Josep Domingo Jordi Castella

933 views

Published on

Ponencia mostrada en el Consolider Ingenio 2010. Realizado en Verano de 2009 (Santander)

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
933
On SlideShare
0
From Embeds
0
Number of Embeds
9
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Josep Domingo Jordi Castella

  1. 1. El proyecto ARES (Seguridad y Privacidad de la Información) y la creación de empresas de base tecnológica Prof. Josep Domingo-Ferrer Dr. Jordi Castellà-Roca Universitat Rovira i Virgili, Tarragona Universidad Internacional Menéndez y Pelayo 20 de julio del 2009
  2. 2. Index <ul><li>Ares </li></ul><ul><ul><li>Research Team </li></ul></ul><ul><ul><li>Research Themes </li></ul></ul><ul><ul><ul><li>Critical Infrastructure Protection </li></ul></ul></ul><ul><ul><ul><li>Ubiquitous Computing </li></ul></ul></ul><ul><ul><ul><li>Secure Electronic Transactions </li></ul></ul></ul><ul><ul><ul><li>Digital Rights Management </li></ul></ul></ul><ul><ul><ul><li>Private Data Management </li></ul></ul></ul><ul><ul><li>Conclusions </li></ul></ul><ul><ul><li>Ares Leitmotiv </li></ul></ul><ul><ul><li>First Year Scientific Indicators </li></ul></ul><ul><li>Kinamik </li></ul><ul><ul><li>Basic facts </li></ul></ul><ul><ul><li>Vision, mission and goal </li></ul></ul><ul><ul><li>Company profile and history </li></ul></ul><ul><ul><li>Very strong market dynamics </li></ul></ul><ul><ul><li>Our rationale: paradigm shift from perimeter to data level security </li></ul></ul><ul><ul><li>Key drivers for better data governance </li></ul></ul><ul><ul><li>Our product: Secure Audit Vault </li></ul></ul><ul><ul><li>Business benefits </li></ul></ul><ul><ul><li>Why are we different? </li></ul></ul><ul><ul><li>R&D: open innovation </li></ul></ul><ul><ul><li>Conclusions </li></ul></ul>
  3. 3. Research Team <ul><li>ARES is composed of research groups from: </li></ul><ul><ul><li>Universitat Rovira i Virgili </li></ul></ul><ul><ul><li>Universitat Politècnica de Catalunya </li></ul></ul><ul><ul><li>Universidad de Málaga </li></ul></ul><ul><ul><li>Universitat Oberta de Catalunya </li></ul></ul><ul><ul><li>Consejo Superior de Investigaciones Científicas </li></ul></ul><ul><ul><li>Universitat de les Illes Balears </li></ul></ul>
  4. 4. Research Team <ul><li>Formed by 78 researchers </li></ul><ul><ul><li>Out of which 51 holding a Ph.D. </li></ul></ul><ul><ul><li>Average age: 35 years </li></ul></ul><ul><li>Project duration </li></ul><ul><ul><li>From October 2007 to September 2012 </li></ul></ul>
  5. 5. Research Themes <ul><li>Main Objective </li></ul><ul><ul><li>“ Develop new technology for protection of privacy in the information society ” </li></ul></ul><ul><li>Research Lines: </li></ul><ul><ul><li>Critical infrastructure protection </li></ul></ul><ul><ul><li>Ubiquitous computing </li></ul></ul><ul><ul><li>Electronic transactions </li></ul></ul><ul><ul><li>Digital rights management </li></ul></ul><ul><ul><li>Private data management </li></ul></ul>
  6. 6. Critical Infrastructure Protection <ul><li>Priority for homeland and corporate security: </li></ul><ul><ul><li>Airports, power plants, hospitals, financial facilities, etc. </li></ul></ul><ul><li>They depend on the safe operation of the information systems that control them </li></ul>
  7. 7. Critical Infrastructure Protection <ul><li>Infrastructure protection by means of sensor networks </li></ul><ul><ul><li>Constrained computational power </li></ul></ul><ul><ul><li>Hostile environment solutions </li></ul></ul><ul><ul><ul><li>Key management </li></ul></ul></ul><ul><ul><ul><li>Node failure detection </li></ul></ul></ul>A. Viejo, F. Sebé and J. Domingo-Ferrer, &quot;Secure and Scalable Many-to-One Symbol Transmission for Sensor Networks&quot;. Computer Communications . Vol. 31, pp. 2408-2413. Jun 2008. ISSN: 0140- 3664.
  8. 8. Critical Infrastructure Protection <ul><li>Security primitives in sensor nodes </li></ul><ul><ul><li>Classification of sensor nodes </li></ul></ul><ul><ul><li>Analysis of suitable security primitives for sensor nodes </li></ul></ul>R. Roman, C. Alcaraz and J. Lopez, “A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes” Mobile, Networks and Applications (MONET) Vol. 12, pag 231-244, Springer, 2008, ISSN 1572-8153. Clase I Clase II Clase III <ul><li>4 Mhz (8 bit) - 1 kB RAM - 16kB ROM </li></ul><ul><li>4~8 Mhz (8~16 bit) - 4~10 kB RAM - 48~128 kB ROM </li></ul><ul><li>13~180 Mhz (32 bit) - 256~512 kB RAM - 4~32 MB ROM </li></ul>
  9. 9. Critical Infrastructure Protection <ul><li>Protecting Critical Infrastructures through WSNs </li></ul><ul><ul><li>Analysis of characteristics and operations of WSNs for the protection of CIs </li></ul></ul><ul><ul><ul><li>Support for Early Warning Systems (EWS) & Dynamic Reconfiguration Systems (DRS) </li></ul></ul></ul><ul><ul><li>New challenges: support services, trust/security management, secure control systems and assessment mechanisms </li></ul></ul>- J. Lopez, C. Alcaraz and R. Roman, “On the Protection and Technologies of Critical Information Infrastructures”. En Foundations of Security Analysis and Design Tutorial Lectures, pp 160-182. LNCS 4677. Springer, October 2007, ISBN 978-3-540-74809-0. - C. Alcaraz, R. Roman and J. Lopez , “Análisis de la Aplicabilidad de las WSN para la protección de Infraestructuras Críticas”, VII Jornadas de Ingeniería Telemática (Jitel 2008), Alcalá de Henares, Spain, September 2008.
  10. 10. Critical Infrastructure Protection <ul><li>Remote integrity checking of backup data </li></ul><ul><ul><li>Cost-efficient solutions </li></ul></ul><ul><ul><li>Data privacy concerns </li></ul></ul>F. Sebé, J. Domingo-Ferrer, A. Martínez-Ballesté, Y. Deswarte and J.J. Quisquater, &quot;Efficient remote data possession checking in critical information infrastructures&quot;. IEEE Transactions on Knowledge and Data Engineering. Vol. 20, pp. 1034-1038. Aug 2008. ISSN: 1041-4347.
  11. 11. Critical Infrastructure Protection <ul><li>Intrusion Detection Systems </li></ul><ul><ul><li>Analysis of network traffic for attack detection </li></ul></ul><ul><ul><li>Data collection preserving user privacy </li></ul></ul><ul><ul><li>Agent-based solutions </li></ul></ul>- J. Garcia-Alfaro and G. Navarro. &quot;Prevention of Cross-Site Scripting Attacks on Current Web Applications&quot;. Lecture Notes in Computer Science. Vol. 4804 (On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS), pp. 1770-1784, Nov 2007, Portugal. ISSN: 0302-9743. - R. Páez, J. Tomàs-Buliart, J. Forné, M. Soriano, “Securing Agents against Malicious Host in an Intrusion Detection System”, 2nd International Workshop on Critical Information Infrastructures Security (CRITIS), 2007.
  12. 12. Ubiquitous Computing <ul><li>Privacy in RFID-tagged shopping </li></ul><ul><ul><li>Tagged products can be traced thus jeopardizing buyer privacy </li></ul></ul><ul><ul><li>Research on privacy-preserving tag identification </li></ul></ul>A. Solanas and J. Manjón, &quot;Deployment of RFID Readers for the Scalable Identification of Private Tags: a Simulation Study&quot;. RFID Security: Techniques, Protocols and System-On-Chip Design . 2008. ISBN: 978-0-38776-480-1.
  13. 13. Ubiquitous Computing <ul><li>Security and privacy in RFID-enabled personal documentation </li></ul><ul><ul><li>RFID in traditional paper-based documentation provides advanced features and a seamless link to the information system </li></ul></ul><ul><ul><li>Advanced security mechanisms required to protect the identity and the personal information of bearers. </li></ul></ul>- P. Najera, F. Moyano and J. Lopez, &quot;Security mechanisms and access control infrastructure for e-Passports and general purpose e-documents&quot;. Journal of Universal Computer Science, Special Issue on Data Security and Privacy Protection in Pervasive Computing environments. To appear - P. Najera, F. Moyano and J. Lopez, &quot;Secure Integration of RFID Technology in Personal Documentation for Seamless Identity Validation&quot; in 3rd Symposium of Ubiquitous Computing and Ambient Intelligence 2008. pp. 134-138. Series: Advances in Intelligent and Soft Computing , Vol. 51, Springer. 2008. ISBN: 978-3-540-85866-9
  14. 14. Ubiquitous Computing <ul><li>Location Based Services </li></ul><ul><ul><li>User devices receive information depending on their location </li></ul></ul><ul><ul><li>Technology solutions protecting users from tracing are needed </li></ul></ul>A. Solanas and A. Martínez-Ballesté, &quot;A TTP-Free Protocol for Location Privacy in Location-Based Services&quot;. Computer Communications . Vol. 31, pp. 1181-1191. Apr 2008. ISSN: 0140-3664.
  15. 15. Ubiquitous Computing <ul><li>Mobile Ad-Hoc Networks </li></ul><ul><ul><li>Decentralized networks </li></ul></ul><ul><ul><li>Research on </li></ul></ul><ul><ul><ul><li>Routing technology in hostile environments </li></ul></ul></ul><ul><ul><ul><li>Certificate Validation </li></ul></ul></ul><ul><ul><ul><li>Trust models </li></ul></ul></ul>- J. Forné, J. L. Muñoz, F. Hinarejos, O. Esparza, &quot;Certificate status validation in mobile ad hoc networks&quot;. IEEE Wireless Communications, February 2009. - M. Mejia, N. Peña, J. L. Muñoz, O. Esparza, &quot;A review of trust modeling in ad hoc networks&quot;. Internet Research, Vol. 19 No. 1, pp. 88-104. 2009
  16. 16. Ubiquitous Computing <ul><li>Vehicular Ad-Hoc Networks </li></ul><ul><ul><li>Car-to-car communications permit: </li></ul></ul><ul><ul><ul><li>Real-time alerts about dangers (braking, lane changes, etc.) </li></ul></ul></ul><ul><ul><ul><li>Announcements about traffic conditions (jams, icy roads, etc.) </li></ul></ul></ul><ul><ul><li>Privacy must be kept by preventing driver tracking </li></ul></ul>V. Daza, J. Domingo-Ferrer, F. Sebé and A. Viejo, &quot;Trustworthy privacy-preserving cargenerated announcements in vehicular ad hoc networks&quot;. IEEE Transactions on Vehicular Technology, 58(4):1876-1886, 2009.
  17. 17. Secure Electronic Transactions <ul><li>Research on security and privacy of electronic transactions </li></ul><ul><ul><li>Legal aspects of electronic transactions </li></ul></ul><ul><ul><li>Electronic payment systems </li></ul></ul><ul><ul><li>Electronic contracts </li></ul></ul><ul><ul><li>Formal validation of protocol security </li></ul></ul><ul><ul><li>Private information retrieval </li></ul></ul>- A. Martínez Nadal, “Comentarios a la ley 59/2003 de firma electrónica”. CIVITAS EDICIONES, S.L. ISBN: 978-84-470-2221-2. - J. Castellà-Roca and A. Vives-Guasch, “Billetes electrónicos seguros”. Reunión Española de Criptología y Seguridad de la Información (RECSI) , pp. 141-150. 2008. ISBN: 978-84-691-5158-7.
  18. 18. Secure Electronic Transactions <ul><li>Private Information Retrieval </li></ul><ul><ul><li>User queries to Internet search engines reveal user habits </li></ul></ul><ul><ul><li>Research on query anonymization: </li></ul></ul><ul><ul><ul><li>Query masking </li></ul></ul></ul><ul><ul><ul><li>P2P-based query anonymization </li></ul></ul></ul>- J. Domingo-Ferrer, A. Solanas and J. Castellà-Roca, &quot;h(k)-Private Information Retrieval from Privacy- Uncooperative Queryable Databases&quot;. Online Information Reviews. To Appear. - J. Domingo-Ferrer, M. Bras-Amoròs, Q. Wu and J. Manjón, &quot;User-Private Information Retrieval Based on a Peer-to-Peer Community”. Data & Knowledge Engineering. To Appear.
  19. 19. Digital Rights Management <ul><li>Intellectual property of digital content has to be protected </li></ul><ul><li>P2P file sharing makes content redistribution very easy </li></ul>
  20. 20. Digital Rights Management <ul><li>Research on Copy Detection Systems </li></ul><ul><ul><li>Watermarking </li></ul></ul><ul><ul><ul><li>Copyright information embedded into digital content </li></ul></ul></ul><ul><ul><li>Fingerprinting </li></ul></ul><ul><ul><ul><li>Security against collusion by dishonest buyers </li></ul></ul></ul><ul><li>M. Fallahpour, D. Megías, “Reversible Data Hiding Based On H.264/AVC Intra Prediction”. Lecture Notes in Computer Science (IWDW 2008). ISSN: 03029743. </li></ul><ul><li>J. Tomas-Buliart, M. Fernández, M. Soriano “Protection of mobile agents execution using a modified Self- </li></ul><ul><li>Validating Branch-Based Software Watermarking with external sentinel” in CRITIS, Frascati, Oct. 2008. </li></ul>
  21. 21. Private Data Management <ul><li>Electronic transactions permit automatic collection of large amounts of personal data </li></ul><ul><li>Sharing and publishing personal data must be compatible with individual privacy </li></ul>- Transfer Contracts: EUROSTAT, IDESCAT - Spin-Off: STAITEC
  22. 22. Private Data Management <ul><li>Secure Data Mining </li></ul><ul><ul><li>Research on: </li></ul></ul><ul><ul><ul><li>Data masking methods </li></ul></ul></ul><ul><ul><ul><li>Record linkage algorithms </li></ul></ul></ul><ul><ul><ul><li>Privacy preserving data mining </li></ul></ul></ul>- J. Nin, J. Herranz, V. Torra, &quot;Rethinking Rank Swapping to Decrease Disclosure Risk&quot;. Data & Knowledge Engineering. Vol. 64, issue 1, Pages 346-364. Jan 2008. ISSN: 0169-023X. - J. Domingo-Ferrer, F. Sebé and A. Solanas, “An anonymity model achievable via microaggregation”, LNCS 5159, pp. 209-218, Aug. 2008. Vol. 5th VLDB Workshop on Secure Data Management-SDM 2008, Berlin: Springer- Verlag No 1,77 77 32 Yes 1,68 70 35 Yes 1,55 63 25 Result Height Weight Age (···) (···) (···) 1,77 77 Anna (···) (···) (···) Height Weight Name
  23. 23. Conclusion <ul><li>Information society has to stay secure to survive. </li></ul><ul><li>Security will progress even without public support … </li></ul><ul><ul><li>… but privacy technology has less commercial appeal. </li></ul></ul><ul><li>Information society must respect privacy to stay human. </li></ul>
  24. 24. ARES Leitmotiv <ul><li>“ National and corporate security” </li></ul><ul><li>vs </li></ul><ul><li>“ Individual Privacy” </li></ul>
  25. 25. First Year Scientific Indicators 8 5 Ph.D. Theses 18 12 Intergroup publications 16 10 New funded projects 1 1 Patents 93 60 Book Chapter or ISBN conferences 81 60 ISI JCR journal articles or LNCS Actual Objective
  26. 26. First Year Scientific Indicators <ul><li>Researchers who have joined ARES: </li></ul><ul><ul><li>Post-doctoral grant holders: </li></ul></ul><ul><ul><ul><li>Qianhong Wu from China </li></ul></ul></ul><ul><ul><ul><li>Roberto Di Pietro from Italy </li></ul></ul></ul><ul><ul><ul><li>Guillermo Navarro from Spain </li></ul></ul></ul><ul><ul><ul><li>David Rebollo from Spain </li></ul></ul></ul><ul><ul><li>Pre-doctoral grant holders: </li></ul></ul><ul><ul><ul><li>From Spain: 8 </li></ul></ul></ul><ul><ul><ul><li>From China: 1 </li></ul></ul></ul><ul><ul><ul><li>From Cuba: 2 </li></ul></ul></ul><ul><ul><ul><li>From Sweden: 1 </li></ul></ul></ul><ul><ul><ul><li>From Romania: 1 </li></ul></ul></ul><ul><ul><ul><li>From Iran: 1 </li></ul></ul></ul>
  27. 27. Kinamik Data Integrity
  28. 28. Basic facts <ul><li>Kinamik is a software development company specialized in providing solutions that collect, secure and seal sensible digital records and makes them tamper-evident. We play in the Data Governance space. </li></ul><ul><li>Kinamik’s integrity focus will improve data quality for e-discovery, compliance, forensics and information security processes (GRC) </li></ul><ul><li>Our software provides an irrefutable proof that a record has not been changed since its creation, regardless who creates, manages, collects or stores this information. </li></ul><ul><li>This approach makes data trustworthy without any possibility of contesting its integrity and validity. </li></ul>
  29. 29. Vision, mission and goal <ul><li>Vision </li></ul><ul><ul><li>ALL organizations will eventually implement independently verifiable tamper-proof registries for sensitive electronic records in order to: </li></ul></ul><ul><ul><ul><li>protect against internal malpractice, </li></ul></ul></ul><ul><ul><ul><li>meet compliance guidelines, </li></ul></ul></ul><ul><ul><ul><li>show good conduct to regulators and courts of law </li></ul></ul></ul><ul><ul><li>demonstrate transparency in their operations. </li></ul></ul><ul><li>Mission </li></ul><ul><ul><li>Provide an easy way to answer a tough question: How do I know that the digital records I am looking at are correct? </li></ul></ul><ul><li>Goal </li></ul><ul><ul><li>Become the de-facto standard for tamper-proofing electronic records and trustworthy sources of information for auditing best practices </li></ul></ul>
  30. 30. Company profile and history <ul><li>Company History and Background </li></ul><ul><ul><li>Kinamik started its activities in late-2005 </li></ul></ul><ul><ul><li>Spin-off from Scytl </li></ul></ul><ul><ul><li>Using internationally-recognized standard cryptographic algorithms and owned intellectual property, Kinamik designed and developed a solution that provides a tamper-evident seal for electronic records </li></ul></ul><ul><ul><li>Six patents have been filed between 2005 and 2008 </li></ul></ul><ul><ul><li>In 2007 Kinamik was a Red Herring 100 finalist; nominated for the ICT European Technology Prize in 2007 and semifinalist for the Eurecan 2008 </li></ul></ul><ul><ul><li>VC-based, three capital rounds </li></ul></ul>
  31. 31. Very strong market dynamics
  32. 32. Our rationale: paradigm shift from perimeter to data level security <ul><li>The security industry has been running backward, starting at the edge (perimeter security) and working its way to the data itself </li></ul><ul><li>3 fundamental reasons why perimeter security only will not work: </li></ul><ul><ul><li>Attackers are more savvy walking through the many holes of firewalls… </li></ul></ul><ul><ul><li>Insider threats are becoming more important than external threats (tipping point) </li></ul></ul><ul><ul><li>The notion of perimeter is changing: SOA, SaaS, Grids, Virtualization are eliminating the borders, increasing data mobility </li></ul></ul><ul><li>If data gets corrupt, billions of dollars of investment (in perimeter security) would be protecting rubbish… or worse, fraud! </li></ul>
  33. 33. Key drivers for better data governance <ul><li>Regulations, compliance with laws and internal security policies are mandating better data management and correctness </li></ul><ul><li>Complexity of systems and varied sources of information create greater manipulation vulnerabilities </li></ul><ul><li>Virtualization, globalization means losing control of data </li></ul><ul><li>Perimeter security is tightened, threats are moving inside </li></ul><ul><li>The key is data integrity </li></ul>
  34. 34. Our product: Secure Audit Vault <ul><li>What is it? </li></ul><ul><ul><li>A market-leading software solution that provides irrefutable proof of integrity on electronic records at a fine granular level. </li></ul></ul><ul><ul><li>It helps organizations reduce audit and compliance costs, mitigates insider threat and gives legal admissibility and best-evidence in case of litigation. </li></ul></ul><ul><li>What does it do? </li></ul><ul><ul><li>Kinamik systematically builds tamper-evident registries of trustworthy information that hold even the most privileged users (system administrators) accountable for their actions. </li></ul></ul><ul><ul><li>Our solution can detect any intentional or unintentional electronic record tampering at a level of granularity unique in the market. It is also able to handle large amounts of data without generating significant overhead. </li></ul></ul><ul><ul><li>While processing electronic records, Kinamik’s software builds a centralized repository secured down to record level. </li></ul></ul>
  35. 35. Business benefits <ul><li>Four drivers: </li></ul><ul><ul><li>Cost in e-evidence and forensic processes is growing at great speed, and so is number of litigation  Kinamik provides the best legal evidence of digital information in case of any need </li></ul></ul><ul><ul><li>Regulatory compliance requires data integrity best practices (SOX, PCI DSS, HIPAA, GLBA, Data Privacy Directives…)  Kinamik facilitates compliance processes for organizations </li></ul></ul><ul><ul><li>Insider threats & Privacy protection  Kinamik helps deterrence of insider threat by systematically building tamper-evident registries of trustworthy information, holding even the most privileged users (system administrators) accountable for their actions. </li></ul></ul><ul><ul><li>Forensics and auditing processes  Kinamik reduces workload costs by providing a secure and centralized data repository for all sensitive data </li></ul></ul>
  36. 36. Why are we different? <ul><li>We have designed, developed and optimized a product that: </li></ul><ul><ul><li>can detect any change of data at fine granular level </li></ul></ul><ul><ul><li>can handle a very large amount of data </li></ul></ul><ul><ul><li>is seamless to integrate in any IT environment </li></ul></ul><ul><ul><li>does not generate significant overhead </li></ul></ul><ul><li>We build tamper-evident registries of trustworthy information </li></ul><ul><li>We notarize data and help building trust in Information Sharing Environments </li></ul>
  37. 37. R&D: open innovation <ul><li>How do we develop and collaborate? </li></ul><ul><ul><li>Internal team for strategic decisions (roadmap definition), design, development and testing </li></ul></ul><ul><ul><li>External validation of our software </li></ul></ul><ul><ul><li>In some cases, implementation </li></ul></ul><ul><ul><li>Applying for research project grants (EU-7FP) </li></ul></ul>
  38. 38. R&D: open innovation <ul><li>How does the CRISES-URV help us? </li></ul><ul><ul><li>Apply the academically needed balance for a private VC-based start up to deploy accurate solutions to the market </li></ul></ul><ul><ul><li>Technical reports: </li></ul></ul><ul><ul><ul><li>Report on KNotary Technical Basis (KTB) </li></ul></ul></ul><ul><ul><ul><ul><li>Analysis and updates to the KTB to obtain an accurate and quality document. </li></ul></ul></ul></ul><ul><ul><ul><li>Suggestions and recommendations for further work (KTB): </li></ul></ul></ul><ul><ul><ul><ul><li>Internal report for Kinamik describing additional analysis work efforts required and other suggestions. </li></ul></ul></ul></ul><ul><ul><li>Code validation: </li></ul></ul><ul><ul><ul><li>Evaluación del algoritmo de escalado de una secuencia de números pseudoaleatoris dentro de un rango fijado </li></ul></ul></ul><ul><ul><ul><li>Revisión del modelo de datos correspondiente a la aplicación kNotary de registro seguro </li></ul></ul></ul><ul><ul><ul><ul><li>The objective was to review the data model of the Knotary Application for secure registration (Immutable Audit Logs) </li></ul></ul></ul></ul><ul><ul><li>Development of new technology needs (i.e. Feed for Sun Solaris) </li></ul></ul><ul><ul><ul><li>Remote audit trail storage for OpenSolaris </li></ul></ul></ul><ul><ul><li>Master thesis projects: the student may be hired once the project is complete. </li></ul></ul>
  39. 39. Conclusions <ul><li>Spin-off of Scytl (VC-based) </li></ul><ul><li>Secure Audit Vault </li></ul><ul><ul><li>Verifiable tamper-proof registers for sensitive electronic records </li></ul></ul><ul><ul><li>Irrefutable proof of integrity on electronic records at a fine granular level </li></ul></ul><ul><ul><li>Able to handle large amounts of data </li></ul></ul><ul><ul><li>Forensic and auditing processes </li></ul></ul><ul><li>Research and Development </li></ul><ul><ul><li>URV-CRISES </li></ul></ul>
  40. 40. Thanks for your attention

×