SlideShare a Scribd company logo
1 of 18
security departement security, privacy and trust of E-* 13/10/2011 1
Enhance the leading position  of ICT-security research in Flanders Essential objectives:  perform first class basic and applied research in key areas from ICT security (core) transfer the acquired basic knowledge into the economy (traditional notion of valorization) lower the cost of regulatory compliance of new  hardware, software and applications (specific: valorization) contribute actively to training of undergraduate and PhD students, and of industry (valorization too) 2
Context, application and technology trends Securityis directly related to dependability, and to trustworthiness – trustworthiness will remain essential   Security cannot be achieved as an after-thought; core to software applications and the development & deploymentprocesses  Security problems arise anywhere in systems (not only at front- and backdoors): end-to-end quality is required. Trustworthiness requires full life-cycle support (management support) 3
security, privacy & trust of E-*:application areas E-health E-media E-society E-commerce E-logistics E-banking …
Security Expertise (1/2) Secure programming languages (Clarke, Piessens, Joosen) Security middleware and component frameworks (Piessens, Desmet, Joosen)  Secure development process (Scandariato, Joosen)  Security monitoring and management (Desmet, Huygens, Joosen)  Security for computer networks and pervasive systems (Verbaeten, Huygens, Preneel, Verbauwhede)  Security for ad-hoc and wireless networks (Preneel, Verbauwhede) Privacy enhancing technologies, identity management (De Decker, Preneel)  Cryptographic software and software obfuscation (Piessens, Preneel) Cryptographic hardware and embedded systems (Verbauwhede, Preneel, Rijmen) Document security, watermarking and perceptual hashing (Preneel) Trusted computing (Verbauwhede, Preneel)   Legislation, compliance & policy(Dumortier,   )
Security Expertise (2/2 and incomplete) Cryptographic algorithms and protocols, foundations of cryptography and provable security (Rijmen, Preneel)  Risk management (Huygens. Joosen) Authorisation technologies (Piessens, Joosen, Desmet) Secure System Software (Piessens, Joosen) HW implementation of DRM, watermarking and perceptual hashing (Verbauwhede, Preneel, Rijmen) Side-channel attacks and countermeasures (Verbauwhede, Rijmen, Preneel) Embedded biometry (Verbauwhede, Tuyls) Security for RFID’s, smart-cards, sensor nodes (Verbauwhede, Batina, Preneel, Huygens, Joosen)  Evaluation of system security, including requirements, security architectures, software, hardware, cryptographic libraries and smart cards (All)
Missionrevisited Security Middleware Privacy Cryptography Watermarking DRM Secure Programming Languages Biometric “To be a one stop shop for security research” Secure Development Risk Management
“one-stop-shopfor ICT security research”  5 research programs: embeddedsecurity privacy & identity management programming secure software securitythrough the engineering process legal research, regulatory &  policyframeworkfor ICT securingdistributed software
The European context (FP7-IST call 8) Track record: About 20 FP6/FP7 projects that relate to trust and security Currently featuring two NoE’s: Cryptology, Bart Preneel from COSIC is currently coordinating ECRYPT II (Network of Excellence on Cryptology), which is a successor to ECRYPT. Service Engineering: WouterJoosen (DistriNet) currently is the Research Director of NESSoS: Engineering Secure Software and Systems for Future Internet Services. … lead generators for new EU projects 9
For the business – applied to many hot application domains: Assurance, compliance of new applications, typically Future Internet Services Cloud computing (the next big one after SOA) IoT and embedded software and systems Very long term: Enabling Cost and Risk Assessment For Society: focus on Privacy (Social Networks) Cybercrime 10
Service Provider GPS GSM Another example: NextGenITS [ICON] Privacy preserving Electronic Toll Only final fee transmitted to Service Provider Only driver has access to location data Authenticity of reported fee and location data Confidentiality of communications GPS Satellites Driver Fee Calculation Updates OBU Bill Fee Reporting Encrypted Location Data
One Example: Bravehealth (FP7-IP 2010-2013) The BRAVEHEALTH system will enable the integration of services provided by mobile resources, legacy applications, data and computing intensive services within a mobile grid to offer personalized e-health services to mobile, nomadic, stationary users. 12
Our broader context for strategic research 13 13/10/2011 Focus  of this talk
Three basic themes in the SecCAS program End to end data protection Improved security in multi-tenant applications Client-centric protection 14
Into the market…Some Important trends in cloud security: Cloud security gateways Cloud based recovery Services MDM: Mobile Device Management Services High Assurance Public Identity Providers 13/10/2011 15
Conclusion:what it means for the ICON programme We have a lot on our plates! New projects being developed: Mobile device management Security and management dashboards Cloud security Gateways for and by SaaS providers Enhancing  the reliability of “social networks” in integrated solutions… Application cases: logistics, transport, health…!!!! 16
Tank you, theTeam (>140 FTEs) Prof. Dave ClarkeProf. Bart De DeckerProf. Danny Hughes Prof. Christophe HuygensProf. Wouter JoosenProf. Frank Piessens Prof. Yolande Berbers Prof. Tom Holvoet Prof. Bart Jacobs ,[object Object],Prof. Bart PreneelProf. Vincent RijmenProf. Ingrid Verbauwhede Prof. Claudia Diaz 7 postdocs40+ junior reserachers ICRI: Prof. JosDumortier 2 postdocs15+ junior researchers 17
security departement security, privacy and trust of E-* 13/10/2011 18

More Related Content

What's hot

What's hot (20)

Computing safety
Computing safetyComputing safety
Computing safety
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Jb ia
Jb   iaJb   ia
Jb ia
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Afcea it security course 2015 flyer
Afcea it security course 2015 flyerAfcea it security course 2015 flyer
Afcea it security course 2015 flyer
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Information security
Information security Information security
Information security
 
Lesson 2 - IDPS
Lesson 2 - IDPSLesson 2 - IDPS
Lesson 2 - IDPS
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
IoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware SecurityIoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware Security
 
Lesson 3- Remote Access
Lesson 3- Remote AccessLesson 3- Remote Access
Lesson 3- Remote Access
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Smart city project's Information Security challenges
Smart city project's Information Security challenges              Smart city project's Information Security challenges
Smart city project's Information Security challenges
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Lessson 2 - Application Layer
Lessson 2 - Application LayerLessson 2 - Application Layer
Lessson 2 - Application Layer
 
I0516064
I0516064I0516064
I0516064
 
IT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoIT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John Lado
 

Viewers also liked

Ict Sd05 I Scan Project Sabine Rotthier
Ict Sd05 I Scan Project   Sabine RotthierIct Sd05 I Scan Project   Sabine Rotthier
Ict Sd05 I Scan Project Sabine Rotthier
imec.archive
 
Ddo1 Bernd Langeheine 081017 Ghent
Ddo1 Bernd Langeheine   081017 GhentDdo1 Bernd Langeheine   081017 Ghent
Ddo1 Bernd Langeheine 081017 Ghent
imec.archive
 
Excellence in customer relationships
Excellence in customer relationshipsExcellence in customer relationships
Excellence in customer relationships
Garrett Delcourt
 
Break out: Incubation and Venturing - Felix Van Maele
Break out: Incubation and Venturing - Felix Van MaeleBreak out: Incubation and Venturing - Felix Van Maele
Break out: Incubation and Venturing - Felix Van Maele
imec.archive
 
Ecrea3i Gidlet Ruth Ppt
Ecrea3i Gidlet Ruth PptEcrea3i Gidlet Ruth Ppt
Ecrea3i Gidlet Ruth Ppt
imec.archive
 
Keynote josephine green we bbt 2011
Keynote josephine green we bbt 2011Keynote josephine green we bbt 2011
Keynote josephine green we bbt 2011
imec.archive
 
Dirk Osstyn - Leylab
Dirk Osstyn - LeylabDirk Osstyn - Leylab
Dirk Osstyn - Leylab
imec.archive
 
Heide-Mieke Scherpereel - Sensotec WoDy Audiokrant
Heide-Mieke Scherpereel - Sensotec WoDy AudiokrantHeide-Mieke Scherpereel - Sensotec WoDy Audiokrant
Heide-Mieke Scherpereel - Sensotec WoDy Audiokrant
imec.archive
 
Maduf07 Expert Opinion And Potential Estimation Lieven De Marez
Maduf07 Expert Opinion And Potential Estimation   Lieven De MarezMaduf07 Expert Opinion And Potential Estimation   Lieven De Marez
Maduf07 Expert Opinion And Potential Estimation Lieven De Marez
imec.archive
 
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value  Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
imec.archive
 
Leen Vandezande - gestandardiseerde interfaces
Leen Vandezande - gestandardiseerde interfacesLeen Vandezande - gestandardiseerde interfaces
Leen Vandezande - gestandardiseerde interfaces
imec.archive
 
Ddo4 Erik Dejonghe How To Go For Digital Ether Dividend (Show)X
Ddo4 Erik Dejonghe   How To Go For Digital Ether Dividend (Show)XDdo4 Erik Dejonghe   How To Go For Digital Ether Dividend (Show)X
Ddo4 Erik Dejonghe How To Go For Digital Ether Dividend (Show)X
imec.archive
 
D'estrella a forat negre
D'estrella a forat negreD'estrella a forat negre
D'estrella a forat negre
jordipeti
 
01 Zorgafhankelijkheid En Communicatietechnologie Inleiding
01  Zorgafhankelijkheid En Communicatietechnologie   Inleiding01  Zorgafhankelijkheid En Communicatietechnologie   Inleiding
01 Zorgafhankelijkheid En Communicatietechnologie Inleiding
imec.archive
 
Presentació a classe
Presentació a classePresentació a classe
Presentació a classe
guestbeb89716
 

Viewers also liked (20)

Ad Ketelaars - Services offered over municipal network
Ad Ketelaars - Services offered over municipal networkAd Ketelaars - Services offered over municipal network
Ad Ketelaars - Services offered over municipal network
 
Ict Sd05 I Scan Project Sabine Rotthier
Ict Sd05 I Scan Project   Sabine RotthierIct Sd05 I Scan Project   Sabine Rotthier
Ict Sd05 I Scan Project Sabine Rotthier
 
Ddo1 Bernd Langeheine 081017 Ghent
Ddo1 Bernd Langeheine   081017 GhentDdo1 Bernd Langeheine   081017 Ghent
Ddo1 Bernd Langeheine 081017 Ghent
 
Svcc12 designparternship
Svcc12 designparternshipSvcc12 designparternship
Svcc12 designparternship
 
Excellence in customer relationships
Excellence in customer relationshipsExcellence in customer relationships
Excellence in customer relationships
 
Break out: Incubation and Venturing - Felix Van Maele
Break out: Incubation and Venturing - Felix Van MaeleBreak out: Incubation and Venturing - Felix Van Maele
Break out: Incubation and Venturing - Felix Van Maele
 
Ecrea3i Gidlet Ruth Ppt
Ecrea3i Gidlet Ruth PptEcrea3i Gidlet Ruth Ppt
Ecrea3i Gidlet Ruth Ppt
 
Keynote josephine green we bbt 2011
Keynote josephine green we bbt 2011Keynote josephine green we bbt 2011
Keynote josephine green we bbt 2011
 
Dirk Osstyn - Leylab
Dirk Osstyn - LeylabDirk Osstyn - Leylab
Dirk Osstyn - Leylab
 
Heide-Mieke Scherpereel - Sensotec WoDy Audiokrant
Heide-Mieke Scherpereel - Sensotec WoDy AudiokrantHeide-Mieke Scherpereel - Sensotec WoDy Audiokrant
Heide-Mieke Scherpereel - Sensotec WoDy Audiokrant
 
Jan Smits - Municipal fiber network in the Netherlands: three different legal...
Jan Smits - Municipal fiber network in the Netherlands: three different legal...Jan Smits - Municipal fiber network in the Netherlands: three different legal...
Jan Smits - Municipal fiber network in the Netherlands: three different legal...
 
Maduf07 Expert Opinion And Potential Estimation Lieven De Marez
Maduf07 Expert Opinion And Potential Estimation   Lieven De MarezMaduf07 Expert Opinion And Potential Estimation   Lieven De Marez
Maduf07 Expert Opinion And Potential Estimation Lieven De Marez
 
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value  Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
 
Leen Vandezande - gestandardiseerde interfaces
Leen Vandezande - gestandardiseerde interfacesLeen Vandezande - gestandardiseerde interfaces
Leen Vandezande - gestandardiseerde interfaces
 
Benoit Felten - The Universal Connectivity Revolution
Benoit Felten - The Universal Connectivity RevolutionBenoit Felten - The Universal Connectivity Revolution
Benoit Felten - The Universal Connectivity Revolution
 
Ddo4 Erik Dejonghe How To Go For Digital Ether Dividend (Show)X
Ddo4 Erik Dejonghe   How To Go For Digital Ether Dividend (Show)XDdo4 Erik Dejonghe   How To Go For Digital Ether Dividend (Show)X
Ddo4 Erik Dejonghe How To Go For Digital Ether Dividend (Show)X
 
D'estrella a forat negre
D'estrella a forat negreD'estrella a forat negre
D'estrella a forat negre
 
01 Zorgafhankelijkheid En Communicatietechnologie Inleiding
01  Zorgafhankelijkheid En Communicatietechnologie   Inleiding01  Zorgafhankelijkheid En Communicatietechnologie   Inleiding
01 Zorgafhankelijkheid En Communicatietechnologie Inleiding
 
I Lab4 Usecases
I Lab4 UsecasesI Lab4 Usecases
I Lab4 Usecases
 
Presentació a classe
Presentació a classePresentació a classe
Presentació a classe
 

Similar to Wouter Joossen - IBBT Security departement

Wouter Joossen - Security
Wouter Joossen - SecurityWouter Joossen - Security
Wouter Joossen - Security
imec.archive
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Dalton Valadares
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
Turvallisuus2013
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
segughana
 
Mobile security decision framework
Mobile security decision frameworkMobile security decision framework
Mobile security decision framework
Vishal Sharma
 
Img s position-paper_for_h2020
Img s position-paper_for_h2020Img s position-paper_for_h2020
Img s position-paper_for_h2020
Marco Manso
 

Similar to Wouter Joossen - IBBT Security departement (20)

Wouter Joossen - Security
Wouter Joossen - SecurityWouter Joossen - Security
Wouter Joossen - Security
 
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator Perspective
 
Mobile security decision framework
Mobile security decision frameworkMobile security decision framework
Mobile security decision framework
 
Smartphone Applications - Common Criteria is going Mobile
Smartphone Applications - Common Criteria is going MobileSmartphone Applications - Common Criteria is going Mobile
Smartphone Applications - Common Criteria is going Mobile
 
ITU-T Study Group 17 Introduction
ITU-T Study Group 17 IntroductionITU-T Study Group 17 Introduction
ITU-T Study Group 17 Introduction
 
Img s position-paper_for_h2020
Img s position-paper_for_h2020Img s position-paper_for_h2020
Img s position-paper_for_h2020
 
Elevating Network Security through NGFW Firewalls.pdf
Elevating Network Security through NGFW Firewalls.pdfElevating Network Security through NGFW Firewalls.pdf
Elevating Network Security through NGFW Firewalls.pdf
 
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall InnovationChrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
 
NGFW - An Updated Overview
NGFW - An Updated Overview NGFW - An Updated Overview
NGFW - An Updated Overview
 
Unique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative Solutions
 
Make things come alive in a secure way - Sigfox
Make things come alive in a secure way - SigfoxMake things come alive in a secure way - Sigfox
Make things come alive in a secure way - Sigfox
 

More from imec.archive

iMinds-iLab.o, Open Innovation in ICT
iMinds-iLab.o, Open Innovation in ICTiMinds-iLab.o, Open Innovation in ICT
iMinds-iLab.o, Open Innovation in ICT
imec.archive
 
ENoLL 6th Wave Results Ceremony (Jesse Marsh)
ENoLL 6th Wave Results Ceremony (Jesse Marsh)ENoLL 6th Wave Results Ceremony (Jesse Marsh)
ENoLL 6th Wave Results Ceremony (Jesse Marsh)
imec.archive
 
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
imec.archive
 
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersApollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
imec.archive
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
imec.archive
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
imec.archive
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
imec.archive
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
imec.archive
 
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersApollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
imec.archive
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
imec.archive
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
imec.archive
 

More from imec.archive (20)

iMinds-iLab.o, Open Innovation in ICT
iMinds-iLab.o, Open Innovation in ICTiMinds-iLab.o, Open Innovation in ICT
iMinds-iLab.o, Open Innovation in ICT
 
Accio presentation closing event
Accio presentation closing eventAccio presentation closing event
Accio presentation closing event
 
PRoF+ Patient Room of the Future
PRoF+ Patient Room of the FuturePRoF+ Patient Room of the Future
PRoF+ Patient Room of the Future
 
Results of the Apollon pilot in homecare and independent living
Results of the Apollon pilot in homecare and independent livingResults of the Apollon pilot in homecare and independent living
Results of the Apollon pilot in homecare and independent living
 
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
 
NMMU-Emmanuel Haven Living Lab
NMMU-Emmanuel Haven Living LabNMMU-Emmanuel Haven Living Lab
NMMU-Emmanuel Haven Living Lab
 
The Humanicité workshops
The Humanicité workshopsThe Humanicité workshops
The Humanicité workshops
 
A Real-World Experimentation Platform
A Real-World Experimentation PlatformA Real-World Experimentation Platform
A Real-World Experimentation Platform
 
ENoLL @ AAL Forum 2012
ENoLL @ AAL Forum 2012ENoLL @ AAL Forum 2012
ENoLL @ AAL Forum 2012
 
ENoLL 6th Wave Results Ceremony (Jesse Marsh)
ENoLL 6th Wave Results Ceremony (Jesse Marsh)ENoLL 6th Wave Results Ceremony (Jesse Marsh)
ENoLL 6th Wave Results Ceremony (Jesse Marsh)
 
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
 
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersApollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersApollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Wouter Joossen - IBBT Security departement

  • 1. security departement security, privacy and trust of E-* 13/10/2011 1
  • 2. Enhance the leading position of ICT-security research in Flanders Essential objectives: perform first class basic and applied research in key areas from ICT security (core) transfer the acquired basic knowledge into the economy (traditional notion of valorization) lower the cost of regulatory compliance of new hardware, software and applications (specific: valorization) contribute actively to training of undergraduate and PhD students, and of industry (valorization too) 2
  • 3. Context, application and technology trends Securityis directly related to dependability, and to trustworthiness – trustworthiness will remain essential Security cannot be achieved as an after-thought; core to software applications and the development & deploymentprocesses Security problems arise anywhere in systems (not only at front- and backdoors): end-to-end quality is required. Trustworthiness requires full life-cycle support (management support) 3
  • 4. security, privacy & trust of E-*:application areas E-health E-media E-society E-commerce E-logistics E-banking …
  • 5. Security Expertise (1/2) Secure programming languages (Clarke, Piessens, Joosen) Security middleware and component frameworks (Piessens, Desmet, Joosen) Secure development process (Scandariato, Joosen) Security monitoring and management (Desmet, Huygens, Joosen) Security for computer networks and pervasive systems (Verbaeten, Huygens, Preneel, Verbauwhede) Security for ad-hoc and wireless networks (Preneel, Verbauwhede) Privacy enhancing technologies, identity management (De Decker, Preneel) Cryptographic software and software obfuscation (Piessens, Preneel) Cryptographic hardware and embedded systems (Verbauwhede, Preneel, Rijmen) Document security, watermarking and perceptual hashing (Preneel) Trusted computing (Verbauwhede, Preneel) Legislation, compliance & policy(Dumortier, )
  • 6. Security Expertise (2/2 and incomplete) Cryptographic algorithms and protocols, foundations of cryptography and provable security (Rijmen, Preneel) Risk management (Huygens. Joosen) Authorisation technologies (Piessens, Joosen, Desmet) Secure System Software (Piessens, Joosen) HW implementation of DRM, watermarking and perceptual hashing (Verbauwhede, Preneel, Rijmen) Side-channel attacks and countermeasures (Verbauwhede, Rijmen, Preneel) Embedded biometry (Verbauwhede, Tuyls) Security for RFID’s, smart-cards, sensor nodes (Verbauwhede, Batina, Preneel, Huygens, Joosen) Evaluation of system security, including requirements, security architectures, software, hardware, cryptographic libraries and smart cards (All)
  • 7. Missionrevisited Security Middleware Privacy Cryptography Watermarking DRM Secure Programming Languages Biometric “To be a one stop shop for security research” Secure Development Risk Management
  • 8. “one-stop-shopfor ICT security research” 5 research programs: embeddedsecurity privacy & identity management programming secure software securitythrough the engineering process legal research, regulatory & policyframeworkfor ICT securingdistributed software
  • 9. The European context (FP7-IST call 8) Track record: About 20 FP6/FP7 projects that relate to trust and security Currently featuring two NoE’s: Cryptology, Bart Preneel from COSIC is currently coordinating ECRYPT II (Network of Excellence on Cryptology), which is a successor to ECRYPT. Service Engineering: WouterJoosen (DistriNet) currently is the Research Director of NESSoS: Engineering Secure Software and Systems for Future Internet Services. … lead generators for new EU projects 9
  • 10. For the business – applied to many hot application domains: Assurance, compliance of new applications, typically Future Internet Services Cloud computing (the next big one after SOA) IoT and embedded software and systems Very long term: Enabling Cost and Risk Assessment For Society: focus on Privacy (Social Networks) Cybercrime 10
  • 11. Service Provider GPS GSM Another example: NextGenITS [ICON] Privacy preserving Electronic Toll Only final fee transmitted to Service Provider Only driver has access to location data Authenticity of reported fee and location data Confidentiality of communications GPS Satellites Driver Fee Calculation Updates OBU Bill Fee Reporting Encrypted Location Data
  • 12. One Example: Bravehealth (FP7-IP 2010-2013) The BRAVEHEALTH system will enable the integration of services provided by mobile resources, legacy applications, data and computing intensive services within a mobile grid to offer personalized e-health services to mobile, nomadic, stationary users. 12
  • 13. Our broader context for strategic research 13 13/10/2011 Focus of this talk
  • 14. Three basic themes in the SecCAS program End to end data protection Improved security in multi-tenant applications Client-centric protection 14
  • 15. Into the market…Some Important trends in cloud security: Cloud security gateways Cloud based recovery Services MDM: Mobile Device Management Services High Assurance Public Identity Providers 13/10/2011 15
  • 16. Conclusion:what it means for the ICON programme We have a lot on our plates! New projects being developed: Mobile device management Security and management dashboards Cloud security Gateways for and by SaaS providers Enhancing the reliability of “social networks” in integrated solutions… Application cases: logistics, transport, health…!!!! 16
  • 17.
  • 18. security departement security, privacy and trust of E-* 13/10/2011 18