Author Manuscript, Published in "2nd International Workshop on Software Engineering for Resilient Systems (serene 2010) Dependability in Dynamic, Evolving and Heterogeneous Systems: the Connect Approach

The EU Future and Emerging Technologies (FET) Project Connect aims at dropping the heterogeneity barriers that prevent the eternality of networking systems through a revolutionary approach: to synthesise on-the-fly the Connectors via which networked systems communicate. The Connect approach, however, comes at risk from the standpoint of dependability, stressing the need for methods and tools that ensure resilience to faults, errors and malicious attacks of the dynamically Connected system. We are investigating a comprehensive approach, which combines dependability analysis, security enforcement and trust assessment, and is centred around a lightweight adaptive monitoring framework. In this project paper, we overview the research that we are undertaking towards this objective and propose a unifying workflow process that encompasses all the Connect dependability/security/trust concepts and models.

[1]  Paola Inverardi,et al.  Capturing functional and non-functional connector , 2010 .

[2]  Fabio Massacci,et al.  Security-by-Contract (SxC) for Software and Services of Mobile Systems , 2009 .

[3]  Sharon Paradesi,et al.  Integrating Behavioral Trust in Web Service Compositions , 2009, 2009 IEEE International Conference on Web Services.

[4]  Andrea Bondavalli,et al.  Model-Based Evaluation as a Support to the Design of Dependable Systems , 2005 .

[5]  Lionel Brunie,et al.  T2D: a peer to peer trust management system based on disposition to trust , 2010, SAC '10.

[6]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[7]  Fabio Martinelli,et al.  A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application , 2008, ISoLA.

[8]  Radu Grosu,et al.  Software monitoring with bounded overhead , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[9]  Antonia Bertolino,et al.  Scaling up SLA monitoring in pervasive environments , 2007, ESSPE '07.

[10]  Jean-Claude Laprie,et al.  From Dependability to Resilience , 2008, DSN 2008.

[11]  Fabio Massacci,et al.  Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code , 2007, EuroPKI.

[12]  Fabio Massacci,et al.  Enhancing Java ME Security Support with Resource Usage Monitoring , 2008, ERCIM News.

[13]  C. R. Ramakrishnan,et al.  Model-Carrying Code (MCC): a new paradigm for mobile-code security , 2001, NSPW '01.

[14]  Athman Bouguettaya,et al.  Reputation Propagation in Composite Services , 2009, 2009 IEEE International Conference on Web Services.

[15]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM '01.

[16]  Valérie Issarny,et al.  Conceptual Models for Assessment & Assurance of Dependability, Security and Privacy in the Eternal CONNECTed World , 2010 .

[17]  William H. Sanders,et al.  Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.

[18]  Giovanna Di Marzo Serugendo,et al.  Robustness and Dependability of Self-Organizing Systems - A Safety Engineering Perspective , 2009, SSS.

[19]  Daniel C. DuVarney,et al.  Model-carrying code: a practical approach for safe execution of untrusted applications , 2003, SOSP '03.

[20]  Robert L. Wears,et al.  Resilience Engineering: Concepts and Precepts , 2006, Quality and Safety in Health Care.

[21]  Kyung-Goo Doh,et al.  Trust Type Based Semantic Web Services Assessment and Selection , 2008, 2008 10th International Conference on Advanced Communication Technology.

[22]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.