contract agreed by both                            <identifier>
                                                         s2.method2
 Technologies                                          </identifier>
                                                     </argument>
    Written using ConSpec                          </invocation>
                                                 </guard>
                                                 <update/>
                                               </reaction>
                                             </perform>
                                           </rule>
                                         </specification>




                        Effectsplus, Padua, Italy, 6 September 2012                  5
Trustworthiness

 Security × Contract × Trust paradigm
   Service properties monitored against policy
   Violations affect trust
   Trustworthy services avoid verification step
 Technologies
   Trust monitoring
   Trust composition
   Security verification




                      Effectsplus, Padua, Italy, 6 September 2012   6
Threats
 Runtime and environmental threats
    Changing threats may cause user
    alert or policy change
 Threat repository
    Community list of relevant threats
    Threats associated with possible
    solutions
 Runtime threat monitoring
    Based on information in threat
    repository and policy




                        Effectsplus, Padua, Italy, 6 September 2012   7
Deployment and Adaptation
 Service Composition
 Framework
 Compositions specified
 using BPMN
 Services replaced to
 maintain policy




                     Effectsplus, Padua, Italy, 6 September 2012   8
Socio-Technical Modelling

 Architectural approach for specifying
    Service composition
    Security policy
    Trustworthy requirements
    Threat requirements
 Goal-oriented modelling




                    Effectsplus, Padua, Italy, 6 September 2012   9
Workflow

 Incorporates comprehensive workflow
 Relies on significant input
   From developers, providers and end-users
   Commercial or community
 Ecosystem
   BPMN service compositions
   ConSpec policy files
   Trust management
   The actual services
 Services may be ‘Aniketos compliant’



                    Effectsplus, Padua, Italy, 6 September 2012   10
Exploitation and Impact
                                                         R&D


 Four fronts                              WP1: Requirements and
                                          architectural approach                                                                                       OUTREACH




                                                                                                      WP7: Verification and enduser evaluation
   Tutorials and




                                                      WP3: Secure composition
                             WP2: Define, establish
   training




                                                                                changes and threats
                                                        of dynamic services


                                                                                 WP4: Response to
                              and maintain trust
                      T1
                      TF 1                                                                                                                       WP8: Tutorials and training

   Demonstrations     TF 2




                                                                                                                              -
                      TF 3
                                                                                                                                                    WP9: Demonstration
   Community          TF n


   building and                                                                                                                                  WP10: Community building
   standardisation                                                                                                                                 and standardization

   Dissemination                                                                                                                                 WP11: Dissemination and
                                  WP5: Platform construction                                                                                          Exploitation
   and exploitation
                                 WP6: Realisation of industry
                                       case studies



                                                                                      WP12: Project management




                      Effectsplus, Padua, Italy, 6 September 2012                                                                                                              11
Tutorials and Training
 Led by SearchLab
 Building up standardised
 documentation
    Standard templates for all prototype
    deliverables
    Automated document generation tools
 Workshops and events
    February 2011 – STS and S×C×T
    July 2011 – STS Modelling Language
    More planned




                       Effectsplus, Padua, Italy, 6 September 2012   12
Demonstrations

 Led by Italtel
 Trade shows and conferences
 Demo events
   February 2012 – Internal Aniketos
   May 2012 – Selex Elsag demo
   July 2012 – Wind demonstration
   July 2012 – SummerSOC
   More planned
 Building software VMs




                    Effectsplus, Padua, Italy, 6 September 2012   13
Community Building

 Led by TSSG
 Aim to build communities
   Contribute to standardisation
   Generate interest
   Foster open source community
 Targeting open source alone is risky
   Requirement for external input
   Capitalise on social networking
   Github, YouTube, LinkedIn, Twitter, etc.
 Aim to combine both commercial and open source



                     Effectsplus, Padua, Italy, 6 September 2012   14
Dissemination and Exploitation
 Led by ATOS
 Publications
 Case Studies
    Future telecom services
    eGovernance: land buying
    Air traffic service pool
 Demos
 Real-world deployment with project
 partners


                           SESAR




                      Effectsplus, Padua, Italy, 6 September 2012   15
Future Telecoms Scenario                                         Bob accesses the WebShop
                                                                    application in order to purchase an
                                                                    electronic item he wishes.

The end user (Bob) owns a mobile
device which is equipped with a
                                                                               2
GPS receiver and a presence         1                                                       Application Server Platform
enabled VoIP client when                                                                                                                   Bob requests the help of an
accessing the web portal of his                                                                                                            assistant by starting a click-
TLC Operator.                                                                                   Converged SIP/HTTP                         to-call VoIP communication
                                                                                                    application
                                         The services involved are:                                                                    3
                                         a. WebShop for general electronic
                                         commerce access;                                           SIP servlets
                                         b. StoreLocator for making users choose
                                         the store where to pick up items selected;




        5          He decides to purchase the item he was interested in
                                                                                      4
                                                                                                                                   Bob is finally asked to confirm his
                                              6                                             7                                      mail address (that was retrieved
                                                                                                                                   through the IdP) to inform him
                                                                                                                                   when he can pick-up the
                                                                                                                                   purchased item




The StoreLocator service gives users two options,
1) a manual selection of the pick-up stores that
                                                        Bob selects option 2) for automatic store         …to collect Bob’s current position information and to
    can be selected from an offered list;
                                                        localization. By doing so a service               generate maps and addresses of the stores which are
2) letting StoreLocator service propose a list of
                                                        recomposition is started…                         closer to Bob
    closest stores.




                                                        Effectsplus, Padua, Italy, 6 September 2012                                                                      16
Audience Reached
 Commercial Sector (ICT Industry)
     Software developers and providers
     Service architecture providers
     Security Experts
     ICT providers, IT vendors
     Internet Service Providers, Cloud Providers
     End-users from Safety and Security Critical Domains
 Aniketos strategic partners
     Other EU projects working in similar domain
     EU technology platforms
     Other research initiatives and big IT companies
 Academia
     Scientists, Students (especially, Master and PhD students)
 European Commission, European Society



                           Effectsplus, Padua, Italy, 6 September 2012   17
Industrial Audience

   Air Traffic Management experts, industries, practitioners and researchers
   (thanks to Aniketos ATC case study)


   Own customers
   FinMeccanica companies
   R&D managers and employees


   Academia
   SAP internal stakeholders
   external partners and SAP developers


   Employees, technical and marketing departments


                       Effectsplus, Padua, Italy, 6 September 2012             18
Industrial Audience

   Internal research and innovation department
   Atos internal stakeholders
   Business development director
   FI-WARE, ChoREOS, NESSoS, etc.
   Inter industry-academia event co-organizer (MDSec @ MoDELS 2012)
   Joined new group addressing standardization of trustworthy, secure
   composable services



   Greek public sector and government
   Athens (previous) city council and other IT companies




                         Effectsplus, Padua, Italy, 6 September 2012    19
Industrial Audience

   Software developers
   Presented in several inter industry-academia scientific events


   Technical teams
   Centre for evaluation of the security of information technology, software
   engineers
   Security experts, head of the security architecture unit, security
   consultants, technical and strategy managers


   Technical and marketing departments
   Intranet community
   Internet users


                       Effectsplus, Padua, Italy, 6 September 2012             20
Academic Audience

 Targeting academics
   Workshops, seminars, conferences
      Submitters or organisers for more than 40 events
   Organizers or PC members
      Around 20 events
   Papers
      Over 40 papers on Aniketos research results (out of 80 submissions)
 Targeting industry
   Participation in around 20 events
   Including worldwide event reaching global SAP developer
   community



                      Effectsplus, Padua, Italy, 6 September 2012           21
Academic Partners
                       CNR     LJMU     PLUS     SINTEF     Tecnalia   TSSG   UNITN

Events participated/
                       5       8        5        7          3          7      15
organized

Participated Master,
PhD programs,
                       1       3        2        1          2          10     6
Seminars,
consultancy

Press Release                           4        1          1                 1

Platforms/clusters/
                                                 1          2
standardization

Papers                 11      5        1        9                     12     9




                             Effectsplus, Padua, Italy, 6 September 2012              22
Promoting Website Visits

 Website intended to be main channel
   Currently role less crucial
   Mainly due to lack of technical and training material
   Strategy therefore to publish more material
 Publish multimedia content when ready
   Embedded videos being shown on web front page
      Embedded from Aniketos YouTube channel
   Deliverables
   Demo material on success stories
   Broadcast new achievements via social channels
 Aim to cross-link between project websites


                     Effectsplus, Padua, Italy, 6 September 2012   23
Outreach Boost Plan
Key ideas to boost
outreach


Key message
specification and
communication




                     Effectsplus, Padua, Italy, 6 September 2012   24
Outreach Boost Plan
Key results




Key outputs




              Effectsplus, Padua, Italy, 6 September 2012   25
Outreach Boost Plan




           Effectsplus, Padua, Italy, 6 September 2012   26
Conclusion
 Four targeted areas for increasing impact
    Tutorials and training
    Demonstrations
    Community building
    Dissemination and exploitation
 Dissemination through outreach boost
    Key message
        Targeted user groups
    Key results
        Success story publication
    Key outputs
        Code and business models
    Improved sharing



                         Effectsplus, Padua, Italy, 6 September 2012   27
http://aniketos.eu

Athens Technology Center SA
Atos Origin
DAEM S.A.
DeepBlue
SELEX ELSAG (ex Elsag Datamat)
Italtel
Liverpool John Moores University
National Research Council of Italy
SAP
SEARCH Lab Ltd
Stiftelsen SINTEF
Tecnalia Research & Innovation
Thales
University of Salzburg
University of Trento
Waterford Institute of Technology
Wind Telecomunicazioni S.p.A.



                                     Effectsplus, Padua, Italy, 6 September 2012   28

Contenu connexe

En vedette

Profile binh nguyen (fil eminimizer)
Profile binh nguyen (fil eminimizer)Profile binh nguyen (fil eminimizer)
Profile binh nguyen (fil eminimizer)Lê Thanh Tân
 
Christmas In July
Christmas In JulyChristmas In July
Christmas In Julyreesmorgan
 
What Open Innovation means for the Pharmaceutical industry
What Open Innovation means for the Pharmaceutical industryWhat Open Innovation means for the Pharmaceutical industry
What Open Innovation means for the Pharmaceutical industryblackhaj
 
Manual on pavement_design_atj_j_5-85
Manual on pavement_design_atj_j_5-85Manual on pavement_design_atj_j_5-85
Manual on pavement_design_atj_j_5-85Sopha Mustafa
 
Disaster Recovery Status Report 22 Feb2012
Disaster Recovery Status Report 22 Feb2012Disaster Recovery Status Report 22 Feb2012
Disaster Recovery Status Report 22 Feb2012reesmorgan
 
A heuristic approach for secure service composition adaptation final
A heuristic approach for secure service composition adaptation finalA heuristic approach for secure service composition adaptation final
A heuristic approach for secure service composition adaptation finalAniketos EU FP7 Project
 
Privacy identity and trust challenges for the future internet citizen fabio...
Privacy identity and trust challenges for the future internet citizen   fabio...Privacy identity and trust challenges for the future internet citizen   fabio...
Privacy identity and trust challenges for the future internet citizen fabio...Aniketos EU FP7 Project
 
Wewst11 trustworthiness monitoring of dynamic service compositions v2
Wewst11 trustworthiness monitoring of dynamic service compositions v2Wewst11 trustworthiness monitoring of dynamic service compositions v2
Wewst11 trustworthiness monitoring of dynamic service compositions v2Aniketos EU FP7 Project
 
Panduan penyediaan rp
Panduan penyediaan rpPanduan penyediaan rp
Panduan penyediaan rpSopha Mustafa
 
TSSG paper for International Symposium on Integrated Network Management (IM)
TSSG paper for International Symposium on Integrated Network Management (IM) TSSG paper for International Symposium on Integrated Network Management (IM)
TSSG paper for International Symposium on Integrated Network Management (IM) Aniketos EU FP7 Project
 

En vedette (16)

Aniketos summary
Aniketos summaryAniketos summary
Aniketos summary
 
Profile binh nguyen (fil eminimizer)
Profile binh nguyen (fil eminimizer)Profile binh nguyen (fil eminimizer)
Profile binh nguyen (fil eminimizer)
 
Christmas In July
Christmas In JulyChristmas In July
Christmas In July
 
Soc july-2012-dmitri-botvich
Soc july-2012-dmitri-botvichSoc july-2012-dmitri-botvich
Soc july-2012-dmitri-botvich
 
Animation
AnimationAnimation
Animation
 
What Open Innovation means for the Pharmaceutical industry
What Open Innovation means for the Pharmaceutical industryWhat Open Innovation means for the Pharmaceutical industry
What Open Innovation means for the Pharmaceutical industry
 
Demo summer soc-28062012
Demo summer soc-28062012Demo summer soc-28062012
Demo summer soc-28062012
 
Manual on pavement_design_atj_j_5-85
Manual on pavement_design_atj_j_5-85Manual on pavement_design_atj_j_5-85
Manual on pavement_design_atj_j_5-85
 
Disaster Recovery Status Report 22 Feb2012
Disaster Recovery Status Report 22 Feb2012Disaster Recovery Status Report 22 Feb2012
Disaster Recovery Status Report 22 Feb2012
 
A heuristic approach for secure service composition adaptation final
A heuristic approach for secure service composition adaptation finalA heuristic approach for secure service composition adaptation final
A heuristic approach for secure service composition adaptation final
 
Privacy identity and trust challenges for the future internet citizen fabio...
Privacy identity and trust challenges for the future internet citizen   fabio...Privacy identity and trust challenges for the future internet citizen   fabio...
Privacy identity and trust challenges for the future internet citizen fabio...
 
Wewst11 trustworthiness monitoring of dynamic service compositions v2
Wewst11 trustworthiness monitoring of dynamic service compositions v2Wewst11 trustworthiness monitoring of dynamic service compositions v2
Wewst11 trustworthiness monitoring of dynamic service compositions v2
 
Panduan penyediaan rp
Panduan penyediaan rpPanduan penyediaan rp
Panduan penyediaan rp
 
Smm 2015 exercise 2
Smm 2015   exercise 2Smm 2015   exercise 2
Smm 2015 exercise 2
 
TSSG paper for International Symposium on Integrated Network Management (IM)
TSSG paper for International Symposium on Integrated Network Management (IM) TSSG paper for International Symposium on Integrated Network Management (IM)
TSSG paper for International Symposium on Integrated Network Management (IM)
 
globalisasi
globalisasiglobalisasi
globalisasi
 

Similaire à Aniketos effects plus_6sep_2012-v04

Aniketos 2nd cluster meeting
Aniketos  2nd cluster meetingAniketos  2nd cluster meeting
Aniketos 2nd cluster meetingfcleary
 
Course on Regulation and Sustainable Energy in Developing Countries - Session 9
Course on Regulation and Sustainable Energy in Developing Countries - Session 9Course on Regulation and Sustainable Energy in Developing Countries - Session 9
Course on Regulation and Sustainable Energy in Developing Countries - Session 9Leonardo ENERGY
 
A Framework for Secure Service Composition
A Framework for Secure Service CompositionA Framework for Secure Service Composition
A Framework for Secure Service CompositionAchim D. Brucker
 
Zi1one Presentation Rev7 Eng(Sep2011)
Zi1one Presentation Rev7 Eng(Sep2011)Zi1one Presentation Rev7 Eng(Sep2011)
Zi1one Presentation Rev7 Eng(Sep2011)Giancarlo Mancinelli
 
ArchanaBhat_TechLead_6.11Years
ArchanaBhat_TechLead_6.11YearsArchanaBhat_TechLead_6.11Years
ArchanaBhat_TechLead_6.11YearsArchana Bhat
 
2000 09 dh,mm,mts,mz m (xml world 2000) wf-xml tutorial
2000 09 dh,mm,mts,mz m (xml world 2000) wf-xml tutorial2000 09 dh,mm,mts,mz m (xml world 2000) wf-xml tutorial
2000 09 dh,mm,mts,mz m (xml world 2000) wf-xml tutorialMike Marin
 
Agile Software Consulting
Agile Software ConsultingAgile Software Consulting
Agile Software ConsultingVictor Olex
 
UC2 International Deployment, Baltimore Society of Communications Technology ...
UC2 International Deployment, Baltimore Society of Communications Technology ...UC2 International Deployment, Baltimore Society of Communications Technology ...
UC2 International Deployment, Baltimore Society of Communications Technology ...Agustin Argelich Casals
 
Telecom service capability methodology summary 02
Telecom  service  capability methodology  summary 02Telecom  service  capability methodology  summary 02
Telecom service capability methodology summary 02pskoularikos
 
Oracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterOracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterGeneXus
 
Safety in special environments - solutions developed by swiss IT-Factory
Safety in special environments - solutions developed by swiss IT-FactorySafety in special environments - solutions developed by swiss IT-Factory
Safety in special environments - solutions developed by swiss IT-FactoryMinnovarc
 
Strome | Innovation in expense management
Strome | Innovation in expense managementStrome | Innovation in expense management
Strome | Innovation in expense managementstromeslides
 
D5.1. LinkedTV Platform and Architecture
D5.1. LinkedTV Platform and ArchitectureD5.1. LinkedTV Platform and Architecture
D5.1. LinkedTV Platform and ArchitectureLinkedTV
 
In search of technical exellence
In search of technical exellenceIn search of technical exellence
In search of technical exellenceJinping Qu
 
Be a winner…use requirements engineering p
Be a winner…use requirements engineering pBe a winner…use requirements engineering p
Be a winner…use requirements engineering pSven Krause
 
ISACA T&T Training Week Course Outline
ISACA T&T Training Week Course OutlineISACA T&T Training Week Course Outline
ISACA T&T Training Week Course Outlinetntsa1972
 

Similaire à Aniketos effects plus_6sep_2012-v04 (20)

Aniketos 2nd cluster meeting
Aniketos  2nd cluster meetingAniketos  2nd cluster meeting
Aniketos 2nd cluster meeting
 
Course on Regulation and Sustainable Energy in Developing Countries - Session 9
Course on Regulation and Sustainable Energy in Developing Countries - Session 9Course on Regulation and Sustainable Energy in Developing Countries - Session 9
Course on Regulation and Sustainable Energy in Developing Countries - Session 9
 
A Framework for Secure Service Composition
A Framework for Secure Service CompositionA Framework for Secure Service Composition
A Framework for Secure Service Composition
 
Zi1one Presentation Rev7 Eng(Sep2011)
Zi1one Presentation Rev7 Eng(Sep2011)Zi1one Presentation Rev7 Eng(Sep2011)
Zi1one Presentation Rev7 Eng(Sep2011)
 
ArchanaBhat_TechLead_6.11Years
ArchanaBhat_TechLead_6.11YearsArchanaBhat_TechLead_6.11Years
ArchanaBhat_TechLead_6.11Years
 
Sudheendra
SudheendraSudheendra
Sudheendra
 
2000 09 dh,mm,mts,mz m (xml world 2000) wf-xml tutorial
2000 09 dh,mm,mts,mz m (xml world 2000) wf-xml tutorial2000 09 dh,mm,mts,mz m (xml world 2000) wf-xml tutorial
2000 09 dh,mm,mts,mz m (xml world 2000) wf-xml tutorial
 
Agile Software Consulting
Agile Software ConsultingAgile Software Consulting
Agile Software Consulting
 
UC2 International Deployment, Baltimore Society of Communications Technology ...
UC2 International Deployment, Baltimore Society of Communications Technology ...UC2 International Deployment, Baltimore Society of Communications Technology ...
UC2 International Deployment, Baltimore Society of Communications Technology ...
 
Telecom service capability methodology summary 02
Telecom  service  capability methodology  summary 02Telecom  service  capability methodology  summary 02
Telecom service capability methodology summary 02
 
Resume
ResumeResume
Resume
 
Oracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterOracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao Datacenter
 
Unit 4
Unit 4Unit 4
Unit 4
 
Unit 4
Unit 4Unit 4
Unit 4
 
Safety in special environments - solutions developed by swiss IT-Factory
Safety in special environments - solutions developed by swiss IT-FactorySafety in special environments - solutions developed by swiss IT-Factory
Safety in special environments - solutions developed by swiss IT-Factory
 
Strome | Innovation in expense management
Strome | Innovation in expense managementStrome | Innovation in expense management
Strome | Innovation in expense management
 
D5.1. LinkedTV Platform and Architecture
D5.1. LinkedTV Platform and ArchitectureD5.1. LinkedTV Platform and Architecture
D5.1. LinkedTV Platform and Architecture
 
In search of technical exellence
In search of technical exellenceIn search of technical exellence
In search of technical exellence
 
Be a winner…use requirements engineering p
Be a winner…use requirements engineering pBe a winner…use requirements engineering p
Be a winner…use requirements engineering p
 
ISACA T&T Training Week Course Outline
ISACA T&T Training Week Course OutlineISACA T&T Training Week Course Outline
ISACA T&T Training Week Course Outline
 

Dernier

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Dernier (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Aniketos effects plus_6sep_2012-v04

  • 1. Aniketos: Ensuring Trustworthiness and Security in Service Composition Exploitation and Impact David Llewellyn-Jones Zeta Dooly Marina Egea González http://aniketos.eu 6th September 2012 Effectsplus Clustering Event, Padua, Italy 1
  • 2. Contents Aniketos overview Security policies Trustworthiness Threats Composition and adaptation Social-Technical Modelling Exploitation and Impact Tutorials and training Demonstrations Community building and standardisation Dissemination and exploitation Case studies Effectsplus, Padua, Italy, 6 September 2012 2
  • 3. Aniketos Project Main objective Help establish and maintain trustworthiness and secure behaviour in a dynamically changing environment of composite services ICT FP7 Objective 1.4 Secure, dependable and trusted infrastructures Duration August 2010 until February 2014 Website http://aniketos.eu Effectsplus, Padua, Italy, 6 September 2012 3
  • 4. Aniketos Workflow Effectsplus, Padua, Italy, 6 September 2012 4
  • 5. Security Policies <specification> <scope>session</scope> <rule> <before> <identifier>*</identifier> Define properties of a service or </before> <perform> service composition <reaction> <guard> Used in several forms <invocation> <identifier> Service developer/provider’s eu.aniketos.predicates.dSOD </identifier> claimed properties for a service <argument> <identifier> Service user’s desired s1.method1 </identifier> properties </argument> <argument> Contract agreed by both <identifier> s2.method2 Technologies </identifier> </argument> Written using ConSpec </invocation> </guard> <update/> </reaction> </perform> </rule> </specification> Effectsplus, Padua, Italy, 6 September 2012 5
  • 6. Trustworthiness Security × Contract × Trust paradigm Service properties monitored against policy Violations affect trust Trustworthy services avoid verification step Technologies Trust monitoring Trust composition Security verification Effectsplus, Padua, Italy, 6 September 2012 6
  • 7. Threats Runtime and environmental threats Changing threats may cause user alert or policy change Threat repository Community list of relevant threats Threats associated with possible solutions Runtime threat monitoring Based on information in threat repository and policy Effectsplus, Padua, Italy, 6 September 2012 7
  • 8. Deployment and Adaptation Service Composition Framework Compositions specified using BPMN Services replaced to maintain policy Effectsplus, Padua, Italy, 6 September 2012 8
  • 9. Socio-Technical Modelling Architectural approach for specifying Service composition Security policy Trustworthy requirements Threat requirements Goal-oriented modelling Effectsplus, Padua, Italy, 6 September 2012 9
  • 10. Workflow Incorporates comprehensive workflow Relies on significant input From developers, providers and end-users Commercial or community Ecosystem BPMN service compositions ConSpec policy files Trust management The actual services Services may be ‘Aniketos compliant’ Effectsplus, Padua, Italy, 6 September 2012 10
  • 11. Exploitation and Impact R&D Four fronts WP1: Requirements and architectural approach OUTREACH WP7: Verification and enduser evaluation Tutorials and WP3: Secure composition WP2: Define, establish training changes and threats of dynamic services WP4: Response to and maintain trust T1 TF 1 WP8: Tutorials and training Demonstrations TF 2 - TF 3 WP9: Demonstration Community TF n building and WP10: Community building standardisation and standardization Dissemination WP11: Dissemination and WP5: Platform construction Exploitation and exploitation WP6: Realisation of industry case studies WP12: Project management Effectsplus, Padua, Italy, 6 September 2012 11
  • 12. Tutorials and Training Led by SearchLab Building up standardised documentation Standard templates for all prototype deliverables Automated document generation tools Workshops and events February 2011 – STS and S×C×T July 2011 – STS Modelling Language More planned Effectsplus, Padua, Italy, 6 September 2012 12
  • 13. Demonstrations Led by Italtel Trade shows and conferences Demo events February 2012 – Internal Aniketos May 2012 – Selex Elsag demo July 2012 – Wind demonstration July 2012 – SummerSOC More planned Building software VMs Effectsplus, Padua, Italy, 6 September 2012 13
  • 14. Community Building Led by TSSG Aim to build communities Contribute to standardisation Generate interest Foster open source community Targeting open source alone is risky Requirement for external input Capitalise on social networking Github, YouTube, LinkedIn, Twitter, etc. Aim to combine both commercial and open source Effectsplus, Padua, Italy, 6 September 2012 14
  • 15. Dissemination and Exploitation Led by ATOS Publications Case Studies Future telecom services eGovernance: land buying Air traffic service pool Demos Real-world deployment with project partners SESAR Effectsplus, Padua, Italy, 6 September 2012 15
  • 16. Future Telecoms Scenario Bob accesses the WebShop application in order to purchase an electronic item he wishes. The end user (Bob) owns a mobile device which is equipped with a 2 GPS receiver and a presence 1 Application Server Platform enabled VoIP client when Bob requests the help of an accessing the web portal of his assistant by starting a click- TLC Operator. Converged SIP/HTTP to-call VoIP communication application The services involved are: 3 a. WebShop for general electronic commerce access; SIP servlets b. StoreLocator for making users choose the store where to pick up items selected; 5 He decides to purchase the item he was interested in 4 Bob is finally asked to confirm his 6 7 mail address (that was retrieved through the IdP) to inform him when he can pick-up the purchased item The StoreLocator service gives users two options, 1) a manual selection of the pick-up stores that Bob selects option 2) for automatic store …to collect Bob’s current position information and to can be selected from an offered list; localization. By doing so a service generate maps and addresses of the stores which are 2) letting StoreLocator service propose a list of recomposition is started… closer to Bob closest stores. Effectsplus, Padua, Italy, 6 September 2012 16
  • 17. Audience Reached Commercial Sector (ICT Industry) Software developers and providers Service architecture providers Security Experts ICT providers, IT vendors Internet Service Providers, Cloud Providers End-users from Safety and Security Critical Domains Aniketos strategic partners Other EU projects working in similar domain EU technology platforms Other research initiatives and big IT companies Academia Scientists, Students (especially, Master and PhD students) European Commission, European Society Effectsplus, Padua, Italy, 6 September 2012 17
  • 18. Industrial Audience Air Traffic Management experts, industries, practitioners and researchers (thanks to Aniketos ATC case study) Own customers FinMeccanica companies R&D managers and employees Academia SAP internal stakeholders external partners and SAP developers Employees, technical and marketing departments Effectsplus, Padua, Italy, 6 September 2012 18
  • 19. Industrial Audience Internal research and innovation department Atos internal stakeholders Business development director FI-WARE, ChoREOS, NESSoS, etc. Inter industry-academia event co-organizer (MDSec @ MoDELS 2012) Joined new group addressing standardization of trustworthy, secure composable services Greek public sector and government Athens (previous) city council and other IT companies Effectsplus, Padua, Italy, 6 September 2012 19
  • 20. Industrial Audience Software developers Presented in several inter industry-academia scientific events Technical teams Centre for evaluation of the security of information technology, software engineers Security experts, head of the security architecture unit, security consultants, technical and strategy managers Technical and marketing departments Intranet community Internet users Effectsplus, Padua, Italy, 6 September 2012 20
  • 21. Academic Audience Targeting academics Workshops, seminars, conferences Submitters or organisers for more than 40 events Organizers or PC members Around 20 events Papers Over 40 papers on Aniketos research results (out of 80 submissions) Targeting industry Participation in around 20 events Including worldwide event reaching global SAP developer community Effectsplus, Padua, Italy, 6 September 2012 21
  • 22. Academic Partners CNR LJMU PLUS SINTEF Tecnalia TSSG UNITN Events participated/ 5 8 5 7 3 7 15 organized Participated Master, PhD programs, 1 3 2 1 2 10 6 Seminars, consultancy Press Release 4 1 1 1 Platforms/clusters/ 1 2 standardization Papers 11 5 1 9 12 9 Effectsplus, Padua, Italy, 6 September 2012 22
  • 23. Promoting Website Visits Website intended to be main channel Currently role less crucial Mainly due to lack of technical and training material Strategy therefore to publish more material Publish multimedia content when ready Embedded videos being shown on web front page Embedded from Aniketos YouTube channel Deliverables Demo material on success stories Broadcast new achievements via social channels Aim to cross-link between project websites Effectsplus, Padua, Italy, 6 September 2012 23
  • 24. Outreach Boost Plan Key ideas to boost outreach Key message specification and communication Effectsplus, Padua, Italy, 6 September 2012 24
  • 25. Outreach Boost Plan Key results Key outputs Effectsplus, Padua, Italy, 6 September 2012 25
  • 26. Outreach Boost Plan Effectsplus, Padua, Italy, 6 September 2012 26
  • 27. Conclusion Four targeted areas for increasing impact Tutorials and training Demonstrations Community building Dissemination and exploitation Dissemination through outreach boost Key message Targeted user groups Key results Success story publication Key outputs Code and business models Improved sharing Effectsplus, Padua, Italy, 6 September 2012 27
  • 28. http://aniketos.eu Athens Technology Center SA Atos Origin DAEM S.A. DeepBlue SELEX ELSAG (ex Elsag Datamat) Italtel Liverpool John Moores University National Research Council of Italy SAP SEARCH Lab Ltd Stiftelsen SINTEF Tecnalia Research & Innovation Thales University of Salzburg University of Trento Waterford Institute of Technology Wind Telecomunicazioni S.p.A. Effectsplus, Padua, Italy, 6 September 2012 28