Securing the Life Cycle of Things in the Internet of Things using Thing Registries

Size: px
Start display at page:

Download "Securing the Life Cycle of Things in the Internet of Things using Thing Registries"

Transcription

1 Securing the Life Cycle of Things in the Internet of Things using Thing Registries Architecture overview Peter Waher Clayster Laboratorios Chile S.A, Blanco 1623, of. 1402, Valparaíso, Chile Abstract. This paper proposes an architecture and describes an implemented solution that allows secure installation, self-configuration and discovery of massive amounts of Things on the Internet (Internet of Things), aiming for zero-configuration where possible and at the same time minimizing risks of malicious users hijacking devices, using existing open and standardized protocols and extensions. It also aims for a simple solution that is simple to implement, both by developers and network architects. Keywords: Internet of Things, Security, Installation, Configuration, Discovery. 1 Introduction Most ideas and solutions proposed for the Internet of Things concern mockups, prototypes of devices or proof of concept system designs, configured manually to provide conceptual ideas of what the Internet of Things could become. The focus is often placed on message transport and service functionality, and seldom on security and mass-distribution of a finished product that can be sold off the shelf. This paper proposes an architecture that would allow a manufacturer to manufacture Things, that can be sold at retail stores, Things that detect network topology and auto-configure themselves accordingly once installed, and then use concepts presented herein to in a secure manner allow its true owner to connect to the Thing and take control of it, while at the same time minimizing the risk of malicious users being able to access the Thing and hijack it. All this is then implemented in a solution that allows this to be performed over the public Internet using only existing, proven, open and standardized protocols and extensions for maximum interoperability and scalability, and where components would be interchangeable. 2 Problem Description The problem being solved by the proposal is the following: In a public network (the Internet), how do you safely connect Things to their owners, if knowledge about how to reach them is not available to either one of them? Here, safely means without Securing the Life Cycle of Things in the Internet of Things using Thing Registries, p. 1, Clayster Laboratorios Chile S.A 2014

2 risk (or minimizing the risk) of third parties hijacking Things by pretending to be their lawful owners. Furthermore, the solution must not use proprietary, but open, methods, allowing any manufacturer to share the same infrastructure if desired and making sure end-users (or interested parties) can validate that used communication patterns are secure. At the same time, the solution must be simple to implement both by developers and network architects, and incur as little costs as possible in the production environment. The solution aims for providing a solution for mass-production of massive amounts of inexpensive products, in a secure manner and requiring a minimum of manual intervention. 3 Conceptual Architecture A Thing bought off the shelf in a retail store, is assumed to have no pre-knowledge of what network topology it will be installed in, or who its owner will be. All it knows is meta-data about itself, chosen by the manufacturer, and methods once installed to connect to the network and necessary infrastructure components, like message brokers, and to create a user identity (or Thing identity) to be able to participate in network communication securely. Once a connection to the network has been made and an identity created, it registers itself with a Thing Registry by sending its metainformation to the registry, using the newly created identity on the network. The Thing Registry maintains a private list of meta-data and Thing identity pairs. The owner, once having installed the Thing physically, resulting in its registration in the Thing Registry, then claims ownership of the Thing, by sending the same metadata to the Thing Registry. The Thing Registry in turn, once having matched a claim from a supposed owner with the corresponding registration from the Thing, informs the owner the identity of the Thing, while at the same time informing the Thing the identity of the owner. The owner can also choose to allow the Thing to become public, meaning the existence of the Thing, its identity and meta-data becomes publicly available and searchable. The owner can also choose to keep the Thing private, meaning the Thing Registry removes the corresponding entry from its database since it has now fulfilled its purpose of matching the Thing identity with its Owner identity by using shared knowledge about the Thing. The above architecture presupposes three Things: First, that having knowledge of the meta-data about the Thing implies ownership of the Thing. Secondly, that there is a method whereby this meta-data is easily transferred without errors from the Thing to the Owner. Thirdly, that the meta-data cannot be easily deduced or guessed by third parties trying to get access to the Thing. The implemented solution described in the following sections demonstrates how this can be solved in a simple way.

3 4 Implemented Solution 4.1 Choice of Protocol For our solution, we ve chosen XMPP [1] [2] [3] as the transport protocol for communication in Internet of Things. Apart from being an open, flexible and extensible protocol [4] it also supports most commonly used communication patterns necessary for Internet of Things, such as request/response, asynchronous messaging and publish/subscribe patterns. It can be used in resource constrained devices [5] [6], support resource constrained networks [7] and work is being done to formalize open interoperable extensions for the Internet of Things [8] [9], protocol bridging [10] and provisioning of services in IoT networks [11]. Furthermore, extensions exist allowing the extension of Semantic Web technologies onto XMPP networks [12] [13]. Important for this solution is the use of Message Brokers to authenticate user identities in the network, and also the support for In-band registration of new accounts available in XMPP [14]. Even though the original method of in-band registration is not safe for use in public servers by Things, there is an extension available that corrects these flaws so that in-band registration of new accounts can be made by both humans and machines in open environments is a secure way [15]. Other available transport protocols, such as MQTT, AMQP, etc., do not support inband registration of new accounts. New accounts have to be either created either outof-band in a proprietary fashion or manually by an operator. Alternatively, the broker has to be configured in a way that allows everybody to connect to the network and pretend to be anybody they like [16]. Other methods, such as HTTP and CoAP, do not use message brokers to authenticate Thing identities, which make trust a problem. To minimize the risk of Things being hijacked, you need a transport protocol that helps Things make sure who the senders of packets are. Placing the burden of authenticating each entity wanting to communicate with the Thing on the Thing itself, places an unreasonable burden on the Thing, resulting in situations where manufacturers will simply ignore it, or implementations to be faulty, wanting or proprietary, resulting in an overall network solution that would be unsecure if anybody would be given access to the network or if the solution is comprised of products and services from different manufacturers. Since we aim at including resource constrained Things, and having the entire lifecycle of the Things supported by one protocol, XMPP becomes the best possible candidate. The message structure used is available as an open extension to XMPP [17]. 4.2 Discovering Network Topology After installation of a Thing, when starting it for the first time, it needs to detect critical network components in order to be able to register itself. The first step is to connect to the Internet. This is standard procedure and will not be discussed in this document. The second step is to find an XMPP Server in which the Thing can register an account. Apart from using a preconfigured XMPP Server (or list of XMPP Servers),

4 [17] lists three dynamic options: First, by using DHCP options to find the server. Another option is by using Multicast DNS (mdns) and DNS Service Discovery (DNS-SD). Finally, SSDP and UPnP can also be used 1. Once the XMPP Server is found, an account has to be registered with the server. This is done using in-band registration [14] and form signatures [15]. A Form signature is a method whereby the account creation form is signed using external credentials. These credentials correspond to a corresponding account on the XMPP server or corresponding directory, allowing the creation of a certain number of XMPP accounts (JIDs). In this way, it is possible for operators, network architects or manufacturers to maintain control of how many accounts have been created and by whom. It also creates a logical business model between infrastructure operators and device manufacturers. The method also makes in-band registration safe to use on public networks, since robots without valid credentials will not be allowed to create accounts automatically. 4.3 Registering the Thing in the Thing Registry The last step in the installation phase, is to find the Thing Registry and for the Thing to register itself there. The most common method listen in [17] concerns searching through server components registered with the XMPP server to which the Thing is connected. The Thing Registry can be integrated with the XMPP Server as a server component [18], allowing scalable access to network communication without the need to be an integral component of the server itself, and without the requirement to be a friend of each Thing communicating with it. Once the Thing Registry has been found, the Thing registers itself sending its meta-data to the Thing Registry. Example: <iq type='set' from='thing@clayster.com/imc' to='discovery.clayster.com' id='1'> <register xmlns='urn:xmpp:iot:discovery'> <str name='sn' value=' '/> <str name='man' value=' <str name='model' value='imc'/> <num name='v' value='1.2'/> <str name='key' value=' '/> </register> </iq> 1 Work is being performed in the UPnP Forum to define an UPnP service interface for XMPP servers.

5 4.4 Transfer of Meta-Data The key to making installation secure, is to make the meta-data reported by the Thing difficult (in practice impossible) to guess, while at the same time simple to implement and simple to transfer from the Thing to the Owner, so that the Owner can report the same meta-data. As described in [17], Meta-Data consists of a collection of string and numerical tags (name & value pairs). These tags can be easily encoded into a string, as is shown in the following example: IoTDisco;SN: ;MAN: MODEL:IMC;#V:1.2;KEY: This string can then be encoded into a QR-code, for instance by using an open API, like the Google Chart API. Example: chl=iotdisco;sn: ;man: MODEL:IMC;%23V:1.2;KEY: This URL returns a QR-code, as follows: It is assumed that, if the owner has access to the Thing and its package it is also its owner. This means, that the QR-code above, containing the meta-information can be displayed on a sticker on the box of the Thing for instance, or on the display of the Thing itself, if it has a display. This QR-code is then read using a smartphone app in the hands of the owner and sent to the Thing Registry, which matches the claim with any meta-data sent from Things earlier. If a match is found, both the owner and the Thing are informed of this, together with information of each other s identities. Example of an owner claiming a Thing: <iq type='set' from='owner@clayster.com/phone' to='discovery.clayster.com' id='4'> <mine xmlns='urn:xmpp:iot:discovery' public='false'> <str name='sn' value=' '/> <str name='man' value=' <str name='model' value='imc'/> <num name='v' value='1.2'/> <str name='key' value=' '/> </mine> </iq>

6 More information on how owner and Thing get the other s communication identities can be found in [17]. 4.5 Public Things Owners can decide which Things it wants to keep private, and which Things can become public. Public Things are searchable, on all meta-data provided (except the KEY tag), including location. This makes the Thing Registry work as a bulletin board for Things, and can be used by services to find publicly available Things to interact with. Public Things can update their meta-data during their entire life cycle, to make sure meta-data is always up-to-date. Here, public depends on the location of the Thing Registry. A local Thing Registry on a plug computer in your home (or on a gateway/firewall/router) would work as a bulletin board for Things in your home, for instance. For more information about search features and operators, see [17]. 4.6 Existing Thing Registry A Thing Registry that can be used for development and testing is available at: discovery.clayster.cl (XMPP Server at clayster.cl) The Thing Registry also hosts a provisioning server, where claimed Things can be managed according to rules defined in [11]. This allows users to control who can access Things and what they can do with the Things, all through a web interface. Furthermore, the user can read Things in accordance with [8] and configure them in accordance with [9]. Bridging between protocols is also supported in accordance with [10]. The URL of this web interface is: Both the Thing Registry as well as the Provisioning Server can be duplicated and hosted on small plug computers for local use, on PCs, servers or be clustered in the cloud. It is important to note that Thing Registries and Provisioning Servers are two different inventions that can either coexist or work separately. 5 Novel features The proposed architecture is the only IoT architecture publicly available, known to the author, that takes the entire Thing Life Cycle into account, including production, installation, configuration, account creation, connection to owner, runtime, ownership change, decommissioning and deregistration, and that only uses publicly available standardized and openly extended protocols that can be easily implemented by both developers, IT architects and production environments, aiming for zero-configuration

7 where possible, without compromising security. At the same time, it creates a logical business model for Operators in the Internet of Things. Through this model architecture Operators can create a scalable Internet of Things infrastructure that manufacturers and end-users can use that enables the vision of Internet of Things. 6 About the author Clayster is a company with origin in Scandinavia, founded by Rikard Strid and Peter Waher. Clayster is dedicated to the promotion of Internet of Things technology and development of Internet of Things applications. Clayster also provides an IoT platform for rapid application development. Founder Rikard Strid currently lives in New York, USA, and apart from promoting Internet of Things technology, is also a Cisco Champion. Co-founder, and author of this proposal, Peter Waher currently lives and works in Chile where he is CEO of Clayster Laboratorios Chile S.A., a subsidiary to Clayster that provides development expertise to partner companies and promotes Internet of Things technology to research institutions. Originally a mathematician, commercial pilot and computer games developer, he has worked twenty years with computer and device communication, including low-level development in assembler for resource constrained devices to high-level system design and architecture. He s currently participant in various standardization efforts within IEEE, IEC, ISO and XSF, working on standards for the Internet of Things. His work with Smart Applications for the Internet of Things and the development of the IP-TV application Energy Saving through Smart Applications won the Urban Living Labs global showcase award in category Cultural and Societal Participation and Collaboration Tools. Rikard Strid can be found on LinkedIn: Peter Waher can be found on LinkedIn: References [1] P. Saint-André, "RFC 6120: Extensible Messaging and Presence Protocol (XMPP): Core," [Online]. Available: [2] P. Saint-André, "RFC 6121: Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence," [Online]. Available: [3] P. Saint-André, "RFC 6122: Extensible Messaging and Presence Protocol (XMPP): Address Format," [Online]. Available: [4] xmpp.org, "XMPP Technology Overview," [Online]. Available: [Accessed ]. [5] R. Klauck and M. Kirsche, "Chatty Things Making the Internet of Things

8 Readily Usable for the Masses with XMPP," [Online]. Available: cottbus.de/content/unrestricted/staff/mk/publications/collaboratecom_2012- Klauck_Kirsche.pdf. [6] M. Krische and R. Klauck, "Unify to Bridge Gaps: Bringing XMPP into the Internet of Things," [Online]. Available: cottbus.de/content/unrestricted/staff/mk/publications/percom_2012-wip- Kirsche_Klauck.pdf. [7] P. Waher and Y. DOI, "XEP-0322: Efficient XML Interchange (EXI) Format," [Online]. Available: [8] P. Waher, "XEP-0323: Internet of Things Sensor Data," [Online]. Available: [9] P. Waher, "XEP-0325: Internet of Things - Control," [Online]. Available: [10] P. Waher, "XEP-0326: Internet of Things - Concentrators," [Online]. Available: [11] P. Waher, "XEP-0324: Internet of Things - Provisioning," [Online]. Available: [12] P. Waher, "XEP-0332: HTTP over XMPP transport," [Online]. Available: [13] P. Waher, "Extending the Semantic Web to Peer-to-Peer-Like Sensor Networks Based on XMPP". [14] P. Saint-Andre, "XEP-0077: In-Band Registration," [Online]. Available: [15] P. Waher, "XEP-0348: Signing Forms," [Online]. Available: [16] P. Waher, "Bridging MQTT & XMPP Internet of Things networks," [17] P. Waher and R. Klauck, "XEP-0347: Internet of Things - Discovery," [Online]. Available: [Accessed ]. [18] P. Saint-Andre, "XEP-0114: Jabber Component Protocol," [Online]. Available:

Smart City, Internet of Things, Security and Privacy

Smart City, Internet of Things, Security and Privacy Smart City, Internet of Things, Security and Privacy Peter Waher Abstract. This course contains a series of lectures and practical laboratory assignments spanning four days that provide the participants

More information

Internet of things (IoT)

Internet of things (IoT) Internet of things (IoT) Duration 3 days Courseware Reference Material Learning Internet of Things Definition for Internet of Things Competing definitions Direct consequences Introduction to IoT Projects

More information

Challenges. Distribution. Discovery. Security. Usability. Governance. Unreliable messaging. Physical objects. Dealing with places.

Challenges. Distribution. Discovery. Security. Usability. Governance. Unreliable messaging. Physical objects. Dealing with places. Unreliable messaging Distribution Discovery Physical objects Asynchrony Dealing with places Delay tolerance Challenges Power source? Data services Security Identifying Integrity Autonomy Usability Provenance

More information

Ontology Summit 2015 Internet of Things

Ontology Summit 2015 Internet of Things Ontology Summit 2015 Internet of Things ISO/IEC/IEEE P21451-1-4 XMPP Interface for Smart Transducers and the 1 st International Semantic Web 3.0 Standard for the Internet of Things William J. Miller Chairman

More information

XEP-0357: Push Notifications

XEP-0357: Push Notifications XEP-0357: Push Notifications Kevin Smith mailto:kevin@kismith.co.uk xmpp:kevin@doomsong.co.uk Lance Stout mailto:lance@andyet.com xmpp:lance@lance.im 2017-08-24 Version 0.3 Status Type Short Name Experimental

More information

OPC UA A NEW COMMUNICATION FRAMEWORK FOR INDUSTRY 4.0 GERHARD HELFRICH, SOFTWARE DEVELOPER, STEMMER IMAGING

OPC UA A NEW COMMUNICATION FRAMEWORK FOR INDUSTRY 4.0 GERHARD HELFRICH, SOFTWARE DEVELOPER, STEMMER IMAGING OPC UA A NEW COMMUNICATION FRAMEWORK FOR INDUSTRY 4.0 GERHARD HELFRICH, SOFTWARE DEVELOPER, STEMMER IMAGING MOTIVATION Cloud SEITE 2 MOTIVATION Cloud EtherCat ProfiNet Fixed partner in level above Many

More information

OPC UA A NEW COMMUNICATION FRAMEWORK FOR INDUSTRY 4.0 GERHARD HELFRICH, SOFTWARE DEVELOPER, STEMMER IMAGING

OPC UA A NEW COMMUNICATION FRAMEWORK FOR INDUSTRY 4.0 GERHARD HELFRICH, SOFTWARE DEVELOPER, STEMMER IMAGING OPC UA A NEW COMMUNICATION FRAMEWORK FOR INDUSTRY 4.0 GERHARD HELFRICH, SOFTWARE DEVELOPER, STEMMER IMAGING MOTIVATION Cloud SEITE 2 MOTIVATION Cloud EtherCat ProfiNet Fixed partner in level above Many

More information

Technical Overview. Version March 2018 Author: Vittorio Bertola

Technical Overview. Version March 2018 Author: Vittorio Bertola Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which

More information

White Paper. EVERY THING CONNECTED How Web Object Technology Is Putting Every Physical Thing On The Web

White Paper. EVERY THING CONNECTED How Web Object Technology Is Putting Every Physical Thing On The Web White Paper EVERY THING CONNECTED Is Putting Every Physical Thing Every Thing Connected The Internet of Things a term first used by technology visionaries at the AUTO-ID Labs at MIT in the 90s 1 has received

More information

Request for Comments: 5437 Category: Standards Track Isode Limited January 2009

Request for Comments: 5437 Category: Standards Track Isode Limited January 2009 Network Working Group Request for Comments: 5437 Category: Standards Track P. Saint-Andre Cisco A. Melnikov Isode Limited January 2009 Status of This Memo Sieve Notification Mechanism: Extensible Messaging

More information

XEP-0129: WebDAV File Transfers

XEP-0129: WebDAV File Transfers XEP-0129: WebDAV File Transfers Peter Saint-Andre mailto:xsf@stpeter.im xmpp:peter@jabber.org http://stpeter.im/ Dave Smith mailto:dizzyd@jabber.org xmpp:dizzyd@jabber.org 2007-04-19 Version 0.3 Status

More information

Web of Things: W3C Vision & Roadmap on IoT Standardizations

Web of Things: W3C Vision & Roadmap on IoT Standardizations ASIA-PACIFIC TELECOMMUNITY The 28 th APT Standardization Program Forum (ASTAP-28) 6-10 March 2017, Bangkok, Thailand Web of Things: W3C Vision & Roadmap on IoT Standardizations W3C/Beihang University China

More information

Intended status: Informational. B. Wyman October 2, 2007

Intended status: Informational. B. Wyman October 2, 2007 Network Working Group Internet-Draft Intended status: Informational Expires: April 4, 2008 P. Saint-Andre XMPP Standards Foundation J. Hildebrand Jabber, Inc. B. Wyman October 2, 2007 Transporting Atom

More information

Cisco Plug and Play Feature Guide Cisco Services. Cisco Plug and Play Feature Guide Cisco and/or its affiliates.

Cisco Plug and Play Feature Guide Cisco Services. Cisco Plug and Play Feature Guide Cisco and/or its affiliates. Cisco Services TABLE OF CONTENTS Configuring Cisco Plug and Play... 14 Contents Introduction... 3 Cisco Plug and Play Components... 3 Plug-n-Play Agent... 3 Key Benefits... 4 Plug and Play Server... 4

More information

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo Exam : 642-565 Title : Security Solutions for Systems Engineers(SSSE) Version : Demo 1. SomeCompany, Ltd. wants to implement the the PCI Data Security Standard to protect sensitive cardholder information.

More information

An Introduction to the Intelligent IoT Integrator (I3)

An Introduction to the Intelligent IoT Integrator (I3) An Introduction to the Intelligent IoT Integrator (I3) Bhaskar Krishnamachari Professor of Electrical Engineering & Computer Science Director, Center for Cyber-Physical Systems and the Internet of Things

More information

XEP-0033: Extended Stanza Addressing

XEP-0033: Extended Stanza Addressing XEP-0033: Extended Stanza Addressing Joe Hildebrand mailto:jhildebr@cisco.com xmpp:hildjj@jabber.org Peter Saint-Andre mailto:xsf@stpeter.im xmpp:peter@jabber.org http://stpeter.im/ 2017-01-11 Version

More information

Using the tpm with iot

Using the tpm with iot Using the tpm with iot David Grawrock Security Architect, Senior Principle Engineer Agenda History Lesson What Does IoT Need How Does The Fulfill Needs Usage IoT Security 2 History Worked on the from 1999

More information

Kepware Whitepaper. IIoT Protocols to Watch. Aron Semle, R&D Lead. Introduction

Kepware Whitepaper. IIoT Protocols to Watch. Aron Semle, R&D Lead. Introduction Kepware Whitepaper IIoT Protocols to Watch Aron Semle, R&D Lead Introduction IoT is alphabet soup. IIoT, IoE, HTTP, REST, JSON, MQTT, OPC UA, DDS, and the list goes on. Conceptually, we ve discussed IoT

More information

WSN & IoT System Interoperability

WSN & IoT System Interoperability WSN & IoT System Interoperability Jerker Delsing Professor LTU IEC WSN IoT 140225-26 NIST INTERNATIONAL ELECTROTECHNICAL COMMISSION Intelligent industrial processes - ProcessIT Prof Jerker Delsing Arrowhead

More information

Web Services Security. Dr. Ingo Melzer, Prof. Mario Jeckle

Web Services Security. Dr. Ingo Melzer, Prof. Mario Jeckle Web Services Security Dr. Ingo Melzer, Prof. Mario Jeckle What is a Web Service? Infrastructure Web Service I. Melzer -- Web Services Security 2 What is a Web Service? Directory Description UDDI/WSIL WSDL

More information

Distributed Systems 26. Mobile Ad Hoc Mesh Networks

Distributed Systems 26. Mobile Ad Hoc Mesh Networks Distributed Systems 26. Mobile Ad Hoc Mesh Networks Paul Krzyzanowski pxk@cs.rutgers.edu 12/16/2011 1 Mesh Networks Mobile Ad-hoc networks, sensor networks, Decentralized networking No need for routers

More information

Resource Discovery in IoT: Current Trends, Gap Analysis and Future Standardization Aspects

Resource Discovery in IoT: Current Trends, Gap Analysis and Future Standardization Aspects Resource Discovery in IoT: Current Trends, Gap Analysis and Future Standardization Aspects Soumya Kanti Datta Research Engineer, EURECOM TF-DI Coordinator in W3C WoT IG Email: dattas@eurecom.fr Roadmap

More information

XEP-0206: XMPP Over BOSH

XEP-0206: XMPP Over BOSH 1 di 15 31/01/2011 19:39 XEP-0206: XMPP Over BOSH Abstract: Authors: Copyright: Status: Type: This specification defines how the Bidirectional-streams Over Synchronous HTTP (BOSH) technology can be used

More information

XEP-0133: Service Administration

XEP-0133: Service Administration XEP-0133: Service Administration Peter Saint-Andre mailto:xsf@stpeter.im xmpp:peter@jabber.org http://stpeter.im/ 2017-07-15 Version 1.2 Status Type Short Name Active Informational admin This document

More information

Internet of Things: An Introduction

Internet of Things: An Introduction Internet of Things: An Introduction IoT Overview and Architecture IoT Communication Protocols Acknowledgements 1.1 What is IoT? Internet of Things (IoT) comprises things that have unique identities and

More information

Khartoum, Sudan Dec 2017

Khartoum, Sudan Dec 2017 ITU-SUDACAD Regional Forum on Internet of Things for Development of Smart and Sustainable Cities Khartoum, Sudan 13-14 Dec 2017 Standardized architectures and important standards defining organizations

More information

On the Creation & Discovery of Topics in Distributed Publish/Subscribe systems

On the Creation & Discovery of Topics in Distributed Publish/Subscribe systems On the Creation & Discovery of Topics in Distributed Publish/Subscribe systems Shrideep Pallickara, Geoffrey Fox & Harshawardhan Gadgil Community Grids Lab, Indiana University 1 Messaging Systems Messaging

More information

Vortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Vortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Vortex Whitepaper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems www.adlinktech.com 2017 Table of Contents 1. Introduction........ P 3 2. Iot and

More information

Ontology Summit F2F Meeting ISO/IEC/IEEE P

Ontology Summit F2F Meeting ISO/IEC/IEEE P Ontology Summit F2F Meeting ISO/IEC/IEEE P21451-1-4 1 st International Semantic Web 3.0 Standard for the Internet of Things (IoT) William J. Miller Chairman 1 Internet of Things (IoT) http://www.sensei-iot.org

More information

Embedded Web Services

Embedded Web Services Nov 1 st, 2011 Embedded Web Services Zach Shelby, Chief Nerd 1 Course Overview Powering M2M with the Internet of Things Industry examples What are Web Services? CoRE - Constrained RESTful Environments

More information

A Language-based Approach to Interoperability of IoT Platforms

A Language-based Approach to Interoperability of IoT Platforms COLLECTOR CoAP TEMPERATURE SENSOR HTTP/FTP/SMTP UDP Set Temperature 70 ºF Get Temperature 68 ºF END TO END PATTERN PUBLISH/SUBSCRIBE PATTERN HVAC COLLECTOR TEMPERATURE SENSOR HVAC TCP/UDP TEMPERATURE SENSOR

More information

Cisco Collaborative Knowledge

Cisco Collaborative Knowledge Cisco Collaborative Knowledge Product Overview. Your workforce needs knowledge, speed and flexibility to solve real-world business challenges in today s fast moving digital economy. Cisco Collaborative

More information

XEP-0135: File Sharing

XEP-0135: File Sharing XEP-0135: File Sharing Peter Saint-Andre mailto:xsf@stpeter.im xmpp:peter@jabber.org http://stpeter.im/ 2004-06-04 Version 0.1 Status Type Short Name Deferred Standards Track files This document specifies

More information

XEP-0324: Internet of Things - Provisioning

XEP-0324: Internet of Things - Provisioning XEP-0324: Internet of Things - Provisioning Peter Waher mailto:peterwaher@hotmail.com xmpp:peter.waher@jabber.org http://www.linkedin.com/in/peterwaher 2017-05-20 Version 0.5 Status Type Short Name Retracted

More information

(9A05803) WEB SERVICES (ELECTIVE - III)

(9A05803) WEB SERVICES (ELECTIVE - III) 1 UNIT III (9A05803) WEB SERVICES (ELECTIVE - III) Web services Architecture: web services architecture and its characteristics, core building blocks of web services, standards and technologies available

More information

ONEM2M INDUSTRY DAY ALAN SOLOWAY, QUALCOMM. 12 July 2017

ONEM2M INDUSTRY DAY ALAN SOLOWAY, QUALCOMM. 12 July 2017 ONEM2M INDUSTRY DAY ALAN SOLOWAY, QUALCOMM 12 July 2017 Time Isolated Aggregated Massively Connected Cloud / Data Centres Rich Devices / Gateways Constrained Devices The architecture will need to achieve

More information

XEP-0114: Jabber Component Protocol

XEP-0114: Jabber Component Protocol XEP-0114: Jabber Component Protocol Peter Saint-Andre mailto:xsf@stpeter.im xmpp:peter@jabber.org http://stpeter.im/ 2012-01-25 Version 1.6 Status Type Short Name Active Historical component This specification

More information

Service Discovery and Remote Services with the Eclipse Communication Framework

Service Discovery and Remote Services with the Eclipse Communication Framework Service Discovery and Remote Services with the Eclipse Communication Framework Jan S. Rellermeyer, ETH Zürich Markus Kuppe, Versant GmbH Scott Lewis, Code 9 2008 by the ECF team; made available under the

More information

A Dynamic Distributed Fedrated Approach for the Internet of Things

A Dynamic Distributed Fedrated Approach for the Internet of Things A Dynamic Distributed Fedrated Approach for the Internet of Things February 12, 2011 1 University of Alcalá - UAH Thales-TAI A Dynamic Distributed Fedrated Approach for the Internet of Things Diego Casado

More information

IEEE Issues in Microgrids Evolution towards a distributed energy future William J. Miller, President, MaCT USA

IEEE Issues in Microgrids Evolution towards a distributed energy future William J. Miller, President, MaCT USA Advanced Energy 2011 - October 12-13, 2011 IEEE Issues in Microgrids Evolution towards a distributed energy future William J. Miller, President, MaCT USA November 16, 2011 Slide 1 November 16, 2011 Slide

More information

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M course (8 ECTS) II Term Academic Year 2016/2017 08 Application Domains

More information

XEP-0363: HTTP File Upload

XEP-0363: HTTP File Upload XEP-0363: HTTP File Upload Daniel Gultsch mailto:daniel@gultsch.de xmpp:daniel@gultsch.de 2018-04-21 Version 0.6.0 Status Type Short Name Proposed Standards Track NOT_YET_ASSIGNED This specification defines

More information

Introduction to IoT. Jianwei Liu Clemson University

Introduction to IoT. Jianwei Liu Clemson University Introduction to IoT Jianwei Liu Clemson University What are IoT & M2M The Internet of Things (IoT), also called Internet of Everything, is the network of physical objects or "things" embedded with electronics,

More information

Cisco Wide Area Application Services and Cisco Nexus Family Switches: Enable the Intelligent Data Center

Cisco Wide Area Application Services and Cisco Nexus Family Switches: Enable the Intelligent Data Center Cisco Wide Area Application Services and Cisco Nexus Family Switches: Enable the Intelligent Data Center What You Will Learn IT departments are facing increasing pressure to accommodate numerous changing

More information

Publish/Subscribe Communication for Crowd-sourcing Based Smart City Applications

Publish/Subscribe Communication for Crowd-sourcing Based Smart City Applications Publish/Subscribe Communication for Crowd-sourcing Based Smart City Applications Róbert L. Szabó* and Károly Farkas* *Inter-University Centre for Telecommunications and Informatics, Debrecen, Hungary HSNLab,

More information

The Open Application Platform for Secure Elements.

The Open Application Platform for Secure Elements. The Open Application Platform for Secure Elements. Java Card enables secure elements, such as smart cards and other tamper-resistant security chips, to host applications, called applets, which employ Java

More information

ATC An OSGI-based Semantic Information Broker for Smart Environments. Paolo Azzoni Research Project Manager

ATC An OSGI-based Semantic Information Broker for Smart Environments. Paolo Azzoni Research Project Manager An OSGI-based Semantic Information Broker for Smart Environments ATC 2011 ARTEMIS JU SP3 / 100017: Smart Objects For Intelligent Applications Paolo Azzoni Research Project Manager Summary Introduction

More information

Whitepaper. IoT Protocols. PAASMER Support for Protocols. Website:

Whitepaper. IoT Protocols. PAASMER Support for Protocols. Website: Whitepaper IoT Protocols PAASMER Support for Protocols Website: www.mobodexter.com www.paasmer.co 1 Table of Contents 1. Introduction 3 2. IoT Protocols 4 3. Connectivity Protocols 5 4. Application Layer

More information

Tutorial (30-Aug-2013, 13:30-2:30pm) XMPP, Big Data, and the Smart Grid

Tutorial (30-Aug-2013, 13:30-2:30pm) XMPP, Big Data, and the Smart Grid IEEE International Conference on Smart Grid Engineering (SEGE 13) 28-30 August, 2013 UOIT, Oshawa, ON (Canada) Sponsored by IEEE Toronto (NPSS & PES) and MITACS Tutorial (30-Aug-2013, 13:30-2:30pm) XMPP,

More information

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY. ITU-T X.660 Guidelines for using object identifiers for the Internet of things

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY. ITU-T X.660 Guidelines for using object identifiers for the Internet of things I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Series X Supplement 31 (09/2017) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS

More information

Cisco Unified Presence 8.0

Cisco Unified Presence 8.0 Cisco Unified Presence 8.0 Cisco Unified Communications Solutions unify voice, video, data, and mobile applications on fixed and mobile networks, enabling easy collaboration every time from any workspace.

More information

Cloud Scale IoT Messaging

Cloud Scale IoT Messaging Cloud Scale IoT Messaging EclipseCon France 2018 Dejan Bosanac, Red Hat Jens Reimann, Red Hat IoT : communication patterns Cloud Telemetry 2 Inquiries Commands Notifications optimized for throughput scale-out

More information

Implementing the Army Net Centric Data Strategy in a Service Oriented Environment

Implementing the Army Net Centric Data Strategy in a Service Oriented Environment Implementing the Army Net Centric Strategy in a Service Oriented Environment Michelle Dirner Army Net Centric Strategy (ANCDS) Center of Excellence (CoE) Service Team Lead RDECOM CERDEC SED in support

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications

More information

Overview SENTINET 3.1

Overview SENTINET 3.1 Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7

More information

INTERNET OF THINGS (IoT) DESIGN CONSIDERATIONS FOR EMBEDDED CONNECTED DEVICES ANDREW CAPLES SENIOR PRODUCT MARKETING MANAGER, NUCLEUS

INTERNET OF THINGS (IoT) DESIGN CONSIDERATIONS FOR EMBEDDED CONNECTED DEVICES ANDREW CAPLES SENIOR PRODUCT MARKETING MANAGER, NUCLEUS INTERNET OF THINGS (IoT) DESIGN CONSIDERATIONS FOR EMBEDDED CONNECTED DEVICES ANDREW CAPLES SENIOR PRODUCT MARKETING MANAGER, NUCLEUS E M B E D D E D S O F T W A R E W H I T E P A P E R w w w. m e n t

More information

Zumobi Brand Integration(Zbi) Platform Architecture Whitepaper Table of Contents

Zumobi Brand Integration(Zbi) Platform Architecture Whitepaper Table of Contents Zumobi Brand Integration(Zbi) Platform Architecture Whitepaper Table of Contents Introduction... 2 High-Level Platform Architecture Diagram... 3 Zbi Production Environment... 4 Zbi Publishing Engine...

More information

Web of Things Architecture and Use Cases. Soumya Kanti Datta, Christian Bonnet Mobile Communications Department

Web of Things Architecture and Use Cases. Soumya Kanti Datta, Christian Bonnet Mobile Communications Department Web of Things Architecture and Use Cases Soumya Kanti Datta, Christian Bonnet Mobile Communications Department Email: Soumya-Kanti.Datta@eurecom.fr Connecting Things in IoT Source: http://www.itworld.com/

More information

Overview of BlackBerry Dynamics Platform

Overview of BlackBerry Dynamics Platform Hong Kong 2018 Overview of BlackBerry Dynamics Platform Richard Schaefer, Sr. Enterprise Solutions Manager Application Models Multiple Platforms Web-based Extend Desktop Browser based rendering and APIs

More information

onem2m and its role in achieving interoperability in IoT

onem2m and its role in achieving interoperability in IoT REGIONAL STANDARDIZATION FORUM FOR BRIDGING THE STANDARDIZATION GAP (BSG) Riyadh, Saudi Arabia, 19 November 2017 onem2m and its role in achieving interoperability in IoT Dr. Omar Elloumi onem2m technical

More information

AWS IoT Overview. July 2016 Thomas Jones, Partner Solutions Architect

AWS IoT Overview. July 2016 Thomas Jones, Partner Solutions Architect AWS IoT Overview July 2016 Thomas Jones, Partner Solutions Architect AWS customers are connecting physical things to the cloud in every industry imaginable. Healthcare and Life Sciences Municipal Infrastructure

More information

Introduction to the Application Layer. Computer Networks Term B14

Introduction to the Application Layer. Computer Networks Term B14 Introduction to the Application Layer Computer Networks Term B14 Intro to Application Layer Outline Current Application Layer Protocols Creating an Application Application Architectures Client-Server P2P

More information

Security and Privacy in the Internet of Things : Antonio F. Skarmeta

Security and Privacy in the Internet of Things : Antonio F. Skarmeta Security and Privacy in the Internet of Things : Antonio F. Skarmeta University of Murcia (UMU) SPAIN Motivation Security and privacy concerns were always there but we need to move from

More information

IoT protocols for the Things

IoT protocols for the Things IoT protocols for the Things Who am I? Christian E. Legare Executive Vice President & Chief Technology Officer I joined Micrium in 2002, a leading provider of embedded software, including the uc/os real

More information

Hands-On with IoT Standards & Protocols

Hands-On with IoT Standards & Protocols DEVNET-3623 Hands-On with IoT Standards & Protocols Casey Bleeker, Developer Evangelist @geekbleek Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this

More information

IoT Standardization Process and Smart IoT

IoT Standardization Process and Smart IoT IoT Standardization Process and Smart IoT Reporter: Linpei Li Joint BUPT-Eurecom Open5G Lab 2017.4.29 Table of contents ⅠIoT Standards Ⅱ Our ITU-T Standardization Process Ⅲ Smart IoT Table of contents

More information

Sentinet for Microsoft Azure SENTINET

Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Cloud Deployment Model... 3 Hybrid Deployment Model...

More information

UNIK Building Mobile and Wireless Networks Maghsoud Morshedi

UNIK Building Mobile and Wireless Networks Maghsoud Morshedi UNIK4700 - Building Mobile and Wireless Networks Maghsoud Morshedi IoT Market https://iot-analytics.com/iot-market-forecasts-overview/ 21/11/2017 2 IoT Management Advantages Remote provisioning Register

More information

ARM mbed Technical Overview

ARM mbed Technical Overview ARM mbed Technical Overview Jerry Wang, FAE, ISG ARM Tech Forum Taipei July 4 th 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application

More information

EUROPEAN COMMISSION. DIGIT DG CNECT Connecting Europe Facility. SML and SMP. Component Offering Description. CEF edelivery Building Block

EUROPEAN COMMISSION. DIGIT DG CNECT Connecting Europe Facility. SML and SMP. Component Offering Description. CEF edelivery Building Block EUROPEAN COMMISSION DIGIT DG CNECT Connecting Europe Facility SML and SMP CEF edelivery Building Block Version [1.00] Status [Final] European Union, 2018 Reuse of this document is authorised provided the

More information

CIP Security Pull Model from the Implementation Standpoint

CIP Security Pull Model from the Implementation Standpoint CIP Security Pull Model from the Implementation Standpoint Jack Visoky Security Architect and Sr. Project Engineer Rockwell Automation Joakim Wiberg Team Manager Technology and Platforms HMS Industrial

More information

XEP-0283: Moved. Tory Patnoe Version 0.1.1

XEP-0283: Moved. Tory Patnoe Version 0.1.1 XEP-0283: Moved Tory Patnoe mailto:tpatnoe@cisco.com xmpp:tpatnoe@cisco.com 2018-08-06 Version 0.1.1 Status Type Short Name Experimental Standards Track moved This document defines an XMPP protocol extension

More information

Libelium Cloud Hive. Technical Guide

Libelium Cloud Hive. Technical Guide Libelium Cloud Hive Technical Guide Index Document version: v7.0-12/2018 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General and information... 4 1.1. Introduction...4 1.1.1. Overview...4 1.2. Data

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Unified Communications Manager Version 10.5 SAML SSO Configuration Example

Unified Communications Manager Version 10.5 SAML SSO Configuration Example Unified Communications Manager Version 10.5 SAML SSO Configuration Example Contents Introduction Prerequisites Requirements Network Time Protocol (NTP) Setup Domain Name Server (DNS) Setup Components Used

More information

SRIJAN MANANDHAR MQTT BASED COMMUNICATION IN IOT. Master of Science thesis

SRIJAN MANANDHAR MQTT BASED COMMUNICATION IN IOT. Master of Science thesis SRIJAN MANANDHAR MQTT BASED COMMUNICATION IN IOT Master of Science thesis Examiner: Prof. Kari Systä Examiner and topic approved by the Faculty Council of the Faculty of Department of Pervasive Systems

More information

OPC Unified Architecture

OPC Unified Architecture OPC Unified Architecture PubSub www.unifiedautomation.com 2 PubSub PubSub Use Cases and (Clients and Servers) behind firewalls (Message broker is Relay) Controller to controller communication Integration

More information

Breaking News CloudAXIS Suite 1.0

Breaking News CloudAXIS Suite 1.0 August 2013 Level 2 Breaking News CloudAXIS Suite 1.0 Product Release Date: October, 2012 Disclaimer 2013 Polycom, Inc. All rights reserved. Polycom, Inc. 6001 America Center Dr San Jose, CA 95002 USA

More information

Analysis of Peer-to-Peer Protocols Performance for Establishing a Decentralized Desktop Grid Middleware

Analysis of Peer-to-Peer Protocols Performance for Establishing a Decentralized Desktop Grid Middleware Analysis of Peer-to-Peer Protocols Performance for Establishing a Decentralized Desktop Grid Middleware Heithem Abbes 1,2, Jean-Christophe Dubacq 2 1 Unité de Recherche UTIC ESSTT, Université de Tunis

More information

XEP-0140: Shared Groups

XEP-0140: Shared Groups XEP-0140: Shared Groups Peter Saint-Andre mailto:peter@andyetnet xmpp:stpeter@stpeterim https://stpeterim/ 2004-10-27 Version 02 Status Type Short Name Retracted Informational groups This document defines

More information

Metadata, Chief technicolor

Metadata, Chief technicolor Metadata, the future of home entertainment Christophe Diot Christophe Diot Chief Scientist @ technicolor 2 2011-09-26 What is a metadata? Metadata taxonomy Usage metadata Consumption (number of views,

More information

NMOS IS-04. Discovery and Registration. Chris Gil & Cristian Recoseanu. SMPTE Event hosted by Atos 25 October 2018

NMOS IS-04. Discovery and Registration. Chris Gil & Cristian Recoseanu. SMPTE Event hosted by Atos 25 October 2018 NMOS IS-04 Discovery and Registration SMPTE Event hosted by Atos 25 October 2018 Chris Gil & Cristian Recoseanu Introduction Why do we need NMOS? AMWA NMOS Specifications Discovery and Registration Connection

More information

Identity Provider for SAP Single Sign-On and SAP Identity Management

Identity Provider for SAP Single Sign-On and SAP Identity Management Implementation Guide Document Version: 1.0 2017-05-15 PUBLIC Identity Provider for SAP Single Sign-On and SAP Identity Management Content 1....4 1.1 What is SAML 2.0.... 5 SSO with SAML 2.0.... 6 SLO with

More information

W3C Web of Things. W3C Auto WG F2F Meeting April 2016

W3C Web of Things. W3C Auto WG F2F Meeting April 2016 W3C Web of Things W3C Auto WG F2F Meeting April 2016 Soumya Kanti Datta Research Engineer, EURECOM Coordinator, TF-DI in W3C WoT IG Email: dattas@eurecom.fr Internet of Things - Landscape 28-April-2016

More information

OPENID CONNECT 101 WHITE PAPER

OPENID CONNECT 101 WHITE PAPER OPENID CONNECT 101 TABLE OF CONTENTS 03 04 EXECUTIVE OVERVIEW WHAT IS OPENID CONNECT? Connect Terminology Relationship to OAuth 08 Relationship to SAML CONNECT IN MORE DETAIL Trust Model Discovery Dynamic

More information

SJTU 2018 Fall Computer Networking. Wireless Communication

SJTU 2018 Fall Computer Networking. Wireless Communication SJTU 2018 Fall Computer Networking 1 Wireless Communication Internet Protocol Stack 2 Application: supporting network applications - FTP, SMTP, HTTP Transport: data transfer between processes - TCP, UDP

More information

Developing the ERS Collaboration Framework

Developing the ERS Collaboration Framework 1 Developing the ERS Collaboration Framework Patrick J. Martin, Ph.D. BAE Systems Technology Solutions patrick.j.martin@baesystems.com 10-26-2016 2 ERS Development Challenges Resilient System A system

More information

MongooseIM - Messaging that Scales

MongooseIM - Messaging that Scales MongooseIM - Messaging that Scales Michał Ślaski What is MongooseIM? 2 What is MongooseIM? Instant messaging for Social Media, Gaming and Telecommunications 2 What is MongooseIM? Instant messaging for

More information

Interoperability. Luca Mottola slides partly by Simon Duquennoy. Politecnico di Milano, Italy and Swedish Institute of Computer Science

Interoperability. Luca Mottola slides partly by Simon Duquennoy. Politecnico di Milano, Italy and Swedish Institute of Computer Science Interoperability Luca Mottola slides partly by Simon Duquennoy Politecnico di Milano, Italy and Swedish Institute of Computer Science 2 Not just stand-alone systems 3 NES in business processes! Motivation

More information

Sentinet for BizTalk Server SENTINET

Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and API Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication

More information

Expose Existing z Systems Assets as APIs to extend your Customer Reach

Expose Existing z Systems Assets as APIs to extend your Customer Reach Expose Existing z Systems Assets as APIs to extend your Customer Reach Unlocking mainframe assets for mobile and cloud applications Asit Dan z Services API Management, Chief Architect asit@us.ibm.com Insert

More information

Implementing Secure Socket Layer

Implementing Secure Socket Layer This module describes how to implement SSL. The Secure Socket Layer (SSL) protocol and Transport Layer Security (TLS) are application-level protocols that provide for secure communication between a client

More information

Networking. Networking and Communication Trends Convergence (Accessibility) Speed Stability Simplicity* Embeddedness

Networking. Networking and Communication Trends Convergence (Accessibility) Speed Stability Simplicity* Embeddedness Networking and Communication Trends Convergence (Accessibility) Speed Stability Simplicity* Embeddedness What is a Computer Network General definition Related hardware Network Interface Card Network Operating

More information

Advanced Solutions of Microsoft SharePoint Server 2013

Advanced Solutions of Microsoft SharePoint Server 2013 Course Duration: 4 Days + 1 day Self Study Course Pre-requisites: Before attending this course, students must have: Completed Course 20331: Core Solutions of Microsoft SharePoint Server 2013, successful

More information

Massive IM Scalability using WebSockets Michał Ślaski

Massive IM Scalability using WebSockets Michał Ślaski Erlang Solutions Ltd. Massive IM Scalability using WebSockets Michał Ślaski What am I chatting about? 1999-2011 Erlang Solutions Ltd. 2 What am I chatting about? Chat features 1999-2011 Erlang Solutions

More information

CMSC 322 Computer Networks Applications and End-To- End

CMSC 322 Computer Networks Applications and End-To- End CMSC 322 Computer Networks Applications and End-To- End Professor Doug Szajda CMSC 332: Computer Networks Announcements Project 2 has been posted and is due Monday, February 8 (No extension!) Homework

More information

VMware AirWatch Google Sync Integration Guide Securing Your Infrastructure

VMware AirWatch Google Sync Integration Guide Securing Your  Infrastructure VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard

More information

Oracle Service Bus Integration Implementation Guide Oracle FLEXCUBE Universal Banking Release [April] [2014]

Oracle Service Bus Integration Implementation Guide Oracle FLEXCUBE Universal Banking Release [April] [2014] Oracle Service Bus Integration Implementation Guide Oracle FLEXCUBE Universal Banking Release 12.0.3.0.0 [April] [2014] Table of Contents 1. INTRODUCTION... 1-1 1.1 SCOPE... 1-1 1.2 INTRODUCTION TO ORACLE

More information

Exploitable Results by Third Parties

Exploitable Results by Third Parties ITEA2 12011 BaaS Building as a Service A Semantic Service Framework for Building Automation Systems Project details Project leader: Email: Website: Franz-Josef Stewing franz-josef.stewing@materna.de http://baas-itea2.eu

More information