110 likes | 323 Views
By: Rabih Ghannoum Olga Cerrato Supervised by: Gustav Boström (DSV) Pablo Giambiagi (SICS). Signing Protocol for Service Level Agreements in Virtual Organizations’ Environment – a Study Based on TrustCoM Framework. Agenda. Introduction Background Problem Objective Audience Method
E N D
By: Rabih Ghannoum Olga Cerrato Supervised by: Gustav Boström (DSV) Pablo Giambiagi (SICS) Signing Protocol for Service Level Agreements in Virtual Organizations’ Environment – a Study Based on TrustCoM Framework
Agenda Introduction Background Problem Objective Audience Method Limitations
Introduction This presentation covers the first chapter of our thesis. The first chapter presents a complete outline of the thesis, what it is about, why, and how it is carried out.
Background Concept of Virtual Organizations (VOs) E.g TrustCoM VO technologies VO trust and security aspects Service Level Agreements (SLAs) Contract Signing Protocols
Problem Real life vs. electronic contract signing Simultaniety vs. fairness Each protocol gives certain security properties The challenge is to match a “right” contract signing protocol to dynamic VO requirements
Objective The end result of our thesis work is 1) to choose and 2) implement a prototype of the contract signing protocol, that is most suitable for SLAs in dynamic VOs.
Audience • Beneficiaries of this work are the developers of similar projects to TrustCoM, i.e. those who want to know what SLA signing protocol suits best for dynamic VOs • Those who use TrustCom for VO development • Those who use other frameworks for VO development and want to compare • Others, who want to gain an overview of contract signing protocols
Method 1 • This work is an example of artefact development • Logical level: inductive method • Approach level: explorative study • Method level: literature survey • Analysis level: qualitative
Method 2 Sign. protocols’ survey Risk analysis using TrustCom Documentation S T EP 2 S T EP 1 Sign. protocols’ properties Security requirements Protocol-property matrix Step 3: Mapping between TrustCom requirements and protocol properties
Step 3: Mapping between TrustCom requirements and protocol properties A protocol choice (presumably some trade-off) Step 4 Implementation: BPEL + XP Method 3
Limitations • Only contract signing protocols are covered • Not all existing protocols are presented • Not applicable to all VOs • But the process and the information on protocols can still be used