The Third International Conference on Dependability NETWARE July 18-25, Venice/Mestre, Italy

Similar documents
SDS PODCAST EPISODE 148 FIVE MINUTE FRIDAY: THE TROLLEY PROBLEM

Imminent Transformations in Health

Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the

Communicating Complex Ideas Podcast Transcript (with Ryan Cronin) [Opening credits music]

General Questionnaire

Summary Remarks By David A. Olive. WITSA Public Policy Chairman. November 3, 2009

Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology

15 ideas to get more clients to your Chiropractic Office on a consistent basis

Gift Basket Business Development Series From Gift Basket Network Construct Your Business with a One-page Business Plan

QUICK SELF-ASSESSMENT - WHAT IS YOUR PERSONALITY TYPE?

Financial and Digital Inclusion

Introduction. Data Source

Class 3 - Getting Quality Clients

The ALA and ARL Position on Access and Digital Preservation: A Response to the Section 108 Study Group

Enabling ICT for. development

This is an oral history interview with Colleen, IBM CRM (Customer Relationship Management) Business Partner

Weight Loss: Template Two

Worksheets :::1::: Copyright Zach Browman - All Rights Reserved Worldwide

7 Proven Steps to Opening, Promoting and Profiting From a Successful Lash Business. Learn the Market

Conversation Guide. Hospice of Southwest Ohio and CareBridge are dedicated to helping people talk about their wishes for end-of-life care.

Name: Due Date: 5/TBD /18 Presentation: TBD

Digitisation A Quantitative and Qualitative Market Research Elicitation

THE FUTURE OF DATA AND INTELLIGENCE IN TRANSPORT

HIGH IMPACT INNOVATIONS TRANSFORMING AUSTRALIAN AGRICULTURE

TRIZ and Related Software: How to maximize their impact on your organization

Exploring. Sticky-Note. Sara Devine

Challenging the Situational Awareness on the Sea from Sensors to Analytics. Programme Overview

Implementing BIM for infrastructure: a guide to the essential steps

Pan-Canadian Trust Framework Overview

Special Eurobarometer 460. Summary. Attitudes towards the impact of digitisation and automation on daily life

Affiliate Information Guide

Towards a Magna Carta for Data

Economic and Social Council

Phase 1: Ideation Getting Started with Concept Testing

Terms and Conditions

Some Reflections on Digital Literacy

Ignite the magic in your business. by Angella Johnson

5 0 I N S I D E R T I P S T O G O F R O M M A K I N G A L I V I N G T O M A K I N G A L I F E

Great Minds. Internship Program IBM Research - China

Terms and Conditions

Running head: THE IMPACT OF COMPUTER ENGINEERING 1

Worksheets :::1::: Copyright Zach Browman - All Rights Reserved Worldwide

3M State of Science Index Global Report

Science Impact Enhancing the Use of USGS Science

The Real Secret Of Making Passive Income By Using Internet At Your Spare Time!

Webinar Module Eight: Companion Guide Putting Referrals Into Action

NonZero. By Robert Wright. Pantheon; 435 pages; $ In the theory of games, a non-zero-sum game is a situation in which one participant s

No Cost Online Marketing

LANGUAGE AND CULTURE (OXFORD INTRODUCTIONS TO LANGUAGE STUDY) BY CLAIRE KRAMSCH

Delhi High Level Conference on Climate Change: Technology Development and Transfer Chair s Summary

THE INTERVIEW SUCCESS BLUEPRINT

Flip Camera Boundaries Student Case Study

DOCTORAL THESIS (Summary)

SMART HOME Insights on consumer attitudes to the smart home. The truth behind the hype. Smart home. Understand. Adopt. Success. About GfK.

Heaven and hell: visions for pervasive adaptation

A User-Side View of Innovation Some Critical Thoughts on the Current STI Frameworks and Their Relevance to Developing Countries

Transcription Media File Name: Radio-Muckler-Visser.mp4 Media File ID: Media Duration: 10:54 Order Number: Date Ordered:

technologies, Gigaom provides deep insight on the disruptive companies, people and technologies shaping the future for all of us.

Sportradar esports Service. Unlocking the incredible potential of esports

Is the U.S. Exporting NPE Patent Litigation?

Privacy, Technology and Economics in the 5G Environment

OECD WORK ON ARTIFICIAL INTELLIGENCE

Competition Manual. 11 th Annual Oregon Game Project Challenge

Strategies for the 2010 Population Census of Japan

Stanford CS Commencement Alex Aiken 6/17/18

YOUR IMPACT INITIATIVES

Innovation Report: The Manufacturing World Will Change Dramatically in the Next 5 Years: Here s How. mic-tec.com

Virtually. Gamers Descend on E3... THE RUNDOWN. Not on the list for an exclusive event? No problem! All you need to

infrastructural technology actually going to be shared by many companies, rather

Making Multidisciplinary Practices Work

UNIVERSAL SERVICE PRINCIPLES IN E-COMMUNICATIONS

THE GSMA PRESENTS MINISTERIAL PROGRAMME

ABUNDANCE CREED. Take the time to say this prayer each day from the heart, and watch your abundance mindset manifest!

The Synthetic Death of Free Will. Richard Thompson Ford, in Save The Robots: Cyber Profiling and Your So-Called

Consumer Market Study: Facebook and Your Privacy

Media and Information Literacy - Policies and Practices. Introduction to the research report Albania

COM C. Rozwell

Technologies Worth Watching. Case Study: Investigating Innovation Leader s

MORE POWER TO THE ENERGY AND UTILITIES BUSINESS, FROM AI.

A Guide to Prepare For Your Industry Interview

Academic job market: how to maximize your chances

Cities and regions in Europe as Test beds: making the most of the opportunities

Children s rights in the digital environment: Challenges, tensions and opportunities

Technologies that will make a difference for Canadian Law Enforcement

2018 NISO Calendar of Educational Events

The 3M State of Science Index. An insight into UK perceptions of science

System notes for the Blastorscape bidding system

MISSISSAUGA LIBRARY COLLECTION POLICY (Revised June 10, 2015, Approved by the Board June 17, 2015)

Sample Surveys. Chapter 11

UNITED NATIONS EDUCATIONAL, SCIENTIFIC AND CULTURAL ORGANIZATION

Chris Riddell. Futurist & Digital Strategist. A futurist for the leaders of tomorrow, and a keynote speaker for businesses of today

How Explainability is Driving the Future of Artificial Intelligence. A Kyndi White Paper

Content Continues Below

Learning Progression for Narrative Writing

A PERSPECTIVE IN COMPUTER ETHICS. Pattarasinee Bhattarakosol 1. Abstract. Introduction. What is computer ethics?

CDT Annual Dinner. Center for Democracy and Technology, Washington. 10 March 2015

Lifecycle of Emergence Using Emergence to Take Social Innovations to Scale

Using Emergence to Take Social Innovations to Scale Margaret Wheatley & Deborah Frieze 2006

Australia Council for the Arts. Artistic vibrancy. Self-reflection tool. Self-reflection tool 1

The Online Marketing Made Easy Podcast with Amy Porterfield Session #123

Transcription:

The Third International Conference on Dependability NETWARE 2010 July 18-25, 2010 - Venice/Mestre, Italy Panel: Security in Sensors/Devices/Mesh/Internet Infrastructures Moderator: Paul Geraci, Technology Survey Group, USA IARIA Board Chair, Emerging Technologies Expert Panelists: Aljosa Pasic, Atos Origin, Spain Rainer Falk, Siemens AG, Germany Masaru Takesue, Hosei University, Japan Wolfgang Boehmer, TU-Darmstadt, Germany Reijo Savola, VTT Technical Research Centre of Finland - Oulu, Finland

I. Introduction. Title: Security in Sensors/Devices/Mesh/Internet Infrastructures I must first humbly thank Dr. Petre Dini for inviting me to assist IARIA with the NETWARE 2010 Conference. I was tasked with moderating an extremely lively international panel of security experts representing academia and industry. We were tremendously lucky to have a panel consisting of such experts to discuss the issues of security; we also entertained quite a discourse on Privacy and Trust. In fact, of the original six or seven questions prepared for the panelists, we were able to get to only two due to the phenomenal discussions, thoughtful responses, and incredible audience participation. As such, the Panel still went over its stated time limit. Below is but a brief synopsis of the Panel, along with some direct responses of a more lightening-rod type question as the discussions were lengthy. The venerable panelists were, in no particular order: Dr. Aljosa Pasic, Atos Origin, Spain, Dr. Rainer Falk, Siemens AG, Germany, Dr. Masaru Takesue, Hosei University, Japan, Dr. Wolfgang Boehmer, TU-Darmstadt, Germany and Dr. Reijo Savola, VTT Technical Research Centre of Finland - Oulu, Finland. I would like to personally thank them all again for an enlightening and entertaining discussion, and their expert, frank answers to questions not only posited by the moderator - but to those thought provoking questions posed by the audience as well. And of course, we couldn t have had such a wonderful panel discussion without the attentive audience and for that, I thank you all II. Panel Moderator: The enormous advances in network technology has consequently resulted in the probable potential for changing the way we communicate and do business over the Internet. We also know that the utility of large networks, particularly social networks, can scale exponentially with the size of the network. This is known as Reed s Law. As such, wireless sensor networks have emerged as an exciting technology for a wide range of important applications that acquire and process information from the physical world. Further, Grid Computing has also evolved as a standards-based approach for coordinated resource sharing. This said, sensor grids combine resource sharing and the physical world by expanding the grid computing archetype; it allows the sharing of sensor resources in wireless sensor networks. As one can imagine, security is a major issue and challenge in the design of sensor grids, social networks and, in fact, any of our future physical and logical network topologies. Despite numerous privacy 2

regulations and customer demands, many of these topologies remain vulnerable to internal and external security breaches. Leading up to the questions, the moderator used audience member participation to give an example of trust. Prior to the panel, the moderator had an assistant give a password of the day to a member of the audience. The assistant asked the audience member not to tell anyone the password. The audience member agreed. Just prior to the prepared panel questions, the moderator asked if anyone in the audience knew the password of the day. After some brief prodding, the participating, yet unwitting audience member raised his hand and told the password to the moderator in front of the audience. The moderator asked the audience member if he were told not to share the information, to which, the audience member gave an affirmative answer. The moderator then asked the audience if they should trust that audience member. After some laughter, the audience response was mixed. After some deliberation, Dr. Aljosa Pasic, suggested that the issue was not one of trust, but rather security. In fact, he said, It is sometimes easier to define what something is not, rather than what they are. Most of the panel members agreed with Dr. Pasic, and some thought that it may, in fact, be a combination of trust and security. III. PANEL QUESTION COVERED FOR PURPOSES OF SYNOPSIS: 1. Moderator: A great percentage of the population remains uninformed about Internet privacy issues; Trust, with regard to the Internet, is somewhat nebulous. There is little doubt that in most developed countries, citizens are increasingly relying on the Internet to gather information. Increasing Internet reliance is also evidenced by the dramatic increase of self-service options available to Internet users. Today, individuals are expected to book airline tickets, determine retirement plans, and, at times, decide between life-and-death medical treatments using Internet tools. Can you define "Privacy" and Trust for us as it pertains to the internet? Dr. Pasic, continuing with his excellent comments on privacy regarding the opening experiment, explained that when one puts something on the Internet, for whatever reason, in numerous instances, the user must agree, in one form or another, that the content of their information may be used. In further defining trust, Dr. Pasic related that in Spanish, the word Trust is Confianza. Con meaning with and fianza meaning guarantee. He explained that trust defines the latter in a relationship, and is tied to the context. He stressed the idea of context by saying, In other words, one may trust Ebay for purchasing an item on the Internet; however, not for building credence. Dr. Savola claimed that the issue of privacy, with regard to the internet is a very subjective concept, and that it can mean different things to different people all over the world. He explained that Basically, it is the attempt to protect information and understood as 3

very strict security and there is strict compliance to the legislation surrounding the protection of the person s data. The esteemed Swedish scientist, when defining trust, agreed with Dr. Savola; he added that, a good question is whether trust can exist between humans and something, or can it be between different [elements]? For example, he continued, can one object trust another object? He went on to say that relationships play a large part in trust. Elaborating, Dr. Savola stated that if a Service Provider, a popular [brand] is used by many people, and then the populace tends to trust that brand even when there may, in fact, be some privacy issues with the provider that they do not immediately attempt to repair. He continued that a smaller, lesser-known provider, with perhaps better privacy might not do as well as it isn t a well-known brand, and that, if they noted a security issue, they are more likely to act upon it faster, in order to remain in competition with the other, larger providers. He concluded by stating that trust, real or perceived, need not be proven that it can depend upon other parameters. Dr. Rainer Falk interjected by stating that many, including possibly the audience and some panel participants tend to look at the word Trust through the eyes of a Computer Scientist. In Computer Science, we know zero and one trust is everything else He went on to agree with the other panelists that trust is context dependent. [Trust] is dependent upon one s objective, ergo trust is extremely subjective. He elaborated by stating, some might say that 0.1 is the trust factor, whereas another may say that 0.9 is the trust factor; and if we agree that this is context dependent, then I believe that we are discussing artificial intelligence because we are out there now, where we actually do not have a model and cannot model trust to the degree that it needs to be modeled. Dr. Falk suggested that the young scientists and engineers in the audience take this topic seriously and, perhaps, look forward, to working these issues in their future. Dr. Wolfgang Boehmer stated that trust is not binary behavior, and that Privacy is binary behavior, it is binary in its orientation. Dr. Boehmer went on to remind the audience that the crux is that the Internet cannot forget any information. He further relayed, regarding Privacy, that once information is put onto the internet by an individual or entity it is gone, it s too late it is no longer necessarily secure or private, due to its binary nature. Regarding Trust, Dr. Boehmer stated, Trust, I can make my own experience. I agree that we have no morals, no mathematics, no matter we have nothing without trust or privacy; and this, I think, is the issue. Dr. Masaru Takesue affirmed that privacy is user generated, and refers to the individual user; the individual user can decide to whom the information that they input will go. As such, the information can be protected. Dr. Takesue defined trust by stating, Trust is the core of the future Internet; it is necessary to move forward. He further stated that if an individual user can reach out, and communicate with a server, one that is restricted to only that user and a few others then the privacy is protected. 4

IV. Conclusion: Though the topic was broad, the panelists displayed the ability to not only answer the various questions posed, but they also provided direct, thoughtful responses to the inquiries of the audience. Their insight, coupled with their industrial knowledge, intelligence, and amiable personalities allowed for lively discussion, spirited debate, and approximately 90 minutes of frank, intellectual discussion regarding a subject that I believe all attendees viewed as important, relevant, and topical. It is important to note that further discussions, questions, and thoughts were shared by the panelists, the moderator, and many members of the audience after the official panel discussion; serving as testimony to the not only the respect for the panelists considerations, but to their performance as well. - Paul J. Geraci IARIA Board Chair, Emerging Technologies 5