Signing Protocol for Service Level Agreements in Virtual Organizations - PowerPoint PPT Presentation

1 / 11
About This Presentation
Title:

Signing Protocol for Service Level Agreements in Virtual Organizations

Description:

Signing Protocol for Service Level Agreements in Virtual Organizations' ... The challenge is to match a 'right' contract signing protocol to dynamic VO requirements ... – PowerPoint PPT presentation

Number of Views:31
Avg rating:3.0/5.0
Slides: 12
Provided by: sics
Category:

less

Transcript and Presenter's Notes

Title: Signing Protocol for Service Level Agreements in Virtual Organizations


1
Signing Protocol for Service Level Agreements in
Virtual Organizations Environment a Study
Based on TrustCoM Framework
  • By
  • Rabih Ghannoum
  • Olga Cerrato
  • Supervised by
  • Gustav Boström (DSV)
  • Pablo Giambiagi (SICS)

2
Agenda
  • Introduction
  • Background
  • Problem
  • Objective
  • Audience
  • Method
  • Limitations

3
Introduction
  • This presentation covers the first chapter of our
    thesis. The first chapter presents a complete
    outline of the thesis, what it is about, why, and
    how it is carried out.

4
Background
  • Concept of Virtual Organizations (VOs)
  • E.g TrustCoM
  • VO technologies
  • VO trust and security aspects
  • Service Level Agreements (SLAs)
  • Contract Signing Protocols

5
Problem
  • Real life vs. electronic contract signing
  • Simultaniety vs. fairness
  • Each protocol gives certain security properties
  • The challenge is to match a right contract
    signing protocol to dynamic VO requirements

6
Objective
  • The end result of our thesis work is 1) to
    choose and 2) implement a prototype of the
    contract signing protocol, that is most suitable
    for SLAs in dynamic VOs.

7
Audience
  • Beneficiaries of this work are the developers of
    similar projects to TrustCoM, i.e. those who want
    to know what SLA signing protocol suits best for
    dynamic VOs
  • Those who use TrustCom for VO development
  • Those who use other frameworks for VO development
    and want to compare
  • Others, who want to gain an overview of contract
    signing protocols

8
Method 1
  • This work is an example of artefact development
  • Logical level inductive method
  • Approach level explorative study
  • Method level literature survey
  • Analysis level qualitative

9
Method 2
Sign. protocols survey
Risk analysis using TrustCom Documentation
S T EP 2
S T EP 1
Sign. protocols properties
Security requirements
Protocol-property matrix
Step 3 Mapping between TrustCom requirements and
protocol properties
10
Method 3
11
Limitations
  • Only contract signing protocols are covered
  • Not all existing protocols are presented
  • Not applicable to all VOs
  • But the process and the information on protocols
    can still be used
Write a Comment
User Comments (0)
About PowerShow.com