I am hiring!

I am looking for a PostDoc if you are interested, please drop me an e-mail with your CV.
I am also looking for a PhD candidate on one of the following topics: Security of the Internet of Things, Adversarial Machine Learning.

Find more info about our new results on behavioural biometrics here.

Find more info about the CINI Cyber Security National Lab i am involved with, by clicking on its logo Cyber Security National Lab .


xESB: Security Enhanced Enterprise Service Bus

Project description
An Enterprise Service Bus is a state of the art piece of technology that deals with mediating communication throughout the enterprise. Enforcement of a policy comprises all the actions that need to be performed in order to makes sure that a policy or set of contraints is satisfied. xESB is an enhanced version of an ESB that monitors and enforces security policies both inside one business domain and between business domains. xESB is based on the Java Business Integration Standard which specifies a number of requirements for the SOA applications that are to be put together (or integrated). Because Java Business Integration is a standard, xESB is generic and applies to any JBI-based infrastructures.

xESB works with the 3 steps of a runtime enforcement process. Once a message is intercepted, the message is evaluated against the deployed security policies; the result is a decision that xESB translates into a series of actions; the enforcement process is in charge of performing those actions (either directly or by delegating them to a trusted third party). In our case xESB understands and performs directly the actions specified by the policy:
  • deletion or blocking of a message
  • delaying of a message
  • modifying of a message in terms of its metadata
The policy language that xESB understands dictates how strong its enforcement is. We have used an internal xESB language that supports UCON-like obligations and is adapted to this message level, as well as two other languages: POLPA (Policy Language based on Process Algebra) and OSL (Obligation Specification Language). The aim is to make xESB able to use any kind of policy language as long as the constraints have to do more with event logic rather than application logic. In our latest work, we have explored the possibilities of having xESB enforcement performed in tandem with enforcement at the business process level. In this way, we sugest a common controller that can delegate enforcement actions at both the xESB layer and BPEL layer. This approach makes it flexible and more reliable to enact realistic SOA policies.

People: Gabriela Gheorghe, Bruno Crispo

  • Gabriela Gheorghe, Daniel Schleicher, Ralph Mietzner, Ganna Monakova, Tobias Anstett, Bruno Crispo, Frank Leymann, "Combining Enforcement Strategies in Service Oriented Architectures". In the proceedings of the 8th International Conference on Service Oriented Computing (ICSOC 2010), December 2010.
  • Gabriela Gheorghe, Paolo Mori, Bruno Crispo and Fabio Martinelli, "Enforcing UCON Policies on the Enterprise Service Bus". In the proceedings of the 12th International Symposium on Distributed Objects, Middleware and Applications (DOA2010) On theMove Federated Conferences, October 2010.
  • Gabriela Gheorghe, Stephan Neuhaus, Bruno Crispo, "xESB: an Enterprise Service Bus for Access and Usage Control Policy Enforcement". In the proceedings of the Fourth International Conference on Trust Management (IFIPTM10), June 1 2010.
  • Gabriela Gheorghe, Fabio Massacci, Stephan Neuhaus and Alexander Pretschner, "GoCoMM: A Governance and Compliance Maturity Model". In the proceedings of the 1st ACM Workshop on Information Security Governance, November 2009.