Keynote Speakers

Keynotes are for all conferences of CGC2011, SCA2011, DASC2011, PICom2011, EmbeddedCom2011 and associated workshops and symposia.


Professor Ivan Stojmenovic

University of Ottawa
Canada

Title: Green Computing in Mobile Cloud
Abstract:

Cloud computing and green computing came to be hot topics in recent years, especially in data center networks. As the development of smart phones and tablets, the combination between mobile devices and cloud computing, named by mobile cloud, has emerged as a new cloud computing platform, bringing new challenges to cloud and green computing. One of the most important issues is how to optimize the scheduling and transport schemes for mobile devices to achieve energy saving.

In this talk, I will first introduce the development of mobile cloud computing. Next, I will present the new challenges of green computing in mobile cloud; especially highlight the uniqueness, compared with the study on the energy saving problem in wireless networking. I will also discuss the possible solutions from various perspectives, including task scheduling, access management, transport mechanisms and application optimization.

Professor Ivan Stojmenovic's Bio

Prof. Ivan Stojmenovic received his Ph.D. degree in mathematics in 1985. He held regular or visiting positions in Serbia (Institute of Mathematics, University of Novi Sad, 1980-1987), Japan (Electrotechnical Laboratory, Tsukuba, 1985/6), USA (Washington State University, Pullman, WA, and University of Miami, FL, 1987/88), France (Amiens 1998, Lille 2002-2007, Paris 2008), Mexico (DISCA, IIMAS, Universidad Nacional Autonoma de Mexico, 2000/02), Spain (Murcia, 2005), UK (University of Birmingham, 2007/08), Hong Kong (May 2009), Brazil (Sao Carlos, August 2009), Canada (SITE, University of Ottawa, since 1988).

Stojmenovic published >250 different papers in referred journals and conferences; >90 of them are in journals with an ISI impact factor, >20 are in IEEE or ACM journals. His most significant publications can be seen at www.site.uottawa.ca/~ivan. He co-authored over 30 book chapters, mostly very recent.

He collaborated with about 100 co-authors with Ph.D. and a number of their graduate students from 24 different countries. He (co)supervised >50 completed Ph.D. and master theses, and published over 120 joint articles with supervised students. He also published articles with 27 graduate students outside of their theses, and 4 undergraduate students. His current research interests are mainly in wireless ad hoc, sensor and cellular networks. His research interests also include parallel computing, multiple-valued logic, evolutionary computing, neural networks, combinatorial algorithms, computational geometry, graph theory, computational chemistry, image processing, programming languages, and computer science education.

He is current editor-in-chief of IEEE Transactions on Parallel and Distributed Systems.


Professor Geoffrey Charles Fox

School of Informatics and Computing
Community Grids Laboratory
Indiana University Bloomington
USA

Title: Sensors Nets and their Analysis in the Cloud
Abstract:

We discuss the conventional wisdom with light weight clients supported by backend clouds and the implications for power efficient user friendly computing. We apply this to scientific data analysis in remote regions (in particular polar science) robotics and surveillance. We introduce a new sensor-cloud interface based on publish-subscribe technology. We discuss how this can be prototyped on FutureGrid. We define a sensor as any data source producing a time series and point out the generality of this.

Professor Geoffrey Charles Fox's Bio

Prof. Geoffrey Fox received a Ph.D. in Theoretical Physics from Cambridge University and is now professor of Informatics and Computing, and Physics at Indiana University where he is director of the Digital Science Center and Associate Dean for Research and Graduate Studies at the School of Informatics and Computing. He previously held positions at Caltech, Syracuse University and Florida State University. He has supervised the PhD of 61 students and published over 600 papers in physics and computer science. He currently works in applying computer science to Bioinformatics, Defense, Earthquake and Ice-sheet Science, Particle Physics and Chemical Informatics. He is principal investigator of FutureGrid 每 a new facility to enable development of new approaches to computing. He is involved in several projects to enhance the capabilities of Minority Serving Institutions.

He is current editor-in-chief of Concurrency and Computation: Practice and Experience


Professor Craig Standing

Foundation Professor of SIM

School of Management
Edith Cowan University
Australia

Title: Social Computing, ICT developments and Innovation
Abstract:

Implications for Practice and Research Collaborative and social media developments have opened up new opportunities to transform work practices and engage with consumers. Social business models can deliver significant benefits for organisations but strategies are important as there are many pitfalls for the unwary. This talk will explore how social media can be used to improve organisational innovation, the challenges in harnessing social media technologies and also its implications for the research environment.

Professor Craig Standing's Bio

Craig Standing is Professor of Strategic Information Management at Edith Cowan University in Western Australia. He completed degrees at Lancaster University and the University of Manchester and a PhD at the University of Western Australia. His research has examined the evolving nature of electronic markets, supply chain management and the use of social media in innovation. He is currently the director of the Centre for Innovative Practice at Edith Cowan University and a member of the Australian Research Council*s College of Experts. He is an editor of the Journal of Systems and Information Technology, and is at the forefront of knowledge on information systems research and research methods.


Professor Vijay Varadharajan

Macquarie University

Australia

Title: Secure and Trustworthy Computing
Abstract:

Security and dependability have become particularly significant as systems get more and more interconnected and as their complexity increases. Technologies such as distributed online applications, cloud computing, service oriented architectures, pervasive mobile devices, and social networking have increased the dependency of society and economy on information systems and infrastructures. Along with the phenomenal growth in technology has been the growth in technology related crimes.

In this talk, I will start with a brief look at some of the recent developments in the threat scenery. Then I will some key challenges involved in the design of secure and trustworthy systems. In particular, I will discuss the types of security services needed to secure distributed systems and applications and will highlight the issues of trust which underpins security. Then I will consider how traditional security and social aspects of trust can be combined to enhance the quality of security decision making.  I will conclude the talk by demonstrating such a trust enhanced security approach using some example systems that we have been working on.

Professor Vijay Varadharajan's Bio

Vijay Varadharajan is the Microsoft Chair Professor in Innovation in Computing in Australia at Macquarie University. He is also the Director of Information and Networked System Security Research (INSS) Group at Macquarie University. Before this he was Chair of Computing and Head of School of Computing and IT at University of Western Sydney. Previously, Vijay headed Security Research worldwide for Hewlett-Packard Labs based at European Headquarters at HP Labs Bristol, UK. He led and managed several research projects in UK, US, Germany, France and Italy and under his leadership several security research technologies were transferred into commercially successful HP products. He also headed the Technical Security Strategy Initiative at HP under the Senior Vice President of HP.  Earlier, he was Research Manager of Data Security Lab at British Telecom Research Labs. U.K., Research Fellow and Lecturer in Computer Science at Plymouth and Reading Universities.  

Vijay was an inaugural Board Member of International Advisors of TCPA, USA, (originally formed by HP, Microsoft, Intel, Sun and Compaq). He is on the Trustworthy Computing Advisory Board (Microsoft, USA), the SAP (Germany) Security Advisory Board, Australian Government*s Peak Security Advisory Group for the Minister of Broadband, Communications and Digital Economy, Australia. He is a member of the ARC College of Experts in Engineering, Mathematics and Informatics. He has been the Technical Board Director of Computer Science at Australian Computer Society, and Chair of the National Taskforce on E-Security. Vijay has been on the Editorial Board of several journals including the IEEE Transactions in Dependable and Secure Computing, the ACM Transactions on Information Systems Security, Springer International Journal of Information Security and IEEE Security and Privacy.

Vijay has published over 320 papers in International Journals and Conferences, has co-authored and edited 9 books and holds 3 patents. His research work over the years has contributed to the development of several successful secure commercial systems and have generated many hundreds of millions of dollars of revenue. His current areas of research interest include Web Services Security, Secure Distributed Applications, Trusted Computing, Wireless and Mobile Security, Cloud Computing and Security, Internet Security, Cyber Security Attacks, Secure Social Computing, Security Policies and Architectures. Vijay is a Fellow of the British Computer Society (FBCS), a Fellow of the IEE (FIEE), a Fellow of the Institute of Mathematics, UK (FIMA), a Fellow of the Australian Institute of Engineers (FIEAust) and a Fellow of the Australian Computer Society (FACS).


Professor Bhavani Thuraisingham

Department of Computer Science
Director of the Cyber Security Research Center
Erik Jonsson School of Engineering and Computer Science
The University of Texas at Dallas, USA

Title: Cloud-Centric Assured Information Sharing
Abstract:

Daniel Wolfe (formerly of the National Security Agency) defined assured information sharing (AIS) as one that ※provides the ability to dynamically and securely share information at multiple classification levels among U.S., allied and coalition forces.§ The DoD*s vision for AIS is to ※deliver the power of in-formation to ensure mission success through an agile enterprise with freedom of maneuverability across the information environment§. More recently National Security Agency CIO Lonny Anderson has stated that the agency is focusing on a ※cloud-centric§ approach to information sharing with other agencies. To address the needs of the DoD, our project is developing technologies and tools for cloud-centric assured information sharing funded by the Air Force Office of Scientific Research (AFOSR).

 We initially examined developments in grid and cloud computing and explored security issues. In particular, we explored secure virtualization, secure storage, secure data management and secure cloud monitoring. We also developed a secure cloud data manager that will be utilized as the engine for assured information sharing. We developed two types of cloud data managers, one based on semantic web data and the other based on relational data. Current frameworks do not scale for large RDF graphs and as a result do not address these challenges. Here, we developed a framework using Hadoop to store and retrieve large numbers of RDF triples by exploiting the cloud computing paradigm. We developed a scheme to store RDF data in a Hadoop Distributed File System. More than one Hadoop job may be needed to answer a query because a triple pattern in a query cannot take part in more than one join in a Hadoop job. To determine the jobs, we developed algorithms to generate a near optimal query plan based on a greedy approach to answer a SPARQL Protocol and RDF Query Language (SPARQL) query. We use Hadoop*s MapReduce framework to answer the queries. We implemented XACML-based policy management and integrated it with our query processing strategies. For secure query processing for relational data we utilized the HIVE framework. In addition to secure query processing, we also developed encrypted query processing on the Amazon cloud that interfaced to the Intelligence Community*s BlackBook system.

 More recently we have developed strategies for secure storage and query processing in a hybrid cloud, In particular, we have developed algorithms for query processing wherein user*s local computing capability is exploited alongside public cloud services to deliver an efficient and secure data management solution. Hybrid clouds offer numerous advantages including ability to restrict data and processing being out-sourced based on sensitivity/confidentiality of the data as well as control on the monetary expenses of using cloud services by exploiting local resources. Nonetheless, query processing in hybrid cloud introduces new challenges, namely, 1) data design: How to partition relations between the public and private components of the cloud? The solution must account for the sensitivity of attributes in a relation as well as the workload that will be executed; 2) data security: How to represent encrypted (sensitive) data that enables non-trivial query processing on the public cloud? and 3) query processing: How to execute queries over the distributed data with mixed representation (i.e., encrypted and plaintext) while minimizing processing and communication costs? This paper addresses these challenges and incorporates the respective solutions into an add-on tool for a Hadoop and Hive-based cloud computing infrastructure.

 We have also developed demonstration systems with our European partners: Kings College, University of London and the University of Insubria Italy who are funded by EOARD (The European Office of Aero-space Research and Development). The first demonstration illustrates how information may be shared in our cloud, based on policies specified in XACML. In the second demonstration we are implementing a semantic web-based policy engine and will show how multiple social networks may share information on our cloud based on semantic web-based policies. For both demonstrations, we will use the secure cloud data managers we have implemented. 2

We have also made progress on a number of research areas related to the cloud. These include (i) SPARQL/JENA-based inference controller for provenance data. This inference controller is being implemented on our Hadoop Cloud; (ii) Cloud-based Malware Detection for Evolving Data Streams where we have developed a scalable feature selection and extraction solution that leverages a cloud computing framework; and (iii) CloudMask: Together with Purdue University we have developed CloudMask, an approach that supports fine-grained attribute-based access control based on encryption while at the same time assuring the privacy of the identity attributes of the users accessing the data. Our future plans include secure virtualization using the XEN hypervisor to host our cloud data managers and demonstrate assured information sharing on this platform. We would also like to explore collaboration with the Asia Pacific region (which includes Australia) for cloud-based information sharing demonstrations with fund-ing from AOARD (The Asian Office of Aerospace Research and Development).

Professor Bhavani Thuraisingham's Bio

Dr. Bhavani Thuraisingham (aka Dr. Bhavani) is the Louis A. Beecherl, Jr. I Distinguished Professor in the Erik Jonsson School of Engineering and Computer Science at The University of Texas at Dallas (UTD) since September 2010. She joined UTD in October 2004 as a Professor of Computer Science and Director of the Cyber Security Re-search Center. She is an elected Fellow of five organizations: the IEEE (Institute for Electrical and Electronics Engineers, 2002), the AAAS (American Association for the Advancement of Science, 2003), the BCS (British Computer Society, 2005), SPDS (Society for Design and Process Science 每 a society that promotes transdisciplinary research 每 2011) and the Society of Information Reuse and Integration (subcommittee of IEEE Systems, Man and Cybernetics Society). She is the recipient of numerous awards including (i) the IEEE Computer Society*s 1997 Technical Achievement Award for ※outstanding and innovative contributions to secure data management§, (ii) the 2010 Research Leadership Award for ※Outstanding and Sustained Leadership Contributions to the Field of Intelligence and Security Informatics§ presented jointly by the IEEE Intelligent and Transportation Systems Society Technical Committee on Intelligence and Security Informatics in Transportation Systems and the IEEE Systems, Man and Cybernetics Society Technical Committee on Homeland Security, (iii) the 2010 ACM SIGSAC (Association for Computing Machinery, Special Interest Group on Security, Audit and Control) Outstanding Contributions Award for ※seminal research contributions and leadership in data and applications security for over 25 years§ and (iv) the 2011 AFCEA (Armed Forces Communications and Electronics Association) Medal of Merit for Sustained Professional Excellence in Communications, Electronics, Intelligence and Information Systems and Service to the Association. She is a Distinguished Scientist of ACM, was an IEEE Distinguished Lecturer between 2002 and 2005, and was also featured by Silicon India magazine as one of the seven leading technology innovators of South Asian origin in the USA in 2002. She received the prestigious earned higher doctorate degree of Doctor of Engineering from the University of Bristol England for her thesis consisting of her published works on secure dependable data management in July 2011.

Prior to joining UTD, Dr. Bhavani was an IPA (Intergovernmental Personnel Act) at the National Science Foundation (NSF) in Arlington, VA, from the MITRE Corporation for three years. At NSF, she established the Data and Applications Security Program and co-founded the Cyber Trust theme and was involved in interagency activities in data mining for counter-terrorism. She worked at MITRE in Bedford, MA between January 1989 and September 2001, conducting research, development, technology transfer and project management activities in secure data and information management, real-time middleware and data management, and data mining. She also led a department of several staff working in information management. Prior to that she worked in the commercial industry for six years first at Control Data Corporation developing the CDCNET product and later at Honeywell Inc. on research development, and technology transfer. Her work has resulted in over 100 journal articles, over 200 refereed conference papers and workshops, and five US patents (two pending). She is the author of eleven books in data management, data mining and data security including one on data mining for counter-terrorism and another on Database and Applications Security and has edited twelve more. She has given over 90 keynote presentations at various technical conferences and has also given invited talks at the White House Office of Science and Technology Policy and at the United Nations on Data Mining for counter-terrorism. She serves (or has served) on editorial boards of leading re-search and industry journals including several IEEE and ACM Transactions.

Dr. Bhavani is the founding president of ※Bhavani Security Consulting, LLC§, a company providing services in consulting and training in Cyber Security and Information Technology. She is also the founder of ※Knowledge and Security Analytics, LLC§, a spin-off company from UTD developing tools in assured information sharing and ※Evolving Malware Security, LLC§ a second spinoff company from UTD developing malware detection tools.


Professor David Abramson

Monash University

Australia

Title: Mixing Cloud and Grid Resources for High Throughput Science
Abstract:

Over the past 15 years we have developed a sophisticated tool set for solving large parameter sweep and search applications. This tool family, called Nimrod, makes it easy to create computational experiments in which multiple independent scenarios are explored. Nimrod supports complete state-space exploration (so called full parameter sweeps), guided search (using non-linear optimisation techniques) and design-of-experiment schemes (for reducing the search space). All of these work by creating many tasks, and farming them out to computational units distributed (potentially) over a Grid. We have run many real world case studies over local clusters and the Grid.

In the Grid we have consistently experienced two obstacles that complicated experiments. First, the heterogeneity that defines the Grid makes application deployment difficult and error prone. The vast variety of operating systems, hardware platforms and runtime environments means that an application needs to be ported to a large number of different platforms, requiring time consuming setup procedures. Second, the lack of quality of service guarantees means that it is difficult to know how much resource can be delivered, thus computing completion times for experiments is difficult. Both of these problems were addressed in the Nimrod tools. First, we extended the OGSA architecture to incorporate a deployment 'service', and leveraged virtualisation to reduce the heterogeneity. Our experimental system used Microsoft's .NET platform. Second, we designed a computational economy that used a payment model to allow users to trade deadlines against costs.

Interestingly, both of these innovations underpin commercial cloud offerings, and make cloud computing a natural platform for running Nimrod experiments. Accordingly, we have added support for Amazon's EC2, and Microsoft's Azure - both commercial cloud services with very different architectures. Nimrod is able to schedule jobs seamlessly across all three systems, leveraging its computational economy to choose the cheapest allocation that meets a user specified deadline. Moreover, the cloud virtualisation schemes have dramatically simplified application deployment, making it possible to run a variety of applications that use specific software stacks.

In this talk I will discuss our work to date, and show how this has produced outcomes in science and engineering.

Professor David Abramson's Bio

Professor David Abramson has been involved in computer architecture and high performance computing research since 1979. Previous to joining Monash University in 1997, he has held appointments at Griffith University, CSIRO, and RMIT. At CSIRO he was the program leader of the Division of Information Technology High Performance Computing Program, and was also an adjunct Associate Professor at RMIT in Melbourne. He served as a program manager and chief investigator in the Co-operative Research Centre for Intelligent Decisions Systems and the Co-operative Research Centre for Enterprise Distributed Systems. Abramson is currently an ARC Professorial Fellow; Professor of Computer Science in the Faculty of Information Technology at Monash University, Australia, and science director of the Monash e-Research Centre. He is a fellow of the Association for Computing Machinery (ACM) and the Academy of Science and Technological Engineering (ATSE), and a member of the IEEE. Abramson has served on committees for many conferences and workshops, and has published over 200 papers and technical documents. He has given seminars and received awards around Australia and internationally and has received over $8 million in research funding. He also has a keen interest in R&D commercialization and consults for Axceleon Inc, who produce an industry strength version of Nimrod, and Guardsoft, a company focused on commercialising the Guard relative debugger. Abramson's current interests are in high performance computer systems design and software engineering tools for programming parallel, distributed supercomputers and stained glass windows.


Professor Albert Zomaya

Director, Centre for Distributed and High Performance Computing

University of Sydney

Australia

Title: Environmentally Sustainable Large Scale Distributed Systems
Abstract:

Global warming and climate change trends call for urgent action to manage information and communication technologies in a sustainable manner by minimizing energy consumption and utilizing resources more efficiently. Distributed computing environments have become the de facto platforms for many applications. These systems bring a range of heterogeneous resources that should be able to function continuously and autonomously. However, distributed systems expend a lot of energy which raises a range of important research issues related to the use and virtualisation of ICT resources in a way offers significant potential to contribute to the goal of what has been described as &green computing*. This talk will review some of the important questions related to the development of new algorithms and tools for energy每aware resource management allocation for large每scale distributed systems enabling these systems to become environmentally friendly.

Professor Albert Zomaya's Bio

Albert Y. ZOMAYA is currently the Chair Professor of High Performance Computing & Networking and Australian Research Council Professorial Fellow in the School of Information Technologies, The University of Sydney. He is also the Director of the Centre for Distributed and High Performance Computing which was established in late 2009. Professor Zomaya is the author/co-author of seven books, more than 400 papers, and the editor of nine books and 11 conference proceedings. He is the Editor in Chief of the IEEE Transactions on Computers and serves as an associate editor for 19 leading journals. Professor Zomaya is the recipient of the Meritorious Service Award (in 2000) and the Golden Core Recognition (in 2006), both from the IEEE Computer Society. Also, he received the IEEE TCPP Outstanding Service Award and the IEEE TCSC Medal for Excellence in Scalable Computing, both in 2011. Professor Zomaya is an ACM Distinguished Speaker, a Chartered Engineer, a Fellow of AAAS, IEEE, IET (U.K.), and a Distinguished Engineer of the ACM.