Research Outputs

2022 2022 2021 2021 2020 2020 2019 2019 2018 2018 2017 2017 2016 2016 2015 2015 2014 2014 2013 2013 0.0 0.0 1.0 1.0 2.0 2.0 3.0 3.0 4.0 4.0 5.0 5.0 6.0 6.0 7.0 7.0
Now showing 1 - 10 of 48
  • Publication
    Tectons : Towards a Generalised Approach to Programming Systems of Systems
    (Europe, 2015)
    Coulson, Geoff 
    ;
    Mauthe, Andreas 
    ;
      139
  • Publication
    Trustworthy Evidence Gathering Mechanism for Multilayer Cloud Compliance.
    (2014)
    Florian, M. 
    ;
    Paudel, S. 
    ;
    Cloud Computing allows the designing of systems which dynamically acquire compute resources. This makes it very suitable for Critical Infrastructures where unpredictable load due to human usage patterns are very likely. Especially in this domain legal compliance is a growing concern in general. Abstraction over multiple architectural cloud layers allows for individual layers being operated by different providers. This makes it hard to determine whether legal compliance is given. In this paper we motivate the research towards an Event Gathering Mechanism which is envisioned to allow the modelling of legal aspects in a multi layered cloud environment.
      92Scopus© Citations 6
  • Publication
    Function-as-a-Service Benchmarking Framework
    Cloud Service Providers deliver their products in form of ”as-a-Service”, which are typically categorized by the level of abstraction. This approach hides the implementation details and shows only functionality to the user. However, the problem is that it is hard to measure the performance of Cloud services, because they behave like black boxes. Especially with Function-as-a-Service it is even more difficult because it completely hides server and infrastructure management from users by design. Cloud Service Prodivers usually restrict the maximum size of code, memory and runtime of Cloud Functions. Nevertheless, users need clarification if more ressources are needed to deliver services in high quality. In this regard, we present the architectural design of a new Function-as-a-Service benchmarking tool, which allows users to evaluate the performance of Cloud Functions. Furthermore, the capabilities of the framework are tested on an isolated platform with a specific workload. The results show that users are able to get insights into Function-as-a-Service environments. This, in turn, allows users to identify factors which may slow down or speed up the performance of Cloud Functions.
      509Scopus© Citations 1
  • Publication
      122Scopus© Citations 2
  • Publication
    A Multi-Layer and Multi-Tenant Cloud Assurance Evaluation Methodology
    (2015)
    Hudic, A. 
    ;
    ;
    Loruenser, T. 
    ;
    Krotsiani, M. 
    ;
    Spanoudakis, G. 
    ;
    Mauthe, A. 
    ;
    Weippl, E. 
    Data with high security requirements is being processed and stored with increasing frequency in the Cloud. To guarantee that the data is being dealt in a secure manner we investigate the applicability of Assurance methodologies. In a typical Cloud environment the setup of multiple layers and different stakeholders determines security properties of individual components that are used to compose Cloud applications. We present a methodology adapted from Common Criteria for aggregating information reflecting the security properties of individual constituent components of Cloud applications. This aggregated information is used to categorise overall application security in terms of Assurance Levels and to provide a continuous assurance level evaluation. It gives the service owner an overview of the security of his service, without requiring detailed manual analyses of log files.
      153Scopus© Citations 8
  • Publication
    Towards continuous Cloud Service Assurance for Critical Infrastructure IT
    (2014-08-27)
    Hudic, A. 
    ;
    Mauthe, A. 
    ;
    Caceres, S. 
    ;
    Hecht, T. 
    ;
    The momentum behind Cloud Computing has revolutionized how ICT services are provided, adopted and delivered. Features such as high scalability, fast provisioning, on demand resource availability makes it an attractive proposition for deploying complex and demanding systems. Clouds are also very suitable for deploying systems with unpredictable load patterns including Critical infrastructure services. Though, the major obstacle in hosting Critical infrastructures is often a lack of assurance. The transparency and flexibility offered by the Cloud, abstracts per definition over e.g. data placement, hardware, service migration. This makes it very hard to assure security properties. We present an investigation of assurance approaches, an analysis of their suitability for Critical Infrastructure Services being deployed in the Cloud and presents our approach.
      119Scopus© Citations 8
  • Publication
    Information Assurance System in the Arrowhead Project
    (ERCIM EEIG, 2014-04)
    Plosz, S. 
    ;
    ;
    Varga, P. 
      124
  • Publication
    Assuring Resilience, Security and Privacy for Flexible Networked Systems and Organisations
    (Schloss Dagstuhl Leibniz-Zentrum für Informatik, 2015)
    Hutchison, David 
    ;
    Nahrstedt, Klara 
    ;
    Schöller, Marcus 
    ;
    Spiecker gen. Döhmann, Indra 
    ;
      142
  • Publication
    Interacting with the Arrowhead Local Cloud: On-boarding Procedure
    (IEEE, 2018-05) ; ;
    Hegedűs, Csaba 
    ;
    ;
    Delsing, Jerker 
    ;
    Eliasson, Jens 
    Industrial automation systems are advancing rapidly and a wide range of standards, communication protocols and platforms supporting the integration of devices are introduced. It is therefore necessary to design and build appropriate tools and frameworks that allow the integration of devices with multiple systems and services. In this work we present the Arrow-head Framework, used to enable collaborative IoT automation and introduce two support core systems, SystemRegistry and DeviceRegistry, which are needed to create a chain of trust from a hardware device to a software system and its associated services. Furthermore, we propose an on-boarding procedure of a new device interacting with the Arrowhead local cloud. This ensures that only valid and authorized devices can host software systems within an Arrowhead local cloud.
      179Scopus© Citations 27