Submit a Paper

The Third International Conference on Advances in Semantic Processing

SEMAPRO 2009

October 11-16, 2009 - Sliema, Malta


Tutorials

Special Tutorial: Tools and Services for Data Intensive Research
by Roger S. Barga, PhD, Microsoft Research

T1. Secure Multicast Communications
by Prof. Dr. J. William Atwood, Concordia University, Canada

T2. Optimizing Communications in Wireless Sensor Networks with Machine Learning
by Dr. Anna Förster,University of Lugano, Switzerland

T3. Open Smart Cards for Access Control, Services and Applications
by Prof. Dr. Pascal Urien,Telecom ParisTech, France

 

DETAILS

Special Tutorial: Tools and Services for Data Intensive Research
by Roger S. Barga, PhD, Microsoft Research

Note: Roger will provide the attendees with both software and supporting documentation of Microsoft Dryad on a USB drive that we will hand

Data Deluge in Scientific Research. Most scientific data analysis comprise analyzing voluminous data collected from various models and instruments. Efficient parallel/concurrent algorithms and frameworks are key to meeting scalability and performance requirements entailed in such scientific data analysis. Microsoft Research is working with researchers to apply and evaluate the same technology we routinely use in search to analyze petabytes of data on clusters of thousands of computers, to tackle data intensive research challenges. We are also providing this software, with programming guides and tutorials, for academic research and education. In this tutorial we will present a hands-on introduction to Microsoft Dryad, a high-performance general-purpose distributed computing engine that is designed to simplify the task of implementing distributed applications on clusters ofWindows-based computers. DryadLINQ allows developers to implement Dryad applications in managed code by using an extended version of the LINQ programming model and API. Attendees will given a USB drive containing the Dryad software, along with programming guides and development documentation to take back to their lab for continued investigations and application.

T1. Secure Multicast Communications
by Prof. Dr. J. William Atwood, Concordia University, Canada

As the number of Content Distribution applications continues to increase, demand for network bandwidth is growing very strongly.  The use of multicast data transmission can reduce the resource requirements for the Network Provider, so that more customers can be accommodated.  However, new features are required for the multicast distribution model: encryption (to prevent theft of services), authentication (to identify legitimate senders and receivers), authorization (to ensure that participants have the right to the services delivered), accounting (to recover revenue from the subscribers), secure management of routing and the multicast data distribution tree (to ensure that the data are not delivered to invalid destinations), and digital rights management (to ensure that participants do not exceed the rights granted by their authorization).  To be useful to the Network Service Provider, this must occur in an environment where direct trust relationships among the Content Provider, its Network Provider, the End User, and his/her Network Provider often do not exist.  The tutorial will start with the motivation for using multicast, and then outline the progress that has been made in providing solutions to the problems outlined above: key management for encryption, participant control (AAA for senders and receivers), secure routing and distribution tree management, and digital rights management.

T2. Optimizing Communications in Wireless Sensor Networks with Machine Learning
by Dr. Anna Förster,University of Lugano, Switzerland

Wireless Sensor Networks (WSNs) are networks of distributed autonomous devices that can sense or monitor physical or environmental conditions cooperatively. WSNs face many challenges, mainly caused by communication failures, storage and computational constraints and limited power supply. Paradigms of machine learning (ML) have been successfully used in recent years to address various communication challenges such as data aggregation and fusion, energy aware routing and clustering, medium access and task scheduling. Machine Learning brings about flexibility, autonomous behavior, and robustness against topology changes, communication failures and scenario changes. However, WSN developers are usually not or not completely aware of the potential these algorithms offer.

This tutorial intends to close this gap and to offer a concise introduction to various machine learning techniques, which have been shown to be well suited to optimizing communications in WSNs. We will discuss some recent research works in the area, their advantages and disadvantages. Further we will explore possible future applications of machine learning to communication problems in WSNs and will identify the best suited ML algorithms. Upon request from the participants, we will attempt to sketch ML based solutions to their particular related problems.

This tutorial is suited for both researchers and practitioners. Although the focus of the tutorial is on WSN, people from various communities can profit from it, such as vehicular networking, delay-tolerant networking, mobile ad hoc networking, peer-to-peer networking etc.

T3. Open Smart Cards for Access Control, Services and Applications
by Prof. Dr. Pascal Urien,Telecom ParisTech, France

Summary

This tutorial presents open technologies enforcing trust, for access control issues in  networks and associated applications & services. Radio technologies and WLANs deployments create ubiquitous services, providing file downloading and streaming facilities in a transparent way. Although efficient cryptographic algorithms (either symmetric or asymmetric) make it possible to design strong access protocols, trust is a key factor in order to avoid identity hijacking for the emerging "always on" society. For several years we work on open architectures, dealing tamper resistant devices, which enforce trust and access control for both WLANs and WEB applications. In 2008 more than 3 billion smart cards were produced; about one billion of these devices include a java virtual machine and execute java programs in trusted computing platforms. We will introduce EAP smart cards embedding authentication methods (EAP-TLS, EAP-AKA...) whose interface is currently defined by an IETF draft and that can be plugged in windows laptops or RADIUS servers. We will show how such architectures may help to solve identity protection issues. We will describe processing of keys-tree (used for wireless services) in such smart cards. Finally we present strong access controls mechanisms to WEB sites, based on embedded SSL stacks.

Keywords : Security, WLAN, WEB Applications, Smartcards

Learnings Objectives

  1. Why trusted computing is necessary for access control in networks and WEB applications. Introducing side channel attacks.
  2. What is a smart card; virtual machines for smart cards; java cards and dotnet card.
  3. Defining trusted services for the Extensible Authentication Protocol (EAP); EAP methods embedded in smart cards. The OpenEapSmartcard open software.
  4. A practical use case, plugging EAP smart cards in Windows laptops for access control in IEEE 802.1x infrastructure, and VPNs working with the EAP protocol.
  5. Designing smart cards enabled RADIUS server, and analyzing performances according to the Erlang B law; smart cards grids.
  6. Defining identity protection issues for WLANs; are wireless computers RFIDs ?. Practical use of EAP smart cards for identity protection.
  7. How keys-tree are used in standards such as WiMAX or LTE (Long Term Evolution) ?. What are the benefits of processing such structures in smart cards ?
  8. What are the benefits of SSL stack in EAP-TLS smart cards; introducing the dual SSL stack concept, what are the performances bottleneck?. A practical use case, accessing to WEB sites via SSL stack embedded in smart cards, and killing passwords use by mutual SSL authentication based on PKI infrastructure.

Agenda

  • Introduction
  • About smart cards
  • EAP smart cards
  • A practical use case for EAP smart cards
  • Smart cards enabled RADIUS server
  • Identity protection
  • keys-tree computing
  • Smart cards for WEB applications, SSL and OpenID use cases
  • Conclusions

Audience : Public concerned by security issues in wireless networks, services and applications.

Novelty : This tutorial introduces an innovative, original and open architecture, based on cheap and widely deployed secure components. It also details and comments practical use cases such as Wi-Fi, WiMAX, RADIUS servers, identity protection, LTE, and WEB applications

 
 

Copyright (c) 2006-2010, IARIA