-
Secure & Rapid Composition of Infrastructure Services in the Cloud
Authors:
Pierre de Leusse,
Panos Periorellis,
Paul Watson,
Andreas Maierhofer
Abstract:
A fundamental ambition of grid and distributed systems is to be capable of sustaining evolution and allowing for adaptability ((F. Losavio et al., 2002), (S. Radhakrishnan, 2005)). Furthermore, as the complexity and sophistication of theses structures increases, so does the need for adaptability of each component. One of the primary benefits of service oriented architecture (SOA) is the ability to…
▽ More
A fundamental ambition of grid and distributed systems is to be capable of sustaining evolution and allowing for adaptability ((F. Losavio et al., 2002), (S. Radhakrishnan, 2005)). Furthermore, as the complexity and sophistication of theses structures increases, so does the need for adaptability of each component. One of the primary benefits of service oriented architecture (SOA) is the ability to compose applications, processes or more complex services from other services which increases the capacity for adaptation. This document proposes a novel infrastructure composition model that aims at increasing the adaptability of the capabilities exposed through it by dynamically managing their non functional requirements.
△ Less
Submitted 2 March, 2012;
originally announced March 2012.
-
SOA-based security governance middleware
Authors:
Pierre de Leusse,
Theo Dimitrakos
Abstract:
Business requirements for rapid operational efficiency, customer responsiveness as well as rapid adaptability are actively driving the need for ever increasing communication and integration apabilities of software assets. In this context, security, although acknowledged as being a necessity, is often perceived as a hindrance. Indeed, dynamic environments require flexible and understandable securit…
▽ More
Business requirements for rapid operational efficiency, customer responsiveness as well as rapid adaptability are actively driving the need for ever increasing communication and integration apabilities of software assets. In this context, security, although acknowledged as being a necessity, is often perceived as a hindrance. Indeed, dynamic environments require flexible and understandable security that can be customized, adapted and reconfigured dynamically to face changing requirements. In this paper, the authors propose SOA based security governance middleware that handles security requirements on behalf of a resource exposed through it. The middleware aims at providing different security settings through the use of managed compositions of security services called profiles. The main added value of this work compared to existing handlers or centralized approaches lies in its enhanced flexibility and transparency.
△ Less
Submitted 2 March, 2012;
originally announced March 2012.
-
Self Managed Security Cell, a security model for the Internet of Things and Services
Authors:
Pierre de Leusse,
Panos Periorellis,
Theo Dimitrakos,
Srijith K. Nair
Abstract:
The Internet of Things and Services is a rapidly growing concept that illustrates that the ever increasing amount of physical items of our daily life which become addressable through a network could be made more easily manageable and usable through the use of Services. This surge of exposed resources along with the level of privacy and value of the information they hold, together with the increase…
▽ More
The Internet of Things and Services is a rapidly growing concept that illustrates that the ever increasing amount of physical items of our daily life which become addressable through a network could be made more easily manageable and usable through the use of Services. This surge of exposed resources along with the level of privacy and value of the information they hold, together with the increase of their usage make for an augmentation in the number of the security threats and violation attempts that existing security systems do not appear robust enough to address. In this paper, the authors underline this increase in risk and identify the requirements for resources to be more resilient in this type of environment while keeping an important level of flexibility. In addition, the authors propose an architectural model of Self Managed Security Cell, which leverages on current knowledge in large scale security systems, information management and autonomous systems.
△ Less
Submitted 2 March, 2012;
originally announced March 2012.
-
A common interface for multi-rule-engine distributed systems
Authors:
Pierre de Leusse,
Bartosz Kwolek,
Krzysztof Zielinski
Abstract:
The rule technological landscape is becoming ever more complex, with an extended number of specifications and products. It is therefore becoming increasingly difficult to integrate rule-driven components and manage interoperability in multi-rule engine environments. The described work presents the possibility to provide a common interface for rule-driven components in a distributed system. The aut…
▽ More
The rule technological landscape is becoming ever more complex, with an extended number of specifications and products. It is therefore becoming increasingly difficult to integrate rule-driven components and manage interoperability in multi-rule engine environments. The described work presents the possibility to provide a common interface for rule-driven components in a distributed system. The authors' approach leverages on a set of discovery protocol, rule interchange and user interface to alleviate the environment's complexity.
△ Less
Submitted 2 March, 2012;
originally announced March 2012.
-
Toward Governance of Cross-Cloud Application Deployment
Authors:
Pierre de Leusse,
Krzysztof Zielinski
Abstract:
In this article, the authors introduce the main ideas around the governance of cross-Cloud application deployment and their related concepts. It is argued that, due to the increasing complexity and nature of the Cloud market, an intermediary specialized in brokering the deployment of different components of a same application onto different Cloud products could both facilitate said deployment and…
▽ More
In this article, the authors introduce the main ideas around the governance of cross-Cloud application deployment and their related concepts. It is argued that, due to the increasing complexity and nature of the Cloud market, an intermediary specialized in brokering the deployment of different components of a same application onto different Cloud products could both facilitate said deployment and in some cases improve its quality in terms of cost, security & reliability and QoS. In order to fulfill these objectives, the authors propose a high level architecture that relies on their previous work on governance of policy & rule driven distributed systems. This architecture aims at supplying five main functions of 1) translation of Service Level Agreements (SLAs) and pricing into a common shared DSL, 2) correlation of analytical data (e.g. monitoring, metering), 3) combination of Cloud products, 4) information from third parties regarding different aspects of Quality of Service (QoS) and 5) cross-Cloud application deployment specification and governance.
△ Less
Submitted 2 March, 2012;
originally announced March 2012.
-
Securing business operations in an SOA
Authors:
Theo Dimitrakos,
David Brossard,
Pierre de Leusse
Abstract:
Service-oriented infrastructures pose new challenges in a number of areas, notably with regard to security and dependability. BT has developed a combination of innovative security solutions and governance frameworks that can address these challenges. They include advances in identity federation; distributed usage and access management; context-aware secure messaging, routing and transformation; an…
▽ More
Service-oriented infrastructures pose new challenges in a number of areas, notably with regard to security and dependability. BT has developed a combination of innovative security solutions and governance frameworks that can address these challenges. They include advances in identity federation; distributed usage and access management; context-aware secure messaging, routing and transformation; and (security) policy governance for service-oriented architectures. This paper discusses these developments and the steps being taken to validate their functionality and performance.
△ Less
Submitted 2 March, 2012;
originally announced March 2012.