KMi Seminars
Model-based Security Engineering
This event took place on Tuesday 25 April 2006 at 12:30

 
Dr Jan Jurjens Technical University of Munich

The current state of the art in security-critical software is far from satisfactory: New security vulnerabilities are detected on an almost daily basis. To improve this situation, we develop techniques and tools that perform an automated analysis of software artefacts for security requirements (such as secrecy, integrity, and authenticity). These artefacts include specifications in the Unified Modeling Language (UML), annotated source code, and run-time data such as security permissions. The security analysis techniques make use of model-checkers and automated theorem provers for first-order logic. We give examples for security flaws found in industrial software using our tools.

Download PowerPoint presentation (3.4Mb ZIP file)

 
KMi Seminars
 

Future Internet is...


Future Internet
With over a billion users, today's Internet is arguably the most successful human artifact ever created. The Internet's physical infrastructure, software, and content now play an integral part of the lives of everyone on the planet, whether they interact with it directly or not. Now nearing its fifth decade, the Internet has shown remarkable resilience and flexibility in the face of ever increasing numbers of users, data volume, and changing usage patterns, but faces growing challenges in meetings the needs of our knowledge society. Globally, many major initiatives are underway to address the need for more scientific research, physical infrastructure investment, better education, and better utilisation of the Internet. Within Japan, USA and Europe major new initiatives have begun in the area.

To succeed the Future Internet will need to address a number of cross-cutting challenges including:

  • Scalability in the face of peer-to-peer traffic, decentralisation, and increased openness

  • Trust when government, medical, financial, personal data are increasingly trusted to the cloud, and middleware will increasingly use dynamic service selection

  • Interoperability of semantic data and metadata, and of services which will be dynamically orchestrated

  • Pervasive usability for users of mobile devices, different languages, cultures and physical abilities

  • Mobility for users who expect a seamless experience across spaces, devices, and velocities