Dependable Systems Group - PowerPoint PPT Presentation

1 / 19
About This Presentation
Title:

Dependable Systems Group

Description:

David Sinclair. Verification of distributed systems. Geoff Hamilton ... Ross Dunne, Frederic Ohel, David Tunney. David Gray, Geoff Hamilton , David Sinclair ... – PowerPoint PPT presentation

Number of Views:42
Avg rating:3.0/5.0
Slides: 20
Provided by: Fast
Category:

less

Transcript and Presenter's Notes

Title: Dependable Systems Group


1
Dependable Systems Group
  • David GrayMay 2002
  • Developing reliable secure software

2
(No Transcript)
3
(No Transcript)
4
  • Rory OConnor
  • Intelligent knowledge-based project management
    tools.
  • Process modeling tools.
  • Project management knowledge capture.
  • Tony Moynihan
  • Factors affecting project decision making.
  • Risk management.
  • Project management knowledge capture.
  • Howard Duncan
  • Software Engineering certification and
    professionalism.

5
  • Rory OConnor
  • Extreme Programming.
  • Flexible process models.
  • Tony Moynihan
  • Improving the capabilities of small teams (Gerry
    Coleman).
  • Software process improvement models.
  • Howard Duncan, Rory OConnor
  • Personal Software Process.

6
  • Rory OConnor
  • Software Quality and Web Systems Usability.
  • Programming language choice and qualify factors.
  • Tony Moynihan (Nora Power)
  • Grounded Theory of Requirements Documents.
  • Howard Duncan
  • Legacy systems and software maintenance.

7
(No Transcript)
8
  • Joe Morris
  • Co-inventor of the refinement calculus.
  • Mathematical framework for constructing correct
    programs from specifications.
  • EI Basic Grant
  • Phrasal Programming a new approach to
    constructing programs.

9
  • David Sinclair
  • Verification of distributed systems.
  • Geoff Hamilton
  • Automated verification techniques.
  • Claus Pahl
  • Verification of component-based systems.

10
  • Geoff Hamilton
  • Optimisation of programs using transformation
    techniques.

11
(No Transcript)
12
  • Mike Scott
  • MIRACL Cryptographic Library.
  • Extremely efficient implementations.
  • Identity Based Encryption.
  • Michael Ryan
  • Fast hardware - crypto co-processors.
  • Thibault Candebat
  • Cryptography on small devices PDAs, phones,
    digital cameras,
  • Elliptic Curve Cryptography (MIRACL).

13
  • David Gray, Geoff Hamilton , Claus Pahl, David
    SinclairBen Aziz, Thibault Candebat, Cameron
    Ross Dunne, Frederic Ohel, David Tunney
  • David Gray, Geoff Hamilton , David Sinclair
  • IMPROVE - EI Strategic Grant ST/2000/94 Formal
    Specification Verification of Security
    Protocols.
  • Industrial partner Baltimore Technologies Ltd.
  • Application of formal methods to Public Key
    Infrastructures (PKIs).
  • Claus Pahl
  • Interference Analysis of Security Protocols using
    Refinement Technologies.

14
  • Ben Aziz
  • Verification of security in mobile and
    distributed systems by static analysis.
  • Thibault Candebat
  • PKIs of small devices proof-carrying
    certification protocols.
  • Cameron Ross Dunne
  • Secure location-dependent services on the
    Internet.
  • Frederic Ohel
  • Combining model checkers and theorem provers to
    verify security protocols.
  • David Tunney
  • Extending nominal calculi to allow for reasoning
    about cryptographic primitives.

15
  • Gary Conway
  • Use of Aspect-Oriented Programming to implement
    access control in Java

16
Projects
  • Behavioural IDL
  • David Sinclair
  • Existing Interface Definition Languages (IDLs)
    only describe the static interface to an object.
  • An IDL can be extended to include a description
    of the observable behaviour of an object and how
    it transforms data.
  • This approach has a number of advantages
  • It will enable the verification of a design
    consisting of multiple objects to ensure that the
    software system has specified properties.
  • It will provide the definition of a monitor
    process to check that an object has not performed
    an operation outside its specification
  • It will be possible to generate this process
    automatically.

17
Projects
  • A Secure Infrastructure for Location-Dependent
    Services on the Internet
  • David Gray (Cameron Ross Dunne , Thibault
    Candebat)
  • Location-aware devices are becoming more common.
  • GPS.
  • Over the next few years, mobile phones in USA
    EU must become position-aware for emergency
    calls.
  • EU plans for European global positioning system.
  • This technology will allow location-dependent
    services to be offered.
  • However, there are architectural and security
    issues that need to be addressed.
  • Privacy and accuracy of location information.
  • Interoperability.
  • Efficiency, scalability,
  • The aim of the project is to specify prototype
    a secure infrastructure that will allow location
    information to be used on the Internet.

18
Projects
  • Identity-Based Encryption
  • Mike Scott
  • A users unique identity (e.g. email address) is
    their public key.
  • Therefore, to send an encrypted email to a user,
    only their email address is required.
  • No need to obtain validate a users public key.
  • No need for a Public Key Infrastructure (PKI).
  • Very simple to deploy.
  • Zero-cost privacy.
  • Email clients/servers of the future will support
    IBE transparently.
  • Internet Service providers could issue IBE
    private keys to customers as a value-added extra
    service.
  • Built-in key escrow ("trusted" private key issuer
    can break encryption.), so no "political" issues.
  • Ideal for in-house email communication where a
    companys internal emails are always encrypted.
  • New fast algorithms for implementation have been
    developed here at DCU.

19
Projects
  • Process Improvement for young companies
  • Tony Moynihan, Rory OConnor, Howard Duncan
  • Identify the technical and non-technical problems
    which are typically encountered by Irish start-up
    software companies over the first three years of
    life.
  • Develop a model of the evolution of their
    software development structures and processes
    over this period.
  • Based on these findings, design a software
    process improvement methodology for 'young'
    software companies which is 'tailorable' to their
    particular stage of development.
Write a Comment
User Comments (0)
About PowerShow.com