21 research outputs found

    Authentication and authorisation in entrusted unions

    Get PDF
    This paper reports on the status of a project whose aim is to implement and demonstrate in a real-life environment an integrated eAuthentication and eAuthorisation framework to enable trusted collaborations and delivery of services across different organisational/governmental jurisdictions. This aim will be achieved by designing a framework with assurance of claims, trust indicators, policy enforcement mechanisms and processing under encryption to address the security and confidentiality requirements of large distributed infrastructures. The framework supports collaborative secure distributed storage, secure data processing and management in both the cloud and offline scenarios and is intended to be deployed and tested in two pilot studies in two different domains, viz, Bio-security incident management and Ambient Assisted Living (eHealth). Interim results in terms of security requirements, privacy preserving authentication, and authorisation are reported

    Authentication and authorisation in entrusted unions

    Get PDF
    This paper reports on the status of a project whose aim is to implement and demonstrate in a real-life environment an integrated eAuthentication and eAuthorisation framework to enable trusted collaborations and delivery of services across different organisational/governmental jurisdictions. This aim will be achieved by designing a framework with assurance of claims, trust indicators, policy enforcement mechanisms and processing under encryption to address the security and confidentiality requirements of large distributed infrastructures. The framework supports collaborative secure distributed storage, secure data processing and management in both the cloud and offline scenarios and is intended to be deployed and tested in two pilot studies in two different domains, viz, Bio-security incident management and Ambient Assisted Living (eHealth). Interim results in terms of security requirements, privacy preserving authentication, and authorisation are reported

    ETSI ZSM driven security management in future networks

    Get PDF
    This paper presents a security management framework driven by Zero-Touch Network and Service Management (ZSM) paradigm and embedded in the High-Level Architecture (HLA) developed in the INSPIRE-5Gplus project. This project work also included design and implementation of different smart 5G security methods and techniques that are essential for achieving security management in future networks. Moreover, the paper provides a summary of lessons learned and guidelines gathered during the practical validation activities for bringing closed loop and smart security management into Beyond 5G systems. Finally we discuss the key challenges and future work needed to enable integrating closed-loop security management in future networks

    DĂ©ploiement sensible au contexte d'applications Ă  base de composants

    No full text
    Les technologies de communication et l'information permettent aujourd'hui de déployer une large gamme d'applications sur des terminaux mobiles tels que des PDAs et des téléphones portables. Le contexte d'exécutions des applications dans un environnement mobile se catactérise par un changement constant dû à la variation de la localisation de l'utilisateur, de sa connexion réseau, du termimnal qu'il utilise ainsi que d'autres paramètres de son environnement. Ces changements de contexte amènent l'utilisateur à effectuer plusieurs fois les tâches de déploiement d'une application (configuration, installation et désinstallation), ceci afin d'obtenir une application dont la configuration répond au mieux aux besoins du contexte. La difficulté de ces tâches de déploiement et leur fréquence nous amène à étudier le déploiement d'applicatioins dans un environnement mobile et à chercher une solution à l'automatisation de l'adaptation du déploiement au contexte. Cette thèse propose une infrastructure intitulée CADeComp pour l'adaptation au contexte du déploiement des applications à base de composants. CADeComp est conçu avec un modèle indépendant de la plateforme qui est contitué d'un modèle de données et d'un modèle d'exécution. Le modèle de données décrit les méta-informations utilisées pour adapter le déploiement au contexte. Ces méta-informations décrivent le contexte de déploiement ainsi que les règles qui définissent les variations des paramètres de déploiement en fonction de ce contexte. Le modèle d'exécution spécifie les entités qui incarnent des mécanismes d'adaptation en s'appuyant sur des algorithmmes qui utilisent ces méta-informations. Cette thèse propose une projection du modèle CADeComp pour le modèle CCM. CADeComp a été implémenté et évalué sur cette plate-forme.The expansion of wireless communication and mobile hand-held devices allows the deployment of a broad range of applications on mobile terminals such as PDAs and mobile phones. Execution context of applications in mobile environnements undergoes contant changes due to the variation of the user location, his network conection , the characteristics or his terminal and other parameters or his physical environment. These context changes lead the user to carry out several times many deployment tasks of the same application such as its configuration, installation and uninstallation, in order to obtain an application whose configuration satisfies the context requierements. The difficulty and the frequency of these deployment tasks lead us to study the application deployment in a mobile environment and look for a solution for the automation of the deployment adaptation to the context. This thesis proposes a platform for the deploiument adaptation or component-based applications to the context, entitled CADecomp. CADeCompis conceived with a platform independent model which concists of a data model and an execution model. The data model describes méta-information used to adapt the deployment to the context. This méta-information describes the deployment context as well as the rules which define the variations of the deployment partameters according to this context. The execution model specifies the entities that incarnate adaptative mechanisms. it define algorithms which use this the deployment méta-information. This thesis proposes a projection of CADeComp model on the CCM model. CADeComp was implemented and evaluated on this platform.EVRY-BU (912282101) / SudocEVRY-INT (912282302) / SudocSudocFranceF

    Dynamic adaptation of CORBA component-based applications

    No full text
    An important requirement for pervasive computing systems is the ability to adapt at runtime to handle varying resources, user mobility, and changing user needs. In this paper, we present an innovative approach to adapt the CORBA component-based applications. This approach proposes to extend the CORBA deployment model to describe the variability of the architecture of applications and to extend the CORBA execution model in order to support adaptation at runtime. The originality of this approach is to consider the adaptation activities as non-functional aspects and to integrate them in the CORBA container. Copyright 2007 ACM.status: publishe

    MDD approach for the development of context-aware applications

    No full text
    Context-aware systems offer entirely new opportunities for application developers and for end users by gathering context information and adapting systems behavior accordingly. Several context models have been defined and various context-aware middleware has been developed in order to simplify the development of context-aware applications. Unfortunately, the development of an application by using these middleware products introduces several technical details in the application. These technical details are specific to a given middleware and reduce the possibility of reusing the application on other middleware. In this paper, we propose an MDD (Model Driven Development) approach that makes it possible to design context-aware applications independently of the platform. This approach is based on several phases that approach step by step the context platform and allow designers to automatically map their models to several platforms through the definition of auto- matic and modular transformations. To be able to apply this approach we define a new UML profile for context-aware applications, that we use to explore our approach.status: publishe

    CADeComp: Context-aware deployment of component-based applications

    No full text
    The expansion of wireless communication and mobile hand-held devices makes it possible to deploy a broad range of applications on mobile terminals such as PDAs and mobile phones. The constant context changes of mobile users oblige them to carry out many deployment tasks of the same application in order to obtain an application whose configuration satisfies the context requirements. The difficulty and the frequency of these deployment tasks led us to study the deployment in a mobile environment and to look for a solution for the automation of the deployment adaptation to the context. This paper studies the deployment sensitivity to the context in order to identify the variable deployment parameters and to analyze the impact of the deployment adaptation on the production life cycle of applications. The contribution made by this paper consists in an innovative middleware entity called Context-Aware Deployment of COMPonents (CADeComp), which can be plugged into existing middleware deployment services. CADeComp defines a flexible data model that facilitates the tasks of component producers and application assemblers by allowing them to specify the meta-information required to adapt the deployment to the context. The advantage of CADeComp is that it is based on reliable adaptive mechanisms that are defined by a platform-independent model according to the MDA approach. We propose a mapping of the CADeComp model to CCM. CADeComp was implemented and evaluated on this platform. © 2007 Elsevier Ltd. All rights reserved.status: publishe
    corecore