SlideShare a Scribd company logo
security departement security, privacy and trust of E-* 13/10/2011 1
Enhance the leading position  of ICT-security research in Flanders Essential objectives:  perform first class basic and applied research in key areas from ICT security (core) transfer the acquired basic knowledge into the economy (traditional notion of valorization) lower the cost of regulatory compliance of new  hardware, software and applications (specific: valorization) contribute actively to training of undergraduate and PhD students, and of industry (valorization too) 2
Context, application and technology trends Securityis directly related to dependability, and to trustworthiness – trustworthiness will remain essential   Security cannot be achieved as an after-thought; core to software applications and the development & deploymentprocesses  Security problems arise anywhere in systems (not only at front- and backdoors): end-to-end quality is required. Trustworthiness requires full life-cycle support (management support) 3
security, privacy & trust of E-*:application areas E-health E-media E-society E-commerce E-logistics E-banking …
Security Expertise (1/2) Secure programming languages (Clarke, Piessens, Joosen) Security middleware and component frameworks (Piessens, Desmet, Joosen)  Secure development process (Scandariato, Joosen)  Security monitoring and management (Desmet, Huygens, Joosen)  Security for computer networks and pervasive systems (Verbaeten, Huygens, Preneel, Verbauwhede)  Security for ad-hoc and wireless networks (Preneel, Verbauwhede) Privacy enhancing technologies, identity management (De Decker, Preneel)  Cryptographic software and software obfuscation (Piessens, Preneel) Cryptographic hardware and embedded systems (Verbauwhede, Preneel, Rijmen) Document security, watermarking and perceptual hashing (Preneel) Trusted computing (Verbauwhede, Preneel)   Legislation, compliance & policy(Dumortier,   )
Security Expertise (2/2 and incomplete) Cryptographic algorithms and protocols, foundations of cryptography and provable security (Rijmen, Preneel)  Risk management (Huygens. Joosen) Authorisation technologies (Piessens, Joosen, Desmet) Secure System Software (Piessens, Joosen) HW implementation of DRM, watermarking and perceptual hashing (Verbauwhede, Preneel, Rijmen) Side-channel attacks and countermeasures (Verbauwhede, Rijmen, Preneel) Embedded biometry (Verbauwhede, Tuyls) Security for RFID’s, smart-cards, sensor nodes (Verbauwhede, Batina, Preneel, Huygens, Joosen)  Evaluation of system security, including requirements, security architectures, software, hardware, cryptographic libraries and smart cards (All)
Missionrevisited Security Middleware Privacy Cryptography Watermarking DRM Secure Programming Languages Biometric “To be a one stop shop for security research” Secure Development Risk Management
“one-stop-shopfor ICT security research”  5 research programs: embeddedsecurity privacy & identity management programming secure software securitythrough the engineering process legal research, regulatory &  policyframeworkfor ICT securingdistributed software
The European context (FP7-IST call 8) Track record: About 20 FP6/FP7 projects that relate to trust and security Currently featuring two NoE’s: Cryptology, Bart Preneel from COSIC is currently coordinating ECRYPT II (Network of Excellence on Cryptology), which is a successor to ECRYPT. Service Engineering: WouterJoosen (DistriNet) currently is the Research Director of NESSoS: Engineering Secure Software and Systems for Future Internet Services. … lead generators for new EU projects 9
For the business – applied to many hot application domains: Assurance, compliance of new applications, typically Future Internet Services Cloud computing (the next big one after SOA) IoT and embedded software and systems Very long term: Enabling Cost and Risk Assessment For Society: focus on Privacy (Social Networks) Cybercrime 10
Service Provider GPS GSM Another example: NextGenITS [ICON] Privacy preserving Electronic Toll Only final fee transmitted to Service Provider Only driver has access to location data Authenticity of reported fee and location data Confidentiality of communications GPS Satellites Driver Fee Calculation Updates OBU Bill Fee Reporting Encrypted Location Data
One Example: Bravehealth (FP7-IP 2010-2013) The BRAVEHEALTH system will enable the integration of services provided by mobile resources, legacy applications, data and computing intensive services within a mobile grid to offer personalized e-health services to mobile, nomadic, stationary users. 12
Our broader context for strategic research 13 13/10/2011 Focus  of this talk
Three basic themes in the SecCAS program End to end data protection Improved security in multi-tenant applications Client-centric protection 14
Into the market…Some Important trends in cloud security: Cloud security gateways Cloud based recovery Services MDM: Mobile Device Management Services High Assurance Public Identity Providers 13/10/2011 15
Conclusion:what it means for the ICON programme We have a lot on our plates! New projects being developed: Mobile device management Security and management dashboards Cloud security Gateways for and by SaaS providers Enhancing  the reliability of “social networks” in integrated solutions… Application cases: logistics, transport, health…!!!! 16
Tank you, theTeam (>140 FTEs) Prof. Dave ClarkeProf. Bart De DeckerProf. Danny Hughes Prof. Christophe HuygensProf. Wouter JoosenProf. Frank Piessens Prof. Yolande Berbers Prof. Tom Holvoet Prof. Bart Jacobs ,[object Object],Prof. Bart PreneelProf. Vincent RijmenProf. Ingrid Verbauwhede Prof. Claudia Diaz 7 postdocs40+ junior reserachers ICRI: Prof. JosDumortier 2 postdocs15+ junior researchers 17
security departement security, privacy and trust of E-* 13/10/2011 18

More Related Content

What's hot

Computing safety
Computing safetyComputing safety
Computing safety
titoferrus
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1
MLG College of Learning, Inc
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
Cisco Service Provider Mobility
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Dr. Loganathan R
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
Zara Nawaz
 
Afcea it security course 2015 flyer
Afcea it security course 2015 flyerAfcea it security course 2015 flyer
Afcea it security course 2015 flyer
Claude Gelinas
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
Mark John Lado, MIT
 
Information security
Information security Information security
Information security
razendar79
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
European Services Institute
 
IoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware SecurityIoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware Security
DATA SECURITY SOLUTIONS
 
Lesson 3- Remote Access
Lesson 3- Remote AccessLesson 3- Remote Access
Lesson 3- Remote Access
MLG College of Learning, Inc
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
osama elfar
 
Smart city project's Information Security challenges
Smart city project's Information Security challenges              Smart city project's Information Security challenges
Smart city project's Information Security challenges
Behak Kangarloo
 
Lessson 2 - Application Layer
Lessson 2 - Application LayerLessson 2 - Application Layer
Lessson 2 - Application Layer
MLG College of Learning, Inc
 
I0516064
I0516064I0516064
I0516064
IOSR Journals
 
IT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoIT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John Lado
Mark John Lado, MIT
 

What's hot (20)

Computing safety
Computing safetyComputing safety
Computing safety
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Jb ia
Jb   iaJb   ia
Jb ia
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Afcea it security course 2015 flyer
Afcea it security course 2015 flyerAfcea it security course 2015 flyer
Afcea it security course 2015 flyer
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Information security
Information security Information security
Information security
 
Lesson 2 - IDPS
Lesson 2 - IDPSLesson 2 - IDPS
Lesson 2 - IDPS
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
IoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware SecurityIoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware Security
 
Lesson 3- Remote Access
Lesson 3- Remote AccessLesson 3- Remote Access
Lesson 3- Remote Access
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Smart city project's Information Security challenges
Smart city project's Information Security challenges              Smart city project's Information Security challenges
Smart city project's Information Security challenges
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Lessson 2 - Application Layer
Lessson 2 - Application LayerLessson 2 - Application Layer
Lessson 2 - Application Layer
 
I0516064
I0516064I0516064
I0516064
 
IT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoIT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John Lado
 

Viewers also liked

Ad Ketelaars - Services offered over municipal network
Ad Ketelaars - Services offered over municipal networkAd Ketelaars - Services offered over municipal network
Ad Ketelaars - Services offered over municipal network
imec.archive
 
Ict Sd05 I Scan Project Sabine Rotthier
Ict Sd05 I Scan Project   Sabine RotthierIct Sd05 I Scan Project   Sabine Rotthier
Ict Sd05 I Scan Project Sabine Rotthierimec.archive
 
Ddo1 Bernd Langeheine 081017 Ghent
Ddo1 Bernd Langeheine   081017 GhentDdo1 Bernd Langeheine   081017 Ghent
Ddo1 Bernd Langeheine 081017 Ghentimec.archive
 
Excellence in customer relationships
Excellence in customer relationshipsExcellence in customer relationships
Excellence in customer relationshipsGarrett Delcourt
 
Break out: Incubation and Venturing - Felix Van Maele
Break out: Incubation and Venturing - Felix Van MaeleBreak out: Incubation and Venturing - Felix Van Maele
Break out: Incubation and Venturing - Felix Van Maeleimec.archive
 
Ecrea3i Gidlet Ruth Ppt
Ecrea3i Gidlet Ruth PptEcrea3i Gidlet Ruth Ppt
Ecrea3i Gidlet Ruth Pptimec.archive
 
Keynote josephine green we bbt 2011
Keynote josephine green we bbt 2011Keynote josephine green we bbt 2011
Keynote josephine green we bbt 2011imec.archive
 
Dirk Osstyn - Leylab
Dirk Osstyn - LeylabDirk Osstyn - Leylab
Dirk Osstyn - Leylabimec.archive
 
Heide-Mieke Scherpereel - Sensotec WoDy Audiokrant
Heide-Mieke Scherpereel - Sensotec WoDy AudiokrantHeide-Mieke Scherpereel - Sensotec WoDy Audiokrant
Heide-Mieke Scherpereel - Sensotec WoDy Audiokrantimec.archive
 
Jan Smits - Municipal fiber network in the Netherlands: three different legal...
Jan Smits - Municipal fiber network in the Netherlands: three different legal...Jan Smits - Municipal fiber network in the Netherlands: three different legal...
Jan Smits - Municipal fiber network in the Netherlands: three different legal...
imec.archive
 
Maduf07 Expert Opinion And Potential Estimation Lieven De Marez
Maduf07 Expert Opinion And Potential Estimation   Lieven De MarezMaduf07 Expert Opinion And Potential Estimation   Lieven De Marez
Maduf07 Expert Opinion And Potential Estimation Lieven De Marezimec.archive
 
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value  Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value imec.archive
 
Leen Vandezande - gestandardiseerde interfaces
Leen Vandezande - gestandardiseerde interfacesLeen Vandezande - gestandardiseerde interfaces
Leen Vandezande - gestandardiseerde interfacesimec.archive
 
Benoit Felten - The Universal Connectivity Revolution
Benoit Felten - The Universal Connectivity RevolutionBenoit Felten - The Universal Connectivity Revolution
Benoit Felten - The Universal Connectivity Revolution
imec.archive
 
Ddo4 Erik Dejonghe How To Go For Digital Ether Dividend (Show)X
Ddo4 Erik Dejonghe   How To Go For Digital Ether Dividend (Show)XDdo4 Erik Dejonghe   How To Go For Digital Ether Dividend (Show)X
Ddo4 Erik Dejonghe How To Go For Digital Ether Dividend (Show)Ximec.archive
 
D'estrella a forat negre
D'estrella a forat negreD'estrella a forat negre
D'estrella a forat negrejordipeti
 
01 Zorgafhankelijkheid En Communicatietechnologie Inleiding
01  Zorgafhankelijkheid En Communicatietechnologie   Inleiding01  Zorgafhankelijkheid En Communicatietechnologie   Inleiding
01 Zorgafhankelijkheid En Communicatietechnologie Inleidingimec.archive
 
Presentació a classe
Presentació a classePresentació a classe
Presentació a classeguestbeb89716
 

Viewers also liked (20)

Ad Ketelaars - Services offered over municipal network
Ad Ketelaars - Services offered over municipal networkAd Ketelaars - Services offered over municipal network
Ad Ketelaars - Services offered over municipal network
 
Ict Sd05 I Scan Project Sabine Rotthier
Ict Sd05 I Scan Project   Sabine RotthierIct Sd05 I Scan Project   Sabine Rotthier
Ict Sd05 I Scan Project Sabine Rotthier
 
Ddo1 Bernd Langeheine 081017 Ghent
Ddo1 Bernd Langeheine   081017 GhentDdo1 Bernd Langeheine   081017 Ghent
Ddo1 Bernd Langeheine 081017 Ghent
 
Svcc12 designparternship
Svcc12 designparternshipSvcc12 designparternship
Svcc12 designparternship
 
Excellence in customer relationships
Excellence in customer relationshipsExcellence in customer relationships
Excellence in customer relationships
 
Break out: Incubation and Venturing - Felix Van Maele
Break out: Incubation and Venturing - Felix Van MaeleBreak out: Incubation and Venturing - Felix Van Maele
Break out: Incubation and Venturing - Felix Van Maele
 
Ecrea3i Gidlet Ruth Ppt
Ecrea3i Gidlet Ruth PptEcrea3i Gidlet Ruth Ppt
Ecrea3i Gidlet Ruth Ppt
 
Keynote josephine green we bbt 2011
Keynote josephine green we bbt 2011Keynote josephine green we bbt 2011
Keynote josephine green we bbt 2011
 
Dirk Osstyn - Leylab
Dirk Osstyn - LeylabDirk Osstyn - Leylab
Dirk Osstyn - Leylab
 
Heide-Mieke Scherpereel - Sensotec WoDy Audiokrant
Heide-Mieke Scherpereel - Sensotec WoDy AudiokrantHeide-Mieke Scherpereel - Sensotec WoDy Audiokrant
Heide-Mieke Scherpereel - Sensotec WoDy Audiokrant
 
Jan Smits - Municipal fiber network in the Netherlands: three different legal...
Jan Smits - Municipal fiber network in the Netherlands: three different legal...Jan Smits - Municipal fiber network in the Netherlands: three different legal...
Jan Smits - Municipal fiber network in the Netherlands: three different legal...
 
Maduf07 Expert Opinion And Potential Estimation Lieven De Marez
Maduf07 Expert Opinion And Potential Estimation   Lieven De MarezMaduf07 Expert Opinion And Potential Estimation   Lieven De Marez
Maduf07 Expert Opinion And Potential Estimation Lieven De Marez
 
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value  Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
 
Leen Vandezande - gestandardiseerde interfaces
Leen Vandezande - gestandardiseerde interfacesLeen Vandezande - gestandardiseerde interfaces
Leen Vandezande - gestandardiseerde interfaces
 
Benoit Felten - The Universal Connectivity Revolution
Benoit Felten - The Universal Connectivity RevolutionBenoit Felten - The Universal Connectivity Revolution
Benoit Felten - The Universal Connectivity Revolution
 
Ddo4 Erik Dejonghe How To Go For Digital Ether Dividend (Show)X
Ddo4 Erik Dejonghe   How To Go For Digital Ether Dividend (Show)XDdo4 Erik Dejonghe   How To Go For Digital Ether Dividend (Show)X
Ddo4 Erik Dejonghe How To Go For Digital Ether Dividend (Show)X
 
D'estrella a forat negre
D'estrella a forat negreD'estrella a forat negre
D'estrella a forat negre
 
01 Zorgafhankelijkheid En Communicatietechnologie Inleiding
01  Zorgafhankelijkheid En Communicatietechnologie   Inleiding01  Zorgafhankelijkheid En Communicatietechnologie   Inleiding
01 Zorgafhankelijkheid En Communicatietechnologie Inleiding
 
I Lab4 Usecases
I Lab4 UsecasesI Lab4 Usecases
I Lab4 Usecases
 
Presentació a classe
Presentació a classePresentació a classe
Presentació a classe
 

Similar to Wouter Joossen - IBBT Security departement

Wouter Joossen - Security
Wouter Joossen - SecurityWouter Joossen - Security
Wouter Joossen - Securityimec.archive
 
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
Abbie Barbir
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
Ahmad Sharifi
 
What Are the Latest Trends in Endpoint Security for 2024?
What Are the Latest Trends in Endpoint Security for 2024?What Are the Latest Trends in Endpoint Security for 2024?
What Are the Latest Trends in Endpoint Security for 2024?
VRS Technologies
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Crawsec
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
Ram kumar
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Dalton Valadares
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Kresimir Popovic
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Turvallisuus2013
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
RahimMakhani2
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmannsegughana
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator Perspective
Dawn Nash Pfeiffer
 
Mobile security decision framework
Mobile security decision frameworkMobile security decision framework
Mobile security decision frameworkVishal Sharma
 
Smartphone Applications - Common Criteria is going Mobile
Smartphone Applications - Common Criteria is going MobileSmartphone Applications - Common Criteria is going Mobile
Smartphone Applications - Common Criteria is going Mobile
Jens Oberender
 
ITU-T Study Group 17 Introduction
ITU-T Study Group 17 IntroductionITU-T Study Group 17 Introduction
ITU-T Study Group 17 Introduction
ITU
 
Img s position-paper_for_h2020
Img s position-paper_for_h2020Img s position-paper_for_h2020
Img s position-paper_for_h2020Marco Manso
 
Elevating Network Security through NGFW Firewalls.pdf
Elevating Network Security through NGFW Firewalls.pdfElevating Network Security through NGFW Firewalls.pdf
Elevating Network Security through NGFW Firewalls.pdf
SecurityGen1
 
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall InnovationChrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
SecurityGen1
 
NGFW - An Updated Overview
NGFW - An Updated Overview NGFW - An Updated Overview
NGFW - An Updated Overview
Security Gen
 
Unique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative Solutions
Juniper Networks
 

Similar to Wouter Joossen - IBBT Security departement (20)

Wouter Joossen - Security
Wouter Joossen - SecurityWouter Joossen - Security
Wouter Joossen - Security
 
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
What Are the Latest Trends in Endpoint Security for 2024?
What Are the Latest Trends in Endpoint Security for 2024?What Are the Latest Trends in Endpoint Security for 2024?
What Are the Latest Trends in Endpoint Security for 2024?
 
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual FrontiersWhy Endpoint Security Matters: Safeguarding Your Virtual Frontiers
Why Endpoint Security Matters: Safeguarding Your Virtual Frontiers
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario HoffmannCyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator Perspective
 
Mobile security decision framework
Mobile security decision frameworkMobile security decision framework
Mobile security decision framework
 
Smartphone Applications - Common Criteria is going Mobile
Smartphone Applications - Common Criteria is going MobileSmartphone Applications - Common Criteria is going Mobile
Smartphone Applications - Common Criteria is going Mobile
 
ITU-T Study Group 17 Introduction
ITU-T Study Group 17 IntroductionITU-T Study Group 17 Introduction
ITU-T Study Group 17 Introduction
 
Img s position-paper_for_h2020
Img s position-paper_for_h2020Img s position-paper_for_h2020
Img s position-paper_for_h2020
 
Elevating Network Security through NGFW Firewalls.pdf
Elevating Network Security through NGFW Firewalls.pdfElevating Network Security through NGFW Firewalls.pdf
Elevating Network Security through NGFW Firewalls.pdf
 
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall InnovationChrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
 
NGFW - An Updated Overview
NGFW - An Updated Overview NGFW - An Updated Overview
NGFW - An Updated Overview
 
Unique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative Solutions
 

More from imec.archive

iMinds-iLab.o, Open Innovation in ICT
iMinds-iLab.o, Open Innovation in ICTiMinds-iLab.o, Open Innovation in ICT
iMinds-iLab.o, Open Innovation in ICTimec.archive
 
Accio presentation closing event
Accio presentation closing eventAccio presentation closing event
Accio presentation closing event
imec.archive
 
PRoF+ Patient Room of the Future
PRoF+ Patient Room of the FuturePRoF+ Patient Room of the Future
PRoF+ Patient Room of the Future
imec.archive
 
Results of the Apollon pilot in homecare and independent living
Results of the Apollon pilot in homecare and independent livingResults of the Apollon pilot in homecare and independent living
Results of the Apollon pilot in homecare and independent living
imec.archive
 
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
imec.archive
 
NMMU-Emmanuel Haven Living Lab
NMMU-Emmanuel Haven Living LabNMMU-Emmanuel Haven Living Lab
NMMU-Emmanuel Haven Living Lab
imec.archive
 
The Humanicité workshops
The Humanicité workshopsThe Humanicité workshops
The Humanicité workshops
imec.archive
 
A Real-World Experimentation Platform
A Real-World Experimentation PlatformA Real-World Experimentation Platform
A Real-World Experimentation Platform
imec.archive
 
ENoLL @ AAL Forum 2012
ENoLL @ AAL Forum 2012ENoLL @ AAL Forum 2012
ENoLL @ AAL Forum 2012
imec.archive
 
ENoLL 6th Wave Results Ceremony (Jesse Marsh)
ENoLL 6th Wave Results Ceremony (Jesse Marsh)ENoLL 6th Wave Results Ceremony (Jesse Marsh)
ENoLL 6th Wave Results Ceremony (Jesse Marsh)imec.archive
 
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...imec.archive
 
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersApollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
imec.archive
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
imec.archive
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
imec.archive
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
imec.archive
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
imec.archive
 
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersApollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
imec.archive
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
imec.archive
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
imec.archive
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
imec.archive
 

More from imec.archive (20)

iMinds-iLab.o, Open Innovation in ICT
iMinds-iLab.o, Open Innovation in ICTiMinds-iLab.o, Open Innovation in ICT
iMinds-iLab.o, Open Innovation in ICT
 
Accio presentation closing event
Accio presentation closing eventAccio presentation closing event
Accio presentation closing event
 
PRoF+ Patient Room of the Future
PRoF+ Patient Room of the FuturePRoF+ Patient Room of the Future
PRoF+ Patient Room of the Future
 
Results of the Apollon pilot in homecare and independent living
Results of the Apollon pilot in homecare and independent livingResults of the Apollon pilot in homecare and independent living
Results of the Apollon pilot in homecare and independent living
 
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
 
NMMU-Emmanuel Haven Living Lab
NMMU-Emmanuel Haven Living LabNMMU-Emmanuel Haven Living Lab
NMMU-Emmanuel Haven Living Lab
 
The Humanicité workshops
The Humanicité workshopsThe Humanicité workshops
The Humanicité workshops
 
A Real-World Experimentation Platform
A Real-World Experimentation PlatformA Real-World Experimentation Platform
A Real-World Experimentation Platform
 
ENoLL @ AAL Forum 2012
ENoLL @ AAL Forum 2012ENoLL @ AAL Forum 2012
ENoLL @ AAL Forum 2012
 
ENoLL 6th Wave Results Ceremony (Jesse Marsh)
ENoLL 6th Wave Results Ceremony (Jesse Marsh)ENoLL 6th Wave Results Ceremony (Jesse Marsh)
ENoLL 6th Wave Results Ceremony (Jesse Marsh)
 
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
 
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersApollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future InternetApollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
 
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across bordersApollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
 
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation EcosystemsApollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Wouter Joossen - IBBT Security departement

  • 1. security departement security, privacy and trust of E-* 13/10/2011 1
  • 2. Enhance the leading position of ICT-security research in Flanders Essential objectives: perform first class basic and applied research in key areas from ICT security (core) transfer the acquired basic knowledge into the economy (traditional notion of valorization) lower the cost of regulatory compliance of new hardware, software and applications (specific: valorization) contribute actively to training of undergraduate and PhD students, and of industry (valorization too) 2
  • 3. Context, application and technology trends Securityis directly related to dependability, and to trustworthiness – trustworthiness will remain essential Security cannot be achieved as an after-thought; core to software applications and the development & deploymentprocesses Security problems arise anywhere in systems (not only at front- and backdoors): end-to-end quality is required. Trustworthiness requires full life-cycle support (management support) 3
  • 4. security, privacy & trust of E-*:application areas E-health E-media E-society E-commerce E-logistics E-banking …
  • 5. Security Expertise (1/2) Secure programming languages (Clarke, Piessens, Joosen) Security middleware and component frameworks (Piessens, Desmet, Joosen) Secure development process (Scandariato, Joosen) Security monitoring and management (Desmet, Huygens, Joosen) Security for computer networks and pervasive systems (Verbaeten, Huygens, Preneel, Verbauwhede) Security for ad-hoc and wireless networks (Preneel, Verbauwhede) Privacy enhancing technologies, identity management (De Decker, Preneel) Cryptographic software and software obfuscation (Piessens, Preneel) Cryptographic hardware and embedded systems (Verbauwhede, Preneel, Rijmen) Document security, watermarking and perceptual hashing (Preneel) Trusted computing (Verbauwhede, Preneel) Legislation, compliance & policy(Dumortier, )
  • 6. Security Expertise (2/2 and incomplete) Cryptographic algorithms and protocols, foundations of cryptography and provable security (Rijmen, Preneel) Risk management (Huygens. Joosen) Authorisation technologies (Piessens, Joosen, Desmet) Secure System Software (Piessens, Joosen) HW implementation of DRM, watermarking and perceptual hashing (Verbauwhede, Preneel, Rijmen) Side-channel attacks and countermeasures (Verbauwhede, Rijmen, Preneel) Embedded biometry (Verbauwhede, Tuyls) Security for RFID’s, smart-cards, sensor nodes (Verbauwhede, Batina, Preneel, Huygens, Joosen) Evaluation of system security, including requirements, security architectures, software, hardware, cryptographic libraries and smart cards (All)
  • 7. Missionrevisited Security Middleware Privacy Cryptography Watermarking DRM Secure Programming Languages Biometric “To be a one stop shop for security research” Secure Development Risk Management
  • 8. “one-stop-shopfor ICT security research” 5 research programs: embeddedsecurity privacy & identity management programming secure software securitythrough the engineering process legal research, regulatory & policyframeworkfor ICT securingdistributed software
  • 9. The European context (FP7-IST call 8) Track record: About 20 FP6/FP7 projects that relate to trust and security Currently featuring two NoE’s: Cryptology, Bart Preneel from COSIC is currently coordinating ECRYPT II (Network of Excellence on Cryptology), which is a successor to ECRYPT. Service Engineering: WouterJoosen (DistriNet) currently is the Research Director of NESSoS: Engineering Secure Software and Systems for Future Internet Services. … lead generators for new EU projects 9
  • 10. For the business – applied to many hot application domains: Assurance, compliance of new applications, typically Future Internet Services Cloud computing (the next big one after SOA) IoT and embedded software and systems Very long term: Enabling Cost and Risk Assessment For Society: focus on Privacy (Social Networks) Cybercrime 10
  • 11. Service Provider GPS GSM Another example: NextGenITS [ICON] Privacy preserving Electronic Toll Only final fee transmitted to Service Provider Only driver has access to location data Authenticity of reported fee and location data Confidentiality of communications GPS Satellites Driver Fee Calculation Updates OBU Bill Fee Reporting Encrypted Location Data
  • 12. One Example: Bravehealth (FP7-IP 2010-2013) The BRAVEHEALTH system will enable the integration of services provided by mobile resources, legacy applications, data and computing intensive services within a mobile grid to offer personalized e-health services to mobile, nomadic, stationary users. 12
  • 13. Our broader context for strategic research 13 13/10/2011 Focus of this talk
  • 14. Three basic themes in the SecCAS program End to end data protection Improved security in multi-tenant applications Client-centric protection 14
  • 15. Into the market…Some Important trends in cloud security: Cloud security gateways Cloud based recovery Services MDM: Mobile Device Management Services High Assurance Public Identity Providers 13/10/2011 15
  • 16. Conclusion:what it means for the ICON programme We have a lot on our plates! New projects being developed: Mobile device management Security and management dashboards Cloud security Gateways for and by SaaS providers Enhancing the reliability of “social networks” in integrated solutions… Application cases: logistics, transport, health…!!!! 16
  • 17.
  • 18. security departement security, privacy and trust of E-* 13/10/2011 18