Research Projects
Our research focuses on:
- network protocols: specification, verification,
and efficient implementation,
- distributed applications:
- computer-assisted quality-assured development,
- configuration and management of distributed
applications,
- integrated network and system management:
- policy- and model-based automation of technical
management tasks,
- security of networks and distributed systems:
- tool-assisted security-analysis,
- trust-adapted security policy enforcement,
- automated security management.
Recent developments enclose the modular
formal specification technique cTLA, a technique translating
state-machine-models to efficient implementations of network protocols, control
wrappers interacting with trust information services in order to secure
component-structured applications, the approach of object-oriented security
analysis, the automated management approach model-based management (MBM), and
the Web Services server implementation Java Multi Edition DPWS Stack (JMEDS).
The MBM approach is an extension of the
so-called policy-based technical network, system and application management.
MBM provides the refinement of abstract high-level policy definitions into
configuration descriptions and executable management rules. Its application is
supported by the tool MoBaSeC (model-based service configuration) and a
run-time management system. The tool performs the interactive graphical
modelling of management policies and system structures. Moreover, it translates
representations of abstract policies into low-level policies which are
automatically enforced by the management system at runtime. The MBM approach
has successfully been applied for the configuration of security services and
protection mechanisms of networked systems as well as for the technical
management of distributed service systems including general configuration,
fault, performance, security and account management.
The JMEDS DPWS server implementation
supports the light-weight implementation of service systems by means of
resource-restricted devices and embedded systems. The implementation is
Java-based and suitable for the Micro Java Edition. It is compliant with the
OASIS standard Devices Profile for Web Services (DPWS).
MBM and JMEDS have been developed in
close cooperation together with the industrial partner MATERNA, Dortmund. Both
approaches will be applied in the project OSAMI, where JMEDS will be
adapted to OSGi environments and support the interactions between distributed
devices. MBM will form the basis of policy-controlled self-management functions
which will support the adaptation of device-based service systems to changing
conditions, user needs and environments.
Project Medolution
Innovative approach „Big Dependable Systems (BDS)“ und Application at the Monitoring and Control of Left Ventricular Devices (LVDs)
The current European medical system is lagging behind the emerging changes in society. An increasing portion of the population suffers
from chronical diseases; people are getting older, need more medical care and consequently the healthcare costs are increasing rapidly.
People wish to stay autonomous and mobile. Therefore, our society has to deal with societal and economic challenges in the medical care
sector, especially in European countries.
An increase the efficiency of both reactive and proactive care and services will effectively support healthcare professionals.
Therefore a large amount and variety of enriched and accurate information and tools for effective interpretation are needed.
These should be based upon relevant healthcare information, extracted from data originating from diverse sources. In addition of
image data and sensor data – both from medical and consumer devices – historical data from the individual person, latest medical
evidence sources or existing databases containing medical study data will be sources or relevant information.
Our focus in the project is on BDS. Here, device based systems particularly perform critical medical functions and therefore have
to provide dependability in a certifiable way. This has to be ensured already during design and development by two complementary approaches:
On the one hand the development process has to be correspondingly aligned, on the other hand, the architecture of the system has to be
suitably arranged.
In particular the device based systems have to support an high level of dependability and the interoperation with less reliable sensor networks.
We develop an architecture model for device-based systems, a suite of utility functions and implementation modules as well
as a suite of infrastructure services and interface definitions. The architecture shall follow the paradigm of service-orientation.
Particularly it shall be accompanied by architecture design patterns supplying security, functional safety, reliability and fault-tolerance
mechanisms for distributed service systems.
The project is funded by the German Federal Minister of Education and Research (BMBF).
Project BaaS
The BaaS project targets the need for comprehensive and open cross-domain management and control
services in today’s buildings.
The main innovations of the project include flexible integration mechanisms for existing building systems,
the abstraction of monitoring and control functions facilitating the aggregation and transformation of
building-related information on different levels, mechanisms for combining different sources of
information in a comprehensive building model, and goal-oriented control services.
The innovations shall lead to increased business value by enabling the creation of smart monitoring and
control services, as well as a comprehensive building information ecosystem.
The project is funded by the German Federal Minister of Education and Research (BMBF).
Project OSAMI
OSAMI-Commons targets open source common foundations for a dynamic service-oriented
platform which is able to personalise itself in large diversity of co-operating Software Intensive Systems (SISs).
The platform makes easy what is difficult now, it facilitates seamlessly:
- Service retrieval from external centralised or distributed repositories
- Devices to connect and exchange information and services
- The connection between various vertical markets in order to allow for new business solutions
OSAMI-Commons targets open source common foundations for a reference platform building-up
from the embedded system domain. Based on dynamic service-oriented programming principles it
will be able to personalise itself in large diversity of co-operating Software Intensive Systems
(SISs). This is achieved through technologies allowing virtualisation of SISs with a high level of
abstraction (e.g OSGi and Web Services).
OSAMI-Commons will demonstrate derived benefits in the services domain and will extend
service oriented solutions in vertical domains,
such as healthcare..
The common architectural
approach will support not only the reuse of assets across different domains but also (in run time) a
cooperation framework of embedded devices for providing added value services. Deployed
applications will allow seamless access to services across devices in the context of interaction
domains (e.g., personal, family, social network, equipment & service provider, industrial systems
….).
Project SIRENA
The SIRENA project is an European
research and advanced development project with the objective to develop a
Service Infrastructure for Real time Embedded Networked Applications. SIRENA is
part of the ITEA programme, itself a "cluster" organisation within
the Eureka framework.
Our work focusses on security services and automated configuration management.
We analyse the security and management needs of service systems and aim to
technical and scientific contributions implementing scalable security services
and automated administration functions. In more detail, a family of security
services, components, and mechanisms shall be integrated into the middleware
platform supporting the adaptation of an application's security properties to
its special requirements. Moreover, since an application's security and
reliability properties depend on its adequate administration, functions for the
comfortable and highly automated management of applications and security
services shall be developed and be implemented by means of framework components
and administration tools.
Formal analysis of security properties
A method shall be developed which
achieves the formal modeling of computer networks, their security mechanisms
and services as well as behaviors of attackers and administration processes
performing activities of technical network, system, and application management.
Networks, mechanisms, services and processes are modeled as State Transition
Systems. Verification and analysis apply Leslie Lamport’s Temporal Logic of
Actions (TLA). The specification technique cTLA and a cTLA-based specification
framework are used in order to support the modular description of systems and
their structured verification. Moreover the cTLA-specifications used can be
translated into Gerard Holzmann’s Protocol Specification Language PROMELA and
analyzed by means of his efficient tool SPIN. Based on the method, we aim to
the study of security properties of networked IT-infrastructures. In
particular, we want to investigate effects of attacks and erroneous
administration activities as well as undesired interferences of attack and
administration processes.
Trust and Security Aspects of Distributed Component-Structured Software
Component-structured software is
composed from components which are independently created, combined, and
deployed. The high number of principals is a reason for more subtle security
risks than in monolithic programs and special protection mechanisms are needed,
which, however, introduce overhead and influence the application performance.
Therefore a trust management system is applied which keeps track of the current
risks, experiences, and trust levels of components and principals. The
protection mechanisms employed in the applications are equipped with adaptation
functions which adjust the monitoring efforts to the current trust levels and
requirements.
Security Aspects
of Distributed Component-Structured Software
Component-structured software is
composed from components which are independently created, combined, and
deployed. The high number of principals is a reason for more subtle security
risks than in monolithic programs. In order to solve this problem we develop a
formal security model for component-structured software. Moreover, we are
developing methods and tools for securing components and applications against
hostile attacks.
Model-based security management
The approach of model-based management
supports the derivation of management applications. It concentrates on a
hierarchically layered model representing the abstract nominal behaviour of the
managed system, the working points and functions of the management application,
and the internal structure and dependencies of the system. An object-oriented
graphical modelling tool and predefined class libraries support the comfortable
development of models. We apply model-based management to security management
of enterprise IT systems supporting the integrated management of the various
security services and mechanisms (e.g., firewalls, VPN-elements,
authentication, authorization). In particular, we support that the detailed
configuration settings and management rules of the different services and
mechanisms can be derived from abstract policies.
Modular TKA-based specification of hybrid systems
The approach concentrates on the formal
development of real-life hybrid technical systems based on TLA. A specification
technique for the formal design, analysis, and verification of
continuous-discrete models is developed which, particularly, facilitates the
modular development of distributed process control software. To facilitate the
formal specification of hybrid technical systems and a hazard analysis by
formal verification, a Framework was developed. The project is supported by the DFG within the programme
KONDISK.
Specification
and Verification of distributed object-oriented real-time systems
The approach is based on UML and cTLA.
We develop a method which supports the correctness-proved design of real-time
process control software. The project is supported by the DFG within the
postgraduate research programme Modelling and Model-Based Design of Complex
Technological Systems.
Implementation of Communication Systems
Extended Finite State Machine (EFSM)
models not only are used for the description of the protocols but also for the
modelling of the software implementation on two levels: the logical
implementation model is oriented at the abstract protocol stack and the
instances of protocol entities, the software architecture model is oriented at
the runtime objects of the final implementation. Thus, the important design
decisions concern the refinement of the logical model into the software model
and their correctness can be checked formally. The approach successfully has
been applied to the development of an efficient integrated activity
thread/server implementation of a 3-layer communication protocol stack.
Open Distributed Applications
The software of open distributed
applications has to implement the productive functionality under special
constraints: due to the distribution of the components distributed algorithms
have to be applied, due to the openness required, standardized communication
services / subsystems have to be used to realize component interactions. The
code of components will reflect all of the three aspects in an integrated way.
The interrelationships between productive functionality, distributed
cooperation, and standardized communication are investigated by means of
fundamental mechanism templates and combination principles resulting in
construction guidelines and suitable strategies for analysis and verification.
A framework
supporting the development and verification of high-speed communication
protocols was designed. It consists of design patterns and theorems. The design
patterns which model protocol mechanisms resp. service constraints can be
composed to protocol and service specifications. Protocol proofs can be reduced
into a sequence of proof steps which are verified by the theorems of the
framework.
The development of tool-support for the
temporal logic TLA (Temporal Logic of Actions) was the goal of this project. We
designed several tools for the construction (composition, interpretation, and
animation) and verification (theorem prover frontend, reachability analysis,
and model checker) of TLA specifications. The project was supported by Digital
Equipment Corporation (DEC) - Systems Research Center (SRC).
Visualization of distributed algorithms and communication protocols from
formal specifications
During initial formalization of design
ideas tools and concepts are necessary, to validate the formal specification
against the ideas of the designer. Beside of formal proofs, animation with
textual, graphical and audial means serve as important method for validation.
First studies in the visualization domain of distributed systems have been
conducted by the ZADA group.
|