ICWS2010上的几篇KEYNOTE

今天看到ICWS2010上的KEYNOTE的摘要部分已经出来了。值得好好关注一下:

 

Keynote 1: Cloud Computing in an Outcome Centric World

ChungSheng Li
Director of Commercial Systems, IBM T.J. Watson Research Center, USA

ABSTRACT:

Delivering business outcome is augmenting and/or replacing traditional fee-for-service business model and has become increasingly prevalent in areas such as strategic outsourcing, smarter planet solutions, crowd sourcing, knowledge marketplace, internet advertisements, and healthcare. As an example, outcome-based strategic outsourcing contracts are expected to grow from ~5% this year (2010) to ~50% by 2015. The primary challenge faced by outcome based business model is the difficulties in providing a transparent and verifiable way for measuring the business outcome between the producer and the consumer without having to reveal too much proprietary information. The rapid penetration of cloud computing is fundamentally changing this landscape as cloud computing facilitated the standardization of service delivery and pricing.

This talk will focus on the technology implications on cloud computing from an outcome centric world: (1) Risk adjusted cost performance, which captures the variation of outcome, for system level metrics will receive increasing focus. This metric will either augment or subsume the traditional cost performance metric. (2) Fine-grained resource provisioning: Both resource provisioning and runtime management for system cluster, private & public clouds will be optimized for the heterogeneous workloads generated by vertically integrated solution platforms that will become increasingly outcome centric. (3) Emergence of cloud OS: Outcome centric management of datacenter resources requires capability for elastic partitioning computing resources among on-premise computing clusters, private and public clouds, resulting in the emergence of cloud hypervisor or OS. (4) Proactive Platforms: Outcome centric platforms and system management requires the system platform to be more situational and context aware of the environment and business requirements. Increase use of behavior models of the system platforms and the environment enables the HW/SW platforms to be increasingly proactive in responding to potential future events.

About the Speaker:
Chung-Sheng Li received the BSEE degree from National Taiwan University, Taiwan, R.O.C., in 1984, and the MS and PhD degrees in electrical engineering and computer science from the University of California, Berkeley, in 1989 and 1991, respectively. He has been with IBM T.J. Watson Research Center as a research staff member since Sept. 1991, and became the Director of the Security, Information Analytics, and Business Integrity department since 2006 and has been the Director of the Commercial Systems since March 2010.

 

Keynote 2 (Panel): Trends of Services Computing

Stephen S. Yau
Professor of Computer Science and Engineering
Director, Information Assurance Center
Arizona State University


About the Moderator:

Stephen S. Yau is currently a professor of computer science and engineering and the Director of Information Assurance Center at Arizona State University (ASU), Tempe. He served as the Chair of the Department of Computer Science and Engineering at ASU in 1994-2001. Previously, he was on the faculties of Northwestern University, Evanston, Illinois, and University of Florida, Gainesville.


He served as the President of the Computer Society of the Institute of Electrical and Electronics Engineers (IEEE) and on the IEEE Board of Directors and the Board of Directors of Computing Research Association. He also served as the Editor-in-Chief of IEEE COMPUTER magazine, and organized many national and international major conferences, including the World Computer Congress sponsored by International Federation for Information Processing (IFIP) in 1989. He founded and organized the Annual International Computer Software and Applications Conference (COMPSAC) sponsored by the IEEE Computer Society, in 1977. He is the general chair of the 2010 IEEE World Congress on Services (SERVICES 2010), the 2010 IEEE 8th International Conference on Web Servics (ICWS 2010), the 2010 IEEE 7th International Conference on Services Computing (SCC 2010), and the 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD 2010).


Keynote 3:  Securing Data in the Cloud - Challenges and Research Directions

Elisa Bertino
Professor, Department of Computer Science, Purdue University
Research Director of the Center for Information Research in Information Assurance and Security

ABSTRACT:

Managing data is arguably one of the reasons for adopting cloud technologies. These technologies are very promising with respect to enhancing scalability, reducing costs, and rapidly adapting to changes in application demands. However the adoption of these technologies is not without risks. Data stored in a cloud would be accessible to a large variety of individuals, like the IT staff of the cloud providers. The cloud providers may in turn outsource data management functions to other providers. Data integrity and availability are critical issues. Physical protection, crucial for data security, may be difficult to assess for the organization owning the data as data may be stored in different countries, which makes difficult making inspections to the data storage location. In some cases, even being able to control the location of the data may be difficult. However, making sure that data is stored or not stored in certain locations is crucial for compliance. Data segregation is essential in the context of multi-tenant contexts in which data owned by different organizations may reside on the same systems. Support for disaster recovery, and accountability are also critical requirements. In the talk we will first elaborate on these issues. We will then present an overview of the MASK system, able to support fine-grained encryption of data while at the same time supporting identity-based privacy-preserving access control on encrypted data. We will conclude the presentation with a discussion about the notion of accountability policies and tools for managing security policies.

About the Speaker:
Elisa Bertino is professor of computer science at Purdue University and Research Director of the Center for Information and Research in Information Assurance and Security (CERIAS). Prior to joining Purdue, she was a professor and department head at the Department of Computer Science and Communication of the University of Milan. She has been a visiting researcher at the IBM Research Laboratory (now Almaden) in San Jose, at the Microelectronics and Computer Technology Corporation, at Rutgers University, at Telcordia Technologies. Her recent research focuses on database security, digital identity management, policy systems, and security for web services. She is a Fellow of ACM and of IEEE. She received the IEEE Computer Society 2002 Technical Achievement Award and the IEEE Computer Society 2005 Kanai Award. She a member of the editorial board of IEEE Transactions on Dependable and Secure Computing, and IEEE Security & Privacy. She is currently serving as chair of the ACM Special Interest Group on Security, Audit and Control (ACM SIGSAC).


 

Keynote 4: Thinking Outside the box: How Cloud, Grid, and Services can Make Us Smarter

Ian Foster
Director, Argonne National Laboratory
Professor, Department of Computer Science, The University of Chicago

ABSTRACT:

Whitehead observed that "civilization advances by extending the number of important operations which we can perform without thinking about them." Thanks to Moore's Law, these operations can nowadays involve increasingly complex information manipulation and computation. The outsourcing of computing via approaches such as utility computing, on-demand computing, grid computing, software as a service, and cloud computing can further enhance human capabilities, by freeing computer applications from the limiting confines of a single computer. Software that thus runs "outside the box" can be more powerful (Google, TeraGrid), dynamic (Animoto, caBIG), and collaborative (FaceBook, myExperiment). It can also be cheaper, due to economies of scale in hardware and software. Simultaneously, service-oriented architectures make it easier to integrate data and software from many sources. The combination of new functionality and new economics inspires new applications, reduces barriers to entry for application providers, and in general disrupts the computing ecosystem. I discuss new applications that outside-the-box computing enables; the hardware and software architectures that make these new applications possible; and the social dimensions of outside-the-box computing. 

About the Speaker:
Ian Foster is Director of the Computation Institute, a joint institute of the University of Chicago and Argonne National Laboratory, where he is also the Arthur Holly Compton Distinguished Service Professor of Computer Science and an Argonne Distinguished Fellow. He received a BSc (Hons I) degree from the University of Canterbury, New Zealand, and a PhD from Imperial College, United Kingdom, both in computer science. His research deals with distributed, parallel, and data-intensive computing technologies, and innovative applications of those technologies to scientific problems. Methods and software he has developed underpin many large national and international cyberinfrastructures. Dr. Foster is a fellow of the American Association for the Advancement of Science, the Association for Computing Machinery, and the British Computer Society. His awards include the British Computer Society's award for technical innovation, the Global Information Infrastructure (GII) Next Generation award, the British Computer Society's Lovelace Medal, R&D Magazine's Innovator of the Year, and an honorary doctorate from the University of Canterbury. He was a co-founder of Univa UD, Inc., a company established to deliver high-quality grid and cloud computing solutions.

 

posted @ 2010-06-22 15:46  周超  阅读(471)  评论(0编辑  收藏  举报