GEMOM - Significant and Measurable Progress beyond the State of the Art

GEMOM (Genetic Message Oriented Secure Middleware) is an EU FP7 ICT project that focuses on the significant and measurable increase in the end-to-end intelligence, security and resilience of complex, distributed information systems. Complex, distributed software systems are virtually impossible to implement without heavy use of messaging infrastructure. While the existing state of the art achieves arbitrary resilience by a brute-force approach, self-healing is either rudimentary or non-existent. GEMOM, with its fluid, resilient, self-healing and adaptive messaging allows for flexible messaging solutions and offers monitoring, management and maintenance incrementally. Its adaptive security solution will learn and adapt to changing environments during run-time in the face of changing threats without sacrificing the efficiency, flexibility, reliability and security of the system. This paper describes the significant and measurable progress beyond state of the art envisioned by the GEMOM project.

[1]  Joel Weise Security Architecture and Adaptive Security By , 2008 .

[2]  R. M. Venkatesan,et al.  Threat-adaptive security policy , 1997, 1997 IEEE International Performance, Computing and Communications Conference.

[3]  Jared D. DeMott The Evolving Art of Fuzzing , 2006 .

[4]  Jon Whittle,et al.  A Survey of Approaches to Adaptive Application Security , 2007, International Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS '07).

[5]  Habtamu Abie,et al.  A Conceptual Formal Framework for Developing and Maintaining Security-Critical Systems , 2005 .

[6]  Graham Morgan,et al.  A Message Oriented Middleware Solution Enabling Non-repudiation Evidence Generation for Reliable Web Services , 2007, ISAS.

[7]  Jörgen Hansson,et al.  An adaptable security manager for real-time transactions , 2000, Proceedings 12th Euromicro Conference on Real-Time Systems. Euromicro RTS 2000.

[8]  Seyed Masoud Sadjadi,et al.  A Survey of Adaptive Middleware , 2003 .

[9]  Jun Zou,et al.  Architecture and fuzzy adaptive security algorithm in intelligent firewall , 2002, MILCOM 2002. Proceedings.

[10]  Betty H. C. Cheng,et al.  A Taxonomy of Compositional Adaptation , 2004 .

[11]  P. Lamanna,et al.  ADAPTIVE SECURITY POLICIES ENFORCED BY SOFTWARE DYNAMIC TRANSLATION , 2002 .

[12]  A. Shnitko Adaptive security in complex information systems , 2003, 7th Korea-Russia International Symposium on Science and Technology, Proceedings KORUS 2003. (IEEE Cat. No.03EX737).

[13]  Seyed Masoud Sadjadi,et al.  Composing adaptive software , 2004, Computer.

[14]  K. Schwan,et al.  Dynamic authentication for high-performance networked applications , 1998, 1998 Sixth International Workshop on Quality of Service (IWQoS'98) (Cat. No.98EX136).

[15]  Creighton Tsuan-Ren Hager,et al.  Context Aware and Adaptive Security for Wireless Networks , 2004 .

[16]  Li Zhou,et al.  Adaptive trust negotiation and access control , 2005, SACMAT '05.

[17]  Guofei Jiang,et al.  Semantic message oriented middleware for publish/subscribe networks , 2004, SPIE Defense + Commercial Sensing.

[18]  Declan O'Sullivan,et al.  Towards a Managed Extensible Control Plane for Knowledge-Based Networking , 2006, DSOM.

[19]  Habtamu Abie,et al.  Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems , 2004, ICICS.