PRIMORIS      Contacts      FAQs      INSTICC Portal
 

Keynote Lectures

Security and Privacy in the Cloud
Pierangela Samarati, Università degli Studi di Milano, Italy

Native Cloud Applications - Why Virtual Machines, Images and Containers Miss the Point!
Frank Leymann, University of Stuttgart, Germany

Complexity Science with the Internet of Things
Peter Sloot, Complexity Institute Singapore, Singapore; ITMO St. Petersburg; Russion Federation; University of Amsterdam, Netherlands

The New Era of Multi-dimensional Data Management
Verena Kantere, University of Geneva, Switzerland

RTTMM: Role Based 3-Tier Mobility Model for Evaluation of Delay Tolerant Routing Protocols in Post Disaster Situation
Mohammed Atiquzzaman, University of Oklahoma, United States

 

Security and Privacy in the Cloud

Pierangela Samarati
Università degli Studi di Milano
Italy
 

Brief Bio
Pierangela Samarati is a Professor at the Computer Science Department of the Università degli Studi di Milano. Her main research interests are access control policies, models and systems, data security and privacy, information system security, and information protection in general. She has participated in several projects involving different aspects of information protection. On these topics she has published more than 230 papers appeared in journals, conference proceedings, and books. She is co-author of the book "Database Security," Addison-Wesley, 1995. She has been Computer Scientist in the Computer Science Laboratory at SRI, CA (USA). She has been a visiting researcher at the Computer Science Department of Stanford University, CA (USA), and at the Center for Secure Information Systems, George Mason University, VA (USA). She is the chair of the IEEE Systems Council Technical Committee on Security and Privacy in Complex Information Systems (TCSPCIS), and of the Steering Committees of the European Symposium on Research in Computer Security (ESORICS) and of the ACM Workshop on Privacy in the Electronic Society (WPES). She is the Coordinator of the Working Group on Security of the Italian Association for Information Processing (AICA), the Italian representative in the IFIP (International Federation for Information Processing) Technical Committee 11 (TC-11) on "Security and Privacy". She is a member of the Steering Committee of: ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS), International Conference on Information Systems Security (ICISS), and International Conference on Information and Communications Security (ICICS). In 2008, she has received the IFIP TC11 Kristian Beckman Award. In 2009, she has been named ACM Distinguished Scientist. In 2012, she has been named IEEE Fellow. In 2012, she has received the IFIP WG 11.3 Outstanding Research Contributions Award. She has served on the program committees of various conferences. She has served as Program Chair or co-Chair for: International Conference on Applied Cryptography and Network Security (ACNS'12), International Conference on Security and Cryptography (SECRYPT'10 -- SECRYPT'13), International Workshop on Security and Trust Management (STM'12), International Conference on Network and System Security (NSS'10 and NSS'11), Workshop in Information Security Theory and Practices (WISTP'10), Information Security Conference (ISC'09), ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS'07), Annual Computer Security Applications Conference (ACSAC'04 -- ACSAC'08), European Symposium on Research in Computer Security (ESORICS'03 and ESORICS'04), ACM Workshop on Privacy in the Electronic Society (WPES'02 and WPES'03), ACM Conference on Computer and Communications Security (CCS'01), IFIP TC-11 International Information Security Conference (SEC'03 and SEC'08), IFIP WG11.3 Working Conference on Database Security (DBSEC'96 and DBSEC'04).


Abstract
The rapid advancements in Information and Communication Technologies (ICTs) have enabled the emerging of the “cloud” as a successful paradigm for conveniently storing, accessing, processing, and sharing information. With its significant benefits of scalability and elasticity, the cloud paradigm has appealed companies and users, which are more and more resorting to the multitude of available providers for storing and processing data. Unfortunately, such a convenience comes at a price of loss of control over these data and consequent new security threats that can limit the potential widespread adoption and acceptance of the cloud computing paradigm.  In this talk I will illustrate some security and privacy issues arising in the cloud scenario, focusing in particular on the problem of guaranteeing
confidentiality and integrity of data stored or processed by external cloud providers.



 

 

Native Cloud Applications - Why Virtual Machines, Images and Containers Miss the Point!

Frank Leymann
University of Stuttgart
Germany
 

Brief Bio
Frank Leymann is a full professor of computer science and director of the Institute of Architecture of Application Systems at the University of Stuttgart, Germany. His research interests include service oriented computing and middleware, workflow- and business process management, Cloud Computing, transaction processing, integration technology, and architecture patterns. Before accepting his professor position he worked for two decades for IBM Software Group building database and middleware products: He built tools supporting conceptual and physical database design for DB2; built performance prediction and monitoring tools for an object database system; was co-architect of a repository system; built both, a universal relation system as well as a complex object database system on top of DB2; and was co-architect of the MQSeries family. In parallel to that, Frank worked continuously since the late eighties on workflow technology and became the father of IBM's workflow product set. As an IBM Distinguished Engineer and elected member of the IBM Academy of Technology he contributed to the architecture and strategy of IBM's entire middleware stack as well as IBM's On Demand Computing strategy. From 2000 on, Frank worked as co-architect of the Web Service stack. He is co-author of many Web Service specifications, including WSFL, WS-Addressing, WS-Metadata Exchange, WS-Business Agreement, the WS-Resource Framework set of specifications, WS-HumanTask and BPEL4People; together with Satish Thatte, he was the driving force behind BPEL4WS. Also, he is co-author of BPMN 2.0 and TOSCA.


Abstract
Due to the current hype around cloud computing, the term “native cloud application” becomes increasingly popular. It suggests an application to fully benefit from all the advantages of cloud computing. Many users tend to consider their applications as cloud native if the application is just bundled in a virtual machine image or a container. Even though virtualization is fundamental for implementing the cloud computing paradigm, a virtualized application does not automatically cover all properties of a native cloud application. In this work, we propose a definition of a native cloud application by specifying the set of characteristic architectural properties, which a native cloud application has to provide. We demonstrate the importance of these properties by introducing a typical scenario from current practice that moves an application to the cloud. The identified properties and the scenario especially show why virtualization alone is insufficient to build native cloud applications. Finally, we outline how native cloud applications respect the core principles of service-oriented architectures, which are currently hyped a lot in the form of microservice architectures.



 

 

Complexity Science with the Internet of Things

Peter Sloot
Complexity Institute Singapore, Singapore; ITMO St. Petersburg; Russion Federation; University of Amsterdam
Netherlands
 

Brief Bio
Peter Sloot is distinguished research professor at the University of Amsterdam and a full professor and director of the Complexity Institute in NTU, Singapore. He is a Leading Scientist Laureate and has been the PI of many international research programs on complex biomedical systems, like www.virolab.org and www.dynanets.org. He is editor in chief of two highly ranked Elsevier Science journals. He has published over 400 research papers. His work is covered in international media such as newspapers, interviews and documentaries. See: http://staff.science.uva.nl/~sloot/


Abstract
We have covered the planet with sensors, cameras, microphones, drones, tracking devices, you name it. All that data is coming at us with an incredible diversity, volume and speed. It is the goal of the Internet of Things (IoT) to provide an infrastructure that can deal with this paradigm shift in ICT.
Business and industry have already discovered the huge potential the IoT will provide them with. Up to now however the scientific world seems to wait and see.
In this talk I will explore the new science we can expect from using the IoT as an experimental platform to study truly complex systems. The need for that is urgent and knocking at our door:  We live in a complex world and are surrounded by complex systems: from a biological cell, made of thousands of different molecules that seamlessly work together, to millions of computer systems that should work together, to our society, a collection of seven billion individuals that try to work and live together. These complex systems display endless signatures of order, disorder, self-organization and self-annihilation.Understanding, quantifying and handling this complexity is one of the biggest scientific challenges of our time. I will discuss ways in which the IoT can help us to make sense of the world around us, to analyze, predict and nudge control its amazing complexity.



 

 

The New Era of Multi-dimensional Data Management

Verena Kantere
University of Geneva
Switzerland
 

Brief Bio
Verena Kantere is a Maître d’ Enseignement et de Recherche - Senior Lecturer at the Centre of Informatics (CUI) at the University of Geneva. Before she was a Senior Researcher and the Excellence Grant Holder at CUI, University of Geneva (UniGe) working towards the provision and exchange of data services in cloud environments, focusing on the management of Big Data and performance of Big Data analytics, by developing methods, algorithms and fully fledged systems. Before coming to the UniGe she was a tenure-track junior assistant professor at the Department of Electrical Engineering and Information Technology at the Cyprus University of Technology (CUT). She has received a Diploma and a Ph.D. from the National Technical University of Athens, (NTUA) and a M.Sc. from the Department of Computer Science at the University of Toronto (UofT), where she also started her PhD studies. After the completion of her PhD studies she worked as a postdoctoral researcher at the Ecole Polytechnique Federale de Lausanne (EPFL). During her graduate studies she developed methods, algorithms and fully fledged systems for data exchange and coordination in Peer-to-Peer (P2P) overlays with structured and unstructured data, focusing on the solution of problems of data heterogeneity, query processing and rewriting, multi-dimensionality and management of continuous queries. Furthermore, she has shown interest and work in the field of the Semantic Web, concerning the problem of semantic similarity, annotation, clustering and integration.


Abstract
Ubiquitous computing and modern data collection tools have given rise to a new era of data management, in which the data as well as the processing environments are enormous and diverse. In this era in which the terms Big Data and Cloud Computing prevail, the success of data management relies in optimizing data processing on multiple dimensions and delivering data services with multifarious quality guarantees. In this talk we will discuss the challenges and the opportunities of the new era of data management and we will explore the possibilities and limitations of multi-dimensional data management. We will focus more on the incorporation of the notion of cost in traditional and new techniques and the role of data heterogeneity. The talk will summarize recent work on a novel economy model for a cloud where users pay on-the-go for the data services they receive and user payments can be used for service provision, infrastructure maintenance and profit. The discussion will go further to the requirement of approximately querying big heterogeneous data in such an environment. The talk will conclude with a discussion on the special management requirements of big analytical data collections and how these could be fulfilled employing cloud data services.



 

 

RTTMM: Role Based 3-Tier Mobility Model for Evaluation of Delay Tolerant Routing Protocols in Post Disaster Situation

Mohammed Atiquzzaman
University of Oklahoma
United States
 

Brief Bio
Mohammed Atiquzzaman (Senior Member, IEEE) obtained his M.S. and Ph.D. in Electrical Engineering and Electronics from the University of Manchester (UK) in 1984 and 1987, respectively.  He currently holds the Edith J Kinney Gaylord Presidential professorship in the School of Computer Science at the University of Oklahoma.
Dr. Atiquzzaman is the Editor-in-Chief of Journal of Networks and Computer Applications, the founding Editor-in-Chief of Vehicular Communications, and serves/served on the editorial boards of many journals including IEEE Communications Magazine, Real Time Imaging Journal, International Journal of Communication Networks and Distributed Systems and Journal of Sensor Networks and International Journal of Communication Systems. He co-chaired the IEEE High Performance Switching and Routing Symposium (2003, 2011), IEEE Globecom and ICC (2014, 2012, 2010, 2009, 2007, 2006), IEEE VTC (2013)  and the SPIE Quality of Service over Next Generation Data Networks conferences (2001, 2002, 2003). He was the panels co-chair of INFOCOM’05, and is/has been in the program committee of many conferences such as INFOCOM, Globecom, ICCCN, ICCIT, Local Computer Networks, and serves on the review panels at the National Science Foundation. He is the current Chair of IEEE Communication Society Technical Committee on Communications Switching and Routing.
Dr. Atiquzzaman received IEEE Communication Society's Fred W. Ellersick Prize, and NASA Group Achievement Award for "outstanding work to further NASA Glenn Research Center's effort in the area of Advanced Communications/Air Traffic Management's Fiber Optic Signal Distribution for Aeronautical Communications" project. He is the co-author of the book “Performance of TCP/IP over ATM networks” and has over 270 refereed publications, available at www.cs.ou.edu/~atiq.
His current research interests are in areas of transport protocols, wireless and mobile networks, ad hoc networks, satellite networks, power-aware networking, and optical communications. His research has been funded by National Science Foundation (NSF), National Aeronautics and Space Administration (NASA), and U.S. Air Force, Cisco and Honeywell.


Abstract
In Internet of Things (IoT) the devices are interconnected through Internet with several redundant paths, but they are still vulnerable to the effects of large scale disasters such as earthquakes and floods. The disaster area may be disconnected from the rest of the Internet and the need arises to get information about the victims.
Adhoc networks like MANETs and DTNs are most suitable to support the communication in partitioned networks, such as a network in a post disaster situation. Even an adhoc network becomes one of the essential network architecture in IoT and attracted lots of attention in the last decade. The disaster affects the several regions with different intensities called each region as disaster event which are located nearer to each other.
Each disaster event is assigned a group of rescue entities with hand held IoT device, where they perform the tactical operation. The movement pattern of the rescue entities in a post disaster area is described by a mobility model which is used to evaluate the routing protocols for post disaster scenario networks. Existing mobility models for post disaster scenarios do not distribute the rescue entities in proportion to the intensity of disaster events in the case of multiple events occurring simultaneously. In this work, we propose the Role-based 3-Tier Mobility Model (RTTMM) to mimic the movement pattern of different rescue entities involved in the disaster relief operation by distributing them based on the proportion of the intensity of the disaster event.
Our model generates the mobility traces of the rescue entities, which are fed as input to the DTN routing protocols. We also evaluate the performance of existing DTN routing protocols using the traces obtained from RTTMM.



footer