50 research outputs found

    Enabling discoverable trusted services for highly dynamic decentralized workflows

    Get PDF
    Fifth generation (5G) mobile networks will revolutionize edge-based computing by providing fast and reliable network capabilities to remote sensors, devices and microservices. This heralds new opportunities for researchers, allowing remote instrumentation and analytic capabilities to be as accessible as local resources. The increased availability of remote data and services presents new opportunities for collaboration, yet introduces challenges for workflow orchestration, which will need to adapt to consider an increased choice of available services, including those from trusted partners and the wider community. In this paper we outline a workflow approach that provides decentralized discovery and orchestration of verifiably trustable services in support of multi-party operations. We base this work on the adoption of standardised data models and protocols emerging from hypermedia research, which has demonstrated success in using combinations of Linked Data, Web of Things (WoT) and semantic technologies to provide mechanisms for autonomous goal-directed agents to discover, execute and reuse new heterogeneous resources and behaviours in large-scale, dynamic environments. We adopt Verifiable Credentials (VCs) to securely share information amongst peers based on prior service usage in a cryptographically secure and tamperproof way, providing a trust-based framework for ratifying service qualities. Collating these new service description channels and integrating with existing decentralized workflow research based on vector symbolic architecture (VSA) provides an enhanced semantic search space for efficient and trusted service discovery that will be necessary for 5G edge-computing environments

    OpenUEBA – A systematic approach to learn behavioural patterns

    Get PDF
    For years, Security Operations Centers (SOC) have resorted to SIEM and IDS tools as the core defence shield, offering reactive detection capabilities against latent threats. Despite the effectiveness of the tools described above, cybercriminal groups have professionalized themselves by launching very sophisticated campaigns that unfortunately, go unnoticed by current detection tools. In order to revolutionize the current range of security tools, we present our vision and advances in openUEBA; An open-source framework focused on the study of the behaviour of users and entities on the network; Where through state-of-the-art Artificial Intelligence techniques are learn behavioural patterns of those users who later fall into cyber attacks. With the learnt knowledge, the tool calculates the user exposure; in other words, it predicts which users will be victims of latent threats, allowing the analyst to make preventive decisions.Peer ReviewedPostprint (published version

    Sustainable Development Report: Blockchain, the Web3 & the SDGs

    Get PDF
    This is an output paper of the applied research that was conducted between July 2018 - October 2019 funded by the Austrian Development Agency (ADA) and conducted by the Research Institute for Cryptoeconomics at the Vienna University of Economics and Business and RCE Vienna (Regional Centre of Expertise on Education for Sustainable Development).Series: Working Paper Series / Institute for Cryptoeconomics / Interdisciplinary Researc

    Sustainable Development Report: Blockchain, the Web3 & the SDGs

    Get PDF
    This is an output paper of the applied research that was conducted between July 2018 - October 2019 funded by the Austrian Development Agency (ADA) and conducted by the Research Institute for Cryptoeconomics at the Vienna University of Economics and Business and RCE Vienna (Regional Centre of Expertise on Education for Sustainable Development).Series: Working Paper Series / Institute for Cryptoeconomics / Interdisciplinary Researc

    Improving engineering change management by introducing a standardised description for engineering changes for the automotive wiring harness

    Get PDF
    Engineering change management is a key part in the development of products that requires a lot of resources and time. A key problem is the lack of a shared ontology to describe engineering changes. This creates problems, additional effort and hinders the digitalisation of the engineering change management. This is especially true for the development of the automotive wiring harness where a low degree of automation together with the occurrence of many changes in a multi-variant system poses a big challenge. A description that is unambiguous, comprehensive and coherent is needed. The research presented in this paper tackles this problem. A standardised description for the engineering change management for the automotive wiring harness is introduced in this publication. The authors outline the approach that has been used to create a systematic description. The validation of the standardised description is based on two approaches: a case study of a development project and an ongoing development project. The validation shows that 94% of all engineering changes can be described in the proposed standardised way. Concepts where the standardised descriptions can be used to improve the engineering change process are outlined at the end of the paper. The paper thereby presents a way that directly improves the engineering change process and the product development process. It enables the further improvement of the engineering change management by providing a basis for an automatic processing, evaluation and implementation of engineering changes
    corecore