SlideShare a Scribd company logo
1 of 13
Cloud-based Situational Analysis for Factories
providing Real-time Reconfiguration Services
ATB SAFIRE Project Oveview 1
ATB SAFIRE Project Oveview 2
Motivation
 Electrolux
 Products connected to a cloud-based
system can be optimised through a
reconfiguration process i.e. Cloud-driven
product optimisation
 OAS
 Optimise production processes and
preventive maintenance activities through
reconfiguration of processes based on Big
Data analysis in the Cloud
 ONA
 Improvements in Adaptive Machining, Part
Quality and Sustainability, based on
analysing machine usage behaviour
compared to nominal machine usage
behaviour
ATB SAFIRE Project Oveview 3
Case Studies
ATB SAFIRE Project Oveview 4
SAFIRE Concept
SAFIRE Security Framework
ATB SAFIRE Project Oveview 5
SAFIRE
Manufacturer / Factory
Optimisation
&
Reconfigurati
on Engine
Situation
Determinat
ion
Services
Predictive
Analytics
Engine
Reconfigurati
on Quality
Evaluation
Services
ReconfigurationInterfaces
Secure SAFIRE infrastructure
Connected Product
Network
&Event-driven Data Ingestion Situation Monitoring Services
Security in SAFIRE
ATB SAFIRE Project Oveview 6
ATB SAFIRE Project Oveview 7
Security Services in SAFIRE Scenario
Figure 3: SAFIRE initial concept
Figure 4 depicts the different aspects of the SAFIRE generic scenario. Each of the
scenario elements are described in the following sections
 Protection of Data at Rest
 Protection of Data in Transit
 Ability to express access control needs
 Comprehensible global policy with
effective enforcement mechanism
 LINK: SAFIRE solution infrastructure
link with security framework
 Application components
 Architecture
ATB SAFIRE Project Oveview 8
Key Requirements and
Links to Other Components
 Use Industrial Internet Consortium’s IIoT Security Framework
(IISF)
 Security Methodology
 Identify assets to be protected
 Identify threats /organisational policy / assumptions on environm’t
 Identify security objectives and requirements
 Select security technologies to meet requirements
 Extend and integrate selected technologies to Security Framework
 Provide security guidance to users and administrators
 Security Services
 Flexible access control policy specification language
 Centralised policy administration / policy decision point
 Distributed policy enforcement points
 Protection of Data at Rest (DAR)
 Protection of Data in Transit (DIT)
ATB SAFIRE Project Oveview 9
SAFIRE Security Framework
 IISF – security framework and ref architecture
 Use as a blueprint for completeness of security
approach
 NGAC – for security policy and enforcement
 Make more universal by making the Policy
Enforcement Points and Policy Query Interfaces
(Policy Server) into Web services
 Construct an easily portable implementation of
an NGAC Security Policy Server
 Delegate PEP and RAP to system developers
 Key Characteristics Audit
 Use of features within chosen impl technologies
 Perform security feature audit to support
confidence in security solution
ATB SAFIRE Project Oveview 10
Development Approach
ATB SAFIRE Project Oveview 11
Next Generation Access Control
Functional Architecture
Policy Enforcement
Point (PEP)
Policy Enforcement
Points (PEP)
PM-Aware
App
Resource-using
Applications
Policy
Decision
Point (PDP)
Policy Info
Point (PIP)
Policy Access &
Administration
Point (PAP)
Resource
Access
Point (PEP)
Resource
Access Points
(RAP)
ResourceProtected
Resources
Policy
Server
Policy
Configuration
Tool
PM-Aware
App
Resource
Managers
Resource
Servers
Policy
Enforcement
Interface
Resource
Access
Interface
Open
Interface
Access
Control
Resource
Access
Policy
Query
Interface
NGAC PEPs as Web services
ATB SAFIRE Project Oveview 12
SAFIRE
components
PEP WS
http req
http resp
Proxy
PEP
Web
Service
http req
http resp
Resource
Server
Data access
http req
http resp
Cloud-based Situational Analysis for Factories
providing Real-time Reconfiguration Services
More info: www.safire-factories.org
ATB SAFIRE Project Oveview 13

More Related Content

What's hot

Automate Network Configuration & Compliance Management with Itential
Automate Network Configuration & Compliance Management with ItentialAutomate Network Configuration & Compliance Management with Itential
Automate Network Configuration & Compliance Management with Itential
Itential
 
Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...
AlgoSec
 
Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...
AlgoSec
 
How Network Instruments can help you!
How Network Instruments can help you!How Network Instruments can help you!
How Network Instruments can help you!
Tonya Williams
 

What's hot (20)

Automate Network Configuration & Compliance Management with Itential
Automate Network Configuration & Compliance Management with ItentialAutomate Network Configuration & Compliance Management with Itential
Automate Network Configuration & Compliance Management with Itential
 
Firewall Rule Recertification - An Application-Centric Approach
Firewall Rule Recertification - An Application-Centric ApproachFirewall Rule Recertification - An Application-Centric Approach
Firewall Rule Recertification - An Application-Centric Approach
 
Measuring and Maximizing the Business Impact of Network Automation
Measuring and Maximizing the Business Impact of Network AutomationMeasuring and Maximizing the Business Impact of Network Automation
Measuring and Maximizing the Business Impact of Network Automation
 
IAP 2020.1 Features Showcase
IAP 2020.1 Features ShowcaseIAP 2020.1 Features Showcase
IAP 2020.1 Features Showcase
 
Migrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best PracticesMigrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best Practices
 
Combining logs, metrics, and traces for unified observability
Combining logs, metrics, and traces for unified observabilityCombining logs, metrics, and traces for unified observability
Combining logs, metrics, and traces for unified observability
 
Integration & Federation: The Key to the Next Wave of Network Automation
Integration & Federation: The Key to the Next Wave of Network AutomationIntegration & Federation: The Key to the Next Wave of Network Automation
Integration & Federation: The Key to the Next Wave of Network Automation
 
Elastic APM: Amping up your logs and metrics for the full picture
Elastic APM: Amping up your logs and metrics for the full pictureElastic APM: Amping up your logs and metrics for the full picture
Elastic APM: Amping up your logs and metrics for the full picture
 
Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...Managing application connectivity securely through a merger or acquisition – ...
Managing application connectivity securely through a merger or acquisition – ...
 
How Netskope Mastered DevOps with Sumo Logic
How Netskope Mastered DevOps with Sumo LogicHow Netskope Mastered DevOps with Sumo Logic
How Netskope Mastered DevOps with Sumo Logic
 
IoT for Automaatio XXI 15 seminar_Vacon
IoT for Automaatio XXI 15 seminar_VaconIoT for Automaatio XXI 15 seminar_Vacon
IoT for Automaatio XXI 15 seminar_Vacon
 
Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...
 
DataArchiva’s Journey to Success in Salesforce Data Archiving
DataArchiva’s Journey to Success in Salesforce Data ArchivingDataArchiva’s Journey to Success in Salesforce Data Archiving
DataArchiva’s Journey to Success in Salesforce Data Archiving
 
Cloud Con 2015 - Integration & Web APIs
Cloud Con 2015 - Integration & Web APIsCloud Con 2015 - Integration & Web APIs
Cloud Con 2015 - Integration & Web APIs
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertification
 
Term paper 2073131
Term paper   2073131Term paper   2073131
Term paper 2073131
 
Create and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesCreate and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best Practices
 
Splunk at Weill Cornell Medical College
Splunk at Weill Cornell Medical CollegeSplunk at Weill Cornell Medical College
Splunk at Weill Cornell Medical College
 
How Network Instruments can help you!
How Network Instruments can help you!How Network Instruments can help you!
How Network Instruments can help you!
 
WWT: Tetration Presentation from Cisco Live 2017
WWT: Tetration Presentation from Cisco Live 2017WWT: Tetration Presentation from Cisco Live 2017
WWT: Tetration Presentation from Cisco Live 2017
 

Similar to SAFIRE Security Concept at EFFRA Event

Ibm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalIbm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_final
Mauricio Godoy
 
Pcty 2013 cloud and open stack 052813
Pcty 2013 cloud and open stack 052813Pcty 2013 cloud and open stack 052813
Pcty 2013 cloud and open stack 052813
IBM Danmark
 

Similar to SAFIRE Security Concept at EFFRA Event (20)

Ibm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_finalIbm cloud forum managing heterogenousclouds_final
Ibm cloud forum managing heterogenousclouds_final
 
Pcty 2013 cloud and open stack 052813
Pcty 2013 cloud and open stack 052813Pcty 2013 cloud and open stack 052813
Pcty 2013 cloud and open stack 052813
 
Cisco and F5 accelerate Application Delivery
Cisco and F5 accelerate Application DeliveryCisco and F5 accelerate Application Delivery
Cisco and F5 accelerate Application Delivery
 
Accelerating Application Delivery with Cisco and F5
Accelerating Application Delivery with Cisco and F5Accelerating Application Delivery with Cisco and F5
Accelerating Application Delivery with Cisco and F5
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center Landscape
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps session
 
Best Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility ArchitecturesBest Practices for Building Scalable Visibility Architectures
Best Practices for Building Scalable Visibility Architectures
 
Automate Cloud and Application Security Deployments with Barracuda and Puppet...
Automate Cloud and Application Security Deployments with Barracuda and Puppet...Automate Cloud and Application Security Deployments with Barracuda and Puppet...
Automate Cloud and Application Security Deployments with Barracuda and Puppet...
 
Continuous Integration and Continuous Delivery on Azure
Continuous Integration and Continuous Delivery on AzureContinuous Integration and Continuous Delivery on Azure
Continuous Integration and Continuous Delivery on Azure
 
Which Application Modernization Pattern Is Right For You?
Which Application Modernization Pattern Is Right For You?Which Application Modernization Pattern Is Right For You?
Which Application Modernization Pattern Is Right For You?
 
VMworld 2013: Architecting the Software-Defined Data Center
VMworld 2013: Architecting the Software-Defined Data Center VMworld 2013: Architecting the Software-Defined Data Center
VMworld 2013: Architecting the Software-Defined Data Center
 
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
Driving Systems Stability & Delivery Agility through DevOps [Decoding DevOps ...
 
Wavefront presentation-May-2019
Wavefront presentation-May-2019Wavefront presentation-May-2019
Wavefront presentation-May-2019
 
Cisco at v mworld 2015 ravi_vmworldtheater2015
Cisco at v mworld 2015 ravi_vmworldtheater2015Cisco at v mworld 2015 ravi_vmworldtheater2015
Cisco at v mworld 2015 ravi_vmworldtheater2015
 
Peek into Neo4j Product Strategy and Roadmap
Peek into Neo4j Product Strategy and RoadmapPeek into Neo4j Product Strategy and Roadmap
Peek into Neo4j Product Strategy and Roadmap
 
(ENT210) Accelerating Business Innovation with DevOps on AWS | AWS re:Invent ...
(ENT210) Accelerating Business Innovation with DevOps on AWS | AWS re:Invent ...(ENT210) Accelerating Business Innovation with DevOps on AWS | AWS re:Invent ...
(ENT210) Accelerating Business Innovation with DevOps on AWS | AWS re:Invent ...
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
chapter 7.docx
chapter 7.docxchapter 7.docx
chapter 7.docx
 
chapter 7.pdf
chapter 7.pdfchapter 7.pdf
chapter 7.pdf
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
 

Recently uploaded

Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
Areesha Ahmad
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Sérgio Sacani
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Sérgio Sacani
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
levieagacer
 
Introduction,importance and scope of horticulture.pptx
Introduction,importance and scope of horticulture.pptxIntroduction,importance and scope of horticulture.pptx
Introduction,importance and scope of horticulture.pptx
Bhagirath Gogikar
 
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
ssuser79fe74
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
PirithiRaju
 

Recently uploaded (20)

PSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxPSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
 
COMPUTING ANTI-DERIVATIVES (Integration by SUBSTITUTION)
COMPUTING ANTI-DERIVATIVES(Integration by SUBSTITUTION)COMPUTING ANTI-DERIVATIVES(Integration by SUBSTITUTION)
COMPUTING ANTI-DERIVATIVES (Integration by SUBSTITUTION)
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
 
Clean In Place(CIP).pptx .
Clean In Place(CIP).pptx                 .Clean In Place(CIP).pptx                 .
Clean In Place(CIP).pptx .
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
 
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
Vip profile Call Girls In Lonavala 9748763073 For Genuine Sex Service At Just...
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
 
Introduction,importance and scope of horticulture.pptx
Introduction,importance and scope of horticulture.pptxIntroduction,importance and scope of horticulture.pptx
Introduction,importance and scope of horticulture.pptx
 
IDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicineIDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicine
 
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
Chemical Tests; flame test, positive and negative ions test Edexcel Internati...
 
Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Alandi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Alandi Call Me 7737669865 Budget Friendly No Advance Booking
 
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptxCOST ESTIMATION FOR A RESEARCH PROJECT.pptx
COST ESTIMATION FOR A RESEARCH PROJECT.pptx
 
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRLKochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
Kochi ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Kochi ESCORT SERVICE❤CALL GIRL
 
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
 
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
Feature-aligned N-BEATS with Sinkhorn divergence (ICLR '24)
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
 
Forensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdfForensic Biology & Its biological significance.pdf
Forensic Biology & Its biological significance.pdf
 

SAFIRE Security Concept at EFFRA Event

  • 1. Cloud-based Situational Analysis for Factories providing Real-time Reconfiguration Services ATB SAFIRE Project Oveview 1
  • 2. ATB SAFIRE Project Oveview 2 Motivation
  • 3.  Electrolux  Products connected to a cloud-based system can be optimised through a reconfiguration process i.e. Cloud-driven product optimisation  OAS  Optimise production processes and preventive maintenance activities through reconfiguration of processes based on Big Data analysis in the Cloud  ONA  Improvements in Adaptive Machining, Part Quality and Sustainability, based on analysing machine usage behaviour compared to nominal machine usage behaviour ATB SAFIRE Project Oveview 3 Case Studies
  • 4. ATB SAFIRE Project Oveview 4 SAFIRE Concept
  • 5. SAFIRE Security Framework ATB SAFIRE Project Oveview 5
  • 6. SAFIRE Manufacturer / Factory Optimisation & Reconfigurati on Engine Situation Determinat ion Services Predictive Analytics Engine Reconfigurati on Quality Evaluation Services ReconfigurationInterfaces Secure SAFIRE infrastructure Connected Product Network &Event-driven Data Ingestion Situation Monitoring Services Security in SAFIRE ATB SAFIRE Project Oveview 6
  • 7. ATB SAFIRE Project Oveview 7 Security Services in SAFIRE Scenario Figure 3: SAFIRE initial concept Figure 4 depicts the different aspects of the SAFIRE generic scenario. Each of the scenario elements are described in the following sections
  • 8.  Protection of Data at Rest  Protection of Data in Transit  Ability to express access control needs  Comprehensible global policy with effective enforcement mechanism  LINK: SAFIRE solution infrastructure link with security framework  Application components  Architecture ATB SAFIRE Project Oveview 8 Key Requirements and Links to Other Components
  • 9.  Use Industrial Internet Consortium’s IIoT Security Framework (IISF)  Security Methodology  Identify assets to be protected  Identify threats /organisational policy / assumptions on environm’t  Identify security objectives and requirements  Select security technologies to meet requirements  Extend and integrate selected technologies to Security Framework  Provide security guidance to users and administrators  Security Services  Flexible access control policy specification language  Centralised policy administration / policy decision point  Distributed policy enforcement points  Protection of Data at Rest (DAR)  Protection of Data in Transit (DIT) ATB SAFIRE Project Oveview 9 SAFIRE Security Framework
  • 10.  IISF – security framework and ref architecture  Use as a blueprint for completeness of security approach  NGAC – for security policy and enforcement  Make more universal by making the Policy Enforcement Points and Policy Query Interfaces (Policy Server) into Web services  Construct an easily portable implementation of an NGAC Security Policy Server  Delegate PEP and RAP to system developers  Key Characteristics Audit  Use of features within chosen impl technologies  Perform security feature audit to support confidence in security solution ATB SAFIRE Project Oveview 10 Development Approach
  • 11. ATB SAFIRE Project Oveview 11 Next Generation Access Control Functional Architecture Policy Enforcement Point (PEP) Policy Enforcement Points (PEP) PM-Aware App Resource-using Applications Policy Decision Point (PDP) Policy Info Point (PIP) Policy Access & Administration Point (PAP) Resource Access Point (PEP) Resource Access Points (RAP) ResourceProtected Resources Policy Server Policy Configuration Tool PM-Aware App Resource Managers Resource Servers Policy Enforcement Interface Resource Access Interface Open Interface Access Control Resource Access Policy Query Interface
  • 12. NGAC PEPs as Web services ATB SAFIRE Project Oveview 12 SAFIRE components PEP WS http req http resp Proxy PEP Web Service http req http resp Resource Server Data access http req http resp
  • 13. Cloud-based Situational Analysis for Factories providing Real-time Reconfiguration Services More info: www.safire-factories.org ATB SAFIRE Project Oveview 13