SlideShare a Scribd company logo
1 of 1
Download to read offline
Project No. 318508 FP7-ICT-2011-8
                                                                                                                       MUSES Budget: 4.76M€
                                                                                                                          EU Funding: 3.59M€
                                                                                              Contact: Anna I. Esparcia – aesparcia@s2grupo.es
                                                                                                          JJ Merelo – jmerelo@geneura.ugr.es



                      Multiplatform Usable Endpoint Security

The overall purpose of MUSES is to foster corporate security
by reducing the risks introduced by user behaviour
Most corporate security incidents are caused by organization insiders, either by their lack of knowledge or inadequate or
malicious behaviour.
MUSES will provide a device independent, user-centric and selfself-adaptive corporate security system, able to cope with the
concept of seamless working experience on different devices, in which a user may start a session on a device and location and
follow up the process on different ones, without corporate digital asset loss.



    MUSES aims at the benefit of the company but focusing on the user
                                     company,

Evolutionary Computation will be used in MUSES in two different contexts:

User modelling with models optimised to match                    Complex Event Processing using EC so that the
observations using EC.                                           underlying mechanisms can be found out.

MUSES will try to create a model of users and                    In some cases, and independently of specific user
their context so that behaviours that can lead to                behaviour, sequences of actions might lead to
security problems can be previewed and, if                       possible security failures. Complex Event
possible, avoided. These user models will depend                 Processing captures these sequences in real time
on observations of the context, but also will                    and tries to model them so that the next action
employ heuristics to match them to known non-                    can be foreseen. To create these models, EC will
safe behaviours. EC will be used as a                            be applied also in conjunction with other
metaheuristic to obtain optimal models                           heuristics.
matching reality.




MUSES partners
S2 Grupo (ES), Universidad de Granada (ES), HITEC (DE), Un  Université de Genève (CH), Center for Usability Research &
Engineering – CURE (AT), Wind Telecomunicazioni (IT), TXT e-so
                                                            solutions (IT), KU Leuven (BE) and Sweden Connectivity (SE).

More Related Content

Viewers also liked

Дайджест "Дистрибуция и логистика" №3, 2013
Дайджест "Дистрибуция и логистика" №3, 2013Дайджест "Дистрибуция и логистика" №3, 2013
Дайджест "Дистрибуция и логистика" №3, 2013Logist.FM
 
Iso9001 risk based_thinking
Iso9001 risk based_thinkingIso9001 risk based_thinking
Iso9001 risk based_thinkingtimdwill
 
Ejercicio 9 popitas
Ejercicio 9 popitasEjercicio 9 popitas
Ejercicio 9 popitasaitoor1234
 
น้ำตกห้วยจันทร์
น้ำตกห้วยจันทร์น้ำตกห้วยจันทร์
น้ำตกห้วยจันทร์Pawinee Sangkaew
 
MULLIGTAWNEY SOUP RECIPE - Indian recipes,soups,non vegetarian food
 MULLIGTAWNEY SOUP RECIPE - Indian recipes,soups,non vegetarian food MULLIGTAWNEY SOUP RECIPE - Indian recipes,soups,non vegetarian food
MULLIGTAWNEY SOUP RECIPE - Indian recipes,soups,non vegetarian foodRecipe Point
 

Viewers also liked (10)

Дайджест "Дистрибуция и логистика" №3, 2013
Дайджест "Дистрибуция и логистика" №3, 2013Дайджест "Дистрибуция и логистика" №3, 2013
Дайджест "Дистрибуция и логистика" №3, 2013
 
Iso9001 risk based_thinking
Iso9001 risk based_thinkingIso9001 risk based_thinking
Iso9001 risk based_thinking
 
Ejercicio 9 popitas
Ejercicio 9 popitasEjercicio 9 popitas
Ejercicio 9 popitas
 
น้ำตกห้วยจันทร์
น้ำตกห้วยจันทร์น้ำตกห้วยจันทร์
น้ำตกห้วยจันทร์
 
Licencia
LicenciaLicencia
Licencia
 
certificate
certificatecertificate
certificate
 
9° giornata coppa
9° giornata coppa9° giornata coppa
9° giornata coppa
 
MULLIGTAWNEY SOUP RECIPE - Indian recipes,soups,non vegetarian food
 MULLIGTAWNEY SOUP RECIPE - Indian recipes,soups,non vegetarian food MULLIGTAWNEY SOUP RECIPE - Indian recipes,soups,non vegetarian food
MULLIGTAWNEY SOUP RECIPE - Indian recipes,soups,non vegetarian food
 
Física nuclear
Física nuclearFísica nuclear
Física nuclear
 
Question 8
Question 8Question 8
Question 8
 

Similar to Muses poster4evostar2013

Mira Telecom - SafeCity brochure
Mira Telecom - SafeCity brochureMira Telecom - SafeCity brochure
Mira Telecom - SafeCity brochureMira Telecom
 
SMARCOS LEAFLET ARTEMIS & ITEA co-Summit 2011
SMARCOS LEAFLET ARTEMIS & ITEA co-Summit 2011SMARCOS LEAFLET ARTEMIS & ITEA co-Summit 2011
SMARCOS LEAFLET ARTEMIS & ITEA co-Summit 2011Smarcos Eu
 
Intelligent System For Face Mask Detection
Intelligent System For Face Mask DetectionIntelligent System For Face Mask Detection
Intelligent System For Face Mask DetectionIRJET Journal
 
Luminovo at Munich Tech Job Fair - 14th March 2019
Luminovo at Munich Tech Job Fair - 14th March 2019Luminovo at Munich Tech Job Fair - 14th March 2019
Luminovo at Munich Tech Job Fair - 14th March 2019TechMeetups
 
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeySecuring Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeyEditor IJMTER
 
Automated Media Player using Hand Gesture
Automated Media Player using Hand GestureAutomated Media Player using Hand Gesture
Automated Media Player using Hand GestureIRJET Journal
 
D0.1 V2.0 Project Presentation
D0.1 V2.0 Project PresentationD0.1 V2.0 Project Presentation
D0.1 V2.0 Project Presentationlatifladid
 
Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementchristophefeltus
 
LTCI Information Communications Lab
LTCI Information Communications LabLTCI Information Communications Lab
LTCI Information Communications LabTélécom Paris
 
CTIT and Innovation, Iddo Bante
CTIT and Innovation, Iddo BanteCTIT and Innovation, Iddo Bante
CTIT and Innovation, Iddo BanteIddo Bante
 
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadehSmart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadehnabati
 
BRAIN-TO-SOCIETY DECISION AND BEHAVIOR SEMINAR : Measuring what users really ...
BRAIN-TO-SOCIETY DECISION AND BEHAVIOR SEMINAR : Measuring what users really ...BRAIN-TO-SOCIETY DECISION AND BEHAVIOR SEMINAR : Measuring what users really ...
BRAIN-TO-SOCIETY DECISION AND BEHAVIOR SEMINAR : Measuring what users really ...Pierre-Majorique Léger
 
A risk and security assessment of VANET availability using attack tree concept
A risk and security assessment of VANET availability using attack tree concept A risk and security assessment of VANET availability using attack tree concept
A risk and security assessment of VANET availability using attack tree concept IJECEIAES
 

Similar to Muses poster4evostar2013 (20)

Mira Telecom - SafeCity brochure
Mira Telecom - SafeCity brochureMira Telecom - SafeCity brochure
Mira Telecom - SafeCity brochure
 
SMARCOS LEAFLET ARTEMIS & ITEA co-Summit 2011
SMARCOS LEAFLET ARTEMIS & ITEA co-Summit 2011SMARCOS LEAFLET ARTEMIS & ITEA co-Summit 2011
SMARCOS LEAFLET ARTEMIS & ITEA co-Summit 2011
 
Intelligent System For Face Mask Detection
Intelligent System For Face Mask DetectionIntelligent System For Face Mask Detection
Intelligent System For Face Mask Detection
 
Luminovo at Munich Tech Job Fair - 14th March 2019
Luminovo at Munich Tech Job Fair - 14th March 2019Luminovo at Munich Tech Job Fair - 14th March 2019
Luminovo at Munich Tech Job Fair - 14th March 2019
 
4 7-imagine introduction
4 7-imagine introduction4 7-imagine introduction
4 7-imagine introduction
 
Artemis spring event 2013
Artemis spring event 2013Artemis spring event 2013
Artemis spring event 2013
 
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic KeySecuring Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
 
Automated Media Player using Hand Gesture
Automated Media Player using Hand GestureAutomated Media Player using Hand Gesture
Automated Media Player using Hand Gesture
 
Mems and Nems.ppt
Mems and Nems.pptMems and Nems.ppt
Mems and Nems.ppt
 
D0.1 V2.0 Project Presentation
D0.1 V2.0 Project PresentationD0.1 V2.0 Project Presentation
D0.1 V2.0 Project Presentation
 
Jimenez
JimenezJimenez
Jimenez
 
Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk management
 
Towards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk managementTowards an innovative systemic approach of risk management
Towards an innovative systemic approach of risk management
 
LTCI Information Communications Lab
LTCI Information Communications LabLTCI Information Communications Lab
LTCI Information Communications Lab
 
CTIT and Innovation, Iddo Bante
CTIT and Innovation, Iddo BanteCTIT and Innovation, Iddo Bante
CTIT and Innovation, Iddo Bante
 
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadehSmart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
Smart manufacturing through cloud based-r-nabati--dr abdulbaghi ghaderzadeh
 
BRAIN-TO-SOCIETY DECISION AND BEHAVIOR SEMINAR : Measuring what users really ...
BRAIN-TO-SOCIETY DECISION AND BEHAVIOR SEMINAR : Measuring what users really ...BRAIN-TO-SOCIETY DECISION AND BEHAVIOR SEMINAR : Measuring what users really ...
BRAIN-TO-SOCIETY DECISION AND BEHAVIOR SEMINAR : Measuring what users really ...
 
A risk and security assessment of VANET availability using attack tree concept
A risk and security assessment of VANET availability using attack tree concept A risk and security assessment of VANET availability using attack tree concept
A risk and security assessment of VANET availability using attack tree concept
 
Ece brochure
Ece brochureEce brochure
Ece brochure
 
A security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed networkA security decision reaction architecture for heterogeneous distributed network
A security decision reaction architecture for heterogeneous distributed network
 

Muses poster4evostar2013

  • 1. Project No. 318508 FP7-ICT-2011-8 MUSES Budget: 4.76M€ EU Funding: 3.59M€ Contact: Anna I. Esparcia – aesparcia@s2grupo.es JJ Merelo – jmerelo@geneura.ugr.es Multiplatform Usable Endpoint Security The overall purpose of MUSES is to foster corporate security by reducing the risks introduced by user behaviour Most corporate security incidents are caused by organization insiders, either by their lack of knowledge or inadequate or malicious behaviour. MUSES will provide a device independent, user-centric and selfself-adaptive corporate security system, able to cope with the concept of seamless working experience on different devices, in which a user may start a session on a device and location and follow up the process on different ones, without corporate digital asset loss. MUSES aims at the benefit of the company but focusing on the user company, Evolutionary Computation will be used in MUSES in two different contexts: User modelling with models optimised to match Complex Event Processing using EC so that the observations using EC. underlying mechanisms can be found out. MUSES will try to create a model of users and In some cases, and independently of specific user their context so that behaviours that can lead to behaviour, sequences of actions might lead to security problems can be previewed and, if possible security failures. Complex Event possible, avoided. These user models will depend Processing captures these sequences in real time on observations of the context, but also will and tries to model them so that the next action employ heuristics to match them to known non- can be foreseen. To create these models, EC will safe behaviours. EC will be used as a be applied also in conjunction with other metaheuristic to obtain optimal models heuristics. matching reality. MUSES partners S2 Grupo (ES), Universidad de Granada (ES), HITEC (DE), Un Université de Genève (CH), Center for Usability Research & Engineering – CURE (AT), Wind Telecomunicazioni (IT), TXT e-so solutions (IT), KU Leuven (BE) and Sweden Connectivity (SE).