- Access Control and Trust
- Service-Oriented Architecture and Web Services
- Distributed systems and fault tolerance
- Mobile Agent-Based Network Management
- Security and Verification in Computing
- Advanced Software Engineering Methodologies
- Distributed and Parallel Computing Systems
- Context-Aware Activity Recognition Systems
- Network Security and Intrusion Detection
- Business Process Modeling and Analysis
- Internet Traffic Analysis and Secure E-voting
- Real-Time Systems Scheduling
- Embedded Systems Design Techniques
- Energy Efficient Wireless Sensor Networks
- Peer-to-Peer Network Technologies
- Cryptography and Data Security
- Network Packet Processing and Optimization
- Software-Defined Networks and 5G
- Parallel Computing and Optimization Techniques
- Multi-Agent Systems and Negotiation
- Wireless Body Area Networks
- Opportunistic and Delay-Tolerant Networks
- Logic, Reasoning, and Knowledge
- Modular Robots and Swarm Intelligence
- Software System Performance and Reliability
Imperial College London
2004-2014
Institute for Infocomm Research
2009
Imperial Valley College
1999-2005
University of London
1984-2003
University College London
2003
Institute of Electrical and Electronics Engineers
1999
Universidad de Londres
1994
Trust is an important aspect of decision making for Internet applications and particularly influences the specification security policy, i.e., who authorized to perform actions as well techniques needed manage implement applications. This survey examines various definitions trust in literature provides a working definition The properties relationships are explained classes different types identified discussed with examples. Some influential examples management systems described.
Modern distributed systems contain a large number of objects and must be capable evolving, without shutting down the complete system, to cater for changing requirements. There is need distributed, automated management agents whose behavior also has dynamically change reflect evolution system being managed. Policies are means specifying influencing within coding into manager agents. Our approach aimed at implementable policies, although policies may initially specified organizational level...
The Conic environment provides a language-based approach to the building of distributed systems which combines simplicity and safety language with flexibility accessibility an operating approach. It comprehensive set tools for program compilation, configuration, debugging, execution in environment. A separate configuration is used specify software components into logical nodes. This concise description facilitates reuse different configurations. Applications are constructed as sets one or...
The specification and management of quality service (QoS) is important in networks distributed computing systems, particularly to support multimedia applications. advent portable laptop computers, palmtops, personal digital assistants with integrated communication capabilities facilitates mobile computing. This article a survey QoS concepts techniques for environments. requirements current future are examined the services required mobility discussed. Generic overviewed followed by an...
Distributed system management, involves monitoring the activity of a system, making management decisions and performing control actions to modify behavior system. Most research on has concentrated mechanisms related network or operating systems. However, in order automate very large distributed systems, it is necessary be able represent manipulate policy within These objectives are typically set out form general policies which require detailed interpretation by managers. The paper explores...
Event-based monitoring is critical for managing and debugging networks distributed systems. This paper presents GEM - an interpreted generalized event language. It allows high-level, abstract events to be specified in terms of combinations lower-level from different nodes a loosely coupled system. Event components can thus within the system perform filtering, correlation notification close where they occur reduce network traffic. declarative rule-based language which notion real time has...
Distributed system management is concerned with the tasks needed to ensure that large distributed systems can function in accordance objectives of their users. These are typically set out form policies interpreted by managers. There benefits be gained providing automated support for human managers, or actually automating routine tasks. To do this, it desirable have a model as objects itself. The summarized. It clear there potential conflicts between policies. may resolved informally but if...
Policies are rules governing the choices in behavior of a system. They increasingly being used as means implementing flexible and adaptive systems for management Internet services, networks, security systems. There is also need common specification policy large-scale multi-organizational where access control implemented variety heterogeneous components. In this article we survey both approaches, concentrating on practical which can be directly translated into an implementation.
Policies are rules that govern the choices in behaviour of a system. Security policies define what actions permitted or not permitted, for whom, and under conditions. Management need to be carried out when specific events occur within system resources must allocated There is considerable interest use security management large-scale networks distributed services. Existing policy work has focussed on specification, information models application-specific enforcement. We address important goal...
Distributed computer control systems (DCCS) have a number of potential advantages over centralised systems, especially where the application is itself physically distributed. A station can be placed close to plant being controlled, and communications network used enable stations communicate co-ordinate their actions. However, software must carefully designed exploit distribution. In paper, CONIC architecture for DCCS described, concentrating on structure but also briefly describing physical...
Policies form an important part of management and can be effective means implementing self-adaptation in pervasive systems. Most policy-based systems focus on large-scale networks distributed Consequently, they are often fragmented, dependent infrastructure lacking flexibility extensibility. This paper presents Ponder2, a novel policy system that is suitable for wide range environments applications. The design implementation Ponder2 emphasises simplicity, extensibility provides users with...
Trust - "reliance on the integrity, ability, or character of a person thing" is pervasive in social systems. We constantly apply it interactions between people, organizations, animals, and even artifacts. use instinctively implicitly closed static systems, consciously explicitly open dynamic An epitome for former case small village, where everybody knows everybody, villagers their knowledge stereotypes to trust distrust neighbors. A big city exemplifies latter case, people explicit rules...
It is suggested that a functional model of monitoring in terms the generation, processing, dissemination, and presentation information can help determine facilities needed to design construct distributed systems. Implementation issues are also discussed, with attention given intrusiveness systems object-based implementation. concluded generic services important tools for managing debugging during system development. Monitoring may be as part application itself, such process control factory...
Policies form an important part of management activities and are effective means implementing self-adaptation in pervasive systems. Many policy- based systems designed to date focus on large-scale networks distributed Consequently, they often fragmented, dependent infrastructure lacking flexibility extensibility. This demonstration presents Ponder2, a self-contained, stand-alone policy environment that is suitable for wide range applications environments ranging from single devices, personal...