3
Aniketos context Dynamically changing composite services and service environment Several service providers involved End users shouldn’t care about what’s under the hood 1 Service end user Service provider ! ? Goal: Make composite services able to establish and maintain security and trustworthiness Design-time discovery and composition support Changed components/threats/environment adapt / recompose Run-time trust and security monitoring, threat notification Case studies: telecom, public services and ATM Aniketos in brief

Aniketos summary

Embed Size (px)

DESCRIPTION

A short summary of the Aniketos project's goals.

Citation preview

Page 1: Aniketos summary

Aniketos context� Dynamically changing composite

services and service environment� Several service providers involved� End users shouldn’t care about

what’s under the hood

1

Service end user

Service provider

!

?

� Goal: Make composite services able to establish and maintain security and trustworthiness� Design-time discovery and composition support� Changed components/threats/environment → adapt / recompose� Run-time trust and security monitoring, threat notification

� Case studies: telecom , public services and ATM

Aniketos in brief

Page 2: Aniketos summary

The ANIKETOS platformDesign-time support Runtime support

Community support

Trustworthiness monitoring and evaluation

Runtime validation of secure service behaviour

Composite service adaptation and recompostion

Trustworthiness definition and evaluation

Security property definition and evaluation

Composite service analysis and preparation

ANIKETOS market place

Threat analysis and notification

End user trust and assurance

Reference architecture and patterns

Page 3: Aniketos summary

Outreach activities – Follow us� Community building

� Community of interest (email lists, LinkedIn group, etc.)� Open source community� European networks , end-user organizations and experts� Follow, contribute to and ensure usage of relevant standards

� Trainings� Distance learning materials� Live trainings targeting internal and external audience

� Demonstrations� Dissemination and exploitation

Contact Zeta Dooly, [email protected] to join community

3