Category: Uncategorized
Engineering Data-Driven Secure Software Services
Big Data Systems (BDS) (i.e., data-intensive applications) have become one of the key priority areas for all sorts of organizations. We have been conducting R&D on different aspects of Data intensive applications in general and on security oriented solutions in particular. A significant part of our research is aimed at inventing new and innovative techniques…
Design Space for Cyber Security Analytical Systems
Cyber Security infrastructures are increasingly relying on big data technologies for capturing, storing, and analyzing huge amount of security events data. Designing and evolving systems that can effectively and efficiently combine big data technologies and cybersecurity are hugely challenging undertakings. Whilst the knowledge for designing cyber security analytics systems has increasing for sometime, there was…
Adaptive Architectures for Cyber Security Analytics Systems
It is becoming quite hard to imagine software systems that wouldn’t need adaptation as part of their runtime requirements. With the increasing demand for adaptivity by design, the knowledge and skills in this area are lagging far behind. Cyber Analytics systems are a new breed of systems that combine big data technologies and cyber security…
Building and Leveraging Design Spaces for Architecting Contemporary Software Systems
It was a great pleasure to visit the Secure Systems Group at the Aalto University of Finland. I was hosted by Professor N. Asokan, the leader of the group and a leading authority on different aspects of the security systems, and Dr Lachlan Gunn, a postdoctoral researcher who has a long association with me from…
Architecting for Continuous Delivery and Deployment
Continuous Software Engineering has been gaining signifiant momentum in terms of widespread adoption among large and small Software houses. This paradigm shift is based on the promise of early, frequent delivery and deployment of software features and continuous feedback on the usefulness and adoption of the features. One of the key challenging area of practice…
Our New Work on Self-Adaptive Security for large-scale Open Environments
We are continuously progressing on the plan for strengthening our capabilities in Cyber Security. To achieve this goal, we have been not only building internal capabilities but also forming and leveraging strategic collaborations. Out of one of our recent collaborations, with Giannis and Rami, in the areas of Cyber Security has resulted a high quality…
Search Engines for Web of Things (WoT)
Millions of objects are being connected to provide different services via the Web. This trend has led the paradigm of Web of Things (WoT), that can be searched and leveraged by uses (i.e., human or other systems/machines). One of the key enabling technologies for materialising the WoT vision are search engines, which need to be…
Modeling Security-Sensitive Architecture of Systems-of-Systems
An increasing number of software systems are considered Software Intensive Systems of Systems (SiSoS), which consist of dozens of constituent systems. Systems are interconnected using private or public networks, which can be prime target for security attacks. Hence, securing SiSoS is a huge challenge and an emerging areas of research and development. SoS can have…
Security and Privacy Challenges of Interconnected Systems
People and organisations are becoming heavily reliant on hyper-connected, hyper-virtulised, and hyper-mobile systems. Such systems are also called blended systems, where millions (or even billions) or devices, software, people, and physical objectives (so-called everything) are connected with each other through private or public (Internet) – so-called Internet of Everything. Security and privacy are the key…