Philipp Wieder

Philipp Wieder
Gesellschaft für wissenschaftliche Datenverarbeitung mbH Göttingen | GWDG · GWDG

Doctor of Engineering

About

140
Publications
58,509
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,084
Citations
Additional affiliations
October 2011 - present
Gesellschaft für wissenschaftliche Datenverarbeitung mbH Göttingen
Position
  • Deputy Head
Description
  • http://www.gwdg.de
July 2007 - September 2011
TU Dortmund University
Position
  • Senior Researcher

Publications

Publications (140)
Conference Paper
The software-defined network is in recent years come into the sight of so many network designers as a successor to the traditional network. This type of network is vulnerable to DDoS attacks, targeting a different part of the SDN network architecture by continuously injecting fake flows. It imposes substantial processing on the controller, and the...
Article
Full-text available
NFDIxCS is a consortium within the family of NFDI, which defines and establishes a research data management (RDM) infrastructure for Computer Science (CS). Based on a broad community process, the various types of research data, their metadata and quality criteria are agreed upon in the community. The resulting research data, along with all associat...
Article
Full-text available
Access control management in a heterogeneous cloud environment, where the number of users is growing, is a daunting task for service providers. Efficiency is heavily reliant on shared resources in a modern cloud computing culture. Although data or service sharing is highly appreciated for collaborative projects, preserving identity and access manag...
Article
Full-text available
Data lakes are a fundamental building block for many industrial data analysis solutions and becoming increasingly popular in research. Often associated with big data use cases, data lakes are, for example, used as central data management systems of research institutions or as the core entity of machine learning pipelines. The basic underlying idea...
Research Proposal
Full-text available
Text+ aims to develop a research data infrastructure for Humanities disciplines and beyond whose primary research focus is on language and text. Text+ will be flexible, scalable, and thus open for different discipline-specific requirements. By offering easy access to high quality research data, Text+ will support a maximum of methodological diversi...
Article
Full-text available
The overall expectation of introducing Canonical Workflow for Experimental Research and FAIR digital objects (FDOs) can be summarised as reducing the gap between workflow technology and research practices to make experimental work more efficient and improve FAIRness without adding administrative load on the researchers. In this document, we will de...
Article
Full-text available
Since their introduction by James Dixon in 2010, data lakes get more and more attention, driven by the promise of high reusability of the stored data due to the schema-on-read semantics. Building on this idea, several additional requirements were discussed in literature to improve the general usability of the concept, like a central metadata catalo...
Preprint
This paper gives a summary of implementation activities in the realm of FAIR Digital Objects (FDO). It gives an idea which software components are robust and used for many years, which components are comparatively new and are being tested out in pilot projects and what the challenges are that need to be urgently addressed by the FDO community. Afte...
Article
Zusammenfassung Ziel der Studie „Real world“-Daten aus der ambulanten Gesundheitsversorgung sind in Deutschland nur schwer systematisch und longitudinal zu erlangen. Unsere Vision ist eine permanente Datenablage mit repräsentativen, de-identifizierten Patienten- und Versorgungsdaten, längsschnittlich, fortwährend aktualisiert und von verschiedenen...
Article
Full-text available
Background Biomedical research projects deal with data management requirements from multiple sources like funding agencies’ guidelines, publisher policies, discipline best practices, and their own users’ needs. We describe functional and quality requirements based on many years of experience implementing data management for the CRC 1002 and CRC 119...
Article
Full-text available
Background Medical data from family doctors are of great importance to health care researchers but seem to be locked in German practices and, thus, are underused in research. The RADAR project (Routine Anonymized Data for Advanced Health Services Research) aims at designing, implementing and piloting a generic research architecture, technical softw...
Article
Full-text available
Bereits seit einigen Jahren werden große Anstrengungen unternommen, um die im deutschen Sprachraum erschienenen Drucke des 16.-18. Jahrhunderts zu erfassen und zu digitalisieren. Deren Volltexttransformation konzeptionell und technisch vorzubereiten, ist das übergeordnete Ziel des DFG-Projekts OCR-D, das sich mit der Weiterentwicklung von Verfahren...
Preprint
Full-text available
Background: Biomedical research projects deal with data management requirements from multiple sources like funding agencies' guidelines, publisher policies, discipline best practices, and their own users' needs. We describe functional and quality requirements based on many years of experience implementing data management for the CRC 1002 and CRC 11...
Conference Paper
Security challenges are the most important obstacles for the advancement of IT-based on-demand services and cloud computing as an emerging technology. In this paper, a structural policy management engine has been introduced to enhance the reliability of managing different policies in clouds and to provide standard as well as dedicated security leve...
Article
Full-text available
The long awaited cloud computing concept is a reality now due to the transformation of computer generations. However, security challenges have become the biggest obstacles for the advancement of this emerging technology. A well-established policy framework is defined in this paper to generate security policies which are compliant to requirements an...
Article
Full-text available
Customers often suffer from the variability of data access time in (edge) cloud storage service, caused by network congestion, load dynamics, etc. One efficient solution to guarantee a reliable latency-sensitive service (e.g., for Industrial Internet of Things (IIoT) application) is to issue requests with multiple download/upload sessions which acc...
Conference Paper
One of the most challenging obstacles for the advancement of clouds is the lack of assurance and transparency, along with the current paucity of techniques to quantify security. A fundamental requirement for solving this problem is to provide proper levels of security based on the requirements of cloud customers and sensitivity of data. However, ge...
Conference Paper
Cloud Computing and its' security and privacy concerns as well as countermeasures are one of the highly debated topics in today's IT industry. One of the most challenging security issues in clouds is to define and manage different levels according to isolation, service delivery and scalability concepts in clouds. These security levels need to be pr...
Chapter
Many simulations require large amounts of computing power to be executed. Traditionally, the computing power is provided by large high performance computing clusters that are solely built for this purpose. However, modern data centers do not only provide access to these high performance computing systems, but also offer other types of computing res...
Article
The efficient integration of optical switching in data center networks is being studied as a means to cope with surging traffic demands. Optically switched, flatter network architectures more efficiently handle the east-west traffic profiles of modern data centers. Limitations in the port count and reconfiguration speed of optical switches require...
Article
Predicting subsequent values of quality of service (QoS) properties is a key component of autonomic solutions. Predictions help in the management of cloud-based applications by preventing QoS breaches from happening. The huge amount of monitoring data generated by cloud platforms motivated the applicability of scalable data mining and machine learn...
Conference Paper
Security challenges are the most important obstacles for the advancement of IT-based on-demand services and cloud computing as an emerging technology. Lack of coincidence in identity management models based on defined policies and various security levels in different cloud servers is one of the most challenging issues in clouds. In this paper, a po...
Conference Paper
The long awaited Cloud computing concept is a reality now due to the advancement and transformation of computer generations. However, security challenges are most important obstacles for the advancement of this emerging technology. Managing security policies based on capabilities of service provider and requirements of cloud customers is one of the...
Article
Full-text available
Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network. It has emerged as the key technology that unleashes the potency of Big Data, Internet of Things, Mobile and Web Applications, and othe...
Conference Paper
Scalable and robust SDN requires the controller to be distributed. In many SDN designs, the distributed controllers are acting as replicas by forming clusters. For large-scale data centers across multiple geographically distributed locations, the controllers have to maintain a synchronized global view. These restrict themselves on single point of f...
Article
One of the most challenging issues regarding to the information policy concerns in cloud computing environments is to provide an appropriate level of security for the stored data in cloud storages. In fact, each individual cloud customer needs to be granted reliable security level(s) based on defined details in SLA. The main aim of this paper is to...
Conference Paper
Full-text available
Cloud computing is becoming a widely adopted technology for delivering On-Demand IT Services via Internet. Despite the rapid advancement of cloud-based environments, security challenges have to be addressed to a greater extent. One of the major issues in modern clouds is to guarantee the privacy and security of resources after the process of user r...
Conference Paper
Security and privacy challenges are the most important obstacles for the advancement of IT-based on-demand services and cloud computing as an emerging technology. To ensure data confidentiality and fine-grained access control in cloud-based environments, stored data and resources needs to be re-encrypted periodically or based on special mechanisms...
Article
Cloud computing providers have to deal with the energy-performance trade-off: minimizing energy consumption, while meeting service level agreement (SLA) requirements. This paper proposes a new heuristic approach for the dynamic consolidation of virtual machines (VMs) in cloud data centers. The fast best-fit decreasing (FBFD) algorithm for intellige...
Article
Full-text available
Cloud computing has recently emerged as a dominant Internet service computing model due to its “pay-as-you-go” and “elastic service” features. Cloud computing systems are usually composed of distributed datacenters, which leverage virtualization technology to provide a scalable and reliable service. Optical networks are recognized as promising next...
Article
In current cloud computing systems, when leveraging virtualization technology, the customer’s requested data computing or storing service is accommodated by a set of communicated virtual machines (VM) in a scalable and elastic manner. These VMs are placed in one or more server nodes according to the node capacities or failure probabilities. The VM...
Preprint
In current cloud computing systems, when leveraging virtualization technology, the customer's requested data computing or storing service is accommodated by a set of communicated virtual machines (VM) in a scalable and elastic manner. These VMs are placed in one or more server nodes according to the node capacities or failure probabilities. The VM...
Conference Paper
Full-text available
Software-Defined Networking (SDN) is a networking paradigm that decouples the control plane of a network from its forwarding plane and offers programmability of the data plane devices to manage and control the ongoing traffic flows. This paper presents the control plane architecture of a data center network (DCN) and its operational services being...
Conference Paper
Security challenges are the most important obstacle for advancement of IT-based on-demand services and cloud computing as an emerging technology. In this paper, a structural policy management engine has been introduced to enhance the reliability of managing different policies in clouds and to provide standard and also dedicated security levels (rin...
Conference Paper
Full-text available
The Platform as a Service (PaaS) model of Cloud Computing has emerged as an enabling yet disruptive paradigm for accelerated development of applications on the Cloud. PaaS hides administration complexities of the underly-ing infrastructure such as the physical or virtual machines. This abstraction is achieved through advanced automation and OS-leve...
Conference Paper
Full-text available
Delivering scalable packet-switched interconnects that can support the bursty Ethernet traffic, which is common in many data centre applications is a challenging problem that is only getting harder. Implementing the control logic capable of deciding how to forward each packet individually in current packet-switched Ethernet interconnects is not opt...
Conference Paper
Full-text available
In this work, we solve the SLA-gap problem between Cloud providers and customers by presenting a robust and computationally inexpensive negotiation strategy, using which autonomous agents can efficiently create near-optimal SLAs under time constraints. This allows to establish feature-rich SLAs when contract space are large, objectives are confiden...
Conference Paper
Full-text available
—Virtualized Cloud platforms have become increas- ingly common and the number of online services hosted on these platforms is also increasing rapidly. A key problem faced by providers in managing these services is detecting the performance anomalies and adjusting resources accordingly. As online services generate a very large amount of monitored da...
Conference Paper
Full-text available
Network emulation has been one of the tools of choice for conducting experiments on commodity hardware. In the absence of an easy to use optical network test-bed, researchers can significantly benefit from the availability of a flexible/programmable optical network emulation platform. Exploiting the lightweight system virtualization, which is recen...
Article
Full-text available
Software defined networking (SDN) and OpenFlow as the outcome of recent research and development efforts provided unprecedented access into the forwarding plane of networking elements. This is achieved by decoupling the network control out of the forwarding devices. This separation paves the way for a more flexible and innovative networking. While...
Conference Paper
Since the introduction of software-defined networking (SDN), scalability has been a major concern. There are different approaches to address this issue, and most of them can be addressed without losing the benefits of SDN. SDN provides a level of flexibility that can accommodate network programming and management at scale. In this work we present t...
Article
Full-text available
Cloud computing materializes the vision of utility computing. Tenants can benefit from ondemand provisioning of compute, storage, and networking resources according to a pay-per-use business model. Tenants have only limited visibility and control over network resources. The owners of cloud computing facilities are also facing challenges in various...
Article
Full-text available
Software Defined Networking (SDN) is a concept which provides the network operators and data centres to flexibly manage their networking equipment using software running on external servers. According to the SDN framework, the control and management of the networks, which is usually implemented in software, is decoupled from the data plane. On the...
Conference Paper
Full-text available
Virtualization technologies of Infrastructure-as-a- Service enable the live migration of running Virtual Machines (VMs) to achieve load balancing, fault-tolerance and hardware consolidation in data centers. However, the downtime/service unavailability due to live migration may be substantial with relevance to the customers' expectations on responsi...
Article
In state-of-the-art distributed computing infrastructures different kinds of resources are combined to offer complex services to customers. As of today, service-oriented middleware stacks are the work-horses to connect resources and their users, and to implement all functions needed to provide those services. Analysing the functionality of prominen...
Conference Paper
Full-text available
As businesses transit towards cloud and service oriented economy, agents are employed to efficiently negotiate service level agreements (SLAs) on services procured automatically to match changes in demand. This ‘pay-as-you-go’ trading model affords flexibility with reliability, but requires customized and seamless interactions enabled by negotiatio...
Article
Full-text available
We present the Intelligent Application Oriented System (IANOS) resource broker models and internals. The aim of IANOS is to provide an understanding of and asolution to the problem of how to find the best resource for agiven submitted application in order to optimally use aset of HPC resources (an HPCN Grid). Best in the sense “at agiven moment and...
Chapter
The management of the entire service landscape comprising a Cloud environment is a complex and challenging venture. There, one task of utmost importance, is the generation and processing of information about the state, health, and performance of the various services and IT components, something which is generally referred to as monitoring. Such inf...
Chapter
Full-text available
In service-oriented systems, negotiating service level agreements (SLAs) occupies a central role in the service usage cycle. It is during negotiations that parties are brought together in an interactive mechanism determined by the negotiation protocols. The choice and description of negotiation protocol determines the scope of information flow whic...
Chapter
The D-Grid is a German national academic Grid initiative, which has been established in 2004. Since then, a variety of resource providers offer resources and services to a large and heterogeneous group of user communities. First, this chapter describes in detail the D-Grid e-Infrastructure as it is operated today. Apart from a brief historical digr...
Chapter
Non-functional properties are an essential constituent of service level agreements as they describe those quality-of-service parameters that are not related to the actual function of a service. Thus, non-functional properties let providers create distinguishing service offers and let consumers discriminate between various offers that provide the sa...
Article
Service Level Agreements (SLAs) are formal electronic contracts between customers and providers of services, describing the rules governing service consumption. They can be established automatically by software agents given proper target utilities, or may be long-standing indicating less volatile business relationships. This position paper reflects...
Book
Service Level Agreements for Cloud Computing provides a unique combination of business-driven application scenarios and advanced research in the area of service-level agreements for Clouds and service-oriented infrastructures. Current state-of-the-art research findings are presented in this book, as well as business-ready solutions applicable to Cl...
Conference Paper
Full-text available
Current Service Level Management solutions for distributed e-Business infrastructures are designed to work in specific domains and are bound to particular languages and protocols. With the transition to Cloud-like environments, it became evident that migrating such solutions from the Grid domain is not a trivial endeavor. Although the various distr...
Conference Paper
Full-text available
The Web Services Agreement specification defines a normative language to formulate Service Level Agreements and a basic protocol to expose service-level descriptions, validate service-level requests, and come to an agreement. This protocol, often called ''take-it-or-leave-it'', allows a service provider and a service consumer to decide whether to a...
Conference Paper
Service level agreements are an intrinsic part of service level management frameworks. They are electronic contracts, or part of a contract, and capture quality-of-service guarantees, responsibilities and constraints related to the provision and consumption of services. In the area of distributed systems a handful of service level agreement specifi...
Book
As Grids and service-oriented architectures have evolved to a common infrastructure for providing and consuming services in research and commercial environments, mechanisms are needed to agree on the objectives and the quality of such service provision. There is a clear trend to use electronic contracts between service consumers and one or more ser...
Article
As Grids and service-oriented architectures have evolved to a common infrastructure for providing and consuming services in research and commercial environments, mechanisms are needed to agree on the objectives and the quality of such service provision. There is a clear trend to use electronic contracts between service consumers and one or more ser...
Chapter
Introduction Background and Related Work SLA Lifecylce An SLA-Based Resource Management–Allocation Architecture Interaction with Grid Resource Management and Scheduling Advance Reservation of Resources Market Models for Resource Allocation Support Case Study Conclusions References
Article
Full-text available
Services in commercial or scientific environments often need to be delivered at a guaranteed service level. This becomes even more important, if composition of services is required, as results will become available for the requester within a predictable timeframe only if the orchestration process may create Service Level Agreements (SLAs) for the i...
Article
Full-text available
Service Level Agreements (SLA) may be used to establish agreements on the quality of a service between a service provider and a service consumer. This report gives an overview on current work done on negotiation and re-negotiation of SLAs within the CoreGRID Institute on Resource Management and Scheduling and in the Grid Resource Allocation Agreeme...
Chapter
Full-text available
The definition of a generic Grid scheduling architecture is the concern of both the Open Grid Forum’s Grid Scheduling Architecture Research Group and a CoreGRID research group of the same name. Such an architecture should provide a blueprint for Grid system and middleware designers and assist them in linking their scheduling requirements to diverse...