1 / 4

Enhancing Security in Ultra-Large Scale (ULS) Systems using Domain-specific Modeling

Enhancing Security in Ultra-Large Scale (ULS) Systems using Domain-specific Modeling. Joe Hoffert, Akshay Dabholkar, Aniruddha Gokhale, and Doug Schmidt Institute for Software Integrated Systems (ISIS) Vanderbilt University. Trustworthiness Challenges for Ultra-Large Scale (ULS) Systems.

lin
Download Presentation

Enhancing Security in Ultra-Large Scale (ULS) Systems using Domain-specific Modeling

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Enhancing Security in Ultra-Large Scale (ULS) Systems using Domain-specific Modeling Joe Hoffert, Akshay Dabholkar, Aniruddha Gokhale, and Doug Schmidt Institute for Software Integrated Systems (ISIS) Vanderbilt University

  2. Trustworthiness Challenges for Ultra-Large Scale (ULS) Systems National/International Power Grid Constellations of Satellites Homeland Defense Air Traffic Management • Traits: • Systems of systems • Pub-Sub paradigm • Multiple QoS needs • Ultra-large in # of components, connections, lines of code, etc. • Approach: • Use Model Driven Engineering (MDE) for • Separation of concerns • Analysis for correctness • Automated synthesis of QoS metadata • Challenges: • Trustworthiness concerns tangled across different middleware layers • Multiple different middleware technologies

  3. Enhancing Security for ULS Systems Interface Security QoS Conforms to Policy Component Security QoS Domain-Specific Security Policy Durability- Volatile Durability- Transient Deadline- 20ms Deadline- 10ms Timebased- 15ms Topic DataWriter Liveliness- Manual By Topic Liveliness- Automatic Reliability- Reliable Reliability- Best Effort SQML uses aspect-oriented design to modularize security at various layers of the system DQML uses constraint-checking for analysis and generates intended QoS metadata DataReader "Enhancing Security in Enterprise DRE Systems using DSMLs", Joe Hoffert 3

  4. Ongoing Research DQML input SQML input Platform Independent Model (PIM) for Security Map SQML security onto DQML • Researching: • Integration of SQML and DQML with other analysis/benchmarking tools • Development of higher level DDS services (e.g., fault-tolerance, real-time data, security) • Creation of Security Platform Independent Model (PIM) applicable across technologies • (http://www.dre.vanderbilt.edu/CoSMIC) "Enhancing Security in Enterprise DRE Systems using DSMLs", Joe Hoffert

More Related