SlideShare a Scribd company logo
1 of 8
Download to read offline
NovaGenesis: Overview and Security Aspects
Antônio Marcos Alberti
Associate Professor and Researcher
INATEL - Instituto Nacional de Telecomunicações
www.inatel.br/novagenesis
October 21th, 2013.
NovaGenesis Overview










(1/4)

“Clean slate” architecture to the new new generation of
converging information technologies.
Distributed systems cooperate each other towards self-organizing
all architectural functionalities.
Employs a bottom-up approach where complex distributed
systems are formed by the cooperation of simple ones.
Complex protocols like TCP are fragmented on a population of
cooperating services - combined at runtime.
The main novelty is on how the Future Internet ingredients are
integrated.
NovaGenesis Overview








(2/4)

Entities and content naming employs natural language and selfcertifiable names (hash codes).
All functionalities are seen as services, including network
protocols.
Name bindings are stored on distributed hash tables, representing
all kind of relationships among named-things.
Name bindings are published and subscribed, enabling distributed
search, discovery, negotiation, and contracting of services and
content.
NovaGenesis Overview










(3/4)

Substrate resources are exposed to software by proxies, which
represent them regarding resource life-cycling and orchestration.
All the communication is done by message scheduling and
exchanging, with dynamic headers.
All the service contracts can capture intrinsically the required
quality, security, privacy, reputation, etc.
The services will employ a decision cycle to meet objectives
traced by human and machine operators.
They compete each other to better satisfy contracts (evolutionary
pressures) and optimize the usage of substrate resources
(evolution environment).
NovaGenesis Overview

(4/4)
Security Aspects


(1/2)

Requirements and challenges:
- Message/data integrity and confidentiality.
- Rendezvous among publishers and subscribers.
- Security, privacy, and trust of entities/content life-cycling.
- Trust network formation, assertion, and management.
- Identity, privacy, and reputation management.
- Unbiased contract, reputation, and trust evaluation.
- Build-in police definition, enforcement, and conflict resolution.
- History preservation versus cleaning.
- Revoking of published bindings, data, permissions, etc.
Security Aspects


(2/2)

Requirements and challenges (continuing):
- Distributed key generation and cryptography.
- Voting and coordination of entities towards social security.
- Distributed/hierarchical certification chains.
- Management of different hash algorithms and sizes.
- Deterministic building of binary executables.
- Management of copies and clones.
- Scalability, resilience, “on the fly” algorithm changing.
Of course, we are looking for collaboration to
address these challenges on Future Internet!

Thank you!
Antônio Marcos Alberti
www.inatel.br/novagenesis
antonioalberti.blogspot.com
facebook.com/antoniomarcos.alberti
researchgate.net/profile/Antonio_Alberti
linkedin.com/profile/view?id=69752898
twitter.com/antoniomalberti

More Related Content

What's hot

Physical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City ApplicationsPhysical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City ApplicationsPayamBarnaghi
 
Semantic technologies for the Internet of Things
Semantic technologies for the Internet of Things Semantic technologies for the Internet of Things
Semantic technologies for the Internet of Things PayamBarnaghi
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so farPayamBarnaghi
 
Working with real world data
Working with real world dataWorking with real world data
Working with real world dataPayamBarnaghi
 
Large-scale data analytics for smart cities
Large-scale data analytics for smart citiesLarge-scale data analytics for smart cities
Large-scale data analytics for smart citiesPayamBarnaghi
 
Dynamic Semantics for the Internet of Things
Dynamic Semantics for the Internet of Things Dynamic Semantics for the Internet of Things
Dynamic Semantics for the Internet of Things PayamBarnaghi
 
Opportunities and Challenges of Large-scale IoT Data Analytics
Opportunities and Challenges of Large-scale IoT Data AnalyticsOpportunities and Challenges of Large-scale IoT Data Analytics
Opportunities and Challenges of Large-scale IoT Data AnalyticsPayamBarnaghi
 
The Internet of Things (IoT)
The Internet of Things (IoT)The Internet of Things (IoT)
The Internet of Things (IoT)Dadhaniya Renish
 
The impact of Big Data on next generation of smart cities
The impact of Big Data on next generation of smart citiesThe impact of Big Data on next generation of smart cities
The impact of Big Data on next generation of smart citiesPayamBarnaghi
 
KIoT - Kit for the internet of things
KIoT - Kit for the internet of thingsKIoT - Kit for the internet of things
KIoT - Kit for the internet of thingscarlo zapponi
 
Tehnologija ni nevtralna
Tehnologija ni nevtralnaTehnologija ni nevtralna
Tehnologija ni nevtralnaDomen Savič
 
A Lightweight and Secure Data Sharing Protocol for D2D Communication
A Lightweight and Secure Data Sharing Protocol for D2D CommunicationA Lightweight and Secure Data Sharing Protocol for D2D Communication
A Lightweight and Secure Data Sharing Protocol for D2D Communicationmohseniatefeh
 
Introduction to SAIL regulatory workshop 110902
Introduction to SAIL regulatory workshop 110902Introduction to SAIL regulatory workshop 110902
Introduction to SAIL regulatory workshop 110902SAIL
 
NECCaseStudy_DallasMuseumArt
NECCaseStudy_DallasMuseumArtNECCaseStudy_DallasMuseumArt
NECCaseStudy_DallasMuseumArtTiffany Francis
 
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...Rute C. Sofia
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet GovernanceKenny Huang Ph.D.
 
Building a user owned internet
Building a user owned internetBuilding a user owned internet
Building a user owned internetWilson Bright
 
Towards Interoperable, Cognitive and Autonomic IoT Systems: an Agent-based Ap...
Towards Interoperable, Cognitive and Autonomic IoT Systems: an Agent-based Ap...Towards Interoperable, Cognitive and Autonomic IoT Systems: an Agent-based Ap...
Towards Interoperable, Cognitive and Autonomic IoT Systems: an Agent-based Ap...Universita della Calabria,
 

What's hot (20)

Physical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City ApplicationsPhysical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City Applications
 
Semantic technologies for the Internet of Things
Semantic technologies for the Internet of Things Semantic technologies for the Internet of Things
Semantic technologies for the Internet of Things
 
Internet of Things: The story so far
Internet of Things: The story so farInternet of Things: The story so far
Internet of Things: The story so far
 
Working with real world data
Working with real world dataWorking with real world data
Working with real world data
 
Large-scale data analytics for smart cities
Large-scale data analytics for smart citiesLarge-scale data analytics for smart cities
Large-scale data analytics for smart cities
 
Dynamic Semantics for the Internet of Things
Dynamic Semantics for the Internet of Things Dynamic Semantics for the Internet of Things
Dynamic Semantics for the Internet of Things
 
Opportunities and Challenges of Large-scale IoT Data Analytics
Opportunities and Challenges of Large-scale IoT Data AnalyticsOpportunities and Challenges of Large-scale IoT Data Analytics
Opportunities and Challenges of Large-scale IoT Data Analytics
 
The Internet of Things (IoT)
The Internet of Things (IoT)The Internet of Things (IoT)
The Internet of Things (IoT)
 
The impact of Big Data on next generation of smart cities
The impact of Big Data on next generation of smart citiesThe impact of Big Data on next generation of smart cities
The impact of Big Data on next generation of smart cities
 
KIoT - Kit for the internet of things
KIoT - Kit for the internet of thingsKIoT - Kit for the internet of things
KIoT - Kit for the internet of things
 
Semantic web on Cloud Infrastructure
Semantic web on Cloud InfrastructureSemantic web on Cloud Infrastructure
Semantic web on Cloud Infrastructure
 
Tehnologija ni nevtralna
Tehnologija ni nevtralnaTehnologija ni nevtralna
Tehnologija ni nevtralna
 
A Lightweight and Secure Data Sharing Protocol for D2D Communication
A Lightweight and Secure Data Sharing Protocol for D2D CommunicationA Lightweight and Secure Data Sharing Protocol for D2D Communication
A Lightweight and Secure Data Sharing Protocol for D2D Communication
 
Introduction to SAIL regulatory workshop 110902
Introduction to SAIL regulatory workshop 110902Introduction to SAIL regulatory workshop 110902
Introduction to SAIL regulatory workshop 110902
 
NECCaseStudy_DallasMuseumArt
NECCaseStudy_DallasMuseumArtNECCaseStudy_DallasMuseumArt
NECCaseStudy_DallasMuseumArt
 
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Building a user owned internet
Building a user owned internetBuilding a user owned internet
Building a user owned internet
 
Towards Interoperable, Cognitive and Autonomic IoT Systems: an Agent-based Ap...
Towards Interoperable, Cognitive and Autonomic IoT Systems: an Agent-based Ap...Towards Interoperable, Cognitive and Autonomic IoT Systems: an Agent-based Ap...
Towards Interoperable, Cognitive and Autonomic IoT Systems: an Agent-based Ap...
 
Big Data and Massive Analytics
Big Data and Massive AnalyticsBig Data and Massive Analytics
Big Data and Massive Analytics
 

Viewers also liked

NovaGenesis: Nova Arquitetura de Internet - Benefícios para o Setor Terciário
NovaGenesis: Nova Arquitetura de Internet - Benefícios para o Setor TerciárioNovaGenesis: Nova Arquitetura de Internet - Benefícios para o Setor Terciário
NovaGenesis: Nova Arquitetura de Internet - Benefícios para o Setor TerciárioAntonio Marcos Alberti
 
Planejamento de Redes Metropolitanas: NovaGenesis
Planejamento de Redes Metropolitanas: NovaGenesisPlanejamento de Redes Metropolitanas: NovaGenesis
Planejamento de Redes Metropolitanas: NovaGenesisAntonio Marcos Alberti
 
Internet de Coisas: O Que Precisa ser Melhorado? Como Seria uma Solução Sem...
Internet de Coisas: O Que Precisa ser Melhorado? Como Seria uma Solução Sem...Internet de Coisas: O Que Precisa ser Melhorado? Como Seria uma Solução Sem...
Internet de Coisas: O Que Precisa ser Melhorado? Como Seria uma Solução Sem...Antonio Marcos Alberti
 
apresentação RINA FI INATEL
apresentação RINA FI INATELapresentação RINA FI INATEL
apresentação RINA FI INATELMarco Casaroli
 
A importância do Seguro de Responsabilidade Civil Profissional
A importância do Seguro de Responsabilidade Civil ProfissionalA importância do Seguro de Responsabilidade Civil Profissional
A importância do Seguro de Responsabilidade Civil ProfissionalArgo Protector
 

Viewers also liked (7)

NovaGenesis: Nova Arquitetura de Internet - Benefícios para o Setor Terciário
NovaGenesis: Nova Arquitetura de Internet - Benefícios para o Setor TerciárioNovaGenesis: Nova Arquitetura de Internet - Benefícios para o Setor Terciário
NovaGenesis: Nova Arquitetura de Internet - Benefícios para o Setor Terciário
 
Planejamento de Redes Metropolitanas: NovaGenesis
Planejamento de Redes Metropolitanas: NovaGenesisPlanejamento de Redes Metropolitanas: NovaGenesis
Planejamento de Redes Metropolitanas: NovaGenesis
 
Internet de Coisas: O Que Precisa ser Melhorado? Como Seria uma Solução Sem...
Internet de Coisas: O Que Precisa ser Melhorado? Como Seria uma Solução Sem...Internet de Coisas: O Que Precisa ser Melhorado? Como Seria uma Solução Sem...
Internet de Coisas: O Que Precisa ser Melhorado? Como Seria uma Solução Sem...
 
apresentação RINA FI INATEL
apresentação RINA FI INATELapresentação RINA FI INATEL
apresentação RINA FI INATEL
 
Internet das Coisas e NovaGenesis
Internet das Coisas e NovaGenesisInternet das Coisas e NovaGenesis
Internet das Coisas e NovaGenesis
 
A importância do Seguro de Responsabilidade Civil Profissional
A importância do Seguro de Responsabilidade Civil ProfissionalA importância do Seguro de Responsabilidade Civil Profissional
A importância do Seguro de Responsabilidade Civil Profissional
 
Internet das coisas
Internet das coisasInternet das coisas
Internet das coisas
 

Similar to NovaGenesis Overview and Security Aspects

A survey of peer-to-peer content distribution technologies
A survey of peer-to-peer content distribution technologiesA survey of peer-to-peer content distribution technologies
A survey of peer-to-peer content distribution technologiessharefish
 
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORKSECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORKIJNSA Journal
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
 
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...IJNSA Journal
 
The Revolution Of Cloud Computing
The Revolution Of Cloud ComputingThe Revolution Of Cloud Computing
The Revolution Of Cloud ComputingCarmen Sanborn
 
A_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdfA_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdf12rno
 
The Web 3.0 Portal with Social Media and Photo Storage application
The Web 3.0 Portal with Social Media and Photo Storage applicationThe Web 3.0 Portal with Social Media and Photo Storage application
The Web 3.0 Portal with Social Media and Photo Storage applicationIRJET Journal
 
Knowledge management tools
Knowledge management toolsKnowledge management tools
Knowledge management toolsmohsen seyedi
 
An Overview Of The Singularity Project
An  Overview Of The  Singularity  ProjectAn  Overview Of The  Singularity  Project
An Overview Of The Singularity Projectalanocu
 
A system for distributed minting and management of persistent identifiers
A system for distributed minting and management of persistent identifiersA system for distributed minting and management of persistent identifiers
A system for distributed minting and management of persistent identifiersLukasz Bolikowski
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Alexander Decker
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Alexander Decker
 
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITYCRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITYIRJET Journal
 
An Agent Future For Network Control
An Agent Future For Network ControlAn Agent Future For Network Control
An Agent Future For Network ControlSara Alvarez
 
Write a 1-page summary for each topic listed below1. Scripting.docx
Write a 1-page summary for each topic listed below1. Scripting.docxWrite a 1-page summary for each topic listed below1. Scripting.docx
Write a 1-page summary for each topic listed below1. Scripting.docxambersalomon88660
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)paperpublications3
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...IJORCS
 

Similar to NovaGenesis Overview and Security Aspects (20)

A survey of peer-to-peer content distribution technologies
A survey of peer-to-peer content distribution technologiesA survey of peer-to-peer content distribution technologies
A survey of peer-to-peer content distribution technologies
 
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORKSECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
SECURITY PROPERTIES IN AN OPEN PEER-TO-PEER NETWORK
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
 
CV January 2011
CV January 2011CV January 2011
CV January 2011
 
The Revolution Of Cloud Computing
The Revolution Of Cloud ComputingThe Revolution Of Cloud Computing
The Revolution Of Cloud Computing
 
A_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdfA_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdf
 
The Web 3.0 Portal with Social Media and Photo Storage application
The Web 3.0 Portal with Social Media and Photo Storage applicationThe Web 3.0 Portal with Social Media and Photo Storage application
The Web 3.0 Portal with Social Media and Photo Storage application
 
Knowledge management tools
Knowledge management toolsKnowledge management tools
Knowledge management tools
 
An Overview Of The Singularity Project
An  Overview Of The  Singularity  ProjectAn  Overview Of The  Singularity  Project
An Overview Of The Singularity Project
 
A system for distributed minting and management of persistent identifiers
A system for distributed minting and management of persistent identifiersA system for distributed minting and management of persistent identifiers
A system for distributed minting and management of persistent identifiers
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...
 
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITYCRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
 
Unit 1.4 Research
Unit 1.4 ResearchUnit 1.4 Research
Unit 1.4 Research
 
An Agent Future For Network Control
An Agent Future For Network ControlAn Agent Future For Network Control
An Agent Future For Network Control
 
Write a 1-page summary for each topic listed below1. Scripting.docx
Write a 1-page summary for each topic listed below1. Scripting.docxWrite a 1-page summary for each topic listed below1. Scripting.docx
Write a 1-page summary for each topic listed below1. Scripting.docx
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
 

More from Antonio Marcos Alberti

Convergência de Arquiteturas de Informação: 6G e Além
Convergência de Arquiteturas de Informação: 6G e AlémConvergência de Arquiteturas de Informação: 6G e Além
Convergência de Arquiteturas de Informação: 6G e AlémAntonio Marcos Alberti
 
Disrupções Tecnológicas e seus Impactos
Disrupções Tecnológicas e seus ImpactosDisrupções Tecnológicas e seus Impactos
Disrupções Tecnológicas e seus ImpactosAntonio Marcos Alberti
 
EMPREENDENDO A MUDANÇA EM REDE ABUNDANTE: COMO INTEGRAR TECNOLOGIA, METODOLO...
EMPREENDENDO A MUDANÇA EM REDE ABUNDANTE: COMO  INTEGRAR TECNOLOGIA, METODOLO...EMPREENDENDO A MUDANÇA EM REDE ABUNDANTE: COMO  INTEGRAR TECNOLOGIA, METODOLO...
EMPREENDENDO A MUDANÇA EM REDE ABUNDANTE: COMO INTEGRAR TECNOLOGIA, METODOLO...Antonio Marcos Alberti
 
Palestra Transformação Digital no The Developer Conferece (TDC) - Future
Palestra Transformação Digital no The Developer Conferece (TDC) - FuturePalestra Transformação Digital no The Developer Conferece (TDC) - Future
Palestra Transformação Digital no The Developer Conferece (TDC) - FutureAntonio Marcos Alberti
 
PILARES DA TRANSIÇÃO E CONVERGÊNCIA DE TECNOLOGIAS DISRUPTIVAS
PILARES DA TRANSIÇÃO E CONVERGÊNCIA DE TECNOLOGIAS DISRUPTIVASPILARES DA TRANSIÇÃO E CONVERGÊNCIA DE TECNOLOGIAS DISRUPTIVAS
PILARES DA TRANSIÇÃO E CONVERGÊNCIA DE TECNOLOGIAS DISRUPTIVASAntonio Marcos Alberti
 
CIDADES INTELIGENTES: TECNOLOGIAS, NOVOS MODELOS, SOLUÇÕES E DESAFIOS EM AB...
CIDADES INTELIGENTES: TECNOLOGIAS, NOVOS MODELOS, SOLUÇÕES E DESAFIOS EM AB...CIDADES INTELIGENTES: TECNOLOGIAS, NOVOS MODELOS, SOLUÇÕES E DESAFIOS EM AB...
CIDADES INTELIGENTES: TECNOLOGIAS, NOVOS MODELOS, SOLUÇÕES E DESAFIOS EM AB...Antonio Marcos Alberti
 
Inteligência Artificial na Transformação Digital de Smart Cities
Inteligência Artificial na Transformação Digital de Smart CitiesInteligência Artificial na Transformação Digital de Smart Cities
Inteligência Artificial na Transformação Digital de Smart CitiesAntonio Marcos Alberti
 
SDN, NFV AND CDN/ICN IN HIBRID TERRESTRIAL/SATELLITE 5G: WHAT IS MISSING?
SDN, NFV AND CDN/ICN IN HIBRID TERRESTRIAL/SATELLITE 5G: WHAT IS MISSING?SDN, NFV AND CDN/ICN IN HIBRID TERRESTRIAL/SATELLITE 5G: WHAT IS MISSING?
SDN, NFV AND CDN/ICN IN HIBRID TERRESTRIAL/SATELLITE 5G: WHAT IS MISSING?Antonio Marcos Alberti
 
Convergência de Tecnologias Disruptivas: IoT, IA, Blockchain, 5G e Internet d...
Convergência de Tecnologias Disruptivas: IoT, IA, Blockchain, 5G e Internet d...Convergência de Tecnologias Disruptivas: IoT, IA, Blockchain, 5G e Internet d...
Convergência de Tecnologias Disruptivas: IoT, IA, Blockchain, 5G e Internet d...Antonio Marcos Alberti
 
Convergência de Tecnologias Disruptivas
Convergência de Tecnologias DisruptivasConvergência de Tecnologias Disruptivas
Convergência de Tecnologias DisruptivasAntonio Marcos Alberti
 
FORWARDING/ROUTING WITH DUAL NAMES: THE NOVAGENESIS APPROACH
FORWARDING/ROUTING WITH DUAL NAMES: THE NOVAGENESIS APPROACHFORWARDING/ROUTING WITH DUAL NAMES: THE NOVAGENESIS APPROACH
FORWARDING/ROUTING WITH DUAL NAMES: THE NOVAGENESIS APPROACHAntonio Marcos Alberti
 
Internet das Coisas, Blockchain e NovaGenesis
Internet das Coisas, Blockchain e NovaGenesisInternet das Coisas, Blockchain e NovaGenesis
Internet das Coisas, Blockchain e NovaGenesisAntonio Marcos Alberti
 
FUTURE INTERNET OF THINGS: EXPERIMENTING WITH NOVAGENESIS AND VIRTUAL SENSORS...
FUTURE INTERNET OF THINGS: EXPERIMENTING WITH NOVAGENESIS AND VIRTUAL SENSORS...FUTURE INTERNET OF THINGS: EXPERIMENTING WITH NOVAGENESIS AND VIRTUAL SENSORS...
FUTURE INTERNET OF THINGS: EXPERIMENTING WITH NOVAGENESIS AND VIRTUAL SENSORS...Antonio Marcos Alberti
 
PROJETO NOVAGENESIS: A CRIAÇÃO DE UMA NOVA INTERNET
PROJETO NOVAGENESIS: A CRIAÇÃO DE UMA NOVA INTERNETPROJETO NOVAGENESIS: A CRIAÇÃO DE UMA NOVA INTERNET
PROJETO NOVAGENESIS: A CRIAÇÃO DE UMA NOVA INTERNETAntonio Marcos Alberti
 

More from Antonio Marcos Alberti (20)

6G
6G6G
6G
 
Convergência de Arquiteturas de Informação: 6G e Além
Convergência de Arquiteturas de Informação: 6G e AlémConvergência de Arquiteturas de Informação: 6G e Além
Convergência de Arquiteturas de Informação: 6G e Além
 
Disrupções Tecnológicas e seus Impactos
Disrupções Tecnológicas e seus ImpactosDisrupções Tecnológicas e seus Impactos
Disrupções Tecnológicas e seus Impactos
 
EMPREENDENDO A MUDANÇA EM REDE ABUNDANTE: COMO INTEGRAR TECNOLOGIA, METODOLO...
EMPREENDENDO A MUDANÇA EM REDE ABUNDANTE: COMO  INTEGRAR TECNOLOGIA, METODOLO...EMPREENDENDO A MUDANÇA EM REDE ABUNDANTE: COMO  INTEGRAR TECNOLOGIA, METODOLO...
EMPREENDENDO A MUDANÇA EM REDE ABUNDANTE: COMO INTEGRAR TECNOLOGIA, METODOLO...
 
Palestra Transformação Digital no The Developer Conferece (TDC) - Future
Palestra Transformação Digital no The Developer Conferece (TDC) - FuturePalestra Transformação Digital no The Developer Conferece (TDC) - Future
Palestra Transformação Digital no The Developer Conferece (TDC) - Future
 
NovaGenesis Overview
NovaGenesis OverviewNovaGenesis Overview
NovaGenesis Overview
 
NovaGenesis Overview
NovaGenesis OverviewNovaGenesis Overview
NovaGenesis Overview
 
NovaGenesis Overview
NovaGenesis OverviewNovaGenesis Overview
NovaGenesis Overview
 
PILARES DA TRANSIÇÃO E CONVERGÊNCIA DE TECNOLOGIAS DISRUPTIVAS
PILARES DA TRANSIÇÃO E CONVERGÊNCIA DE TECNOLOGIAS DISRUPTIVASPILARES DA TRANSIÇÃO E CONVERGÊNCIA DE TECNOLOGIAS DISRUPTIVAS
PILARES DA TRANSIÇÃO E CONVERGÊNCIA DE TECNOLOGIAS DISRUPTIVAS
 
CIDADES INTELIGENTES: TECNOLOGIAS, NOVOS MODELOS, SOLUÇÕES E DESAFIOS EM AB...
CIDADES INTELIGENTES: TECNOLOGIAS, NOVOS MODELOS, SOLUÇÕES E DESAFIOS EM AB...CIDADES INTELIGENTES: TECNOLOGIAS, NOVOS MODELOS, SOLUÇÕES E DESAFIOS EM AB...
CIDADES INTELIGENTES: TECNOLOGIAS, NOVOS MODELOS, SOLUÇÕES E DESAFIOS EM AB...
 
Inteligência Artificial na Transformação Digital de Smart Cities
Inteligência Artificial na Transformação Digital de Smart CitiesInteligência Artificial na Transformação Digital de Smart Cities
Inteligência Artificial na Transformação Digital de Smart Cities
 
SDN, NFV AND CDN/ICN IN HIBRID TERRESTRIAL/SATELLITE 5G: WHAT IS MISSING?
SDN, NFV AND CDN/ICN IN HIBRID TERRESTRIAL/SATELLITE 5G: WHAT IS MISSING?SDN, NFV AND CDN/ICN IN HIBRID TERRESTRIAL/SATELLITE 5G: WHAT IS MISSING?
SDN, NFV AND CDN/ICN IN HIBRID TERRESTRIAL/SATELLITE 5G: WHAT IS MISSING?
 
Convergência de Tecnologias Disruptivas: IoT, IA, Blockchain, 5G e Internet d...
Convergência de Tecnologias Disruptivas: IoT, IA, Blockchain, 5G e Internet d...Convergência de Tecnologias Disruptivas: IoT, IA, Blockchain, 5G e Internet d...
Convergência de Tecnologias Disruptivas: IoT, IA, Blockchain, 5G e Internet d...
 
Arte e Pensamento - Mundo Virtual
Arte e Pensamento - Mundo VirtualArte e Pensamento - Mundo Virtual
Arte e Pensamento - Mundo Virtual
 
Convergência de Tecnologias Disruptivas
Convergência de Tecnologias DisruptivasConvergência de Tecnologias Disruptivas
Convergência de Tecnologias Disruptivas
 
FORWARDING/ROUTING WITH DUAL NAMES: THE NOVAGENESIS APPROACH
FORWARDING/ROUTING WITH DUAL NAMES: THE NOVAGENESIS APPROACHFORWARDING/ROUTING WITH DUAL NAMES: THE NOVAGENESIS APPROACH
FORWARDING/ROUTING WITH DUAL NAMES: THE NOVAGENESIS APPROACH
 
OVERVIEW OF ICT LAB RESEARCH
OVERVIEW OF ICT LAB RESEARCHOVERVIEW OF ICT LAB RESEARCH
OVERVIEW OF ICT LAB RESEARCH
 
Internet das Coisas, Blockchain e NovaGenesis
Internet das Coisas, Blockchain e NovaGenesisInternet das Coisas, Blockchain e NovaGenesis
Internet das Coisas, Blockchain e NovaGenesis
 
FUTURE INTERNET OF THINGS: EXPERIMENTING WITH NOVAGENESIS AND VIRTUAL SENSORS...
FUTURE INTERNET OF THINGS: EXPERIMENTING WITH NOVAGENESIS AND VIRTUAL SENSORS...FUTURE INTERNET OF THINGS: EXPERIMENTING WITH NOVAGENESIS AND VIRTUAL SENSORS...
FUTURE INTERNET OF THINGS: EXPERIMENTING WITH NOVAGENESIS AND VIRTUAL SENSORS...
 
PROJETO NOVAGENESIS: A CRIAÇÃO DE UMA NOVA INTERNET
PROJETO NOVAGENESIS: A CRIAÇÃO DE UMA NOVA INTERNETPROJETO NOVAGENESIS: A CRIAÇÃO DE UMA NOVA INTERNET
PROJETO NOVAGENESIS: A CRIAÇÃO DE UMA NOVA INTERNET
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

NovaGenesis Overview and Security Aspects

  • 1. NovaGenesis: Overview and Security Aspects Antônio Marcos Alberti Associate Professor and Researcher INATEL - Instituto Nacional de Telecomunicações www.inatel.br/novagenesis October 21th, 2013.
  • 2. NovaGenesis Overview      (1/4) “Clean slate” architecture to the new new generation of converging information technologies. Distributed systems cooperate each other towards self-organizing all architectural functionalities. Employs a bottom-up approach where complex distributed systems are formed by the cooperation of simple ones. Complex protocols like TCP are fragmented on a population of cooperating services - combined at runtime. The main novelty is on how the Future Internet ingredients are integrated.
  • 3. NovaGenesis Overview     (2/4) Entities and content naming employs natural language and selfcertifiable names (hash codes). All functionalities are seen as services, including network protocols. Name bindings are stored on distributed hash tables, representing all kind of relationships among named-things. Name bindings are published and subscribed, enabling distributed search, discovery, negotiation, and contracting of services and content.
  • 4. NovaGenesis Overview      (3/4) Substrate resources are exposed to software by proxies, which represent them regarding resource life-cycling and orchestration. All the communication is done by message scheduling and exchanging, with dynamic headers. All the service contracts can capture intrinsically the required quality, security, privacy, reputation, etc. The services will employ a decision cycle to meet objectives traced by human and machine operators. They compete each other to better satisfy contracts (evolutionary pressures) and optimize the usage of substrate resources (evolution environment).
  • 6. Security Aspects  (1/2) Requirements and challenges: - Message/data integrity and confidentiality. - Rendezvous among publishers and subscribers. - Security, privacy, and trust of entities/content life-cycling. - Trust network formation, assertion, and management. - Identity, privacy, and reputation management. - Unbiased contract, reputation, and trust evaluation. - Build-in police definition, enforcement, and conflict resolution. - History preservation versus cleaning. - Revoking of published bindings, data, permissions, etc.
  • 7. Security Aspects  (2/2) Requirements and challenges (continuing): - Distributed key generation and cryptography. - Voting and coordination of entities towards social security. - Distributed/hierarchical certification chains. - Management of different hash algorithms and sizes. - Deterministic building of binary executables. - Management of copies and clones. - Scalability, resilience, “on the fly” algorithm changing.
  • 8. Of course, we are looking for collaboration to address these challenges on Future Internet! Thank you! Antônio Marcos Alberti www.inatel.br/novagenesis antonioalberti.blogspot.com facebook.com/antoniomarcos.alberti researchgate.net/profile/Antonio_Alberti linkedin.com/profile/view?id=69752898 twitter.com/antoniomalberti