(such as accidentally open ports).
For instance, on 25 January 2003 a memory-
resident worm called Slammer began propagating it-
self from East Asia throughout the entire Internet
(Moore et al., 2003a). In the U.S. and Canada approx-
imately 13,000 Bank of America ATMs, which use
the Internet for sending encrypted information, had to
be shut down, due to their inability to correctly com-
plete transactions.
Such security attacks result in both short and
long term economic losses due to the lack of service
availability and infrastructural resilience, and the de-
creased level of trust on behalf of the customers. Fi-
nancial institutions are sensitive to such attacks and
related damages. They are categorized as an opera-
tional risk in the first pillar of the Basel II accord (bas,
2009) saying that financial institutions that address
the specific requirements developed for each risk cat-
egory can potentially lower their risk capital require-
ments.
However, due to massive scale of the attacks, indi-
vidual financial institutions would often lack the nec-
essary infrastructure and resources to effectively han-
dle the vast amounts of information that should be
collected and analyzed in real time to enable effec-
tive protection. It is therefore, desirable to provide
financial institutions with the necessary tools and ab-
stractions to enable them to consolidate their physical
resources and collaborate on sharing and processing
information in a trusted and controllable fashion. In
this paper, we introduce one such abstraction, called
Semantic Room (SR).
Each SR has an objective and is associated with
a contract that specifies the set of services pro-
vided by that Semantic Room, rights and obligations
of the semantic room members (including hardware
and software requirements) along with the data pro-
tection, isolation, trust, security, availability, fault-
tolerance, and performance requirements. Using this
abstraction, contractually regulated cooperation envi-
ronments can be created in a structured and controlled
way.
We show the UML use case that describes the
steps to be performed for creating and instantiating
SR and we highlight the flexibility of the SR model
discussing different instantiations of the specific SR
that realizes a collaborative intrusion detection sys-
tem.
Related Work. The need for collaborative systems
for coping with current generation of threats and se-
curity attacks is highlighted in a number of works
that can be found in the literature (e.g., (Kr
¨
ugel et al.,
2001)(Xie et al., 2006)(Locasto et al., 2005)) and spe-
cific systems have been built. However, these sys-
tems do not address organizational issues, thus limit-
ing their effectiveness as employed by federations of
organizations, this is noted in (Moore et al., 2003b).
The semantic room model includes both technical
(e.g., complex event processing and data privacy) and
organizational aspects (e.g., contract management).
We expect the latter can foster security collaboration
among financial institutions.
From the point of view of contract-based coop-
eration, the semantic rooms model is similar to the
one proposed in the MEDUSA system introduced in
(Balakrshnan and Stonebraker, 2004). MEDUSA is a
distributed framework for managing the load in fed-
erated systems. It is based on pairwise contracts ne-
gotiated between on-line participants. Contracts set
tightly bounded prices for migrating each unit of load
between two participants and they specify the set of
tasks that each is willing to execute on behalf of the
other. The federated systems described in (Balakrsh-
nan and Stonebraker, 2004) are similar to our SRs;
however, the federation model regulated by contracts
of (Balakrshnan and Stonebraker, 2004) is not used
for complex event processing purposes as in our case.
The rest of this paper is organized as follows. Sec-
tion 2 describes the Semantic Room abstraction, the
roles of Semantic Room members and the contracts
that are used to regulate Semantic Rooms. Section
3 describes the UML use case we have designed for
SR creation, instantiation and management purposes.
An example of a possible usage of an SR is also dis-
cussed. Finally Section 4 concludes the paper and
outlines some future work.
2 THE SEMANTIC ROOM
ABSTRACTION
A Semantic room is a federation of financial institu-
tions formed for the sake of information processing
and sharing. The partners participating in a specific
SR are referred to as the members of the SR.
Each SR is associated with a contract that defines
the set of processing and data sharing services pro-
vided by that SR along with the data protection, iso-
lation, trust, security, dependability, and performance
requirements. The contract also contains the hard-
ware and software requirements a member has to pro-
vision in order to be admitted into the semantic room.
The SR abstraction embodies the Event-Driven
Architecture (EDA) paradigm (Chandy, 2006), which
applies a loosely coupled communication pattern
among application components. EDAs typically con-
sist of a sensing module which gathers data from var-
ious sources. Data is then correlated and analyzed in
ICEIS 2010 - 12th International Conference on Enterprise Information Systems
148