LUCON. Data Flow Control for Message-Based IoT Systems. Julian Schütte, Gerd Brost. Fraunhofer AISEC, Germany
|
|
- Damon Neal
- 5 years ago
- Views:
Transcription
1 LUCON Data Flow Control for Message-Based IoT Systems Julian Schütte, Gerd Brost Fraunhofer AISEC, Germany TrustCom 2018, New York, 1st of August, 2018
2 Outline 1 Message-based IoT Architectures 2 Approach Message Routes as a Control Flow Graph Usage Control as a Taint Analysis Problem Compliance Checking as Reachability Problem The LUCON Policy Language 3 Evaluation & Conclusions 1 11
3 Message-based IoT Architectures
4 A Typical IoT System Data Processing Pre-Processing Services Message Broker Edge Device Message Broker Message Queuing Sensors On-Premise Cloud Storage Sensitive data is collected from sensors Pre-processing at the edge, main processing/aggregation in the backend Communication over messages queues, orchestration by message routers 2 11
5 Usage Control in Distributed Systems Usage Control instead of Access Control Access Control only regulates if data may be used. Usage Control is about how data may be used continuous control of data processing "Flow-sensitive" Usage Control Existing work on information flow control implements specific info flow models e.g. secrecy/integrity in cloud computing (e.g., FlowK, CamFlow) only runtime enforcement of information flows Our Goal Policies over any kind of data flow Runtime enforcement & provenance of data flows Design-time compliance verification of message routes against data flow policies 3 11
6 Usage Control in Distributed Systems Usage Control instead of Access Control Access Control only regulates if data may be used. Usage Control is about how data may be used continuous control of data processing "Flow-sensitive" Usage Control Existing work on information flow control implements specific info flow models e.g. secrecy/integrity in cloud computing (e.g., FlowK, CamFlow) only runtime enforcement of information flows Our Goal Policies over any kind of data flow Runtime enforcement & provenance of data flows Design-time compliance verification of message routes against data flow policies 3 11
7 Usage Control in Distributed Systems Usage Control instead of Access Control Access Control only regulates if data may be used. Usage Control is about how data may be used continuous control of data processing "Flow-sensitive" Usage Control Existing work on information flow control implements specific info flow models e.g. secrecy/integrity in cloud computing (e.g., FlowK, CamFlow) only runtime enforcement of information flows Our Goal Policies over any kind of data flow Runtime enforcement & provenance of data flows Design-time compliance verification of message routes against data flow policies 3 11
8 Approach
9 Approach We treat information flow control as a program analysis problem. Usage Control Message Routes Runtime Enforcement Compliance Checking Program Analysis Control Flow Graph (CFG) Dynamic Taint Analysis Reachability Problem Note: Typical attacker model of dist. usage control is less strict than of program analysis Program analysis: Control flow (the program) is public. Observation of control flows at runtime is trivial (ptrace) Usage Control: Control flow (a message route) is non-public. Typically, attacker can observe only parts of control flow, esp. not termination 4 11
10 Message Routes as a Control Flow Graph <route id = " Sensor_Messaging " > <from uri = " timer: // everysecond? period=1000 " /> <to uri = "ahc://localhost:9292/temp" /> <to uri = "hdfs://a.example.com/store" /> <aggregate outbatchsize = " 10 " /> <to uri = "ahc: /> </ route > LUCON compiles Apache Camel routes into a CFG representation in Prolog. Message m Lm = {raw, temperature} Policy = {publish raw} m Service A (Database) L = L + = Lm = {raw, temperature} P = {persist(hdfs2://...)} Service B (Merges Data) m m L = {raw} L + = {merge(10)} Lm = {temperature, merge(10)} P = Service C (Publisher) L = L + = Lm = {temperature, merge(10)} P = {publish( 5 11
11 Usage Control as Taint Analysis We apply the technique of taint analysis from software analysis to information flows Labels are attached to messages Labels may change whenever a message is processed by a service (transformation functions L and L + ). Rules declare what happens when message with label X enters service Y. Block message Execute an action ( obligation ) 6 11
12 Compliance Checking as Reachability Problem Reminder: We compile Camel message routes into a CFG representation in Prolog We also compile LUCON policies into data flow constraints over the CFG Prolog We can now turn the problem of compliance checking into a reachability problem verify that there is no path through the CFG that violates the constraints of the policy Route Sensor_Messaging i s invalid because s e r v i c e may receive label ( s ) [ raw ]. This i s forbidden by rule dontpublishraw Example flows v i o l a t i n g p o l i c y follow : sensor creates message labeled [ raw ] storage receives message labeled [ raw ] aggregator receives message labeled [ raw ] receives message labeled [ raw, aggregated ] fail!. Compliance violation reported by Prolog 7 11
13 The LUCON Policy Language LUCON is a DSL created in Eclipse XText ( generates IDE w/ syntax highlighter & autocomplete) Declares transformation functions and flow rules Rules are compiled into Prolog Evaluation of rules is a Prolog query Simple example: Do not publish data labeled as raw 8 11
14 Evaluation & Conclusions
15 Implementation & Evaluation Enforcement of data flow rules is sound & complete, assuming that the compilation from Camel to Prolog is, too. LUCON implementation Domain specific language with Eclipse XText Compliance checking & enforcement with tuprolog Performance of tuprolog as an enforcement engine? 9 11
16 Runtime Performance & Memory Consumption 200 Evaluation time (ms) ,000 2,000 3,000 4,000 5,000 Red=No. of labels. Blue=No. of applicable rules Memory consumption (MB) ,000 2,000 3,000 4,000 5,000 Red=No. of labels. Blue=No. of applicable rules 10 11
17 Conclusions LUCON is a policy language that controls data flows in message-based systems Implemented as a Prolog-based interceptor for Apache Camel approx. 20 ms + 20 MB runtime impact for realistic size of policies (uncached) Generalization of classic access control and information flow policies. Prevents any policy violation at runtime Compliance checking: Proofs that your message route will never violate any policy 11 / 11
LUCON: Data Flow Control for Message-Based IoT Systems
LUCON: Data Flow Control for Message-Based IoT Systems Julian Schütte, Gerd Stefan Brost Fraunhofer AISEC, Germany {julian.schuette,gerd.brost}@aisec.fraunhofer.de arxiv:1805.05887v1 [cs.cr] 14 May 2018
More informationBIG MODELS AN ALTERNATIVE APPROACH
2. BIG MODELS AN ALTERNATIVE APPROACH Whitepaper Eclipse Summit 2008 Modeling Symposium Jos Warmer, Ordina (jos.warmer@ordina.nl) Abstract Scaling up modeling within project runs into many practical problems.
More informationAutomated Cloud Compliance. GxP and 21 CFR Part 11 Compliance
Automated Cloud Compliance GxP and 21 CFR Part 11 Compliance Solution Overview Sierra Labs has developed a set of tools to help companies with HIPAA compliance, 21 CFR Part 11 requirement, and GxP validation
More informationUnify DevOps and SecOps: Security Without Friction
SANS Secure DevOps Summit Unify DevOps and SecOps: Security Without Friction Matt Alderman, CISSP Chief Strategy & Marketing Officer Layered Insight @maldermania Technology Trend #1: Infrastructure Migrates
More informationEventuation properties and interaction contracts
Eventuation properties and interaction contracts Mario Südholt Ascola research team; Mines Nantes, Inria, Lina SCRIPT WS Vrije Universiteit Brussel, 12 Nov. 2013 Motivation 1 Motivation 2 Generalizing
More informationPreserving Data Privacy in the IoT World
MASSACHUSETTS INSTITUTE OF TECHNOLOGY Preserving Data Privacy in the IoT World Thomas Hardjono Alex Sandy Pentland Connection Science & Engineering Massachusetts Institute of Technology July 2016 connection.mit.edu
More informationIoT Edge within the IoT Framework
IoT Edge within the IoT Framework Axel Dittmann Diplom-Betriebswirt (FH) Diplom-Wirtschaftsinformatiker (FH) Global Technical Solution Specialist IOT CISSP, MCP Twitter: @DittmannAxel Waves of Innovation
More informationCLOUD GOVERNANCE SPECIALIST Certification
CLOUD GOVERNANCE SPECIALIST Certification The Cloud Professional (CCP) program from Arcitura is dedicated to excellence in the fields of cloud computing technology, mechanisms, platforms, architecture,
More informationOutline. Introduction End-to-end QoS in heterogeneous networks User-centric, cross-layered approach User-centric QoS in PLC Networks Conclusions
Managing the User-Perceived QoS in Heterogeneous Networks Pedro M. Ruiz Project Manager Agora Systems S.A. Madrid 2003 Global Summit Outline Introduction End-to-end QoS in heterogeneous networks User-centric,
More informationMicrosoft Visual Basic 2005: Reloaded
Microsoft Visual Basic 2005: Reloaded Second Edition Chapter 3 Variables, Constants, Methods, and Calculations Objectives After studying this chapter, you should be able to: Declare variables and named
More informationFogIoT Orchestrator: an Orchestration System for IoT Applications in Fog Environment
FogIoT Orchestrator: an Orchestration System for IoT Applications in Fog Environment Bruno Donassolo - Orange Labs Ilhem Fajjari - Orange Labs Arnaud Legrand - INRIA - LIG Panayotis Mertikopoulos - INRIA
More informationB U I L D I N G O N T H E G A T E W A Y. Copyright 2015, Oracle and/or its affiliates. All rights reserved.
B U I L D I N G O N T H E G A T E W A Y Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
More informationCMPSC 497: Static Analysis
CMPSC 497: Static Analysis Trent Jaeger Systems and Internet Infrastructure Security (SIIS) Lab Computer Science and Engineering Department Pennsylvania State University Page 1 Our Goal In this course,
More informationUniLFS: A Unifying Logical Framework for Service Modeling and Contracting
UniLFS: A Unifying Logical Framework for Service Modeling and Contracting RuleML 2103: 7th International Web Rule Symposium July 11-13, 2013 Dumitru Roman 1 and Michael Kifer 2 1 SINTEF / University of
More informationOverview SENTINET 3.1
Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7
More informationPrivacy Challenges in Big Data and Industry 4.0
Privacy Challenges in Big Data and Industry 4.0 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: csjcao@comp.polyu.edu.hk http://www.comp.polyu.edu.hk/~csjcao/
More information2779 : Implementing a Microsoft SQL Server 2005 Database
2779 : Implementing a Microsoft SQL Server 2005 Database Introduction Elements of this syllabus are subject to change. This five-day instructor-led course provides students with the knowledge and skills
More informationAMon A Monitoring System for ActiveMQ
A Monitoring System for ActiveMQ Joe Fernandez joe.fernandez@ttmsolutions.com Total Transaction Management, LLC 570 Rancheros Drive, Suite 140 San Marcos, CA 92069 760-591-0273 www.ttmsolutions.com 1 Designed
More informationWHITEPAPER. Compliance with ITAR and Export Controls in Collaboration Systems
WHITEPAPER Compliance with ITAR and Export Executive Summary IT executives for organizations that are subject to export controls and regulations, including ITAR, EAR, as well as German BAFA regulations,
More informationDynamic Languages Toolkit. Presented by Andrey Tarantsov
Dynamic Languages Toolkit Presented by Andrey Tarantsov Dynamic Languages Toolkit Serves as a foundation for scripting and dynamically-typed language IDEs Generalizes JDT code and follows its architecture
More informationTHE DESIGN ENVIRONMENT FOR HETEROGENEOUS SYSTEMS
THE DESIGN ENVIRONMENT FOR HETEROGENEOUS SYSTEMS SystemC / SystemC AMS based Simulation and Modeling Technologies Outline COSIDE Today COSIDE 2.0 COSIDE Future 2 Management Summary Combination of analog
More informationCustomization and Provisioning of Complex Event Processing using TOSCA IAAS & IPVS
Customization and Provisioning of Complex Event Processing using TOSCA IAAS & IPVS Ana C. Franco da Silva, Pascal Hirmer, Uwe Breitenbücher, Oliver Kopp, Bernhard Mitschang franco-da-silva@informatik.uni-stuttgart.de
More informationSecure Cloud Computing Architecture (SCCA)
Secure Cloud Computing Architecture (SCCA) Program Overview Susan Casson PM, SCCA May 15, 2018 UNITED IN IN SERVICE TO OUR NATION 1 Service Overview: Why SCCA? SCCA connects the DoD to Infrastructure and
More informationMOBILE.NET PRIVACY POLICY
MOBILE.NET PRIVACY POLICY As the operator of the Mobile.net website (https://mobile.net.ltd/) (Website), ADX Labs, LLC. (Company, we or us) is committed to protecting and respecting your privacy. The data
More informationIntroduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur
Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 08 Basics of IoT Networking- Part- IV So, we continue
More informationDEVELOPMENT OF A SOFIA2 CLIENT (KP) FOLLOWING THE MODEL KP ARCHITECTURE
DEVELOPMENT OF A SOFIA2 CLIENT (KP) FOLLOWING THE MODEL KP ARCHITECTURE May 2016 Version 1 DEVELOPMENT OF KP MODEL Page 1/18 INDEX INDEX... 2 STEP 1 GETTING FAMILIAR WITH SOFIA2'S BASIC CONCEPTS... 3 STEP
More informationA c t i v e w o r k s p a c e f o r e x t e r n a l d a t a a g g r e g a t i o n a n d S e a r c h. 1
A c t i v e w o r k s p a c e f o r e x t e r n a l d a t a a g g r e g a t i o n a n d S e a r c h B a l a K a n t h i www.intelizign.com 1 Active workspace can search and visualize PLM data better! Problems:
More informationGetting started 7. Setting properties 23
Contents 1 2 3 Getting started 7 Introducing Visual Basic 8 Installing Visual Studio 10 Exploring the IDE 12 Starting a new project 14 Adding a visual control 16 Adding functional code 18 Saving projects
More informationRange Restriction for General Formulas
Range Restriction for General Formulas 1 Range Restriction for General Formulas Stefan Brass Martin-Luther-Universität Halle-Wittenberg Germany Range Restriction for General Formulas 2 Motivation Deductive
More informationHow to Route Internet Traffic between A Mobile Application and IoT Device?
Whitepaper How to Route Internet Traffic between A Mobile Application and IoT Device? Website: www.mobodexter.com www.paasmer.co 1 Table of Contents 1. Introduction 3 2. Approach: 1 Uses AWS IoT Setup
More informationIntroducing SQL Query Verifier Plugin
Introducing SQL Query Verifier Plugin IBM Application Runtime Expert for i Document version: 1.0 To download the master version of this document, visit product home site: http://www.ibm.com/systems/power/software/i/are/index.html
More informationERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016
Abstract The Mirai botnet struck the security industry in three massive attacks that shook traditional DDoS protection paradigms, proving that the Internet of Things (IoT) threat is real and the grounds
More informationStatic analysis and testing of executable DSL specification
Static analysis and testing of executable DSL specification Qinan Lai 1, Andy Carpenter 1 1 School of Computer Science, the University of Manchester, Manchester, UK {laiq,afc}@cs.man.ac.uk Keywords: Abstract:
More informationF-OWL: An OWL Reasoner in Flora-2 Youyong Zou, Harry Chen, Tim Finin, Lalana Kagal
F-OWL: An OWL Reasoner in Flora-2 Youyong Zou, Harry Chen, Tim Finin, Lalana Kagal http://fowl.sourceforge.net/ Feature Supports RDF and OWL-Full Supports RDF/N-Triple query Supports Dynamic Import Provides
More informationSPECIFICATION-BASED TESTING VIA DOMAIN SPECIFIC LANGUAGE
RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA 10.2478/rput-2014-0003 2014, Volume 22, Special Number SPECIFICATION-BASED TESTING VIA
More information3D Visualization. Requirements Document. LOTAR International, Visualization Working Group ABSTRACT
3D Visualization Requirements Document LOTAR International, Visualization Working Group ABSTRACT The purpose of this document is to provide the list of requirements and their associated priorities related
More informationSAP Edge Services, cloud edition Edge Services Predictive Analytics Service Guide Version 1803
SAP Edge Services, cloud edition Edge Services Predictive Analytics Service Guide Version 1803 Table of Contents MACHINE LEARNING AND PREDICTIVE ANALYTICS... 3 Model Trained with R and Exported as PMML...
More informationGenie. Distributed Systems Synthesis and Verification. Marc Rosen. EN : Advanced Distributed Systems and Networks May 1, 2017
Genie Distributed Systems Synthesis and Verification Marc Rosen EN.600.667: Advanced Distributed Systems and Networks May 1, 2017 1 / 35 Outline Introduction Problem Statement Prior Art Demo How does it
More information21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING
WWW.HCLTECH.COM 21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING THE AGE OF DISRUPTION: THE AGE OF CYBER THREATS While the digital era has brought with it significant advances in technology, capabilities
More informationDomain-Specific Languages Language Workbenches
Software Engineering with and Domain-Specific Languages Language Workbenches Peter Friese Itemis peter.friese@itemis.de Markus Voelter Independent/itemis voelter@acm.org 1 Programming Languages C# Erlang
More informationGSMK. Cryptography Network Security. GSMK Oversight SS7 Firewall and Intrusion Detection System
Cryptography Network Security GSMK Firewall and Intrusion Detection System GSMK Firewall and intrusion detection system to prevent attacks via interconnect. Protect your Network s Achilles Heel. With the
More informationSKILL AREA 306: DEVELOP AND IMPLEMENT COMPUTER PROGRAMS
Add your company slogan SKILL AREA 306: DEVELOP AND IMPLEMENT COMPUTER PROGRAMS Computer Programming (YPG) LOGO 306.1 Review Selected Programming Environment 306.1.1 Explain the concept of reserve words,
More informationIII. Check if the divisors add up to the number. Now we may consider each of these tasks separately, assuming the others will be taken care of
Top-Down Design 1 Top-Down Design: A solution method where the problem is broken down into smaller sub-problems, which in turn are broken down into smaller subproblems, continuing until each sub-problem
More informationWhen Modeling meets Productivity. Sven Efftinge - itemis
When Modeling meets Productivity Sven Efftinge - itemis I Eclipse JDT I GIT So what s the Problem? It s the Language not the Tooling! Level of Abstraction Reuse existing, proven technology and apply
More informationIoT with Apache ActiveMQ, Camel and Spark
IoT with Apache ActiveMQ, Camel and Spark Burr Sutter - Red Hat Agenda Business & IT Architecture IoT Architecture IETF IoT Use Case Ingestion: Apache ActiveMQ, Apache Camel Analytics: Apache Spark Demos
More informationFast Indexing Strategies for Robust Image Hashes
DIGITAL FORENSIC RESEARCH CONFERENCE Fast Indexing Strategies for Robust Image Hashes By Christian Winter, Martin Steinebach and York Yannikos Presented At The Digital Forensic Research Conference DFRWS
More informationGeneric Programming Constructs and Applications in Object-Oriented Languages
Generic Programming Constructs and Applications in Object-Oriented Languages Maurizio Cimadamore maurizio.cimadamore@[unibo.it sun.com] alice research group Alma Mater Studiorum Università di Bologna Sun
More informationCSE 403: Software Engineering, Fall courses.cs.washington.edu/courses/cse403/16au/ Static Analysis. Emina Torlak
CSE 403: Software Engineering, Fall 2016 courses.cs.washington.edu/courses/cse403/16au/ Static Analysis Emina Torlak emina@cs.washington.edu Outline What is static analysis? How does it work? Free and
More informationDániel Darvas Domain-specific languages (DSLs): what, how and when?
Dániel Darvas Domain-specific languages (DSLs): what, how and when? ICE Tea 21/02/2014 Outline Theory Concept of DSLs Technology Support for DSLs Reality Some details of the ST Example DSL Theory / Concept
More informationAn Implementation of Fog Computing Attributes in an IoT Environment
An Implementation of Fog Computing Attributes in an IoT Environment Ranjit Deshpande CTO K2 Inc. Introduction Ranjit Deshpande CTO K2 Inc. K2 Inc. s end-to-end IoT platform Transforms Sensor Data into
More informationGraph-based analysis of JavaScript source code repositories
Graph-based analysis of JavaScript source code repositories Gábor Szárnyas Graph Processing devroom @ FOSDEM 2018 JAVASCRIPT Latest standard: ECMAScript 2017 STATIC ANALYSIS Static source code analysis
More informationDate yyyy-mm-dd binding declaration GASTEC QA GENERAL REQUIREMENTS
Date yyyy-mm-dd binding declaration GASTEC QA GENERAL REQUIREMENTS 253/160324 Foreword Kiwa These have been approved by the GASTEC QA Board of Experts, in which all relevant parties in the field of gas-related
More informationArchitectural patterns and models for implementing CSPA
Architectural patterns and models for implementing CSPA Marco Silipo THE CONTRACTOR IS ACTING UNDER A FRAMEWORK CONTRACT CONCLUDED WITH THE COMMISSION Application architecture Outline SOA concepts and
More informationWaste Electrical and Electronic Equipment (WEEE)
Waste Electrical and Electronic Equipment (WEEE) Waste Management Plan Guidance manual for WEEE Waste Management Plan online submission This document is for guidance only. It does not purport to be and
More information1 What-is-anopen-platform/
universaal IOT a Technical Overview Topics Semantic Discovery & Interoperability Service Broker & Orchestrator Context Broker, Context History Entrepôt, & Semantic Reasoning Human-Environment Interaction
More informationSemantic Analysis. Outline. The role of semantic analysis in a compiler. Scope. Types. Where we are. The Compiler so far
Outline Semantic Analysis The role of semantic analysis in a compiler A laundry list of tasks Scope Static vs. Dynamic scoping Implementation: symbol tables Types Statically vs. Dynamically typed languages
More informationWHITE PAPER. Meeting GDPR Challenges with Delphix. KuppingerCole Report
KuppingerCole Report WHITE PAPER by Mike Small December 2017 GDPR introduces stringent controls over the processing of PII relating to people resident in the EU with high penalties for non-compliance.
More informationIBM Advantage: IBM Watson Compare and Comply Element Classification
IBM Advantage: IBM Watson Compare and Comply Element Classification Executive overview... 1 Introducing Watson Compare and Comply... 2 Definitions... 3 Element Classification insights... 4 Sample use cases...
More informationAssertions, pre/postconditions
Programming as a contract Assertions, pre/postconditions Assertions: Section 4.2 in Savitch (p. 239) Specifying what each method does q Specify it in a comment before method's header Precondition q What
More informationImplementing a Microsoft SQL Server 2005 Database Course 2779: Three days; Instructor-Led
Implementing a Microsoft SQL Server 2005 Database Course 2779: Three days; Instructor-Led Introduction This three-day instructor-led course provides students with product knowledge and skills needed to
More informationA consumer-driven access control approach to censorship circumvention in content-centric networking
A consumer-driven access control approach to censorship circumvention in content-centric networking Jun Kurihara, Kenji Yokota and Atsushi Tagami KDDI R&D Laboratories, Inc. ACM ICN 2016 Kyoto, Japan,
More information1. What is used by the extension application to get access to the extended SAP solution?
SAP EDUCATION SAMPLE QUESTIONS: C_HCP_10 SAP Certified Development Associate - SAP HANA Cloud Platform (Edition 2016) Disclaimer: These sample questions are for self-evaluation purposes only and do not
More informationTowards A Formal Theory of On Chip Communications in the ACL2 Logic
(c) Julien Schmaltz, ACL2 2006, San José August 15-16 p. 1/37 Towards A Formal Theory of On Chip Communications in the ACL2 Logic Julien Schmaltz Saarland University - Computer Science Department Saarbrücken,
More informationCloud-Native Applications. Copyright 2017 Pivotal Software, Inc. All rights Reserved. Version 1.0
Cloud-Native Applications Copyright 2017 Pivotal Software, Inc. All rights Reserved. Version 1.0 Cloud-Native Characteristics Lean Form a hypothesis, build just enough to validate or disprove it. Learn
More informationINTEGRATION OF AD HOC WIRELESS SENSOR NETWORKS IN A VIRTUAL INSTRUMENTATION CONFIGURATION
Bulletin of the Transilvania University of Braşov Vol. 7 (56) No. 2-2014 Series I: Engineering Sciences INTEGRATION OF AD HOC WIRELESS SENSOR NETWORKS IN A VIRTUAL INSTRUMENTATION CONFIGURATION Mihai MACHEDON-PISU
More informationAre functional languages a good way to represent productive meta models?
Are functional languages a good way to represent productive meta models? Rainbow Team, I3S Lab, CNRS University of Nice, France http://rainbow.i3s.unice.fr 4 th European Lisp Workshop ECOOP 07, 07/30/2007,
More informationAssessing the Security of Internet Connected Critical Infrastructures
Assessing the Security of Internet Connected Critical Infrastructures The Comifin Project Approach H. Ghani, A. Khelil, N. Suri, G. Csertán, L. Gönczy, G. Urbanics, J. Clarke Dept of Computer Science,
More informationManual. TC3 Power Monitoring. TwinCAT 3. Version: Date: Order No.: TF3650
Manual TC3 Power Monitoring TwinCAT 3 Version: Date: Order No.: 1.1 2019-01-03 TF3650 Table of contents Table of contents 1 Foreword... 5 1.1 Notes on the documentation... 5 1.2 Safety instructions...
More informationSOA-14: Continuous Integration in SOA Projects Andreas Gies
Tooling for Service Mix 4 Principal Architect http://www.fusesource.com http://open-source-adventures.blogspot.com About the Author Principal Architect PROGRESS - Open Source Center of Competence Degree
More informationMcAfee Embedded Control
McAfee Embedded Control System integrity, change control, and policy compliance in one solution McAfee Embedded Control maintains the integrity of your system by only allowing authorized code to run and
More informationModeling and Discovering Vulnerabilities with Code Property Graphs
Modeling and Discovering Vulnerabilities with Code Property Graphs Fabian Yamaguchi, Nico Golde (Qualcomm), Daniel Arp, and Konrad Rieck Security & Privacy 2014 GEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Implementation
More informationTAXII 2.0 Specification Pre Draft
TAXII 2.0 Specification Pre Draft Current Status/Intent This document serves to gain consensus on pre draft concepts of TAXII 2.0. Please feel free to poke holes and comment! Overview TAXII is an open
More informationData Governance Overview
3 Data Governance Overview Date of Publish: 2018-04-01 http://docs.hortonworks.com Contents Apache Atlas Overview...3 Apache Atlas features...3...4 Apache Atlas Overview Apache Atlas Overview Apache Atlas
More informationSaba Hosted Customer Privacy Policy
Saba Hosted Customer Privacy Policy Last Revised 23 May 2018 1. Introduction Saba is committed to protecting information which can be used to directly or indirectly identify an individual ( personal data
More informationIntegration Service. Admin Console User Guide. On-Premises
Kony MobileFabric TM Integration Service Admin Console User Guide On-Premises Release 7.3 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and
More informationPractical Network-wide Packet Behavior Identification by AP Classifier
Practical Network-wide Packet Behavior Identification by AP Classifier NETWORK-WIDE PACKET BEHAVIOR IDENTIFICATION o An control plane application identifying forwarding behaviors of packets in a flow:
More informationXtext. Introduction and Real World Samples. Hendrik Bünder, itemis AG. itemis AG
Xtext Introduction and Real World Samples Hendrik Bünder, itemis AG Who is this guy? Hendrik Bünder IT-Consultant Agenda Introduction to Xtext What, How, Why? Common DSLs DSLs that no longer impress anybody.
More informationTemporal Data Model for Program Debugging
Temporal Data Model for Program Debugging Demian Lessa Jan Chomicki Bharat Jayaraman Department of Computer Science and Engineering State University of New York, Buffalo August 29, 2011 Current Debuggers
More informationSEARCH by Sound. API Documentation. Spectralmind Audio Intelligence Platform. Spectralmind. Platform version: 1.3 Document version: 1.1.
Spectralmind Platform version: 1.3 Document version: 1.1.1 SEARCH by Sound Spectralmind Audio Intelligence Platform Authors: Wolfgang Jochum, Ewald Peiszer API Documentation Version... 3 Overview... 3
More informationModule 4: Advanced Development
Module 4: Advanced Development Objective Create and build a Standard Make Project from source files in CVS Contents Version control Standard Make Projects Fortran Refactoring Searching LACSI 2006 Version
More informationXDK LIVE A NEW PROGRAMMING LANGUAGE FOR THE EMBEDDED IOT. Christian Weichel Bosch Connected Devices and Solutions GmbH
XDK LIVE A NEW PROGRAMMING LANGUAGE FOR THE EMBEDDED IOT Christian Weichel Bosch Connected Devices and Solutions GmbH Cumulated Effort Eclipse PAX Scaling over quantity Breadboard Custom PCBA DFM Industrialization
More informationFMCAD 2011 (Austin, Texas) Jonathan Kotker, Dorsa Sadigh, Sanjit Seshia University of California, Berkeley
FMCAD 2011 (Austin, Texas) Jonathan Kotker, Dorsa Sadigh, Sanjit Seshia University of California, Berkeley 1 Cyber-Physical = Computation + Physical Processes Quantitative analysis of programs is crucial:
More informationPart III. Issues in Search Computing
Part III Issues in Search Computing Introduction to Part III: Search Computing in a Nutshell Prior to delving into chapters discussing search computing in greater detail, we give a bird s eye view of its
More informationApache Wink Developer Guide. Draft Version. (This document is still under construction)
Apache Wink Developer Guide Software Version: 1.0 Draft Version (This document is still under construction) Document Release Date: [August 2009] Software Release Date: [August 2009] Apache Wink Developer
More informationThis Readme describes the NetIQ Access Manager 3.1 SP5 release.
NetIQ Access Manager 3.1 SP5 Readme January 2013 This Readme describes the NetIQ Access Manager 3.1 SP5 release. Section 1, What s New, on page 1 Section 2, Upgrading or Migrating to Access Manager 3.1
More informationWhat Do We Mean by the Term Personal Identifiable Information?
PRIVACY POLICY Privacy Policy of Level 3 Communications, Inc. and its group companies (referred to throughout as Level 3, we or us ). We are committed to protecting the privacy of individuals. This Privacy
More informationDistributed Hybrid MDM, aka Virtual MDM Optional Add-on, for WhamTech SmartData Fabric
Distributed Hybrid MDM, aka Virtual MDM Optional Add-on, for WhamTech SmartData Fabric Revision 2.1 Page 1 of 17 www.whamtech.com (972) 991-5700 info@whamtech.com August 2018 Contents Introduction... 3
More informationGenerating String Attack Inputs Using Constrained Symbolic Execution. presented by Kinga Dobolyi
Generating String Attack Inputs Using Constrained Symbolic Execution presented by Kinga Dobolyi What is a String Attack? Web applications are 3 tiered Vulnerabilities in the application layer Buffer overruns,
More informationModel Driven Engineering in High Tech Industry
Model Driven Engineering in High Tech Industry Mark van den Brand LUCAS-dagen, Lund, October 2016 Short introduction of myself 1992-1997: Assistant professor at UvA (NL) 1997-2005: Senior researcher at
More informationThe Integrated Smart & Security Platform Powered the Developing of IOT
The Integrated Smart & Security Platform Powered the Developing of IOT We Are Entering A New Era- 50million connections Smart-Healthcare Smart-Wearable VR/AR Intelligent Transportation Eco-Agriculture
More informationFeatures of the New MySignals Cloud
Features of the New MySignals Cloud Libelium s IoT ehealth Platform As part of our continuous improvement process in Libelium, we are pleased to announce the new MySignals Cloud 1.0 version, which will
More informationTechnical Brief Distributed Trusted Computing
Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,
More informationProvenance-aware Secure Networks
Provenance-aware Secure Networks Wenchao Zhou Eric Cronin Boon Thau Loo University of Pennsylvania Motivation Network accountability Real-time monitoring and anomaly detection Identifying and tracing malicious
More information@2010 Badri Computer Architecture Assembly II. Virtual Memory. Topics (Chapter 9) Motivations for VM Address translation
Virtual Memory Topics (Chapter 9) Motivations for VM Address translation 1 Motivations for Virtual Memory Use Physical DRAM as a Cache for the Disk Address space of a process can exceed physical memory
More informationABAP Platform 7.4/7.5 Overview. Technology Core Platform Product Management, SAP SE March 22 th, 2017
ABAP Platform 7.4/7.5 Overview Technology Core Platform Product Management, SAP SE March 22 th, 2017 Disclaimer This presentation outlines our general product direction and should not be relied on in making
More informationIntroduction to Machine-Independent Optimizations - 6
Introduction to Machine-Independent Optimizations - 6 Machine-Independent Optimization Algorithms Department of Computer Science and Automation Indian Institute of Science Bangalore 560 012 NPTEL Course
More informationCSE 307: Principles of Programming Languages
CSE 307: Principles of Programming Languages Advanced Topics R. Sekar Topics 1 / 14 1. 2 / 14 Section 1 3 / 14 Semantics of Programs Syntax defines what programs are valid. Semantics defines what the valid
More informationCisco EnergyWise Optimize and Cost Saving. Traditional IT Power Management
Cisco EnergyWise Introduction In response to energy costs, environmental concerns, and government directives, there is an increased need for sustainable and green business IT operations. Methods to measure
More informationCompiler Construction
Compiler Construction Thomas Noll Software Modeling and Verification Group RWTH Aachen University https://moves.rwth-aachen.de/teaching/ss-16/cc/ Seminar Analysis and Verification of Pointer Programs (WS
More informationApache Beam. Modèle de programmation unifié pour Big Data
Apache Beam Modèle de programmation unifié pour Big Data Who am I? Jean-Baptiste Onofre @jbonofre http://blog.nanthrax.net Member of the Apache Software Foundation
More information