• CORBA/e: Targeting Distributed

  • FileName: CORBAe_MILS_Agenda.pdf [read-online]
    • Abstract: CORBA/e: Targeting DistributedReal-Time and Embedded SystemsHalf-Day SeminarMILS: An Architecture for Cross-Domain SolutionsHalf-Day SeminarThursday, June 28, 2007 - Brussels, BelgiumRegistration Meeting Info Hotel

Download the ebook

CORBA/e: Targeting Distributed
Real-Time and Embedded Systems
Half-Day Seminar
MILS: An Architecture for Cross-Domain Solutions
Half-Day Seminar
Thursday, June 28, 2007 - Brussels, Belgium
Registration Meeting Info Hotel
CORBA/e - The New High-Performance Communications Architecture
for Real-Time and Embedded Systems
Responding to the demand for a smaller and faster CORBA, the OMG has created the
CORBA/e (CORBA for embedded) specification. CORBA/e is the new standard for smaller
form-factor systems and is the new high-performance CORBA specification for embedded
systems. From software-defined radios to robotics to high performance signal processing, real-
time and embedded CORBA has become the architecture of choice for embedded systems.
This half-day seminar will introduce the CORBA/e architecture, detail the advantages provided
by the multiple profiles, and show by example the footprint and performance provided by current
0900 – 0910 Welcome and Introduction for CORBA/e
Dr. Richard Soley, Chairman & CEO, Object Management Group
0910 – 1000 CORBA/e for Distributed Real-time and Embedded Systems
Victor Giddings, Sr. Product Engineer, Objective Interface Systems
CORBA/e merges the interoperability of standard CORBA with the deterministic
execution and reliability of real-time CORBA. Shedding the dynamic aspects of
the full standard to bring determinism to footprint and execution, the two profiles
defined by CORBA/e bring OMG-standard real-time IIOP interoperability to
distributed board- and chip-based systems. CORBA/e offers a solution to keep
pace with technological advancement in processors and communications
busses, protecting development investment. This presentation will describe the
rationale behind CORBA/e, describe the CORBA/e profiles, and contrast them
with Minimum CORBA.
1000 – 1015 Morning Refreshments
1015 – 1115 Optimizing RTE CORBA for Software-based Communications (SBC)
Steve Jennis, SVP Corporate Development, PrismTech
PrismTech will explain how the CORBA/e specification permits the definition of
'profiles' which in turn support the development of ORBs and COS which are
highly optimized for particular embedded application-domains, and yet still
standards-compliant. This is a major advance over the 'monolithic' Minimum
CORBA specification. Furthermore, PrismTech will explain how it is applying
CORBA/e to dramatically lower the achievable footprint of embedded middleware
to support SBC applications that are extremely size, weight and power
constrained, e.g. handheld radios.
1115 – 1200 Myths and Realities about the JTRS SCA and CORBA
Steve Bernier, Project Leader-Software Defined Radio
CRC (Communications Research Centre)
This presentation will explore the usage of CORBA in the context of the SCA
Core Frameworks. It will cover the SCA specification and its requirements
regarding CORBA. The presentation’s main goal is to provide a new perspective
on SCA Core Frameworks and address SCA’s most popular myths.
1200 – 1300 LUNCH
* * * * *
MILS: An Architecture for Cross Domain Solutions
This half-day seminar will introduce the Multiple Independent Levels of Security (MILS)
architecture, and describe MILS-related standards work occurring at OMG and elsewhere. MILS
enables system and security engineers to effectively collaborate during the entire software life-
cycle to "bake security in" rather than "bolting it on" after the system nears completion. It is
based on the usage of evaluated products under the International Common Criteria to provide a
solid basis to provide Information Assurance in the computing infrastructure, thus enabling the
aggregation of trusted computing in distributed systems. Development of several product
protection profiles are being undertaken in a number of consortia, actively supported by many
commercial vendors. Work at the OMG is focused on developing profiles for RT-CORBA and
DDS, extending UML and MDA to capture security policy, and enabling tool support for
improving software assurance and quality.
1300 – 1330 Keynote Speaker TBA
1330 – 1415 “MILS: An Infrastructure for Building CDS / MLS Systems”
Ben Calloni, Ph.D., P.E., Lockheed Martin Fellow, Software Security,
Mission Systems Avionics & Software, Lockheed Martin
Events after the attack on the World Trade Center has strengthened the resolve
of NATO to make a shift in the old security policy of "need-to-know" to a "need-
to-share". These Cross Domain Systems (CDS) have to provide for the timely
flow of sensitive and classified data among coalition partners during prosecution
of the global war on terrorism. The MILS Architecture is an approach that
includes the use of Open Standard, Commercial Off the Shelf (COTS) Common
Criteria evaluated technologies and products to meet this multi-national, multi-
level, multi-corporation requirement.
1415 - 1500 The MILS Architecture
Gordon Uchenick, Senior Mentor/Principal Engineer, Objective Interface
Coalition Force Operations and Network Centric Warfare require real-time
information sharing among many different organizations. This paradigm requires
that computing nodes and networks simultaneously store and transfer many
different kinds of data with guarantees that data will be kept separate and that
stakeholder distribution policies will always be enforced. The MILS Separation
Kernel provides high assurance separation for data at rest in a processor. The
MILS Partitioning Communications System extends that guaranteed separation
to data in transit on the networks connecting cross-domain systems, enabling the
foundation for real-time information sharing among multi-national forces.
1500 – 1515 Afternoon Refreshments
1515 – 1600 Leveraging MILS to Build High-Assurance Systems from Software
Components of Lesser Assurance
Sebastian Staamann, Director of Security Products and Solutions,
The decomposition of application systems into software components ready to be
deployed in different MILS partitions enables the enforcement of detailed
application-level security policies for the interactions between the single
components. The evaluatable enforcement of application-level security policies
on these interactions enables assurance levels for the overall system, which are
higher than those of the single parts. The use of distribution middleware for the
component interactions enables the building of generic reference monitors. This
presentation discusses the building of high-assurance systems out of
components of lesser assurance based on MILS OSes and the use of
middleware security gateways for CORBA, DDS, and Web Services.
1600 – 1630 Greater focus on the Information Asset
Michael Abramson, President and CEO, Advanced Systems Management
Group, Ltd.
Information Operations in Coalition Force Operations, Network Centric or pan-
agency operation in public safety and homeland security require greater sharing
and control of information than ever before. The fusion of information for tactical
picture compilation, planning, and decisions support is mired in the opposing
requirement to share elements of these fused (highly classified) information
elements. How is the operational need to sharing information going to co-exist
with imposed information security requirements? Can a great focus on the
information asset aid in this process? What types of MILS components are
needed? Where should we focus on Standards?
1630 – 1700 Security Evaluations- a Vendor Perspective
Shaun Lee, Security Evaluations Manager, Security Assurance Group,
Oracle Corporation UK Ltd.
Oracle has completed 25 security evaluations for its products under several
government security testing criteria. This includes 12 under the Common Criteria
which came years after starting its first evaluation under the TCSEC ("Orange
Book") in 1990. This presentation will review a large commercial organization’s
reasons for performing security evaluations, the value of such evaluations and
the role of security evaluations in the wider Information Assurance realm within
Oracle. The presentation will also consider some of Oracle’s practical
experiences of evaluations and of its interactions with the certifying and criteria
setting bodies.

Use: 0.396