SlideShare a Scribd company logo
Architecting Secure Mobile P2P Systems James Walkerdine , Peter Phillips,  Simon Lock Lancaster University
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Motivation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile P2P and Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PEPERS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PEPERS Developments Development   Framework   Runtime   Framework Design  and  Architecture  Framework (DAF) Static Verification  Framework (SVF) Execution  Framework (EF) Dynamic Verification  Framework (DVF) Development Platform   Runtime Platform Development Methodology P2P Application Reference Architectures Tool Support
User Partner Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PEPERS Development Methodology (PDM)
Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
Secure Mobile P2P Development Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key types of P2P Topology
Topology support for Security
Development Methodology ,[object Object],[object Object],[object Object],[object Object],[object Object]
Each stage tailored to consider P2P, Security and Mobile  aspects Requirements  Elicitation Propose System  Architecture Start Propose Sub - System  Design System  Implementation Verification  and Validation
Support Tool ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
G4S Case Study ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Requirements  Elicitation Propose System  Architecture Start Propose Sub - System  Design System  Implementation Verification  and Validation
Propose System Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Application Reference Architectures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Shared Workspace Application Reference Architecture Application/GUI Real - time Connection Monitor/Synchronisation Distributed Authentication/Authorisation Awareness Monitor Decentralised P2P Communication Encryption Distributed Logging P2P Network Layer Known Peer Repository Distributed Log Storage Workspace Management Local Data
Case Study ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tool Video
 
 
Evaluation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

130118 sergio luis da silva jr. - an approach to formalise security patterns
130118   sergio luis da silva jr. - an approach to formalise security patterns130118   sergio luis da silva jr. - an approach to formalise security patterns
130118 sergio luis da silva jr. - an approach to formalise security patterns
Ptidej Team
 
Ethical Hacking Services
Ethical Hacking ServicesEthical Hacking Services
Ethical Hacking Services
Virtue Security
 
Practical Security Architecture Analysis
Practical Security Architecture AnalysisPractical Security Architecture Analysis
Practical Security Architecture Analysis
Phil Huggins FBCS CITP
 
Michael L Sawall INFOSEC
Michael L Sawall INFOSECMichael L Sawall INFOSEC
Michael L Sawall INFOSEC
Mike Sawall
 
Larry fermi generic nac overview-expanded - atlseccon2011
Larry fermi   generic nac overview-expanded - atlseccon2011Larry fermi   generic nac overview-expanded - atlseccon2011
Larry fermi generic nac overview-expanded - atlseccon2011
Atlantic Security Conference
 
Access control3
Access control3Access control3
Access control3
Awhydot
 
Cse322 embedded systems-eth_1.00_ac26
Cse322 embedded systems-eth_1.00_ac26Cse322 embedded systems-eth_1.00_ac26
Cse322 embedded systems-eth_1.00_ac26
krishnahere
 
Php developer
Php developerPhp developer
Php developer
Ertugrul Akbas
 
3.Secure Design Principles And Process
3.Secure Design Principles And Process3.Secure Design Principles And Process
3.Secure Design Principles And Process
phanleson
 
Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
MLG College of Learning, Inc
 

What's hot (10)

130118 sergio luis da silva jr. - an approach to formalise security patterns
130118   sergio luis da silva jr. - an approach to formalise security patterns130118   sergio luis da silva jr. - an approach to formalise security patterns
130118 sergio luis da silva jr. - an approach to formalise security patterns
 
Ethical Hacking Services
Ethical Hacking ServicesEthical Hacking Services
Ethical Hacking Services
 
Practical Security Architecture Analysis
Practical Security Architecture AnalysisPractical Security Architecture Analysis
Practical Security Architecture Analysis
 
Michael L Sawall INFOSEC
Michael L Sawall INFOSECMichael L Sawall INFOSEC
Michael L Sawall INFOSEC
 
Larry fermi generic nac overview-expanded - atlseccon2011
Larry fermi   generic nac overview-expanded - atlseccon2011Larry fermi   generic nac overview-expanded - atlseccon2011
Larry fermi generic nac overview-expanded - atlseccon2011
 
Access control3
Access control3Access control3
Access control3
 
Cse322 embedded systems-eth_1.00_ac26
Cse322 embedded systems-eth_1.00_ac26Cse322 embedded systems-eth_1.00_ac26
Cse322 embedded systems-eth_1.00_ac26
 
Php developer
Php developerPhp developer
Php developer
 
3.Secure Design Principles And Process
3.Secure Design Principles And Process3.Secure Design Principles And Process
3.Secure Design Principles And Process
 
Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
 

Similar to Walker SAM Presentation

Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
Shakas Technologies
 
Pattern-Oriented Distributed Software Architectures
Pattern-Oriented Distributed Software Architectures Pattern-Oriented Distributed Software Architectures
Pattern-Oriented Distributed Software Architectures
David Freitas
 
Blockchain solution architecture deliverable
Blockchain solution architecture deliverableBlockchain solution architecture deliverable
Blockchain solution architecture deliverable
Sarmad Ibrahim
 
Guaranteed Component Assembly with Round Trip Analysis for Energy Efficient H...
Guaranteed Component Assembly with Round Trip Analysis for Energy Efficient H...Guaranteed Component Assembly with Round Trip Analysis for Energy Efficient H...
Guaranteed Component Assembly with Round Trip Analysis for Energy Efficient H...
Ákos Horváth
 
Pattern-Oriented Software Architecture: Patterns for Concurrent and Networked...
Pattern-Oriented Software Architecture: Patterns for Concurrent and Networked...Pattern-Oriented Software Architecture: Patterns for Concurrent and Networked...
Pattern-Oriented Software Architecture: Patterns for Concurrent and Networked...
David Freitas
 
A new model for the selection of web development frameworks: application to P...
A new model for the selection of web development frameworks: application to P...A new model for the selection of web development frameworks: application to P...
A new model for the selection of web development frameworks: application to P...
IJECEIAES
 
Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...
KTN
 
Service Oriented Architecture for Net Centric Operations based on Open Source...
Service Oriented Architecture for Net Centric Operations based on Open Source...Service Oriented Architecture for Net Centric Operations based on Open Source...
Service Oriented Architecture for Net Centric Operations based on Open Source...
Sanjiva Weerawarana
 
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
Rio Info
 
Governing in the Cloud
Governing in the CloudGoverning in the Cloud
Governing in the Cloud
Rolf Frydenberg
 
Notes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And RoadmapNotes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And Roadmap
Alan McSweeney
 
Opac labs overview-pr1.0
Opac labs overview-pr1.0Opac labs overview-pr1.0
Opac labs overview-pr1.0
opaclabs
 
security_assessment_slides
security_assessment_slidessecurity_assessment_slides
security_assessment_slides
Steve Arnold
 
Continuous Compliance and DevSecOps
Continuous Compliance and DevSecOpsContinuous Compliance and DevSecOps
Continuous Compliance and DevSecOps
Puppet
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_Appaji
Appaji K
 
Adding P2P support to WengoPhone, an open-source VoIP and ...
Adding P2P support to WengoPhone, an open-source VoIP and ...Adding P2P support to WengoPhone, an open-source VoIP and ...
Adding P2P support to WengoPhone, an open-source VoIP and ...
Videoguy
 
15 implementing architectures
15 implementing architectures15 implementing architectures
15 implementing architectures
Majong DevJfu
 
CPaaS.io Y1 Review Meeting - Platform Architecture
CPaaS.io Y1 Review Meeting - Platform ArchitectureCPaaS.io Y1 Review Meeting - Platform Architecture
CPaaS.io Y1 Review Meeting - Platform Architecture
Stephan Haller
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
David Patterson
 

Similar to Walker SAM Presentation (20)

Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Pattern-Oriented Distributed Software Architectures
Pattern-Oriented Distributed Software Architectures Pattern-Oriented Distributed Software Architectures
Pattern-Oriented Distributed Software Architectures
 
Blockchain solution architecture deliverable
Blockchain solution architecture deliverableBlockchain solution architecture deliverable
Blockchain solution architecture deliverable
 
Guaranteed Component Assembly with Round Trip Analysis for Energy Efficient H...
Guaranteed Component Assembly with Round Trip Analysis for Energy Efficient H...Guaranteed Component Assembly with Round Trip Analysis for Energy Efficient H...
Guaranteed Component Assembly with Round Trip Analysis for Energy Efficient H...
 
Pattern-Oriented Software Architecture: Patterns for Concurrent and Networked...
Pattern-Oriented Software Architecture: Patterns for Concurrent and Networked...Pattern-Oriented Software Architecture: Patterns for Concurrent and Networked...
Pattern-Oriented Software Architecture: Patterns for Concurrent and Networked...
 
A new model for the selection of web development frameworks: application to P...
A new model for the selection of web development frameworks: application to P...A new model for the selection of web development frameworks: application to P...
A new model for the selection of web development frameworks: application to P...
 
Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...
 
Service Oriented Architecture for Net Centric Operations based on Open Source...
Service Oriented Architecture for Net Centric Operations based on Open Source...Service Oriented Architecture for Net Centric Operations based on Open Source...
Service Oriented Architecture for Net Centric Operations based on Open Source...
 
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
 
Governing in the Cloud
Governing in the CloudGoverning in the Cloud
Governing in the Cloud
 
Notes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And RoadmapNotes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And Roadmap
 
Opac labs overview-pr1.0
Opac labs overview-pr1.0Opac labs overview-pr1.0
Opac labs overview-pr1.0
 
security_assessment_slides
security_assessment_slidessecurity_assessment_slides
security_assessment_slides
 
Continuous Compliance and DevSecOps
Continuous Compliance and DevSecOpsContinuous Compliance and DevSecOps
Continuous Compliance and DevSecOps
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_Appaji
 
Adding P2P support to WengoPhone, an open-source VoIP and ...
Adding P2P support to WengoPhone, an open-source VoIP and ...Adding P2P support to WengoPhone, an open-source VoIP and ...
Adding P2P support to WengoPhone, an open-source VoIP and ...
 
15 implementing architectures
15 implementing architectures15 implementing architectures
15 implementing architectures
 
CPaaS.io Y1 Review Meeting - Platform Architecture
CPaaS.io Y1 Review Meeting - Platform ArchitectureCPaaS.io Y1 Review Meeting - Platform Architecture
CPaaS.io Y1 Review Meeting - Platform Architecture
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 

Recently uploaded

TechnoXander Confirmation of Payee Product Pack 1.pdf
TechnoXander Confirmation of Payee Product Pack 1.pdfTechnoXander Confirmation of Payee Product Pack 1.pdf
TechnoXander Confirmation of Payee Product Pack 1.pdf
richardwellington119
 
Chapter 25: Economic Growth Summary from Samuelson and Nordhaus
Chapter 25: Economic Growth Summary from Samuelson and NordhausChapter 25: Economic Growth Summary from Samuelson and Nordhaus
Chapter 25: Economic Growth Summary from Samuelson and Nordhaus
iraangeles4
 
Monthly Market Risk Update: June 2024 [SlideShare]
Monthly Market Risk Update: June 2024 [SlideShare]Monthly Market Risk Update: June 2024 [SlideShare]
Monthly Market Risk Update: June 2024 [SlideShare]
Commonwealth
 
How Poonawalla Fincorp and IndusInd Bank’s Co-Branded RuPay Credit Card Cater...
How Poonawalla Fincorp and IndusInd Bank’s Co-Branded RuPay Credit Card Cater...How Poonawalla Fincorp and IndusInd Bank’s Co-Branded RuPay Credit Card Cater...
How Poonawalla Fincorp and IndusInd Bank’s Co-Branded RuPay Credit Card Cater...
beulahfernandes8
 
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
asukqco
 
Macroeconomic-digest-of-Ukraine-0624-Eng.pdf
Macroeconomic-digest-of-Ukraine-0624-Eng.pdfMacroeconomic-digest-of-Ukraine-0624-Eng.pdf
Macroeconomic-digest-of-Ukraine-0624-Eng.pdf
olaola5673
 
Seeman_Fiintouch_LLP_Newsletter_Jun_2024.pdf
Seeman_Fiintouch_LLP_Newsletter_Jun_2024.pdfSeeman_Fiintouch_LLP_Newsletter_Jun_2024.pdf
Seeman_Fiintouch_LLP_Newsletter_Jun_2024.pdf
Ashis Kumar Dey
 
The various stages, after the initial invitation has been made to the public ...
The various stages, after the initial invitation has been made to the public ...The various stages, after the initial invitation has been made to the public ...
The various stages, after the initial invitation has been made to the public ...
Yashwanth Rm
 
BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...
BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...
BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...
Neil Day
 
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
brunasordi905
 
1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样
1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样
1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样
28xo7hf
 
What Lessons Can New Investors Learn from Newman Leech’s Success?
What Lessons Can New Investors Learn from Newman Leech’s Success?What Lessons Can New Investors Learn from Newman Leech’s Success?
What Lessons Can New Investors Learn from Newman Leech’s Success?
Newman Leech
 
Economic Risk Factor Update: June 2024 [SlideShare]
Economic Risk Factor Update: June 2024 [SlideShare]Economic Risk Factor Update: June 2024 [SlideShare]
Economic Risk Factor Update: June 2024 [SlideShare]
Commonwealth
 
The Rise and Fall of Ponzi Schemes in America.pptx
The Rise and Fall of Ponzi Schemes in America.pptxThe Rise and Fall of Ponzi Schemes in America.pptx
The Rise and Fall of Ponzi Schemes in America.pptx
Diana Rose
 
3-الملخصات الهيكلية للمعايير المراجعة المصرية.pdf
3-الملخصات الهيكلية للمعايير المراجعة المصرية.pdf3-الملخصات الهيكلية للمعايير المراجعة المصرية.pdf
3-الملخصات الهيكلية للمعايير المراجعة المصرية.pdf
Riadh ASSOUAK
 
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
mukeshomran942
 
Ending stagnation: How to boost prosperity across Scotland
Ending stagnation: How to boost prosperity across ScotlandEnding stagnation: How to boost prosperity across Scotland
Ending stagnation: How to boost prosperity across Scotland
ResolutionFoundation
 
falcon-invoice-discounting-a-premier-investment-platform-for-superior-returns...
falcon-invoice-discounting-a-premier-investment-platform-for-superior-returns...falcon-invoice-discounting-a-premier-investment-platform-for-superior-returns...
falcon-invoice-discounting-a-premier-investment-platform-for-superior-returns...
Falcon Invoice Discounting
 
一比一原版宾夕法尼亚大学毕业证(UPenn毕业证书)学历如何办理
一比一原版宾夕法尼亚大学毕业证(UPenn毕业证书)学历如何办理一比一原版宾夕法尼亚大学毕业证(UPenn毕业证书)学历如何办理
一比一原版宾夕法尼亚大学毕业证(UPenn毕业证书)学历如何办理
vpqasyb
 
How to Identify the Best Crypto to Buy Now in 2024.pdf
How to Identify the Best Crypto to Buy Now in 2024.pdfHow to Identify the Best Crypto to Buy Now in 2024.pdf
How to Identify the Best Crypto to Buy Now in 2024.pdf
Kezex (KZX)
 

Recently uploaded (20)

TechnoXander Confirmation of Payee Product Pack 1.pdf
TechnoXander Confirmation of Payee Product Pack 1.pdfTechnoXander Confirmation of Payee Product Pack 1.pdf
TechnoXander Confirmation of Payee Product Pack 1.pdf
 
Chapter 25: Economic Growth Summary from Samuelson and Nordhaus
Chapter 25: Economic Growth Summary from Samuelson and NordhausChapter 25: Economic Growth Summary from Samuelson and Nordhaus
Chapter 25: Economic Growth Summary from Samuelson and Nordhaus
 
Monthly Market Risk Update: June 2024 [SlideShare]
Monthly Market Risk Update: June 2024 [SlideShare]Monthly Market Risk Update: June 2024 [SlideShare]
Monthly Market Risk Update: June 2024 [SlideShare]
 
How Poonawalla Fincorp and IndusInd Bank’s Co-Branded RuPay Credit Card Cater...
How Poonawalla Fincorp and IndusInd Bank’s Co-Branded RuPay Credit Card Cater...How Poonawalla Fincorp and IndusInd Bank’s Co-Branded RuPay Credit Card Cater...
How Poonawalla Fincorp and IndusInd Bank’s Co-Branded RuPay Credit Card Cater...
 
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
 
Macroeconomic-digest-of-Ukraine-0624-Eng.pdf
Macroeconomic-digest-of-Ukraine-0624-Eng.pdfMacroeconomic-digest-of-Ukraine-0624-Eng.pdf
Macroeconomic-digest-of-Ukraine-0624-Eng.pdf
 
Seeman_Fiintouch_LLP_Newsletter_Jun_2024.pdf
Seeman_Fiintouch_LLP_Newsletter_Jun_2024.pdfSeeman_Fiintouch_LLP_Newsletter_Jun_2024.pdf
Seeman_Fiintouch_LLP_Newsletter_Jun_2024.pdf
 
The various stages, after the initial invitation has been made to the public ...
The various stages, after the initial invitation has been made to the public ...The various stages, after the initial invitation has been made to the public ...
The various stages, after the initial invitation has been made to the public ...
 
BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...
BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...
BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...
 
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
 
1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样
1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样
1比1复刻(ksu毕业证书)美国堪萨斯州立大学毕业证本科文凭证书原版一模一样
 
What Lessons Can New Investors Learn from Newman Leech’s Success?
What Lessons Can New Investors Learn from Newman Leech’s Success?What Lessons Can New Investors Learn from Newman Leech’s Success?
What Lessons Can New Investors Learn from Newman Leech’s Success?
 
Economic Risk Factor Update: June 2024 [SlideShare]
Economic Risk Factor Update: June 2024 [SlideShare]Economic Risk Factor Update: June 2024 [SlideShare]
Economic Risk Factor Update: June 2024 [SlideShare]
 
The Rise and Fall of Ponzi Schemes in America.pptx
The Rise and Fall of Ponzi Schemes in America.pptxThe Rise and Fall of Ponzi Schemes in America.pptx
The Rise and Fall of Ponzi Schemes in America.pptx
 
3-الملخصات الهيكلية للمعايير المراجعة المصرية.pdf
3-الملخصات الهيكلية للمعايير المراجعة المصرية.pdf3-الملخصات الهيكلية للمعايير المراجعة المصرية.pdf
3-الملخصات الهيكلية للمعايير المراجعة المصرية.pdf
 
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
欧洲杯足彩-欧洲杯足彩押注-欧洲杯足彩押注官网|【​网址​🎉ac99.net🎉​】
 
Ending stagnation: How to boost prosperity across Scotland
Ending stagnation: How to boost prosperity across ScotlandEnding stagnation: How to boost prosperity across Scotland
Ending stagnation: How to boost prosperity across Scotland
 
falcon-invoice-discounting-a-premier-investment-platform-for-superior-returns...
falcon-invoice-discounting-a-premier-investment-platform-for-superior-returns...falcon-invoice-discounting-a-premier-investment-platform-for-superior-returns...
falcon-invoice-discounting-a-premier-investment-platform-for-superior-returns...
 
一比一原版宾夕法尼亚大学毕业证(UPenn毕业证书)学历如何办理
一比一原版宾夕法尼亚大学毕业证(UPenn毕业证书)学历如何办理一比一原版宾夕法尼亚大学毕业证(UPenn毕业证书)学历如何办理
一比一原版宾夕法尼亚大学毕业证(UPenn毕业证书)学历如何办理
 
How to Identify the Best Crypto to Buy Now in 2024.pdf
How to Identify the Best Crypto to Buy Now in 2024.pdfHow to Identify the Best Crypto to Buy Now in 2024.pdf
How to Identify the Best Crypto to Buy Now in 2024.pdf
 

Walker SAM Presentation

  • 1. Architecting Secure Mobile P2P Systems James Walkerdine , Peter Phillips, Simon Lock Lancaster University
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. PEPERS Developments Development Framework Runtime Framework Design and Architecture Framework (DAF) Static Verification Framework (SVF) Execution Framework (EF) Dynamic Verification Framework (DVF) Development Platform Runtime Platform Development Methodology P2P Application Reference Architectures Tool Support
  • 7.
  • 9.
  • 10.
  • 11. Key types of P2P Topology
  • 13.
  • 14. Each stage tailored to consider P2P, Security and Mobile aspects Requirements Elicitation Propose System Architecture Start Propose Sub - System Design System Implementation Verification and Validation
  • 15.
  • 16.
  • 17. Requirements Elicitation Propose System Architecture Start Propose Sub - System Design System Implementation Verification and Validation
  • 18.
  • 19.
  • 20. Shared Workspace Application Reference Architecture Application/GUI Real - time Connection Monitor/Synchronisation Distributed Authentication/Authorisation Awareness Monitor Decentralised P2P Communication Encryption Distributed Logging P2P Network Layer Known Peer Repository Distributed Log Storage Workspace Management Local Data
  • 21.
  • 23.  
  • 24.  
  • 25.
  • 26.