1 / 21

Aniketos: Ensuring Trustworthiness and Security in Service Composition Exploitation and Impact

Aniketos: Ensuring Trustworthiness and Security in Service Composition Exploitation and Impact. David Llewellyn-Jones Zeta Dooly Marina Egea González http:// aniketos.eu. 6 th September 2012 Effectsplus Clustering Event, Padua, Italy. Aniketos Project. Main objective

kenaz
Download Presentation

Aniketos: Ensuring Trustworthiness and Security in Service Composition Exploitation and Impact

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Aniketos: Ensuring Trustworthiness and Security in Service CompositionExploitation and Impact David Llewellyn-Jones Zeta Dooly Marina Egea González http://aniketos.eu 6th September 2012 Effectsplus Clustering Event, Padua, Italy

  2. Aniketos Project • Main objective • Help establish and maintain trustworthiness and secure behaviour in a dynamically changing environment of composite services • ICT FP7 Objective 1.4 • Secure, dependable and trusted infrastructures • Duration • August 2010 until February 2014 • Website • http://aniketos.eu

  3. Aniketos Workflow

  4. Workflow • Incorporates comprehensive workflow • Relies on significant input • From developers, providers and end-users • Commercial or community • Ecosystem • BPMN service compositions • ConSpec policy files • Trust management • The actual services • Services may be ‘Aniketos compliant’

  5. R&D WP1: Requirements and architectural approach OUTREACH user evaluation WP8: Tutorials and training TF 1 T1 TF 2 - WP2: Define, establish WP3: Secure composition and maintain trust WP4: Response to of dynamic services changes and threats TF 3 TF 3 WP9: Demonstration TF n TF n WP10: Community building WP7: Verification and end and standardization WP11: Dissemination and WP5: Platform construction Exploitation WP6: Realisation of industry case studies WP12: Project management Exploitation and Impact • Four fronts • Tutorials and training • Demonstrations • Community building and standardisation • Dissemination and exploitation

  6. Tutorials and Training • Led by SearchLab • Building up standardised documentation • Standard templates for all prototype deliverables • Automated document generation tools • Workshops and events • February 2011 – STS and S×C×T • July 2011 – STS Modelling Language • More planned

  7. Demonstrations • Led by Italtel • Trade shows and conferences • Demo events • February 2012 – Internal Aniketos • May 2012 – Selex Elsag demo • July 2012 – Wind demonstration • July 2012 – SummerSOC • More planned • Building software VMs

  8. Community Building • Led by TSSG • Aim to build communities • Contribute to standardisation • Generate interest • Foster open source community • Targeting open source alone is risky • Requirement for external input • Capitalise on social networking • Github, YouTube, LinkedIn, Twitter, etc. • Aim to combine both commercial and open source

  9. Dissemination and Exploitation SESAR • Led by ATOS • Publications • Case Studies • Future telecom services • eGovernance: land buying • Air traffic service pool • Demos • Real-world deployment with project partners

  10. Audience Reached • Commercial Sector (ICT Industry) • Software developers and providers • Service architecture providers • Security Experts • ICT providers, IT vendors • Internet Service Providers, Cloud Providers • End-users from Safety and Security Critical Domains • Aniketos strategic partners • Other EU projects working in similar domain • EU technology platforms • Other research initiatives and big IT companies • Academia • Scientists, Students (especially, Master and PhD students) • European Commission, European Society

  11. Industrial Audience • Air Traffic Management experts, industries, practitioners and researchers (thanks to Aniketos ATC case study) • Own customers • FinMeccanica companies • R&D managers and employees • Academia • SAP internal stakeholders • external partners and SAP developers • Employees, technical and marketing departments

  12. Industrial Audience • Internal research and innovation department • Atos internal stakeholders • Business development director • FI-WARE, ChoREOS, NESSoS, etc. • Inter industry-academia event co-organizer (MDSec @ MoDELS 2012) • Joined new group addressing standardization of trustworthy, secure composable services • Greek public sector and government • Athens (previous) city council and other IT companies

  13. Industrial Audience • Software developers • Presented in several inter industry-academia scientific events • Technical teams • Centre for evaluation of the security of information technology, software engineers • Security experts, head of the security architecture unit, security consultants, technical and strategy managers • Technical and marketing departments • Intranet community • Internet users

  14. Academic Audience • Targeting academics • Workshops, seminars, conferences • Submitters or organisers for more than 40 events • Organizers or PC members • Around 20 events • Papers • Over 40 papers on Aniketos research results (out of 80 submissions) • Targeting industry • Participation in around 20 events • Including worldwide event reaching global SAP developer community

  15. Academic Partners

  16. Promoting Website Visits • Website intended to be main channel • Currently role less crucial • Mainly due to lack of technical and training material • Strategy therefore to publish more material • Publish multimedia content when ready • Embedded videos being shown on web front page • Embedded from Aniketos YouTube channel • Deliverables • Demo material on success stories • Broadcast new achievements via social channels • Aim to cross-link between project websites

  17. Outreach Boost Plan Key ideas to boost outreach Key message specification and communication

  18. Outreach Boost Plan Key results Key outputs

  19. Outreach Boost Plan

  20. Conclusion • Four targeted areas for increasing impact • Tutorials and training • Demonstrations • Community building • Dissemination and exploitation • Dissemination through outreach boost • Key message • Targeted user groups • Key results • Success story publication • Key outputs • Code and business models • Improved sharing

  21. http://aniketos.eu • Athens Technology Center SA • Atos • DAEM S.A. • DeepBlue • SELEX ELSAG (ex Elsag Datamat) • Italtel • Liverpool John Moores University • National Research Council of Italy • SAP • SEARCH Lab Ltd • Stiftelsen SINTEF • Tecnalia Research & Innovation • Thales • University of Salzburg • University of Trento • Waterford Institute of Technology • Wind Telecomunicazioni S.p.A.

More Related