SlideShare a Scribd company logo
Aniketos: Supporting Trustworthy
   and Secure Composition in
Service and Cloud Environments
               Per Håkon Meland
              Erkuden Rios Velasco
              David Llewellyn-Jones
                http://aniketos.eu

                     4th of July 2011
        Effectsplus Clustering Event, Amsterdam
Contents

           Background
           Project overview
                    Objective, facts, partners
           Challenges we are facing
                    and what we can do about them…




Box image by ba1969: http://www.sxc.hu/photo/1301543



                                                       Effectsplus July 2011   2
Future Internet
 Networked services
    From monolithic full-service stack suppliers
    To dynamic services built using multiple
    services from multiple providers
 Autonomic computing paradigm
    Self-management
    Self-healing
    Self-configuration
    Self-protection
 Dynamic mix of Cloud/non-cloud services depending on
    Service availability
    Functionality
    Price
    Performance
    Trustworthiness
    Security features

                                           Effectsplus July 2011   3
Aniketos Project
 The main objective of Aniketos is to help establish
 and maintain trustworthiness and secure behaviour
 in a dynamically changing environment of
 composite services.
    Methods, tool support and security services to support
    design-time creation and run-time (re-)composition of
    dynamic services
    Notifications about threats and changes
    Socio-technical evaluations for acceptance and effective
    security
 ICT FP7 Objective 1.4: Secure, dependable and
 trusted infrastructures
 Started August 2010 running until February 2014
 See http://aniketos.eu


                                      Effectsplus July 2011    4
Compose Service Case Studies
                                                     Air traffic
                                                     service pool
                            SESAR




Future telecom services
                                                          Photo by Joe Lipson, CC license

                          eGovernance: Land buying

                             Effectsplus July 2011                              5
Aniketos Consortium
 Athens Technology Center SA
 Atos Origin
 DAEM S.A.
 DeepBlue
 SELEX ELSAG (ex Elsag Datamat)
 Italtel
 Liverpool John Moores University
 National Research Council of Italy
 SAP
 SEARCH Lab Ltd
 Stiftelsen SINTEF
 Tecnalia Research & Innovation
 Thales
 University of Salzburg
 University of Trento
 Waterford Institute of Technology
 Wind Telecomunicazioni S.p.A.



                                      Effectsplus July 2011   6
Composite Security
 Not just enforcing single security property on
 all services
    Distributed services from multiple providers
    Difficulty knowing if a policy is violated or not
    Service providers agree to fulfil a customer’s
    policy
        Need to know whether their service can fulfil it
        Need to decide whether this is the case
        Need tools to determine security properties
        based on composition




                                           Effectsplus July 2011   7
Example
 A ‘recursive services’ scenario
    Using a service, don’t need to know (or
    care) whether it’s a single service or
    composite service
    When determining the trustworthiness
    or security of a service, these issues
    may be critical!
 Data flow:
    Where is my data stored?
    Who has access to these data?
    How are they stored?
    How are they deleted?
    Which laws and policies apply?



                                      Effectsplus July 2011   8
Source: http://www.zdnet.com/blog/igeneration/microsoft-admits-patriot-act-can-access-eu-based-cloud-data/11225


                                                                      Effectsplus July 2011                       9
Composite Trust

 Services require not just security, but also trust
    Service provider claims to fulfil a security policy
    How can a service consumer trust this?
    Need tools for quantification of
    trustworthiness and verification
 Composite services introduce
    Composite trust
    Chains of trust
    Requirements on careful attribution
       Who’s trustworthiness rating should be affected if something goes
       wrong?



                                     Effectsplus July 2011          10
Aniketos Remedies for
   Composite Security and Trust

Express security and trustworthiness requirements
through graphical modelling
Generation of security SLA templates
Discovery, matching and planning
Provide design-time and runtime modules for evaluating
and monitoring security and trustworthiness between
service stakeholders
Subscription-based notifications and alerts (“early-
warning”)


                           Effectsplus July 2011   11
Societal Acceptance
           and Effective Security
Trust and security are not only technical matters
   Depend heavily on the human factors to be effective
Composite services are often complex
   Service end user should have an easy and understandable way of
   relying on its trustworthiness
Aniketos contribution
   Define a user-centred view on service trust and security
   Investigate user acceptance and practical usability
   Use case studies for future European services




                                  Effectsplus July 2011       12
Summary of Security and Trust
              Challenges for the Future Internet
            Services made up of other services
            Service composition may not be obvious externally
            Services provided by multiple providers
            Service components change; trust information
            may not be available
            Widespread adoption means security must
            be clear for non-technical users




Padlock image from arinas74: http://www.sxc.hu/photo/1056349



                                                               Effectsplus July 2011   13
Aniketos Approach
 Make composite services able to establish and maintain security and trustworthiness




                                           Effectsplus July 2011           14 / 27
Aniketos Approach
 Make composite services able to establish and maintain security and trustworthiness




                                           Effectsplus July 2011           15 / 27
Aniketos Approach – Objectives
 Ensure and manage trustworthiness of interoperable and
 dynamically evolving services (through trust models and metrics)
 Develop integral framework providing methods and tool support for
 secure interoperable service development, composition, adaptation
 and management through concept of Security Engineering
 Define how to efficiently analyse, solve and share information on how
 new threats and vulnerabilities can be mitigated or how services can
 adapt to them
 Promote and contribute to best practices, standards and own
 certification work related to security and trust
 Demonstrate and evaluate practical use of security techniques,
 frameworks, patterns and tools in ordinary development of software
 and service with end-user trials


                                   Effectsplus July 2011    16 / 27
Aniketos Approach




                    Effectsplus July 2011   17 / 27
Platform Overview
 This approach is reflected in the platform design
 Incorporates                                                            The Aniketos platform
                                                                          The Aniketos platform
     Design-time support                                     Design-time support                    Runtime support
                                                              Design-time support                    Runtime support
     Run-time support                                          Trustworthiness definition            Trustworthiness monitoring
                                                                    and evaluation
                                                                 Trustworthiness definition                and evaluation
                                                                                                       Trustworthiness monitoring
     Community support                                                and evaluation                         and evaluation

                                                               Security property definition         Runtime validation of secure
 Security properties are defined and evaluated                   Securityevaluation
                                                                    and property definition
                                                                        and evaluation
                                                                                                         service behaviour
                                                                                                      Runtime validation of secure
                                                                                                           service behaviour

 Trustworthiness underpins security claims                     Composite service analysis
                                                                   and preparation
                                                                 Composite service analysis
                                                                                                   Composite service adaptation
                                                                                                       and recomposition
                                                                                                     Composite service adaptation
                                                                     and preparation                     and recomposition
 Threat context included in analysis
                                                                                Community support
 Composite analysis allows trust and security                                    Community support

 properties to be understood in the context of                   Reference architecture and
                                                                         patterns
                                                                   Reference architecture and
                                                                                                 Threat analysis and notification
                                                                                                   Threat analysis and notification
                                                                            patterns
 composite services                                             End user trust and assurance         Aniketos market place
                                                                  End user trust and assurance         Aniketos market place
 Support provided in terms of
     Reference designs and security patterns
     Threat information
     Notifications




                                               Effectsplus July 2011                                          18 / 27
Key Concepts

 Trust
   Used to determine whether offered security contracts are likely to
   be adhered to
 Security
   Security requirements are defined by a security contract requested
   by the consumer, and fulfilled by a security policy agreed by the
   provider
 Threats
   Threats define the context
   Different security may be needed as new threats and
   vulnerabilities are identified



                                  Effectsplus July 2011     19 / 27
Threat Detection and Response

 Service deployment environment is dynamic
   Fluctuating threats picture for service providers
   Changing operating conditions for end users
   New attack methods and capabilities emerge
   Flaws and vulnerabilities may be discovered in services
 Aniketos contribution
   Investigating new threat landscape
   Investigate threats to composite services
   Undertake work in understanding their nature
   Establish how to deal with them




                                 Effectsplus July 2011       20/27

More Related Content

What's hot

Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
HyTrust
 
Presidio Overview
Presidio OverviewPresidio Overview
Presidio Overview
rebekaclifton
 
Newcastle upon Tyne Hospitals NHS Success Story
Newcastle upon Tyne Hospitals NHS Success StoryNewcastle upon Tyne Hospitals NHS Success Story
Newcastle upon Tyne Hospitals NHS Success Story
Imprivata
 
Miratech Infrastructure Support Services
Miratech Infrastructure Support ServicesMiratech Infrastructure Support Services
Miratech Infrastructure Support Services
Miratech
 
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
IBM Sverige
 
Safe Code Software Integrity Controls0610
Safe Code Software Integrity Controls0610Safe Code Software Integrity Controls0610
Safe Code Software Integrity Controls0610
Tommy Tracx Xaypanya
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4
Arrow ECS UK
 
Security Certification - Critical Review
Security Certification - Critical ReviewSecurity Certification - Critical Review
Security Certification - Critical Review
ISA Interchange
 
Arrow ecs security_brochure_2012
Arrow ecs security_brochure_2012Arrow ecs security_brochure_2012
Arrow ecs security_brochure_2012
Arrow ECS UK
 
Security Certification - Critical Review
Security Certification - Critical ReviewSecurity Certification - Critical Review
Security Certification - Critical Review
ISA Interchange
 
Microsoft Forefront - Security for Office Communications Server Product Overv...
Microsoft Forefront - Security for Office Communications Server Product Overv...Microsoft Forefront - Security for Office Communications Server Product Overv...
Microsoft Forefront - Security for Office Communications Server Product Overv...
Microsoft Private Cloud
 
Enhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your NetworkEnhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your Network
Cisco Canada
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
Lilian Schaffer
 

What's hot (13)

Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
 
Presidio Overview
Presidio OverviewPresidio Overview
Presidio Overview
 
Newcastle upon Tyne Hospitals NHS Success Story
Newcastle upon Tyne Hospitals NHS Success StoryNewcastle upon Tyne Hospitals NHS Success Story
Newcastle upon Tyne Hospitals NHS Success Story
 
Miratech Infrastructure Support Services
Miratech Infrastructure Support ServicesMiratech Infrastructure Support Services
Miratech Infrastructure Support Services
 
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
 
Safe Code Software Integrity Controls0610
Safe Code Software Integrity Controls0610Safe Code Software Integrity Controls0610
Safe Code Software Integrity Controls0610
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4
 
Security Certification - Critical Review
Security Certification - Critical ReviewSecurity Certification - Critical Review
Security Certification - Critical Review
 
Arrow ecs security_brochure_2012
Arrow ecs security_brochure_2012Arrow ecs security_brochure_2012
Arrow ecs security_brochure_2012
 
Security Certification - Critical Review
Security Certification - Critical ReviewSecurity Certification - Critical Review
Security Certification - Critical Review
 
Microsoft Forefront - Security for Office Communications Server Product Overv...
Microsoft Forefront - Security for Office Communications Server Product Overv...Microsoft Forefront - Security for Office Communications Server Product Overv...
Microsoft Forefront - Security for Office Communications Server Product Overv...
 
Enhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your NetworkEnhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your Network
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 

Similar to Aniketos 2nd cluster meeting

Aniketos summary
Aniketos summaryAniketos summary
Aniketos summary
Aniketos EU FP7 Project
 
Aniketos trust bus_sept_2012
Aniketos trust bus_sept_2012Aniketos trust bus_sept_2012
Aniketos trust bus_sept_2012
Aniketos EU FP7 Project
 
A Framework for Secure Service Composition
A Framework for Secure Service CompositionA Framework for Secure Service Composition
A Framework for Secure Service Composition
Achim D. Brucker
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trust
fcleary
 
Mobility solutions client presentation
Mobility solutions client presentationMobility solutions client presentation
Mobility solutions client presentation
Juarez Junior
 
Defining and Evaluating the Usability of CMS - Saurabh Kudesia
 Defining and Evaluating the Usability of CMS - Saurabh Kudesia   Defining and Evaluating the Usability of CMS - Saurabh Kudesia
Defining and Evaluating the Usability of CMS - Saurabh Kudesia
STC India UX SIG
 
Profile based security assurance for service
Profile based security assurance for serviceProfile based security assurance for service
Profile based security assurance for service
IESS
 
Information Technology Security Techniques Evaluation Criteria For It Secrit...
Information Technology  Security Techniques Evaluation Criteria For It Secrit...Information Technology  Security Techniques Evaluation Criteria For It Secrit...
Information Technology Security Techniques Evaluation Criteria For It Secrit...
Vishnu Kesarwani
 
Aniketos effects plus_6sep_2012-v04
Aniketos effects plus_6sep_2012-v04Aniketos effects plus_6sep_2012-v04
Aniketos effects plus_6sep_2012-v04
Aniketos EU FP7 Project
 
Orchestration and provisioning architecture for effective service management
Orchestration and provisioning architecture for effective service managementOrchestration and provisioning architecture for effective service management
Orchestration and provisioning architecture for effective service management
Alan McSweeney
 
Wireless Enterprise Mobility Solutions
Wireless Enterprise Mobility Solutions Wireless Enterprise Mobility Solutions
Wireless Enterprise Mobility Solutions
Infosys
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
AM Publications
 
How much can I trust my cloud services?
How much can I trust my cloud services?How much can I trust my cloud services?
How much can I trust my cloud services?
ATMOSPHERE .
 
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
IJNSA Journal
 
Lee Technologies Corporate Brochure
Lee Technologies Corporate BrochureLee Technologies Corporate Brochure
Lee Technologies Corporate Brochure
cwoodson
 
A secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsA secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOps
nooriasukmaningtyas
 
Sqa material
Sqa materialSqa material
Sqa material
Faridl Mughoffar
 
Extending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudExtending Enterprise Security into the Cloud
Extending Enterprise Security into the Cloud
CA API Management
 
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
IBM Sverige
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement Management
Noam Bunder
 

Similar to Aniketos 2nd cluster meeting (20)

Aniketos summary
Aniketos summaryAniketos summary
Aniketos summary
 
Aniketos trust bus_sept_2012
Aniketos trust bus_sept_2012Aniketos trust bus_sept_2012
Aniketos trust bus_sept_2012
 
A Framework for Secure Service Composition
A Framework for Secure Service CompositionA Framework for Secure Service Composition
A Framework for Secure Service Composition
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trust
 
Mobility solutions client presentation
Mobility solutions client presentationMobility solutions client presentation
Mobility solutions client presentation
 
Defining and Evaluating the Usability of CMS - Saurabh Kudesia
 Defining and Evaluating the Usability of CMS - Saurabh Kudesia   Defining and Evaluating the Usability of CMS - Saurabh Kudesia
Defining and Evaluating the Usability of CMS - Saurabh Kudesia
 
Profile based security assurance for service
Profile based security assurance for serviceProfile based security assurance for service
Profile based security assurance for service
 
Information Technology Security Techniques Evaluation Criteria For It Secrit...
Information Technology  Security Techniques Evaluation Criteria For It Secrit...Information Technology  Security Techniques Evaluation Criteria For It Secrit...
Information Technology Security Techniques Evaluation Criteria For It Secrit...
 
Aniketos effects plus_6sep_2012-v04
Aniketos effects plus_6sep_2012-v04Aniketos effects plus_6sep_2012-v04
Aniketos effects plus_6sep_2012-v04
 
Orchestration and provisioning architecture for effective service management
Orchestration and provisioning architecture for effective service managementOrchestration and provisioning architecture for effective service management
Orchestration and provisioning architecture for effective service management
 
Wireless Enterprise Mobility Solutions
Wireless Enterprise Mobility Solutions Wireless Enterprise Mobility Solutions
Wireless Enterprise Mobility Solutions
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 
How much can I trust my cloud services?
How much can I trust my cloud services?How much can I trust my cloud services?
How much can I trust my cloud services?
 
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
 
Lee Technologies Corporate Brochure
Lee Technologies Corporate BrochureLee Technologies Corporate Brochure
Lee Technologies Corporate Brochure
 
A secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOpsA secure cloud service deployment framework for DevOps
A secure cloud service deployment framework for DevOps
 
Sqa material
Sqa materialSqa material
Sqa material
 
Extending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudExtending Enterprise Security into the Cloud
Extending Enterprise Security into the Cloud
 
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
Kostnadseffektiv implementation av IT-säkerhetsstrategi – Accenture - IBM Sma...
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement Management
 

More from fcleary

Effectsplus july event report
Effectsplus july event report Effectsplus july event report
Effectsplus july event report
fcleary
 
Viking vi cisi
Viking vi cisiViking vi cisi
Viking vi cisi
fcleary
 
T&s roadmap slides ams
T&s roadmap slides amsT&s roadmap slides ams
T&s roadmap slides ams
fcleary
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meeting
fcleary
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1
fcleary
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meeting
fcleary
 
Vis sense cluster meeting
Vis sense cluster meetingVis sense cluster meeting
Vis sense cluster meeting
fcleary
 
Endorse cluster meeting
Endorse cluster meetingEndorse cluster meeting
Endorse cluster meeting
fcleary
 
Comifin cluster meeting
Comifin cluster meetingComifin cluster meeting
Comifin cluster meeting
fcleary
 
Posecco cluster meeting
Posecco cluster meetingPosecco cluster meeting
Posecco cluster meeting
fcleary
 
Assert4soa cluster meeting
Assert4soa cluster meetingAssert4soa cluster meeting
Assert4soa cluster meeting
fcleary
 
Nessos securechange cluster meeting
Nessos securechange cluster meetingNessos securechange cluster meeting
Nessos securechange cluster meeting
fcleary
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meeting
fcleary
 
VIKING cluster meeting 1
VIKING cluster meeting 1VIKING cluster meeting 1
VIKING cluster meeting 1
fcleary
 
Models Workshop Objectives
Models Workshop ObjectivesModels Workshop Objectives
Models Workshop Objectives
fcleary
 
U trustit_cluster meeting
U trustit_cluster meetingU trustit_cluster meeting
U trustit_cluster meeting
fcleary
 
Massif road mapping_20110704
Massif road mapping_20110704Massif road mapping_20110704
Massif road mapping_20110704fcleary
 
Bic effectplus ws
Bic effectplus wsBic effectplus ws
Bic effectplus ws
fcleary
 
Syssec
SyssecSyssec
Syssec
fcleary
 
Nessos
NessosNessos
Nessos
fcleary
 

More from fcleary (20)

Effectsplus july event report
Effectsplus july event report Effectsplus july event report
Effectsplus july event report
 
Viking vi cisi
Viking vi cisiViking vi cisi
Viking vi cisi
 
T&s roadmap slides ams
T&s roadmap slides amsT&s roadmap slides ams
T&s roadmap slides ams
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meeting
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1
 
Wsanacip tampres cluster meeting
Wsanacip tampres cluster meetingWsanacip tampres cluster meeting
Wsanacip tampres cluster meeting
 
Vis sense cluster meeting
Vis sense cluster meetingVis sense cluster meeting
Vis sense cluster meeting
 
Endorse cluster meeting
Endorse cluster meetingEndorse cluster meeting
Endorse cluster meeting
 
Comifin cluster meeting
Comifin cluster meetingComifin cluster meeting
Comifin cluster meeting
 
Posecco cluster meeting
Posecco cluster meetingPosecco cluster meeting
Posecco cluster meeting
 
Assert4soa cluster meeting
Assert4soa cluster meetingAssert4soa cluster meeting
Assert4soa cluster meeting
 
Nessos securechange cluster meeting
Nessos securechange cluster meetingNessos securechange cluster meeting
Nessos securechange cluster meeting
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meeting
 
VIKING cluster meeting 1
VIKING cluster meeting 1VIKING cluster meeting 1
VIKING cluster meeting 1
 
Models Workshop Objectives
Models Workshop ObjectivesModels Workshop Objectives
Models Workshop Objectives
 
U trustit_cluster meeting
U trustit_cluster meetingU trustit_cluster meeting
U trustit_cluster meeting
 
Massif road mapping_20110704
Massif road mapping_20110704Massif road mapping_20110704
Massif road mapping_20110704
 
Bic effectplus ws
Bic effectplus wsBic effectplus ws
Bic effectplus ws
 
Syssec
SyssecSyssec
Syssec
 
Nessos
NessosNessos
Nessos
 

Recently uploaded

Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 

Recently uploaded (20)

Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 

Aniketos 2nd cluster meeting

  • 1. Aniketos: Supporting Trustworthy and Secure Composition in Service and Cloud Environments Per Håkon Meland Erkuden Rios Velasco David Llewellyn-Jones http://aniketos.eu 4th of July 2011 Effectsplus Clustering Event, Amsterdam
  • 2. Contents Background Project overview Objective, facts, partners Challenges we are facing and what we can do about them… Box image by ba1969: http://www.sxc.hu/photo/1301543 Effectsplus July 2011 2
  • 3. Future Internet Networked services From monolithic full-service stack suppliers To dynamic services built using multiple services from multiple providers Autonomic computing paradigm Self-management Self-healing Self-configuration Self-protection Dynamic mix of Cloud/non-cloud services depending on Service availability Functionality Price Performance Trustworthiness Security features Effectsplus July 2011 3
  • 4. Aniketos Project The main objective of Aniketos is to help establish and maintain trustworthiness and secure behaviour in a dynamically changing environment of composite services. Methods, tool support and security services to support design-time creation and run-time (re-)composition of dynamic services Notifications about threats and changes Socio-technical evaluations for acceptance and effective security ICT FP7 Objective 1.4: Secure, dependable and trusted infrastructures Started August 2010 running until February 2014 See http://aniketos.eu Effectsplus July 2011 4
  • 5. Compose Service Case Studies Air traffic service pool SESAR Future telecom services Photo by Joe Lipson, CC license eGovernance: Land buying Effectsplus July 2011 5
  • 6. Aniketos Consortium Athens Technology Center SA Atos Origin DAEM S.A. DeepBlue SELEX ELSAG (ex Elsag Datamat) Italtel Liverpool John Moores University National Research Council of Italy SAP SEARCH Lab Ltd Stiftelsen SINTEF Tecnalia Research & Innovation Thales University of Salzburg University of Trento Waterford Institute of Technology Wind Telecomunicazioni S.p.A. Effectsplus July 2011 6
  • 7. Composite Security Not just enforcing single security property on all services Distributed services from multiple providers Difficulty knowing if a policy is violated or not Service providers agree to fulfil a customer’s policy Need to know whether their service can fulfil it Need to decide whether this is the case Need tools to determine security properties based on composition Effectsplus July 2011 7
  • 8. Example A ‘recursive services’ scenario Using a service, don’t need to know (or care) whether it’s a single service or composite service When determining the trustworthiness or security of a service, these issues may be critical! Data flow: Where is my data stored? Who has access to these data? How are they stored? How are they deleted? Which laws and policies apply? Effectsplus July 2011 8
  • 10. Composite Trust Services require not just security, but also trust Service provider claims to fulfil a security policy How can a service consumer trust this? Need tools for quantification of trustworthiness and verification Composite services introduce Composite trust Chains of trust Requirements on careful attribution Who’s trustworthiness rating should be affected if something goes wrong? Effectsplus July 2011 10
  • 11. Aniketos Remedies for Composite Security and Trust Express security and trustworthiness requirements through graphical modelling Generation of security SLA templates Discovery, matching and planning Provide design-time and runtime modules for evaluating and monitoring security and trustworthiness between service stakeholders Subscription-based notifications and alerts (“early- warning”) Effectsplus July 2011 11
  • 12. Societal Acceptance and Effective Security Trust and security are not only technical matters Depend heavily on the human factors to be effective Composite services are often complex Service end user should have an easy and understandable way of relying on its trustworthiness Aniketos contribution Define a user-centred view on service trust and security Investigate user acceptance and practical usability Use case studies for future European services Effectsplus July 2011 12
  • 13. Summary of Security and Trust Challenges for the Future Internet Services made up of other services Service composition may not be obvious externally Services provided by multiple providers Service components change; trust information may not be available Widespread adoption means security must be clear for non-technical users Padlock image from arinas74: http://www.sxc.hu/photo/1056349 Effectsplus July 2011 13
  • 14. Aniketos Approach Make composite services able to establish and maintain security and trustworthiness Effectsplus July 2011 14 / 27
  • 15. Aniketos Approach Make composite services able to establish and maintain security and trustworthiness Effectsplus July 2011 15 / 27
  • 16. Aniketos Approach – Objectives Ensure and manage trustworthiness of interoperable and dynamically evolving services (through trust models and metrics) Develop integral framework providing methods and tool support for secure interoperable service development, composition, adaptation and management through concept of Security Engineering Define how to efficiently analyse, solve and share information on how new threats and vulnerabilities can be mitigated or how services can adapt to them Promote and contribute to best practices, standards and own certification work related to security and trust Demonstrate and evaluate practical use of security techniques, frameworks, patterns and tools in ordinary development of software and service with end-user trials Effectsplus July 2011 16 / 27
  • 17. Aniketos Approach Effectsplus July 2011 17 / 27
  • 18. Platform Overview This approach is reflected in the platform design Incorporates The Aniketos platform The Aniketos platform Design-time support Design-time support Runtime support Design-time support Runtime support Run-time support Trustworthiness definition Trustworthiness monitoring and evaluation Trustworthiness definition and evaluation Trustworthiness monitoring Community support and evaluation and evaluation Security property definition Runtime validation of secure Security properties are defined and evaluated Securityevaluation and property definition and evaluation service behaviour Runtime validation of secure service behaviour Trustworthiness underpins security claims Composite service analysis and preparation Composite service analysis Composite service adaptation and recomposition Composite service adaptation and preparation and recomposition Threat context included in analysis Community support Composite analysis allows trust and security Community support properties to be understood in the context of Reference architecture and patterns Reference architecture and Threat analysis and notification Threat analysis and notification patterns composite services End user trust and assurance Aniketos market place End user trust and assurance Aniketos market place Support provided in terms of Reference designs and security patterns Threat information Notifications Effectsplus July 2011 18 / 27
  • 19. Key Concepts Trust Used to determine whether offered security contracts are likely to be adhered to Security Security requirements are defined by a security contract requested by the consumer, and fulfilled by a security policy agreed by the provider Threats Threats define the context Different security may be needed as new threats and vulnerabilities are identified Effectsplus July 2011 19 / 27
  • 20. Threat Detection and Response Service deployment environment is dynamic Fluctuating threats picture for service providers Changing operating conditions for end users New attack methods and capabilities emerge Flaws and vulnerabilities may be discovered in services Aniketos contribution Investigating new threat landscape Investigate threats to composite services Undertake work in understanding their nature Establish how to deal with them Effectsplus July 2011 20/27