Category: Data Exfiltration
Smart Campus: Model Driven Security for Systems of Systems
Socio-technical systems underpinning smart and connected cities are good examples of systems of systems – where each constituent system act and behave independents but these systems are connected with each other and provide each other different services. Security is one of the key aspects of systems of systems, e.g., smart city systems or smart campus…
Smart Campuses – Experimental Platforms for Smart Cities
Smart Cities initiatives are gaining popularity in almost every corner of the World – increasing urbanisation and myriad of socio-economic challenges are forcing governments and public sector organisations to leverage Information Communication Technologies (ICT) for conceiving and materialising innovative solutions for socio-economic challenges under a broad umbrella of Smart Cities. Since Smart Cities initiatives present…
Secure and Scalable Private Cloud for Defence Systems
Following on the successful completion of our collaborative project on building and evaluating private cloud for defence systems, our second project is on building and evaluating secure and scalable private cloud using container technologies. For our projects, we use Openstack software for private cloud and its related technologies. For evaluating the security and scalability of…
A New Approach to Identifying Security Requirements
We are delighted to announce that our ongoing collaboration with researchers from Lancaster University and University of Leicester has resulted in an approach to eliciting security requirements. The approach has been published in a recently accepted paper in the premier software engineering conference, the International Conference on Software Engineering to be organised in Austin, USA…
Private Cloud for Defence Systems
Defence Science and Technology Group (DSTG), An Australian Defence’s R&D organisation, recognises that Cloud Computing presents new opportunities for more flexible and efficient utilisation of computing resources. We have teamed up with DST’s submarine division’s researchers to build and apply knowledge and competency in designing and experimenting with private cloud infrastructure for combat systems. We…
Towards a Cyber Security Assessment Framework for Smart Grid
Modern energy systems are interconnected through public and private networks, hence, such systems can be target of cyber attacks – Smart Grid is an example of a system of systems which can be targeted for security breaches. Smart grid systems may be targeted using the vulnerabilities are unknown, zero day attacks. It is important to…
Visiting Software School at Fudan University, China
During my recent visit to China, I visited the Software Engineering Laboratory, Software School at Fudan University in Shanghai. It has always a great pleasure visiting Professor Xin Peng and his team who are conducting an excellent research on challenging and important topics of Software Product Lines, Software Maintenance and Evolution, and Requirements Engineering. This…
Building a private cloud for an academic environment
While the perceived and real technical and soio-technical concerns about public cloud solutions may be discouraging many organizations from migrating and/or using public clouds, many organizations are resorting to solutions involving private and community clouds. The increasing trend of private clouds is also making inroads into academic circles where a large amount of data may…
Cloud Computing – Adoption Barriers
Organizations and practitioners are well aware, and largely convinced, of the claimed benefits of cloud computing, however, they are concerned about the general lack of knowledge about the potential uncertainties and risks involved in adopting cloud computing. This is one of the conclusions from the first phase of our research on cloud computing adoption barriers.…