Keynote Speakers
Keynotes are for all
conferences of CGC2011, SCA2011, DASC2011, PICom2011, EmbeddedCom2011
and associated workshops and symposia.
﹛
|
Professor Ivan Stojmenovic
University of Ottawa
Canada |
Title: Green Computing in Mobile Cloud |
Abstract:
Cloud computing and green computing came to
be hot topics in recent years, especially in data center
networks. As the development of smart phones and tablets, the
combination between mobile devices and cloud computing, named by
mobile cloud, has emerged as a new cloud computing platform,
bringing new challenges to cloud and green computing. One of the
most important issues is how to optimize the scheduling and
transport schemes for mobile devices to achieve energy saving.
﹛
In this talk, I will first introduce the
development of mobile cloud computing. Next, I will present the
new challenges of green computing in mobile cloud; especially
highlight the uniqueness, compared with the study on the energy
saving problem in wireless networking. I will also discuss the
possible solutions from various perspectives, including task
scheduling, access management, transport mechanisms and
application optimization. |
Professor
Ivan Stojmenovic's
Bio |
Prof. Ivan Stojmenovic received his Ph.D.
degree in mathematics in 1985. He held regular or visiting
positions in Serbia (Institute of Mathematics, University of
Novi Sad, 1980-1987), Japan (Electrotechnical Laboratory,
Tsukuba, 1985/6), USA (Washington State University, Pullman, WA,
and University of Miami, FL, 1987/88), France (Amiens 1998,
Lille 2002-2007, Paris 2008), Mexico (DISCA, IIMAS, Universidad
Nacional Autonoma de Mexico, 2000/02), Spain (Murcia, 2005), UK
(University of Birmingham, 2007/08), Hong Kong (May 2009),
Brazil (Sao Carlos, August 2009), Canada (SITE, University of
Ottawa, since 1988).
Stojmenovic published >250 different papers in referred journals
and conferences; >90 of them are in journals with an ISI impact
factor, >20 are in IEEE or ACM journals. His most significant
publications can be seen at www.site.uottawa.ca/~ivan. He
co-authored over 30 book chapters, mostly very recent.
He collaborated with about 100 co-authors with Ph.D. and a
number of their graduate students from 24 different countries.
He (co)supervised >50 completed Ph.D. and master theses, and
published over 120 joint articles with supervised students. He
also published articles with 27 graduate students outside of
their theses, and 4 undergraduate students. His current research
interests are mainly in wireless ad hoc, sensor and cellular
networks. His research interests also include parallel
computing, multiple-valued logic, evolutionary computing, neural
networks, combinatorial algorithms, computational geometry,
graph theory, computational chemistry, image processing,
programming languages, and computer science education.
He is current editor-in-chief of IEEE
Transactions on Parallel and Distributed Systems. |
﹛
﹛
|
Professor Geoffrey Charles Fox
School of
Informatics and Computing
Community Grids Laboratory
Indiana University Bloomington
USA |
Title: Sensors Nets and their Analysis in the Cloud |
Abstract:
We discuss the conventional wisdom with light weight clients
supported by backend clouds and the implications for power
efficient user friendly computing. We apply this to scientific
data analysis in remote regions (in particular polar science)
robotics and surveillance. We introduce a new sensor-cloud
interface based on publish-subscribe technology. We discuss how
this can be prototyped on FutureGrid. We define a sensor as any
data source producing a time series and point out the generality
of this. |
Professor Geoffrey
Charles Fox's Bio |
Prof. Geoffrey
Fox received a Ph.D. in Theoretical Physics from Cambridge
University and is now professor of Informatics and Computing,
and Physics at Indiana University where he is director of the
Digital Science Center and Associate Dean for Research and
Graduate Studies at the School of Informatics and Computing. He
previously held positions at Caltech, Syracuse University and
Florida State University. He has supervised the PhD of 61
students and published over 600 papers in physics and computer
science. He currently works in applying computer science to
Bioinformatics, Defense, Earthquake and Ice-sheet Science,
Particle Physics and Chemical Informatics. He is principal
investigator of FutureGrid 每 a new facility to enable
development of new approaches to computing. He is involved in
several projects to enhance the capabilities of Minority Serving
Institutions. He is current editor-in-chief of
Concurrency and Computation: Practice and Experience |
﹛
﹛
|
Professor Craig Standing
Foundation
Professor of SIM
School of
Management
Edith Cowan University
Australia |
Title: Social Computing, ICT developments
and Innovation |
Abstract:
Implications for Practice and Research
Collaborative and social media developments have opened up new
opportunities to transform work practices and engage with
consumers. Social business models can deliver significant
benefits for organisations but strategies are important as there
are many pitfalls for the unwary. This talk will explore how
social media can be used to improve organisational innovation,
the challenges in harnessing social media technologies and also
its implications for the research environment. |
Professor Craig
Standing's Bio |
Craig Standing is Professor of Strategic
Information Management at Edith Cowan University in Western
Australia. He completed degrees at Lancaster University and the
University of Manchester and a PhD at the University of Western
Australia. His research has examined the evolving nature of
electronic markets, supply chain management and the use of
social media in innovation. He is currently the director of the
Centre for Innovative Practice at Edith Cowan University and a
member of the Australian Research Council*s College of Experts.
He is an editor of the
Journal of Systems and Information Technology, and is at
the forefront of knowledge on information systems research and
research methods. |
﹛
﹛ ﹛
|
Professor
Vijay Varadharajan
Macquarie
University
Australia |
Title:
Secure and Trustworthy
Computing |
Abstract:
Security and dependability
have become particularly significant as systems get more and
more interconnected and as their complexity increases.
Technologies such as distributed online applications, cloud
computing, service oriented architectures, pervasive mobile
devices, and social networking have increased the dependency of
society and economy on information systems and infrastructures.
Along with the phenomenal growth in technology has been the
growth in technology related crimes.
In this talk, I will start
with a brief look at some of the recent developments in the
threat scenery. Then I will some key challenges involved in the
design of secure and trustworthy systems. In particular, I will
discuss the types of security services needed to secure
distributed systems and applications and will highlight the
issues of trust which underpins security. Then I will consider
how traditional security and social aspects of trust can be
combined to enhance the quality of security decision making. I
will conclude the talk by demonstrating such a trust enhanced
security approach using some example systems that we have been
working on. |
Professor
Vijay Varadharajan's Bio |
Vijay Varadharajan is
the Microsoft Chair Professor in Innovation in Computing in
Australia at Macquarie University. He is also the Director of
Information and Networked System Security Research (INSS) Group
at Macquarie University. Before this he was Chair of Computing
and Head of School of Computing and IT at University of Western
Sydney. Previously, Vijay headed Security Research worldwide for
Hewlett-Packard Labs based at European Headquarters at HP Labs
Bristol, UK. He led and managed several research projects in UK,
US, Germany, France and Italy and
under his leadership several security research technologies were
transferred into commercially successful HP products. He also
headed the Technical Security Strategy Initiative at HP under
the Senior Vice President of HP. Earlier, he was
Research Manager of Data
Security Lab at British Telecom Research Labs. U.K., Research
Fellow and Lecturer in Computer Science at Plymouth and Reading
Universities.
Vijay was
an inaugural Board Member of International Advisors of TCPA,
USA, (originally formed by HP, Microsoft, Intel, Sun and
Compaq). He is on the Trustworthy Computing Advisory Board
(Microsoft, USA), the SAP (Germany) Security Advisory Board,
Australian Government*s Peak Security
Advisory Group for the Minister of Broadband, Communications and
Digital Economy, Australia. He is a member of the ARC College of
Experts in Engineering, Mathematics and Informatics.
He has been the
Technical Board Director of Computer Science at Australian
Computer Society, and Chair of the
National Taskforce on E-Security.
Vijay has been on the
Editorial Board of several journals including the IEEE
Transactions in Dependable and Secure Computing, the ACM
Transactions on Information Systems Security, Springer
International Journal of Information Security and IEEE Security
and Privacy.
Vijay has published over
320 papers in International Journals and Conferences, has
co-authored and edited 9 books and holds 3 patents. His research
work over the years has contributed to the development of
several successful secure commercial systems and
have generated many hundreds of millions of
dollars of revenue.
His current areas of
research interest include Web Services Security, Secure
Distributed Applications, Trusted Computing, Wireless and Mobile
Security, Cloud Computing and Security, Internet Security, Cyber
Security Attacks, Secure Social Computing, Security Policies and
Architectures. Vijay is a Fellow of the British Computer Society
(FBCS), a Fellow of the IEE (FIEE), a Fellow of the Institute of
Mathematics, UK (FIMA), a Fellow of the Australian Institute of
Engineers (FIEAust) and a Fellow of the Australian Computer
Society (FACS). |
﹛
﹛ ﹛
|
Professor
Bhavani Thuraisingham
Department of Computer Science
Director of the Cyber Security Research Center
Erik Jonsson School of Engineering and Computer Science
The University of Texas at Dallas, USA |
Title:
Cloud-Centric Assured Information Sharing |
Abstract:
Daniel Wolfe
(formerly of the National Security Agency) defined assured
information sharing (AIS) as one that ※provides the ability to
dynamically and securely share information at multiple
classification levels among U.S., allied and coalition forces.§
The DoD*s vision for AIS is to ※deliver the power of
in-formation to ensure mission success through an agile
enterprise with freedom of maneuverability across the
information environment§. More recently National Security Agency
CIO Lonny Anderson has stated that the agency is focusing on a
※cloud-centric§ approach to information sharing with other
agencies. To address the needs of the DoD, our project is
developing technologies and tools for cloud-centric assured
information sharing funded by the Air Force Office of Scientific
Research (AFOSR).
We initially
examined developments in grid and cloud computing and explored
security issues. In particular, we explored secure
virtualization, secure storage, secure data management and
secure cloud monitoring. We also developed a secure cloud data
manager that will be utilized as the engine for assured
information sharing. We developed two types of cloud data
managers, one based on semantic web data and the other based on
relational data. Current frameworks do not scale for large RDF
graphs and as a result do not address these challenges. Here, we
developed a framework using Hadoop to store and retrieve large
numbers of RDF triples by exploiting the cloud computing
paradigm. We developed a scheme to store RDF data in a Hadoop
Distributed File System. More than one Hadoop job may be needed
to answer a query because a triple pattern in a query cannot
take part in more than one join in a Hadoop job. To determine
the jobs, we developed algorithms to generate a near optimal
query plan based on a greedy approach to answer a SPARQL
Protocol and RDF Query Language (SPARQL) query. We use Hadoop*s
MapReduce framework to answer the queries. We implemented XACML-based
policy management and integrated it with our query processing
strategies. For secure query processing for relational data we
utilized the HIVE framework. In addition to secure query
processing, we also developed encrypted query processing on the
Amazon cloud that interfaced to the Intelligence Community*s
BlackBook system.
More recently
we have developed strategies for secure storage and query
processing in a hybrid cloud, In particular, we have developed
algorithms for query processing wherein user*s local computing
capability is exploited alongside public cloud services to
deliver an efficient and secure data management solution. Hybrid
clouds offer numerous advantages including ability to restrict
data and processing being out-sourced based on
sensitivity/confidentiality of the data as well as control on
the monetary expenses of using cloud services by exploiting
local resources. Nonetheless, query processing in hybrid cloud
introduces new challenges, namely, 1) data design: How to
partition relations between the public and private components of
the cloud? The solution must account for the sensitivity of
attributes in a relation as well as the workload that will be
executed; 2) data security: How to represent encrypted
(sensitive) data that enables non-trivial query processing on
the public cloud? and 3) query processing: How to execute
queries over the distributed data with mixed representation
(i.e., encrypted and plaintext) while minimizing processing and
communication costs? This paper addresses these challenges and
incorporates the respective solutions into an add-on tool for a
Hadoop and Hive-based cloud computing infrastructure.
We have also
developed demonstration systems with our European partners:
Kings College, University of London and the University of
Insubria Italy who are funded by EOARD (The European Office of
Aero-space Research and Development). The first demonstration
illustrates how information may be shared in our cloud, based on
policies specified in XACML. In the second demonstration we are
implementing a semantic web-based policy engine and will show
how multiple social networks may share information on our cloud
based on semantic web-based policies. For both demonstrations,
we will use the secure cloud data managers we have implemented.
2
We have also
made progress on a number of research areas related to the
cloud. These include (i) SPARQL/JENA-based inference controller
for provenance data. This inference controller is being
implemented on our Hadoop Cloud; (ii) Cloud-based Malware
Detection for Evolving Data Streams where we have developed a
scalable feature selection and extraction solution that
leverages a cloud computing framework; and (iii) CloudMask:
Together with Purdue University we have developed CloudMask, an
approach that supports fine-grained attribute-based access
control based on encryption while at the same time assuring the
privacy of the identity attributes of the users accessing the
data. Our future plans include secure virtualization using the
XEN hypervisor to host our cloud data managers and demonstrate
assured information sharing on this platform. We would also like
to explore collaboration with the Asia Pacific region (which
includes Australia) for cloud-based information sharing
demonstrations with fund-ing from AOARD (The Asian Office of
Aerospace Research and Development). |
Professor
Bhavani Thuraisingham's Bio |
Dr. Bhavani
Thuraisingham (aka Dr. Bhavani) is the Louis A. Beecherl,
Jr. I Distinguished Professor in the Erik Jonsson School of
Engineering and Computer Science at The University of Texas at
Dallas (UTD) since September 2010. She joined UTD in October
2004 as a Professor of Computer Science and Director of the
Cyber Security Re-search Center. She is an elected Fellow of
five organizations: the IEEE (Institute for Electrical and
Electronics Engineers, 2002), the AAAS (American Association for
the Advancement of Science, 2003), the BCS (British Computer
Society, 2005), SPDS (Society for Design and Process Science 每 a
society that promotes transdisciplinary research 每 2011) and the
Society of Information Reuse and Integration (subcommittee of
IEEE Systems, Man and Cybernetics Society). She is the recipient
of numerous awards including (i) the IEEE Computer Society*s
1997 Technical Achievement Award for ※outstanding and innovative
contributions to secure data management§, (ii) the 2010 Research
Leadership Award for ※Outstanding and Sustained Leadership
Contributions to the Field of Intelligence and Security
Informatics§ presented jointly by the IEEE Intelligent and
Transportation Systems Society Technical Committee on
Intelligence and Security Informatics in Transportation Systems
and the IEEE Systems, Man and Cybernetics Society Technical
Committee on Homeland Security, (iii) the 2010 ACM SIGSAC
(Association for Computing Machinery, Special Interest Group on
Security, Audit and Control) Outstanding Contributions Award for
※seminal research contributions and leadership in data and
applications security for over 25 years§ and (iv) the 2011 AFCEA
(Armed Forces Communications and Electronics Association) Medal
of Merit for Sustained Professional Excellence in
Communications, Electronics, Intelligence and Information
Systems and Service to the Association. She is a Distinguished
Scientist of ACM, was an IEEE Distinguished Lecturer between
2002 and 2005, and was also featured by Silicon India
magazine as one of the seven leading technology innovators of
South Asian origin in the USA in 2002. She received the
prestigious earned higher doctorate degree of Doctor of
Engineering from the University of Bristol England for her
thesis consisting of her published works on secure dependable
data management in July 2011.
Prior to
joining UTD, Dr. Bhavani was an IPA (Intergovernmental Personnel
Act) at the National Science Foundation (NSF) in Arlington, VA,
from the MITRE Corporation for three years. At NSF, she
established the Data and Applications Security Program and
co-founded the Cyber Trust theme and was involved in interagency
activities in data mining for counter-terrorism. She worked at
MITRE in Bedford, MA between January 1989 and September 2001,
conducting research, development, technology transfer and
project management activities in secure data and information
management, real-time middleware and data management, and data
mining. She also led a department of several staff working in
information management. Prior to that she worked in the
commercial industry for six years first at Control Data
Corporation developing the CDCNET product and later at Honeywell
Inc. on research development, and technology transfer. Her work
has resulted in over 100 journal articles, over 200 refereed
conference papers and workshops, and five US patents (two
pending). She is the author of eleven books in data management,
data mining and data security including one on data mining for
counter-terrorism and another on Database and Applications
Security and has edited twelve more. She has given over 90
keynote presentations at various technical conferences and has
also given invited talks at the White House Office of Science
and Technology Policy and at the United Nations on Data Mining
for counter-terrorism. She serves (or has served) on editorial
boards of leading re-search and industry journals including
several IEEE and ACM Transactions.
Dr. Bhavani is the
founding president of ※Bhavani Security Consulting, LLC§, a
company providing services in consulting and training in Cyber
Security and Information Technology. She is also the founder of
※Knowledge and Security Analytics, LLC§, a spin-off company from
UTD developing tools in assured information sharing and
※Evolving Malware Security, LLC§ a second spinoff company from
UTD developing malware detection tools. |
﹛
﹛ ﹛
|
Professor
David Abramson
Monash University
Australia |
Title: Mixing Cloud
and Grid Resources for High Throughput Science |
Abstract:
Over the past 15 years we have developed
a sophisticated tool set for solving large parameter sweep and
search applications. This tool family, called Nimrod, makes it
easy to create computational experiments in which multiple
independent scenarios are explored. Nimrod supports complete
state-space exploration (so called full parameter sweeps),
guided search (using non-linear optimisation techniques) and
design-of-experiment schemes (for reducing the search space).
All of these work by creating many tasks, and farming them out
to computational units distributed (potentially) over a Grid. We
have run many real world case studies over local clusters and
the Grid.
In the Grid we have consistently experienced two obstacles that
complicated experiments. First, the heterogeneity that defines
the Grid makes application deployment difficult and error prone.
The vast variety of operating systems, hardware platforms and
runtime environments means that an application needs to be
ported to a large number of different platforms, requiring time
consuming setup procedures. Second, the lack of quality of
service guarantees means that it is difficult to know how much
resource can be delivered, thus computing completion times for
experiments is difficult. Both of these problems were addressed
in the Nimrod tools. First, we extended the OGSA architecture to
incorporate a deployment 'service', and leveraged virtualisation
to reduce the heterogeneity. Our experimental system used
Microsoft's .NET platform. Second, we designed a computational
economy that used a payment model to allow users to trade
deadlines against costs.
Interestingly, both of these innovations underpin commercial
cloud offerings, and make cloud computing a natural platform for
running Nimrod experiments. Accordingly, we have added support
for Amazon's EC2, and Microsoft's Azure - both commercial cloud
services with very different architectures. Nimrod is able to
schedule jobs seamlessly across all three systems, leveraging
its computational economy to choose the cheapest allocation that
meets a user specified deadline. Moreover, the cloud
virtualisation schemes have dramatically simplified application
deployment, making it possible to run a variety of applications
that use specific software stacks.
In this talk I will discuss our work to date, and show how this
has produced outcomes in science and engineering. |
Professor
David Abramson's Bio |
Professor David Abramson
has been involved in computer architecture and high performance
computing research since 1979. Previous to joining Monash
University in 1997, he has held appointments at Griffith
University, CSIRO, and RMIT. At CSIRO he was the program leader
of the Division of Information Technology High Performance
Computing Program, and was also an adjunct Associate Professor
at RMIT in Melbourne. He served as a program manager and chief
investigator in the Co-operative Research Centre for Intelligent
Decisions Systems and the Co-operative Research Centre for
Enterprise Distributed Systems. Abramson is currently an ARC
Professorial Fellow; Professor of Computer Science in the
Faculty of Information Technology at Monash University,
Australia, and science director of the Monash e-Research Centre.
He is a fellow of the Association for Computing Machinery (ACM)
and the Academy of Science and Technological Engineering (ATSE),
and a member of the IEEE. Abramson has served on committees for
many conferences and workshops, and has published over 200
papers and technical documents. He has given seminars and
received awards around Australia and internationally and has
received over $8 million in research funding. He also has a keen
interest in R&D commercialization and consults for Axceleon Inc,
who produce an industry strength version of Nimrod, and
Guardsoft, a company focused on commercialising the Guard
relative debugger. Abramson's current interests are in high
performance computer systems design and software engineering
tools for programming parallel, distributed supercomputers and
stained glass windows. |
﹛
﹛
|
Professor
Albert Zomaya
Director, Centre
for Distributed and High Performance Computing
University of Sydney
Australia |
Title:
Environmentally Sustainable
Large Scale Distributed Systems |
Abstract:
Global warming and climate
change trends call for urgent action to manage information and
communication technologies in a sustainable manner by minimizing
energy consumption and utilizing resources more efficiently.
Distributed computing environments have become the de facto
platforms for many applications. These systems bring a range of
heterogeneous resources that should be able to function
continuously and autonomously. However, distributed systems
expend a lot of energy which raises a range of important
research issues related to the use and virtualisation of ICT
resources in a way offers significant potential to contribute to
the goal of what has been described as &green computing*. This
talk will review some of the important questions related to the
development of new algorithms and tools for energy每aware
resource management allocation for large每scale distributed
systems enabling these systems to become environmentally
friendly. |
Professor
Albert Zomaya's Bio |
Albert Y. ZOMAYA
is currently the Chair Professor of High Performance
Computing & Networking and Australian Research Council
Professorial Fellow in the School of Information
Technologies, The University of Sydney. He is also the
Director of the Centre for Distributed and High Performance
Computing which was established in late 2009. Professor
Zomaya is the author/co-author of seven books, more than 400
papers, and the editor of nine books and 11 conference
proceedings. He is the Editor in Chief of the IEEE
Transactions on Computers and serves as an associate editor
for 19 leading journals. Professor Zomaya is the recipient of
the Meritorious Service Award (in 2000) and the Golden
Core Recognition (in 2006), both from the IEEE Computer
Society. Also, he received the IEEE TCPP Outstanding
Service Award and the IEEE TCSC Medal for Excellence in
Scalable Computing, both in 2011. Professor Zomaya is an ACM
Distinguished Speaker, a Chartered Engineer, a Fellow of AAAS,
IEEE, IET (U.K.), and a Distinguished Engineer of the ACM. |
|