Desde Septiembre 22, 2020 11:45 hasta Septiembre 22, 2020 13:15

Ciclo de Coloquios 2020: "On security policy migrations"

Publicado por Katherine Quezada

El Departamento de Informática de la Universidad Técnica Federico Santa María tiene el agrado de invitar a la comunidad Universitaria a su ciclo de coloquios. Esta presentación se realizará por videoconferencia a través de la plataforma Zoom, el día martes 22 de septiembre a las 11:45 horas. Participa, sin previa inscripción, ingresando a https://tv.inf.utfsm.cl/ (link se actualizará el día y horario del coloquio)


Expositores

Jorge Lobo, ICREA Researcher at Universidad Pompeu Fabra, y ACM Distinguished Scientist.

Mini Bio

Jorge Lobo is an ICREA Research Professor in the Department of Information and Communication Technologies at UPF since October 2012. He is also Visiting Professor in the Department of Computing at Imperial College London. Before joining ICREA he was at IBM T.J. Watson Research Center. Previous to IBM, he was principal architect at Teltier Technologies, a startup company in the wireless telecommunication area, and now part of Cisco Systems. Before Teltier, he was member of the research staff at Bell Labs and associate professor of computer science at the University of Illinois at Chicago. He did pioneer work at Bell Labs in policy-based network management developing the policy language PDL used for the management of the first generation of Lucent Technologies softswitches. He received a PhD in Computer Science from the University of Maryland at College Park, and a MSc and a BE from Simón Bolívar University in Venezuela. He is an ACM Distinguished Scientist.

Resumen

There has been over the past decade a rapid change towards computational environments that are comprised of large and diverse sets of devices, many of them mobile, which can connect in flexible and context-dependent ways. Examples range from networks where we can have communications between powerful cloud centers, to the myriad of simple sensor devices on the IoT. As the management of these dynamic environments becomes ever more complex, we want to propose policy migrations as a methodology to simplify the management of security policies by re-utilizing and re-deploying existing policies as the systems change. We are interested in understanding the challenges raised answering the following question: given a security policy that is being enforced in a particular source computational device, what does it entail to migrate this policy to be enforced in a different target device? Because of the differences between devices and because these devices cannot be seen in isolation but in the context where they are deployed, the meaning of the policy enforced in the source device needs to be re-interpreted and implemented in the context of the target device.

¡Te esperamos!