This paper introduces a new collaboration abstraction, called Semantic Room (SR), specifically targeted to facilitating sharing and processing large volumes of data produced and consumed in real time by a collection of networked participants. The model enables constructing flexible collaborative event-driven distributed systems with well-defined and contractually regulated properties and behavior. The contract determines the set of services provided by SR, the software and hardware resources required for its operation along with a collection of non-functional requirements, such as, data protection, isolation, trust, security, availability, fault-tolerance, and performance. We show how the SR model can be leveraged for creating trusted information processing systems for the sake of protecting financial institutions against coordinated security threats (e.g., stealthy scans, worm outbreaks, Distributed Denial of Service). To this end, we present several use-cases demonstrating a variety of the SR administration task flows, and briefly discuss possible ways of implementing the SR abstraction using the collaborative intrusion detection as an example.
A contract-based event driven model for collaborative security in financial information systems / Baldoni, Roberto; Lodi, Giorgia; Chockler, Gregory; Dekel, Eliezer; Mulcahy, Barry P.; Martufi, Giuseppe. - STAMPA. - 4:(2010), pp. 147-153. (Intervento presentato al convegno 12th International Conference on Enterprise Information Systems, ICEIS 2010 tenutosi a Funchal, prt nel 2010).
A contract-based event driven model for collaborative security in financial information systems
BALDONI, Roberto;
2010
Abstract
This paper introduces a new collaboration abstraction, called Semantic Room (SR), specifically targeted to facilitating sharing and processing large volumes of data produced and consumed in real time by a collection of networked participants. The model enables constructing flexible collaborative event-driven distributed systems with well-defined and contractually regulated properties and behavior. The contract determines the set of services provided by SR, the software and hardware resources required for its operation along with a collection of non-functional requirements, such as, data protection, isolation, trust, security, availability, fault-tolerance, and performance. We show how the SR model can be leveraged for creating trusted information processing systems for the sake of protecting financial institutions against coordinated security threats (e.g., stealthy scans, worm outbreaks, Distributed Denial of Service). To this end, we present several use-cases demonstrating a variety of the SR administration task flows, and briefly discuss possible ways of implementing the SR abstraction using the collaborative intrusion detection as an example.File | Dimensione | Formato | |
---|---|---|---|
VE_2010_11573-940335.pdf
solo gestori archivio
Tipologia:
Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
1.24 MB
Formato
Adobe PDF
|
1.24 MB | Adobe PDF | Contatta l'autore |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.