Trust Eleva,on Architecture v03

Size: px
Start display at page:

Download "Trust Eleva,on Architecture v03"

Transcription

1 Trust Eleva,on Architecture v03 DISCUSSION DRAFT Andrew Hughes 1

2 Purpose of this presenta,on To alempt to explain the Trust Eleva,on mechanism as a form of ALribute Based Access Control To aid in understanding the func,ons involved in Trust Eleva,on To show rela,onships, informa,on flows and repositories To set a basis for further specifica,on 2

3 A Bit ABout ABAC ALribute Based Access Control Use NIST SP as reference source Subject tries to get Resource Policy Enforcement Point (PEP) intercepts request Policy Decision Point (PDP) checks supplied alributes versus access control policy Can obtain addi,onal alributes from Environmental Condi,ons, Policy Informa,on Point, others PDP instructs PEP to permit or deny access 3

4 4

5 Why discuss ABAC alongside TE? ABAC is concerned with making access control decisions based on policy, transac,on-,me informa,on and sta,c informa,on Trust Eleva,on is concerned with sa,sfying access control decisions that need addi,onal alributes to sa,sfy policy Trust Eleva,on allows pre- determined step up criteria from one level of assurance to other levels of assurance 5

6 TE As A Mode Of ABAC One way to think about the purpose of Trust Eleva,on is to provide addi,onal informa,on that is required to make access control decisions Trea,ng TE as a mode of ABAC is not the only way to represent it, but the ABAC model offers hooks that seem to fit the TE model well 6

7 7

8 TE PaLerns WriLen as ABAC PaLerns To aid in understanding actors, func,ons and responsibili,es, I have created Trust Eleva,on PaLerns in the form of NIST SP ABAC PaLerns These are NOT sequence diagrams These are NOT protocol structure diagrams NOTE: The first pass at the diagrams are interspersed with explanatory slides. AHer the 3 rd PaLern slide I have duplicated the three palern slides to allow you to flip between them easily 8

9 PaLern 1: Basic ABAC A recrea,on of the ABAC PaLern from SP Should be a familiar construct Shows the well known PDP, PEP, PIP, PAP and policy repository 9

10 10

11 PaLern 2: Basic Trust Eleva,on Adds in a minimal set of addi,onal func,ons as described in the Trust Eleva,on deliverables These elements should be able to handle the simple TE Use Cases The RP from the TE Use Case is now split into the relevant ABAC bits I have renamed the LOA Repository to TE Method Repository 11

12 12

13 Notes on Basic TE PaLern The PIP is an ac,ve agent Able to obtain addi,onal informa,on from the Subject (User, User Agent or Device) Able to compose answers to the PDP s requests for more informa,on needed to make the policy decision TE Method Determiner is shown as an input to the PDP instead of the PIP TE MD is a form of policy engine: takes requested LOA and required LOA, returns TE Method(s) that can be used to step up {is this what is supposed to occur? A single answer or a list of answers? See slides later on about this func,on} The TE Method Repository contains informa,on about the TE Methods and how they step up the LOA The Method Repository is configured in tandem with the TE MD using the TE Admin Point 13

14 PaLern 3: Extended TE Adds addi,onal func,ons and alribute sources Should be able to support all TE Use Cases, including recursive, federated, pre- loaded creden,al assurance and other advanced cases Don t worry too much about the complexity of the boxes and lines this is NOT taking the place of a sequence diagram! 14

15 15

16 Notes on Extended TE PaLern Imagine that there is some form of orchestra,on engine (possibly the PIP itself) ensuring the steps are done in the correct order Imagine that the PEP/PDP are able to do a recursive response/ request with the Subject if needed Imagine that the PIP is able to invoke orchestrated events to obtain needed alributes e.g. seek addi,onal verified alributes from addi,onal alribute provider that might need User authen,ca,on No,ce that the User/Creden,al Provisioning Func,ons provide the TE Method Repository and ALribute Repository with configura,on informa,on This could enable pre- loaded TE Methods and other op,miza,ons 16

17 17

18 18

19 19

20 Compare to TE Core Model Flip through the next series of slides to see where the Core Model boxes apply 20

21 21

22 22

23 23

24 24

25 25

26 Make Sense? By rela,ng the TE Model to ABAC Access Control palern language it should help others to relate and understand the concepts What else is needed? Data Model for TE Method Repository Use Cases Sequence Diagrams Func,onal Descrip,ons Interface Specifica,ons Finite state machine? If the TE Extended PaLern is sufficiently rich, we can begin defining tailored material 26

27 PDP and PIP FUNCTIONAL ENHANCEMENTS 27

28 PDP Enhancements The PDP and PIP must be enhanced to handle TE messages and calls The PDP must be able to Consume Trust Eleva,on Policy Direct the PIP to perform the indicated TE Method Signal to the PEP in a way that the Subject is able to consume 28

29 PIP Enhancements The PDP and PIP must be enhanced to handle TE messages and calls The PIP must be able to Parse instruc,ons about TE Methods from the PDP Orchestrate a series of ac,ons needed to execute each of the TE Methods Discover appropriate informa,on sources for each listed TE Method 29

30 The TE Method Determiner and TE Method Repository ADDITIONAL DETAILS 30

31 Method Determiner Role The TE Method Determiner returns the Method Determined when given Current Method, LOA and one of Requested Method or LOA Returns Null?/False? if no valid Methods match the request {TE Method, LOA} Current == {TE Method, LOA} Requested + {TE Method} Determined MD does a simple table lookup against the TE Method Repository Not a mathema,cal evalua,on Not a?procedural/algorithmic? Process i.e. Star,ng from here, where do I end up, given these constraints 31

32 Method Determiner Basic I/O Input A Input B Input C Output {TE Method} Current {LOA} Current {LOA} Requested {TE Method} Determined (A list of methods) {TE Method, LOA} Current == {TE Method, LOA} Requested + {TE Method} Determined Need to Discuss does the MD need informa,on about which Factor was used, or which Threats are being mi,gated? 32

33 Method Determiner Simple Table Structure Star7ng TE Method Star7ng LOA Target LOA Step Up TE Method HMMM need to talk about this more Is this table rich enough to make expressing the step up methods simple? Or will the Admin be forced to list a very complex set of poten,al combina,ons? 33

34 The Method Determiner Func,ons Func,ons Confirm TE Method & Current TE LOA validity Does the TE Method match the TE LOA? Can the MD be asked to list all informa,on in the Repository tables? Determine TE Methods Returns list of TE Methods that could be used to go from Current TE Method + Current TE LOA- > Requested LOA Inputs Current TE Method Current TE LOA Requested TE LOA (op,onal) Requested TE Method (op,onal) Cycle counter (op,onal) Indicator for how many,mes this Subject has been around the loop for this AuthZ alempt Op,ons (Op,onal) e.g. subject preferences, RP preferences, other constraints, transac,on audit tags Outputs List of TE Methods that could be used to go from Current TE Method + Current TE LOA - > Requested LOA Could return Null/False if no TE Methods apply TE Hints to the PDP & PIP (op,onal) Enabler for local implementa,on details (e.g. which AuthN provider, Subject constraints, transac,on audit tags, etc.) Controls Policy restric,ons that forbid certain combina,ons or situa,ons from returning an answer Some kind of controls around audit & logging 34

35 Method Repository Data Model Need to discuss! 35

36 TE Message Structure(s) Data structure of TE Messages TE Method Determiner <- > TE Method Repository TE Method Determiner <- > PDP TE Extensions needed for PDP <- > PIP SAML Message Example JSON Message Example OIDC Message Example Other Examples? 36

37 PaLerns for Use Cases Need to discuss Diagrams/sequences for the range of Use Cases The major differences should be in the orchestra,on that the PIP does Dynamic versus Sta,c (preloaded values) step up Recursive step up queries (where does the recursion 37

Modifying an Exis.ng Commercial Product for Cryptographic Module Evalua.on

Modifying an Exis.ng Commercial Product for Cryptographic Module Evalua.on Modifying an Exis.ng Commercial Product for Cryptographic Module Evalua.on ICMC16 O?awa, Canada 18-20 May 2016 Presented by Alan Gornall Introduc.on I provide cer.fica.on support to my clients: compliance

More information

Key Nego(a(on Protocol & Trust Router

Key Nego(a(on Protocol & Trust Router Key Nego(a(on Protocol & Trust Router dra6- howle:- radsec- knp ABFAB, IETF 80 31 March, Prague. Introduc(on The ABFAB architecture does not require any par(cular AAA strategy for connec(ng RPs to IdPs.

More information

Special Publication

Special Publication Special Publication 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Patricia Toth NIST MEP What is Information Security? Personnel Security Cybersecurity

More information

Design Principles & Prac4ces

Design Principles & Prac4ces Design Principles & Prac4ces Robert France Robert B. France 1 Understanding complexity Accidental versus Essen4al complexity Essen%al complexity: Complexity that is inherent in the problem or the solu4on

More information

Document Databases: MongoDB

Document Databases: MongoDB NDBI040: Big Data Management and NoSQL Databases hp://www.ksi.mff.cuni.cz/~svoboda/courses/171-ndbi040/ Lecture 9 Document Databases: MongoDB Marn Svoboda svoboda@ksi.mff.cuni.cz 28. 11. 2017 Charles University

More information

RISK-BASED APPROACH TO DEPLOYMENT OF OMNICHANNEL BIOMETRICS IN SBERBANK

RISK-BASED APPROACH TO DEPLOYMENT OF OMNICHANNEL BIOMETRICS IN SBERBANK SESSION ID: IDY-W02 RISK-BASED APPROACH TO DEPLOYMENT OF OMNICHANNEL BIOMETRICS IN SBERBANK Anton Mitrofanov Authen:ca:on PlaBorm Chief Product Owner Sberbank Leyla Goncharenko Risk-based authen:ca:on

More information

Authorization Survey Results & Use Cases Presentation to Concordia Working Group

Authorization Survey Results & Use Cases Presentation to Concordia Working Group Authorization Survey Results & Use Cases Presentation to Concordia Working Group Identity and Authorization Services Working Group (IAS-WG) John Tolbert (Boeing) Gavin Illingworth (BMO Financial Group)

More information

Ways to implement a language

Ways to implement a language Interpreters Implemen+ng PLs Most of the course is learning fundamental concepts for using PLs Syntax vs. seman+cs vs. idioms Powerful constructs like closures, first- class objects, iterators (streams),

More information

Con$nuous Audi$ng and Risk Management in Cloud Compu$ng

Con$nuous Audi$ng and Risk Management in Cloud Compu$ng Con$nuous Audi$ng and Risk Management in Cloud Compu$ng Marcus Spies Chair of Knowledge Management LMU University of Munich Scien$fic / Technical Director of EU Integrated Research Project MUSING Cloud

More information

Federated Authentication with Web Services Clients

Federated Authentication with Web Services Clients Federated Authentication with Web Services Clients in the context of SAML based AAI federations Thomas Lenggenhager thomas.lenggenhager@switch.ch Mannheim, 8. March 2011 Overview SAML n-tier Delegation

More information

Secure Server Project. Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek

Secure Server Project. Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek Secure Server Project Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek 1 Outline I. Mo9va9on, Objec9ves II. Threat Landscape III. Design IV. Status V. Roadmap 2 Mo9va9on In a nutshell: Secure

More information

Welcome to this Clean Sky Info Day on how to become a Partner in Clean Sky 2. This presenta=on will explain how to prepare a proposal and submit it

Welcome to this Clean Sky Info Day on how to become a Partner in Clean Sky 2. This presenta=on will explain how to prepare a proposal and submit it Welcome to this Clean Sky Info Day on how to become a Partner in Clean Sky 2. This presenta=on will explain how to prepare a proposal and submit it via the Par=cipant Portal. 1 To make the submission process

More information

Composite Compliance: Demonstra1ng Suitability of Cloud Layering for Sensi1ve and Regulated Workloads

Composite Compliance: Demonstra1ng Suitability of Cloud Layering for Sensi1ve and Regulated Workloads Composite Compliance: Demonstra1ng Suitability of Cloud Layering for Sensi1ve and Regulated Workloads Heather Hinton, PhD hhinton@us.ibm.com IBM Dis1nguished Engineer Master Inventor, Member IBM AoT 7

More information

CS 465 Final Review. Fall 2017 Prof. Daniel Menasce

CS 465 Final Review. Fall 2017 Prof. Daniel Menasce CS 465 Final Review Fall 2017 Prof. Daniel Menasce Ques@ons What are the types of hazards in a datapath and how each of them can be mi@gated? State and explain some of the methods used to deal with branch

More information

Rela+onal Algebra. Rela+onal Query Languages. CISC437/637, Lecture #6 Ben Cartere?e

Rela+onal Algebra. Rela+onal Query Languages. CISC437/637, Lecture #6 Ben Cartere?e Rela+onal Algebra CISC437/637, Lecture #6 Ben Cartere?e Copyright Ben Cartere?e 1 Rela+onal Query Languages A query language allows manipula+on and retrieval of data from a database The rela+onal model

More information

Mastering Enterprise Metadata with Seman2c Modeling

Mastering Enterprise Metadata with Seman2c Modeling Unlocking the Power of Seman4c Knowledge Mastering Enterprise Metadata with Seman2c Modeling 1 Enterprise Metadata: The descrip4on of the organiza4onal context processes, roles, policies, products and

More information

Introduc)on to Computer Networks

Introduc)on to Computer Networks Introduc)on to Computer Networks COSC 4377 Lecture 3 Spring 2012 January 25, 2012 Announcements Four HW0 s)ll missing HW1 due this week Start working on HW2 and HW3 Re- assess if you found HW0/HW1 challenging

More information

Identity, Authentication and Authorization. John Slankas

Identity, Authentication and Authorization. John Slankas Identity, Authentication and Authorization John Slankas jbslanka@ncsu.edu Identity Who or what a person or thing is; a distinct impression of a single person or thing presented to or perceived by others;

More information

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products CIAM: Need for Identity Governance & Assurance Yash Prakash VP of Products Key Tenets of CIAM Solution Empower consumers, CSRs & administrators Scale to millions of entities, cloud based service Security

More information

PERMIS An Application Independent Authorisation Infrastructure. David Chadwick

PERMIS An Application Independent Authorisation Infrastructure. David Chadwick PERMIS An Application Independent Authorisation Infrastructure David Chadwick Role/Attribute Based Access Control Model Hierarchical Role based Access Control (RBAC) Permissions are allocated to roles/attributes

More information

10/7/15. MediaItem tostring Method. Objec,ves. Using booleans in if statements. Review. Javadoc Guidelines

10/7/15. MediaItem tostring Method. Objec,ves. Using booleans in if statements. Review. Javadoc Guidelines Objec,ves Excep,ons Ø Wrap up Files Streams MediaItem tostring Method public String tostring() { String classname = getclass().tostring(); StringBuilder rep = new StringBuilder(classname); return rep.tostring();

More information

Search Engines. Informa1on Retrieval in Prac1ce. Annotations by Michael L. Nelson

Search Engines. Informa1on Retrieval in Prac1ce. Annotations by Michael L. Nelson Search Engines Informa1on Retrieval in Prac1ce Annotations by Michael L. Nelson All slides Addison Wesley, 2008 Indexes Indexes are data structures designed to make search faster Text search has unique

More information

WebDAV connec+ons to InfoRouter Requirements & Known Issues inforouter Version 8.x. Ac$ve Innova$ons, Inc. Copyright

WebDAV connec+ons to InfoRouter Requirements & Known Issues inforouter Version 8.x. Ac$ve Innova$ons, Inc. Copyright WebDAV connec+ons to InfoRouter Requirements & Known Issues inforouter Version 8.x Ac$ve Innova$ons, Inc. Copyright 1998 2015 www.inforouter.com Server- side Installa+on Requirements Install inforouter

More information

RAD, Rules, and Compatibility: What's Coming in Kuali Rice 2.0

RAD, Rules, and Compatibility: What's Coming in Kuali Rice 2.0 software development simplified RAD, Rules, and Compatibility: What's Coming in Kuali Rice 2.0 Eric Westfall - Indiana University JASIG 2011 For those who don t know Kuali Rice consists of mul8ple sub-

More information

hashfs Applying Hashing to Op2mize File Systems for Small File Reads

hashfs Applying Hashing to Op2mize File Systems for Small File Reads hashfs Applying Hashing to Op2mize File Systems for Small File Reads Paul Lensing, Dirk Meister, André Brinkmann Paderborn Center for Parallel Compu2ng University of Paderborn Mo2va2on and Problem Design

More information

Faster Splunk App Cer=fica=on with Splunk AppInspect

Faster Splunk App Cer=fica=on with Splunk AppInspect Copyright 2016 Splunk Inc. Faster Splunk App Cer=fica=on with Splunk AppInspect Andy Nortrup Product Manager, Splunk Grigori Melnik Director, Product Management, Splunk Disclaimer During the course of this

More information

Visualizing Logical Dependencies in SWRL Rule Bases

Visualizing Logical Dependencies in SWRL Rule Bases Visualizing Logical Dependencies in SWRL Rule Bases Saeed Hassanpour, Mar:n J. O Connor and Amar K. Das Stanford Center for Biomedical Informa:cs Research MSOB X215, 251 Campus Drive, Stanford, California,

More information

[GSoC Proposal] Securing Airavata API

[GSoC Proposal] Securing Airavata API [GSoC Proposal] Securing Airavata API TITLE: Securing AIRAVATA API ABSTRACT: The goal of this project is to design and implement the solution for securing AIRAVATA API. Particularly, this includes authenticating

More information

Lecture 2. White- box Tes2ng and Structural Coverage (see Amman and Offut, Chapter 2)

Lecture 2. White- box Tes2ng and Structural Coverage (see Amman and Offut, Chapter 2) Lecture 2 White- box Tes2ng and Structural Coverage (see Amman and Offut, Chapter 2) White- box Tes2ng (aka. Glass- box or structural tes2ng) An error may exist at one (or more) loca2on(s) Line numbers

More information

Access Control Service Oriented Architecture

Access Control Service Oriented Architecture http://www.cse.wustl.edu/~jain/cse571-09/ftp/soa/index.html 1 of 13 Access Control Service Oriented Architecture Security Yoon Jae Kim, yj1dreamer AT gmail.com (A project report written under the guidance

More information

Mul$ple Upstream Interface Support for IGMP/MLD Proxy

Mul$ple Upstream Interface Support for IGMP/MLD Proxy 93 rd IETF, July 2015, Prague, Czech Republic Mul$ple Upstream Interface Support for dra

More information

RISC-V, Rocket, and RoCC Spring 2017 James Mar2n

RISC-V, Rocket, and RoCC Spring 2017 James Mar2n RISC-V, Rocket, and RoCC Spring 2017 James Mar2n What s new in Lab 2: In lab 1, you built a SHA3 unit that operates in isola2on We would like Sha3Accel to act as an accelerator for a processor Lab 2 introduces

More information

Welcome to the SIHO itransact portal.

Welcome to the SIHO itransact portal. Provider and Vendor Access Portal One stop access for your guide to utilizing SIHO s new itransact platform. Welcome to the SIHO itransact portal. Primary access codes will be given to key contacts at

More information

Condi(onals and Loops

Condi(onals and Loops Condi(onals and Loops 1 Review Primi(ve Data Types & Variables int, long float, double boolean char String Mathema(cal operators: + - * / % Comparison: < > = == 2 A Founda(on for Programming any program

More information

CMPS 20 Game Design Experience

CMPS 20 Game Design Experience CMPS 20 Game Design Experience Winter 2013 Week 4/5: Design Patterns Computational Cinematics Studio // Center for Games and Playable Media http://games.soe.ucsc.edu/ccs // http://games.soe.ucsc.edu Arnav

More information

Stream and Complex Event Processing Discovering Exis7ng Systems: esper

Stream and Complex Event Processing Discovering Exis7ng Systems: esper Stream and Complex Event Processing Discovering Exis7ng Systems: esper G. Cugola E. Della Valle A. Margara Politecnico di Milano gianpaolo.cugola@polimi.it emanuele.dellavalle@polimi.it Univ. della Svizzera

More information

Network Virtualiza/on Overlay Control Protocol Requirements

Network Virtualiza/on Overlay Control Protocol Requirements Network iza/on Overlay Control Protocol Requirements dra

More information

Libraries are wri4en in C/C++ and compiled for the par>cular hardware.

Libraries are wri4en in C/C++ and compiled for the par>cular hardware. marakana.com 1 marakana.com 2 marakana.com 3 marakana.com 4 Libraries are wri4en in C/C++ and compiled for the par>cular hardware. marakana.com 5 The Dalvik virtual machine is a major piece of Google's

More information

Differen'al Privacy. CS 297 Pragya Rana

Differen'al Privacy. CS 297 Pragya Rana Differen'al Privacy CS 297 Pragya Rana Outline Introduc'on Privacy Data Analysis: The SeAng Impossibility of Absolute Disclosure Preven'on Achieving Differen'al Privacy Introduc'on Sta's'c: quan'ty computed

More information

CISC327 - So*ware Quality Assurance

CISC327 - So*ware Quality Assurance CISC327 - So*ware Quality Assurance Lecture 12 Black Box Tes?ng CISC327-2003 2017 J.R. Cordy, S. Grant, J.S. Bradbury, J. Dunfield Black Box Tes?ng Outline Last?me we con?nued with black box tes?ng and

More information

Clinical Research Professionals Educa3on Session Barb Greguson Alliance Sta3s3cal and Data Center

Clinical Research Professionals Educa3on Session Barb Greguson Alliance Sta3s3cal and Data Center Clinical Research Professionals Educa3on Session Barb Greguson Alliance Sta3s3cal and Data Center greguson.barbara@mayo.edu Alliance for Clinical Trials in Oncology Spring 2015 Group Mee3ng Presenta3on

More information

Instructor: Randy H. Katz hap://inst.eecs.berkeley.edu/~cs61c/fa13. Fall Lecture #7. Warehouse Scale Computer

Instructor: Randy H. Katz hap://inst.eecs.berkeley.edu/~cs61c/fa13. Fall Lecture #7. Warehouse Scale Computer CS 61C: Great Ideas in Computer Architecture Everything is a Number Instructor: Randy H. Katz hap://inst.eecs.berkeley.edu/~cs61c/fa13 9/19/13 Fall 2013 - - Lecture #7 1 New- School Machine Structures

More information

INFO/CS 4302 Web Informa6on Systems

INFO/CS 4302 Web Informa6on Systems INFO/CS 4302 Web Informa6on Systems FT 2012 Week 5: Web Architecture: Structured Formats Part 3 (XML Manipula6ons) (Lecture 8) Theresa Velden RECAP XML & Related Technologies overview Purpose Structured

More information

SQL- Updates, Asser0ons and Views

SQL- Updates, Asser0ons and Views SQL- Updates, Asser0ons and Views Data Defini0on, Constraints, and Schema Changes Used to CREATE, DROP, and ALTER the descrip0ons of the tables (rela0ons) of a database CREATE TABLE In SQL2, can use the

More information

Making Research Data Public: Why, What, and How. Fall 2016

Making Research Data Public: Why, What, and How. Fall 2016 Making Research Data Public: Why, What, and How Fall 2016 Research Data Service (RDS) The Research Data Service provides the Illinois research community with exper:se, tools, and infrastructure to manage

More information

Scaling the Wholesale Interconnect Market. Gastón Cu0gnola Senior Sales Engineer Telco Systems

Scaling the Wholesale Interconnect Market. Gastón Cu0gnola Senior Sales Engineer Telco Systems Host Sponsor Co- Sponsor Scaling the Wholesale Interconnect Market Gastón Cu0gnola Senior Sales Engineer Telco Systems 1 Presenta0on Agenda Status of Wholesale/Interconnect Environments Moving up the curve

More information

CS 61C: Great Ideas in Computer Architecture (Machine Structures) Lecture 32: Pipeline Parallelism 3

CS 61C: Great Ideas in Computer Architecture (Machine Structures) Lecture 32: Pipeline Parallelism 3 CS 61C: Great Ideas in Computer Architecture (Machine Structures) Lecture 32: Pipeline Parallelism 3 Instructor: Dan Garcia inst.eecs.berkeley.edu/~cs61c! Compu@ng in the News At a laboratory in São Paulo,

More information

Rethinking Path Valida/on. Russ White

Rethinking Path Valida/on. Russ White Rethinking Path Valida/on Russ White Reality Check Right now there is no US Government mandate to do anything A mandate in the origin authen9ca9on area is probably immanent A mandate in the path valida9on

More information

BIL 682 Ar+ficial Intelligence Week #2: Solving problems by searching. Asst. Prof. Aykut Erdem Dept. of Computer Engineering HaceDepe University

BIL 682 Ar+ficial Intelligence Week #2: Solving problems by searching. Asst. Prof. Aykut Erdem Dept. of Computer Engineering HaceDepe University BIL 682 Ar+ficial Intelligence Week #2: Solving problems by searching Asst. Prof. Aykut Erdem Dept. of Computer Engineering HaceDepe University Today Search problems Uninformed search Informed (heuris+c)

More information

Dynamic Stateful Service Security

Dynamic Stateful Service Security Dynamic Stateful Security FIA Workshop, Prague 12 May 2009 Mike Surridge ms@it-innovation.soton.ac.uk innovation.soton.ac.uk Overview Why is dynamic service security important? How we implemented dynamic

More information

CS6200 Informa.on Retrieval. David Smith College of Computer and Informa.on Science Northeastern University

CS6200 Informa.on Retrieval. David Smith College of Computer and Informa.on Science Northeastern University CS6200 Informa.on Retrieval David Smith College of Computer and Informa.on Science Northeastern University Indexing Process Indexes Indexes are data structures designed to make search faster Text search

More information

Delegated authentication Electronic identity: delegated and federated authentication, policy-based access control

Delegated authentication Electronic identity: delegated and federated authentication, policy-based access control Delegated authentication Electronic identity: delegated and federated authentication, policy-based access control Antonio Lioy < lioy @ polito.it > several RPs (Replying Party) may decide to delegate authentication

More information

Identity & Policy (for Security, Privacy and Trust)

Identity & Policy (for Security, Privacy and Trust) Identity & Policy (for Security, Privacy and Trust) October 28th, 2008 Liberty Alliance Wrbcast Rakesh Radhakrishnan Principle Architect (Telco) Technology Lead (Telco) Sun Microsystems, Inc. 1 Agenda

More information

Inves&ga&ng Intent API for Service Chaining. Andy Veitch NetCracker (NEC)

Inves&ga&ng Intent API for Service Chaining. Andy Veitch NetCracker (NEC) Inves&ga&ng Intent API for Service Chaining Andy Veitch NetCracker (NEC) Goals Define and develop Intent NBI for service chaining Define for mul&ple underlying implementa&ons avoid network details Develop

More information

Lecture 2. White- box Tes2ng and Structural Coverage (see Amman and Offut, Chapter 2)

Lecture 2. White- box Tes2ng and Structural Coverage (see Amman and Offut, Chapter 2) Lecture 2 White- box Tes2ng and Structural Coverage (see Amman and Offut, Chapter 2) White- box Tes2ng (aka. Glass- box or structural tes2ng) An error may exist at one (or more) loca2on(s) Line numbers

More information

Lecture 4: Build Systems, Tar, Character Strings

Lecture 4: Build Systems, Tar, Character Strings CIS 330:! / / / / (_) / / / / _/_/ / / / / / \/ / /_/ / `/ \/ / / / _/_// / / / / /_ / /_/ / / / / /> < / /_/ / / / / /_/ / / / /_/ / / / / / \ /_/ /_/_/_/ _ \,_/_/ /_/\,_/ \ /_/ \ //_/ /_/ Lecture 4:

More information

Search Engines. Informa1on Retrieval in Prac1ce. Annota1ons by Michael L. Nelson

Search Engines. Informa1on Retrieval in Prac1ce. Annota1ons by Michael L. Nelson Search Engines Informa1on Retrieval in Prac1ce Annota1ons by Michael L. Nelson All slides Addison Wesley, 2008 Evalua1on Evalua1on is key to building effec$ve and efficient search engines measurement usually

More information

Programming Languages and Techniques (CIS120)

Programming Languages and Techniques (CIS120) Programming Languages and Techniques (CIS120) Lecture 7 January 30 th, 2015 Binary Search Trees (Lecture notes Chapter 7) ! Homework #1 feedback dope assignment, got a 96.4 the first time, careless mistake,

More information

Kaseya Service Desk Workshop DAY TWO

Kaseya Service Desk Workshop DAY TWO Kaseya Service Desk Workshop DAY TWO Developed by Kaseya University Powered by IT Scholars 1 Kaseya Version 6.2 Last updated on June 27, 2012 Day One Roadmap! Introduc3on to Workshop and Virtual Labs Kaseya

More information

F.P. Brooks, No Silver Bullet: Essence and Accidents of Software Engineering CIS 422

F.P. Brooks, No Silver Bullet: Essence and Accidents of Software Engineering CIS 422 The hardest single part of building a software system is deciding precisely what to build. No other part of the conceptual work is as difficult as establishing the detailed technical requirements...no

More information

Securing Hadoop. Keys Botzum, MapR Technologies Jan MapR Technologies - Confiden6al

Securing Hadoop. Keys Botzum, MapR Technologies Jan MapR Technologies - Confiden6al Securing Hadoop Keys Botzum, MapR Technologies kbotzum@maprtech.com Jan 2014 MapR Technologies - Confiden6al 1 Why Secure Hadoop Historically security wasn t a high priority Reflec6on of the type of data

More information

Bioinforma)cs Resources - NoSQL -

Bioinforma)cs Resources - NoSQL - Bioinforma)cs Resources - NoSQL - Lecture & Exercises Prof. B. Rost, Dr. L. Richter, J. Reeb Ins)tut für Informa)k I12 Short SQL Recap schema typed data tables defined layout space consump)on is computable

More information

Enforcing declara.ve data policies

Enforcing declara.ve data policies Enforcing declara.ve data policies Peter Druschel with Anjo Vahldiek, Eslam Elnikety, Aastha Mehta, Deepak Garg, MPI- SWS (with contribu@ons from Rodrigo Rodrigues Nova Lisboa, Johannes Gehrke Cornell/Microso>,

More information

What is Search For? CS 188: Ar)ficial Intelligence. Constraint Sa)sfac)on Problems Sep 14, 2015

What is Search For? CS 188: Ar)ficial Intelligence. Constraint Sa)sfac)on Problems Sep 14, 2015 CS 188: Ar)ficial Intelligence Constraint Sa)sfac)on Problems Sep 14, 2015 What is Search For? Assump)ons about the world: a single agent, determinis)c ac)ons, fully observed state, discrete state space

More information

Novell Access Manager 3.1

Novell Access Manager 3.1 Technical White Paper IDENTITY AND SECURITY www.novell.com Novell Access Manager 3.1 Access Control, Policy Management and Compliance Assurance Novell Access Manager 3.1 Table of Contents: 2..... Complete

More information

11/12/11. Objec&ves Overview. Databases, Data, and Informa&on. Objec&ves Overview. Databases, Data, and Informa&on. Databases, Data, and Informa&on

11/12/11. Objec&ves Overview. Databases, Data, and Informa&on. Objec&ves Overview. Databases, Data, and Informa&on. Databases, Data, and Informa&on Objec&ves Overview Define the term,, and explain how a interacts with and informa:on Define the term, integrity, and describe the quali:es of valuable informa:on Discuss the terms character, field, record,

More information

R E F E R E N C E TCG. Trusted Multi-Tenant Infrastructure Work Group. Use Cases. Version 1.1. November 15, 2013

R E F E R E N C E TCG. Trusted Multi-Tenant Infrastructure Work Group. Use Cases. Version 1.1. November 15, 2013 R E F E R E N C E Trusted Multi-Tenant Infrastructure Work Group Use Cases Version 1.1 November 15, 2013 Contact: admin@trustedcomputinggroup.org TCG Copyright TCG 2011-2013 Disclaimers, Notices, and License

More information

SIS Logic Synthesis System

SIS Logic Synthesis System SIS Logic Synthesis System Luigi Di Guglielmo Davide Bresolin Tiziano Villa University of Verona Dep. Computer Science Italy Introduc>on Logic Synthesis performs the transla>on from a high level descrip>on

More information

Introduc)on to Computer Networks

Introduc)on to Computer Networks Introduc)on to Computer Networks COSC 4377 Lecture 7 Spring 2012 February 8, 2012 Announcements HW3 due today Start working on HW4 HW5 posted In- class student presenta)ons No TA office hours this week

More information

Thinking Induc,vely. COS 326 David Walker Princeton University

Thinking Induc,vely. COS 326 David Walker Princeton University Thinking Induc,vely COS 326 David Walker Princeton University slides copyright 2017 David Walker permission granted to reuse these slides for non-commercial educa,onal purposes Administra,on 2 Assignment

More information

IP CREW. Cogni,ve Radio Experimenta,on World

IP CREW. Cogni,ve Radio Experimenta,on World IP CREW Cogni,ve Radio Experimenta,on World 1st open call - informa,on session Ingrid Moerman Brussels, September 14, 2011 The research leading to these results has received funding from the European Union's

More information

Authentication Step-Up Protocol and Metadata Version 1.0

Authentication Step-Up Protocol and Metadata Version 1.0 Authentication Step-Up Protocol and Metadata Version 1.0 Committee Specification Draft 01 / Public Review Draft 01 12 November 2015 Specification URIs This version: http://docs.oasis-open.org/trust-el/trust-el-protocol/v1.0/csprd01/trust-el-protocol-v1.0-

More information

An introduc/on to Sir0i

An introduc/on to Sir0i Authen4ca4on and Authorisa4on for Research and Collabora4on An introduc/on to Sir0i Addressing Federated Security Incident Response Hannah Short CERN hannah.short@cern.ch TF-CSIRT May, 2016 Agenda Federated

More information

LING 581: Advanced Computa7onal Linguis7cs. Lecture Notes April 16th

LING 581: Advanced Computa7onal Linguis7cs. Lecture Notes April 16th LING 581: Advanced Computa7onal Linguis7cs Lecture Notes April 16th Administrivia Factoid Ques-on Answering homework did you submit your simula.on? Seman7cs New topic! We want computers to be able to understand

More information

Sta$c Single Assignment (SSA) Form

Sta$c Single Assignment (SSA) Form Sta$c Single Assignment (SSA) Form SSA form Sta$c single assignment form Intermediate representa$on of program in which every use of a variable is reached by exactly one defini$on Most programs do not

More information

Step 1: A few setup items are needed to properly start using SeamLESS EHR with MedicFusion.

Step 1: A few setup items are needed to properly start using SeamLESS EHR with MedicFusion. Step 1: A few setup items are needed to properly start using SeamLESS EHR with MedicFusion. Prerequisites: SeamLESS version 1.3.0.0 R1 or greater esuite version 3.7.4.0 on the worksta;on (3.7.5.0) and

More information

Arkansas WebIZ Basic Training

Arkansas WebIZ Basic Training Arkansas WebIZ Basic Training Presented by: Andrew Luker Arkansas Department of Health (WebIZ) Dec. 12, 2018 Introduc)on Welcome to Arkansas WebIZ, a state-of-the-art immuniza9on registry built from the

More information

Vulnerability Analysis (III): Sta8c Analysis

Vulnerability Analysis (III): Sta8c Analysis Computer Security Course. Vulnerability Analysis (III): Sta8c Analysis Slide credit: Vijay D Silva 1 Efficiency of Symbolic Execu8on 2 A Sta8c Analysis Analogy 3 Syntac8c Analysis 4 Seman8cs- Based Analysis

More information

Importing/Exporting Data in AdBase

Importing/Exporting Data in AdBase Importing/Exporting Data in AdBase Purpose of Presentation Provide an Overview of AdBase Utilities Which Allow:! Importing of Order Data or! Exporting of Order Data To or From the AdBase Core Database.

More information

Object Oriented Design (OOD): The Concept

Object Oriented Design (OOD): The Concept Object Oriented Design (OOD): The Concept Objec,ves To explain how a so8ware design may be represented as a set of interac;ng objects that manage their own state and opera;ons 1 Topics covered Object Oriented

More information

MulG-Vendor Key Management with KMIP

MulG-Vendor Key Management with KMIP MulG-Vendor Key Management with KMIP Tim Hudson CTO Cryptso2 tjh@cryptso2.com GS13A 19-May-2016 1:35pm Key Management 1000011010100100101100101010000010101000101001101001111010001100 Key Management Standards

More information

EAS- SEC: Framework for Securing Enterprise Business Applica;ons

EAS- SEC: Framework for Securing Enterprise Business Applica;ons Invest in security to secure investments EAS- SEC: Framework for Securing Enterprise Business Applica;ons Alexander Polyakov CTO ERPScan About ERPScan The only 360- degree SAP Security solu8on - ERPScan

More information

Automated System Analysis using Executable SysML Modeling Pa8erns

Automated System Analysis using Executable SysML Modeling Pa8erns Automated System Analysis using Executable SysML Modeling Pa8erns Maged Elaasar* Modelware Solu

More information

AWS Iden)ty And Access Management (IAM) Manohar Rapolu

AWS Iden)ty And Access Management (IAM) Manohar Rapolu AWS Iden)ty And Access Management (IAM) Manohar Rapolu Topics Introduc5on Principals Authen5ca5on Authoriza5on Other Key Feature -> Mul5 Factor Authen5ca5on -> Rota5ng Keys -> Resolving Mul5ple Permissions

More information

BEETLE GEOMETRY MODULE 2: INVESTIGATION 1. Exploring Pen

BEETLE GEOMETRY MODULE 2: INVESTIGATION 1. Exploring Pen BEETLE GEOMETRY Exploring Pen Ac@vity 2.1.1 Drawing Numerals ACTIVITY 2.1.1 Drawing Numerals Ac@vity 2.1.1 Drawing Numerals Open project 2-Drawing Numerals, save as a copy and rename. Read the setup script

More information

Clinical Metadata A complete metadata and project management solu6on. October 2017 Andrew Ndikom and Liang Wang

Clinical Metadata A complete metadata and project management solu6on. October 2017 Andrew Ndikom and Liang Wang A complete metadata and project management solu6on. October 2017 Andrew Ndikom and Liang Wang 1 Agenda How is metadata currently managed within the industry? Five key problems with current approaches.

More information

Fix- point engine in Z3. Krystof Hoder Nikolaj Bjorner Leonardo de Moura

Fix- point engine in Z3. Krystof Hoder Nikolaj Bjorner Leonardo de Moura μz Fix- point engine in Z3 Krystof Hoder Nikolaj Bjorner Leonardo de Moura Mo?va?on Horn EPR applica?ons (Datalog) Points- to analysis Security analysis Deduc?ve data- bases and knowledge bases (Yago)

More information

Obligation Standardization

Obligation Standardization Standardization David Chadwick, University of Kent Mario Lischka NEC Laboratories Europe 1 Problems with Existing Model s have not been handled fully, they are simply attribute assignments which are consumed

More information

Clinical Research Professionals Educa3on Session Barb Greguson Alliance Sta3s3cal and Data Center

Clinical Research Professionals Educa3on Session Barb Greguson Alliance Sta3s3cal and Data Center Clinical Research Professionals Educa3on Session Barb Greguson Alliance Sta3s3cal and Data Center greguson.barbara@mayo.edu Alliance for Clinical Trials in Oncology Fall 2015 Group Mee3ng Presenta3on Objec3ves

More information

extensible Access Control Markup Language (XACML) Anne Anderson Sun Microsystems, Inc. GSA Identity Workshop 27 Feb 2007

extensible Access Control Markup Language (XACML) Anne Anderson Sun Microsystems, Inc. GSA Identity Workshop 27 Feb 2007 extensible Access Control Markup Language (XACML) Anne Anderson Sun Microsystems, Inc. GSA Identity Workshop 27 Feb 2007 Outline Introduction to XACML XACML 3.0: Coming soon! > Administrative Policy and

More information

CORE STATES GROUP TRAINING SERIES BLUEBEAM EXPORTING CREATED BY: CSG IT CORE STATES GROUP

CORE STATES GROUP TRAINING SERIES BLUEBEAM EXPORTING CREATED BY: CSG IT CORE STATES GROUP CORE STATES GROUP TRAINING SERIES BLUEBEAM EXPORTING CREATED BY: CSG IT CORE STATES GROUP BLUEBEAM EXPORTING When working with PDF s there are a lot of +mes that you need to do something with that PDF

More information

ADVENTURES IN OPENBANKING: UNDERSTANDING OAUTH AND OPENID CONNECT CLIENT ECOSYSTEMS

ADVENTURES IN OPENBANKING: UNDERSTANDING OAUTH AND OPENID CONNECT CLIENT ECOSYSTEMS SESSION ID: IDY-R04 ADVENTURES IN OPENBANKING: UNDERSTANDING OAUTH AND OPENID CONNECT CLIENT ECOSYSTEMS Pamela Dingle Director of Iden7ty Standards @ Microso= @pamelarosiedee Disclaimer The work I describe

More information

CSSE232 Computer Architecture. Logic and Decision Opera:ons

CSSE232 Computer Architecture. Logic and Decision Opera:ons CSSE232 Computer Architecture Logic and Decision Opera:ons Class status Reading for today: Sec:ons 2.6-2.7 Due today HW0 Lab 0 status? Outline Logical opera:ons ShiI operators Pseudo instruc:ons Immediates

More information

Soft GPGPUs for Embedded FPGAS: An Architectural Evaluation

Soft GPGPUs for Embedded FPGAS: An Architectural Evaluation Soft GPGPUs for Embedded FPGAS: An Architectural Evaluation 2nd International Workshop on Overlay Architectures for FPGAs (OLAF) 2016 Kevin Andryc, Tedy Thomas and Russell Tessier University of Massachusetts

More information

Introduc)on to Biology. Review Sheet Answers

Introduc)on to Biology. Review Sheet Answers Introduc)on to Biology Review Sheet Answers Microscope History and Cell Basics Name and describe the two most common types of LIGHT* microscopes? Simple: Only have one lens. Compound: It has two lenses.

More information

NETCONF WG IETF 96 (Berlin)

NETCONF WG IETF 96 (Berlin) Zero Touch Provisioning for NETCONF/RESTCONF Call Home dra>-ie@-netconf-zerotouch-09 NETCONF WG IETF 96 (Berlin) Recap At IETF 95, we reviewed a significantly updated dra> and its 4 open issues. 2 issues

More information

Monitoring IPv6 Content Accessibility and Reachability. Contact: R. Guerin University of Pennsylvania

Monitoring IPv6 Content Accessibility and Reachability. Contact: R. Guerin University of Pennsylvania Monitoring IPv6 Content Accessibility and Reachability Contact: R. Guerin (guerin@ee.upenn.edu) University of Pennsylvania Outline Goals and scope So=ware overview Func@onality, performance, and requirements

More information

Research opportuni/es with me

Research opportuni/es with me Research opportuni/es with me Independent study for credit - Build PL tools (parsers, editors) e.g., JDial - Build educa/on tools (e.g., Automata Tutor) - Automata theory problems e.g., AutomatArk - Research

More information

Best Practices and Pitfalls for Building Products out of OpenDaylight

Best Practices and Pitfalls for Building Products out of OpenDaylight Best Practices and Pitfalls for Building Products out of OpenDaylight Colin Dixon, TSC Chair, OpenDaylight Principal Software Engineer, Brocade Devin Avery, Sr Staff Software Engineer, Brocade Agenda Agenda

More information

Mo#va#ng the OO Way. COMP 401, Fall 2017 Lecture 05

Mo#va#ng the OO Way. COMP 401, Fall 2017 Lecture 05 Mo#va#ng the OO Way COMP 401, Fall 2017 Lecture 05 Arrays Finishing up from last #me Mul#dimensional Arrays Mul#dimensional array is simply an array of arrays Fill out dimensions lef to right. int[][]

More information