|
A tutorial is a specialized session on a particular topic, which may including or not practical training, lectured by an instructor who is an expert in that topic. The duration of tutorials can be 3 hours (half-day) with a break or 6 hours (full-day) with three breaks, including one for lunch.
Brief Bio of Prof. Eduardo B. Fernandez Eduardo B. Fernandez (Eduardo Fernandez-Buglioni) is a professor in the Department of Computer Science and Engineering at Florida Atlantic University in Boca Raton, Florida. He has published numerous papers on authorization models, object-oriented analysis and design, and fault-tolerant systems. He has written three books on these subjects. He has lectured all over the world at both academic and industrial meetings. He has created and taught several graduate and undergraduate courses and industrial tutorials. His current interests include patterns for object-oriented design and web services security. He holds a MS degree in Electrical Engineering from Purdue University and a Ph.D. in Computer Science from UCLA. He is a Senior Member of the IEEE, and a Member of ACM. He is an active consultant for industry, including assignments with IBM, Allied Signal, Motorola, Harris, Lucent, and others. He is also a frequent proposal reviewer for NSF. Abstract: Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices to develop basic models that can be used for new designs. Security patterns join the extensive knowledge accumulated about security with the structure provided by patterns to provide guidelines for secure system design and evaluation. We show a variety of security patterns and their use in the construction of secure systems. These patterns include Authentication, Authorization, Role-based Access Control, Firewalls, Protected Execution Environment, and others. We combine some of these patterns to build Single-Sign-On architectures, web services authorization, authorized applications, and others. We apply these patterns through a secure system development method that use different mechanisms based on a hierarchical architecture whose layers define the scope of each security mechanism. First, the possible attacks and the rights of the users are defined from extended Use Cases using a Role-Based Access Control (RBAC) model. These rights are then reflected in the conceptual class model. We then define additional security constraints that apply to distribution and concurrency aspects, as well as navigational user interfaces. In the implementation levels we select patterns, components, and languages to realize the needed functions. We use a catalog of security patterns that help defining the security mechanisms at each architectural level and at each development stage. The patterns are shown using UML models and examples are taken from out forthcoming book “Security Patterns”. Attendees will be able to understand security patterns and how can they be used to build secure systems. In his presentation, Prof. Fernandez will address: - Introduction
Brief Bio of Dr. Jan Dietz Jan Dietz is Professor
in Information Systems Design in the Department of Computer Science at
Delft University of Technology (The Netherlands). He has designed and
implemented a variety of information systems, and he has published about
200 scientific and professional papers as well as several books. He is
member of IFIP WG8.1 (Design and Evaluation of Information Systems). He
has been lecturer in many post graduate courses, and he has held several
managerial positions in organizing these courses. Next to that he has
done consultancy work in all kinds of enterprises. His core interests
are in modelling, redesigning and re-engineering business processes, and
in designing and engineering advanced ICT-applications to support them.
In this area he has (co)supervised over 150 M.Sc.’s and 10 Ph.D.’s. His
current passion is enterprise ontology and enterprise architecture. Jan
Dietz is the spiritual father of DEMO (Design & Engineering Methodology
for Organizations) and is co-founder of the DEMO Knowledge Center
(www.demo.nl).
Abstract: Managing an enterprise,
(re)designing and (re)engineering an enterprise, as well as getting
services from an enterprise as a client or collaborating with it as
partner in a network, is far more complicated nowadays than it was in
the past. These problems are rather well known, as is the role that
information systems play. Their complexity can only be mastered if two
conditions are fulfilled. The first is that one disposes of an
appropriate theory about the ‘construction’ and ‘operation’ of
enterprises. The other condition is that there are appropriate
methodologies, which are based on that theory. The theory should lead to
a conception of an enterprise that is coherent, comprehensive,
consistent and concise, and that only contains the essence of the
construction and operation of an enterprise, its deep structure,
abstracted from all realisation and implementation issues. We will call
such a conception an enterprise ontology. The author’s interest in
enterprise ontology is motivated by the sense that a vigorous
counterbalance is needed to the current dominant technocratic and
bureaucratic way of thinking. As an example, the implementation of an
ERP package in an enterprise may easily take several years and cost a
huge amount of money. This money is partly spent to having the supplier
of the package (or some intermediary company) explain how to use it, and
partly to have the enterprise adapt the current way of working such that
it fits the straitjacket of the ERP package. Another example is the
attempt by people to get the service that companies and governmental
agencies say they will get in their advertisements. Often one ends up by
not having got the service but by being frustrated. In both cases the
cause of the failure is that the construction and operation of these
systems is completely opaque, while their being transparent is a
prerequisite for solving the problems. The transparency of the operation
of enterprises should be no less than a civil right already; it will
become indispensable in a future cyber culture. In this tutorial a
theory of enterprises is presented that offers the transparency that is
needed. Next a practical method is discussed and exercised, which
provides effective help in builiding enterpirse ontologies. Several
example cases illustrate the notion of enterprise ontology and its
practical applications. In his presentation, Prof.
Dietz will address: - Introduction: the problems
|