The Presentation focusses on the development from current mobile networks into the future sensor-driven mobile networks. A special focus is given on security aspects, especially measurable security of systems. The presentation was given at the IDC Mobility Series 2012 in Budapest.
The presentation provides an overview on areas for Master Thesis work at UNIK in the areas of Wireless Networks and Information Security (WNIS). Students from UiO, NTNU or any of our collaboration partners are invited to take contact to define a study in one of these areas. Some of these areas include:
* Radio communication, including
- Communication in the high North, advancing propagation models
- models and protocols for industrial sensor networks
- heterogeneous and adaptive networks
- Internet access and provision for emerging economies
* The 3rd wave of Internet: the Internet of People, Things and Services
- providing context-awareness for mobile and business services
- Socialtainment, integrating your social network into future (electrical) mobility
* Information Security
- establish measurable security for the sensor networks
- adaptable security for sensor-driven applications in traffic, eHealth
* Mobile Applications
- Monitoring Air Quality through mobile devices
- using mobile phones for health monitoring (and fun)
* Light-weight solutions for autonomous operations
- distributed logic for decentralised decision making
- light-weight software for autonomous operations
- semantic systems for advanced information handling in shipping
- in Norwegian
Disse foilene inneholder områder for masteroppgaver som kan gjennomføres ved UNIK, forskningsinstitutter ved Kjeller eller samarbeidene industri. Vi tilbyr masteroppgaver i området adaptive nett og informasjonssikkerhet.
Internet of Information and Services (IoIS): A Conceptual Integrative Archite...Antonio Marcos Alberti
Worldwide, hundreds of projects to redesign the Internet are in progress under the banner of the so-called Future Internet. Some argue that the most important thing is to the design to accommodate information exchanging, a.k.a. information-centrism. Others argue that the most important thing is to design to accommodate service-based applications. In this talk, we defend the idea that the most important thing is to design to integrate both aspects in a cohesive way. To do so, architectural blueprints should be able to solve indirections generally, to allow mobility and semantic rich search for services and contents, as well as location, hiring and dynamic invocation of services. We propose a single conceptual architecture capable of integrating the service- and information-centric approaches for the Future Internet. We call this approach as Internet of Information and Services (IoIS).
The Presentation focusses on the development from current mobile networks into the future sensor-driven mobile networks. A special focus is given on security aspects, especially measurable security of systems. The presentation was given at the IDC Mobility Series 2012 in Budapest.
The presentation provides an overview on areas for Master Thesis work at UNIK in the areas of Wireless Networks and Information Security (WNIS). Students from UiO, NTNU or any of our collaboration partners are invited to take contact to define a study in one of these areas. Some of these areas include:
* Radio communication, including
- Communication in the high North, advancing propagation models
- models and protocols for industrial sensor networks
- heterogeneous and adaptive networks
- Internet access and provision for emerging economies
* The 3rd wave of Internet: the Internet of People, Things and Services
- providing context-awareness for mobile and business services
- Socialtainment, integrating your social network into future (electrical) mobility
* Information Security
- establish measurable security for the sensor networks
- adaptable security for sensor-driven applications in traffic, eHealth
* Mobile Applications
- Monitoring Air Quality through mobile devices
- using mobile phones for health monitoring (and fun)
* Light-weight solutions for autonomous operations
- distributed logic for decentralised decision making
- light-weight software for autonomous operations
- semantic systems for advanced information handling in shipping
- in Norwegian
Disse foilene inneholder områder for masteroppgaver som kan gjennomføres ved UNIK, forskningsinstitutter ved Kjeller eller samarbeidene industri. Vi tilbyr masteroppgaver i området adaptive nett og informasjonssikkerhet.
Internet of Information and Services (IoIS): A Conceptual Integrative Archite...Antonio Marcos Alberti
Worldwide, hundreds of projects to redesign the Internet are in progress under the banner of the so-called Future Internet. Some argue that the most important thing is to the design to accommodate information exchanging, a.k.a. information-centrism. Others argue that the most important thing is to design to accommodate service-based applications. In this talk, we defend the idea that the most important thing is to design to integrate both aspects in a cohesive way. To do so, architectural blueprints should be able to solve indirections generally, to allow mobility and semantic rich search for services and contents, as well as location, hiring and dynamic invocation of services. We propose a single conceptual architecture capable of integrating the service- and information-centric approaches for the Future Internet. We call this approach as Internet of Information and Services (IoIS).
Traditional players fail at teaching tech to lawyers Legal scholars deliver academical lectures that are detached from
technical reality & day-to-day business constraints
Tech gurus provide aspirational talks that are disconnected from
the legal context
The Law Is Code Manifesto
We combine the best of law & tech to provide legal experts with hands-on, fun & interactive trainings
Our teachers are active practitioners & their combined expertise covers the whole spectrum of technology: software, hardware, networks, cybersecurity, data, eMarketing & artificial intelligence
Regulating Data: The Implications of Informatics on International LawJon Garon
Description: Because of the increasing ease of digitization, all information has the potential to be digitized and as such, all information is becoming part of a single, incomprehensibly large, multinational, multicultural data system. The resulting data ecosystem is subject to local regulation by state and national laws which have often been drafted to address a conflicting set of jurisdictional rules and normative expectations regarding the creation, ownership, collection, storage and dissemination of information. The laws vary from country to country, resisting efforts at bringing international harmony because of deeply rooted historical differences. The presentation is an overview of the steps necessary for developing a comprehensive informatics regulatory system that protects privacy, telecom policy and copyright.
Research Orientation towards Do-it-Yourself Internet-of-Things Mass Creativit...trappenl
Presentation at Pervasive 2010 "Research Orientation towards Do-it-Yourself Internet-of-Things Mass Creativity Concepts" by Marc Roelands, Marc Godon, Mohamed Ali Feki, Laurence Claeys, Pascal Zontrop, Johan Criel, Koen De Voegt, Marjan Geerts, Lieven Trappeniers,
Helsinki, Finland, May 2010
Public version of my presentation slide as guess lecturer at Politeknik Telkom, Bandung, May 4, 2013, discussing about "Internet of Things" Feel free to comment and/or download
Cyber Defence East Africa Summit 2015 invitation baipgroup
Cyber Defence East Africa Summit 2015 will take place on the 11-13th August, 2015 in Mlimani City, Dar es Salaam, Tanzania. For more information, please check the official conference website: www.cybersecurity.co.tz. Organisations interested in attending or sponsoring CDEA2015 are kindly invited to contact us at info@nrd.no.
Implementation of a Biometric Solution Providing Strong Authentication To Gai...Sylvain Maret
First- hand feedback on the implementation of identity management within a bank.
Technological choices ? Issues ? Concept and design, implementation, training and human aspects. A hands-on experience.
Presentation about research challenges and upcoming calls in Software and Services for the S-Cube workshop at the International Conference on Software Engineering, Zürich (Switzerland), 5 June 2012
This is the third part of a Future Internet Tutorial presented at IWT 2011. See: www.inatel.br/iwt
The Internet has invaded most aspects of life and society, changing our lifestyle, work, communication and social interaction and giving us expectations about new forms of interactions and access to global knowledge. Application and user demands on the Internet are increasing with mobile technologies and media content. Nevertheless, the Internet today is a complex agglomerate of protocols that inherits the grown legacies of decades of patchwork solutions.
There is a common consensus that the Internet needs improvement. Nevertheless, there is not yet a shared vision on how this may happen. As a direct consequence research programs have started worldwide to re-think traditional Internet design principles and to come up with new architectural concepts for the so-called Future Internet (FI).
The Future Internet Tutorial provides an overview of Future Internet research directions and trends. It presents the Future Internet research initiatives around the world and the efforts to establish experimental facilities for FI research. The tutorial gives an introduction to new Future Internet architectures that are currently under discussion and related technologies. Among the approaches discussed are addressing and routing concepts, adaptability, autonomicity, self-*, *-aware and manageability, virtualization, neutrality, openness, diversity, extendibility, flexibility and evolvability. The tutorial also presents some interdisciplinary aspects related to artificial general intelligence and bio-inspired ICT.
www.inatel.br/iwt
Presenting the works of the EU projects PrimeLife and ABC4Trust, on how to employ attribute-based credentials (at the Newcastle security forum). The slides are provided by IBM Research - Zurich, in particular Jan Camenisch, Gregory Neven and Anja Lehmann.
Traditional players fail at teaching tech to lawyers Legal scholars deliver academical lectures that are detached from
technical reality & day-to-day business constraints
Tech gurus provide aspirational talks that are disconnected from
the legal context
The Law Is Code Manifesto
We combine the best of law & tech to provide legal experts with hands-on, fun & interactive trainings
Our teachers are active practitioners & their combined expertise covers the whole spectrum of technology: software, hardware, networks, cybersecurity, data, eMarketing & artificial intelligence
Regulating Data: The Implications of Informatics on International LawJon Garon
Description: Because of the increasing ease of digitization, all information has the potential to be digitized and as such, all information is becoming part of a single, incomprehensibly large, multinational, multicultural data system. The resulting data ecosystem is subject to local regulation by state and national laws which have often been drafted to address a conflicting set of jurisdictional rules and normative expectations regarding the creation, ownership, collection, storage and dissemination of information. The laws vary from country to country, resisting efforts at bringing international harmony because of deeply rooted historical differences. The presentation is an overview of the steps necessary for developing a comprehensive informatics regulatory system that protects privacy, telecom policy and copyright.
Research Orientation towards Do-it-Yourself Internet-of-Things Mass Creativit...trappenl
Presentation at Pervasive 2010 "Research Orientation towards Do-it-Yourself Internet-of-Things Mass Creativity Concepts" by Marc Roelands, Marc Godon, Mohamed Ali Feki, Laurence Claeys, Pascal Zontrop, Johan Criel, Koen De Voegt, Marjan Geerts, Lieven Trappeniers,
Helsinki, Finland, May 2010
Public version of my presentation slide as guess lecturer at Politeknik Telkom, Bandung, May 4, 2013, discussing about "Internet of Things" Feel free to comment and/or download
Cyber Defence East Africa Summit 2015 invitation baipgroup
Cyber Defence East Africa Summit 2015 will take place on the 11-13th August, 2015 in Mlimani City, Dar es Salaam, Tanzania. For more information, please check the official conference website: www.cybersecurity.co.tz. Organisations interested in attending or sponsoring CDEA2015 are kindly invited to contact us at info@nrd.no.
Implementation of a Biometric Solution Providing Strong Authentication To Gai...Sylvain Maret
First- hand feedback on the implementation of identity management within a bank.
Technological choices ? Issues ? Concept and design, implementation, training and human aspects. A hands-on experience.
Presentation about research challenges and upcoming calls in Software and Services for the S-Cube workshop at the International Conference on Software Engineering, Zürich (Switzerland), 5 June 2012
This is the third part of a Future Internet Tutorial presented at IWT 2011. See: www.inatel.br/iwt
The Internet has invaded most aspects of life and society, changing our lifestyle, work, communication and social interaction and giving us expectations about new forms of interactions and access to global knowledge. Application and user demands on the Internet are increasing with mobile technologies and media content. Nevertheless, the Internet today is a complex agglomerate of protocols that inherits the grown legacies of decades of patchwork solutions.
There is a common consensus that the Internet needs improvement. Nevertheless, there is not yet a shared vision on how this may happen. As a direct consequence research programs have started worldwide to re-think traditional Internet design principles and to come up with new architectural concepts for the so-called Future Internet (FI).
The Future Internet Tutorial provides an overview of Future Internet research directions and trends. It presents the Future Internet research initiatives around the world and the efforts to establish experimental facilities for FI research. The tutorial gives an introduction to new Future Internet architectures that are currently under discussion and related technologies. Among the approaches discussed are addressing and routing concepts, adaptability, autonomicity, self-*, *-aware and manageability, virtualization, neutrality, openness, diversity, extendibility, flexibility and evolvability. The tutorial also presents some interdisciplinary aspects related to artificial general intelligence and bio-inspired ICT.
www.inatel.br/iwt
Presenting the works of the EU projects PrimeLife and ABC4Trust, on how to employ attribute-based credentials (at the Newcastle security forum). The slides are provided by IBM Research - Zurich, in particular Jan Camenisch, Gregory Neven and Anja Lehmann.
The European cyber security cPPP strategic research & innovation agendaEUBrasilCloudFORUM .
Presentation by Fabio Martinelli, CNR, National Research Council of Italy, representing the NECS project (European Network for Cybersecurity) at Cloudscape Brazil 2017
Presentation at Data protection in the Western Balkans and the Eastern Partnership Region. High-level exchange and learning week organised by SIGMA, GIZ, RCC and ReSPA.
Digital Platforms and Reference Architectures in Healthcare, Social care and ...OPEN DEI
Introduction – OPEN DEI Webinar "The role of the Reference Architectures in Data-oriented Digital Platforms"
28 May 2020
Giuseppe Fico (Assistant Professor in Biomedical Engineering)
The Internet of Things (IoT) aims to unify everything in our world under a common infrastructure, giving us not only control of things around us, but also keeping us informed about the state of things. Currently the IoT affects both the daily lives of all of us and the management of business processes, becoming a considerable asset for the world market.
This work is focussed on the analysis of IoT technologies state of the art and theirs trends in South Tyrol after 20 years of growth and expansion. The analisys is based on the bibliographic study of existing technologies both considering the market and the research context, through the systematic review of official company reports, comparisons with experts in the field, academic research documents and archives available online. The main objective of this work is to provide an overview of IoT technologies state of the art and their application in everyday life. In addition, the study also aims to give to the actors in the sector an idea of how the IoT technologies will progress in South Tyrol.
Returning to London for its sixth year next march this event is attracting significant interest. Join us at SMi Group's European Smart Grid Cyber Security 2016 conference & exhibition
20090327 Software Engineering -- What's in it for me?Arian Zwegers
Presentation about the opportunities for funding in Software and Services, esp in the FP7 ICT Work Programme, ITEA2, and Artemis, for the CSMR conference, Kaiserslautern (Germany), 27 March 2009
Internet of things_by_economides_keynote_speech_at_ccit2014_finalAnastasios Economides
Internet of Things forecast, economics, applications, technology, research challenges, sensor networks security, attack models, countermeasures, network security visualization
BA and Beyond 19 Autumn Event - Pieter-Jan Pauwels - Museum of Things for PeopleBA and Beyond
Pieter-Jan presented the results of Museum of Things for People, a research project at Design Museum Gent that investigated how Internet of Things can improve the museum visitor's experience. He explained the human, technological and legal impact.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. Introduction Jacques Bus
• 22 years in EU ICT research programmes
– Various organisational/IT jobs
– 4 yrs HoU Software Engineering
– Last 6 years HoU Trust and Security
• Since April 2010: Independent Advisor (DigiTrust.EU)
– Research Fellow Univ Luxembourg (SnT)
– Secretary General Digital Enlightenment Forum Asbl
www.digitalenlightenment.org
– Director Business Development Privacy & Identity lab
(cooperation RUN, UvT, TNO, SIDN): www.pilab.nl
DigiTrust.EU
– Senior Advisor Center for Science, Society and
Citizenship (CSSC) www.cssc.eu
– Advisor to other projects: TDL, ABC4Trust, …
3. Content
• Introduction to EC
• Research and Technology Development
• Competitiveness & Innovation
• European Institute of Technology - ICT Lab
• Future RTD and Innovation (Horizon 2020)
DigiTrust.EU
4. Introduction to EC
EU Council
EU Parliament
DGs & Serv Independent
Agencies/Bodies
Sec Gen
ENISA
EU Commission
DIGIT
Home Affairs
Justice EIT
DigiTrust.EU
Research European Data
INFSO Protection
Enterprise Supervisor
EC DP Off
5. Current RTD for Trust, security, privacy ...
• In FP7 ICT Theme
– mostly in “Trust and Security” unit (INFSO/F5).
Obj. 1.4 Trustworthy ICT
– Some activity also in eGovernment and
eHealth activities, or in Future Internet and
Data management of ICT Theme (DG INFSO)
• In FP7 Security Theme in the context of
civil security. Also studies on interaction
DigiTrust.EU
between Security and Privacy (DG
Enterprise)
6. Trustworthy ICT: 58 Trust & Security projects in FP7
200 m€
Network Identity management, Services
infrastructures privacy, trust infrastructures
4 projects 8 projects 4 projects
7 projects 40M€ 5 projects 60M€ 7 projects 48M€
Critical Infrastructure Protection 9 projects 20M€
Enabling technologies
Biometrics, trusted computing, cryptography, secure SW 4 projects
4 projects 27M€
Networking, Coordination and Support
Research roadmaps, metrics and benchmarks, 4 projects
5M€
international cooperation, coordination activities 2 projects
••• 6
Foil from INFSO/F5 with thanks
7. FP7-ICT Call 8: Trustworthy ICT
26/7/2011 –17/1/2012
80 M€
a) Heterogeneous networked, service and computing environments
70 M€
Min. 50% IPs
b) Trust, eIdentity and Privacy management infrastructures Min. 30% STREPs
c)Data policy, governance and socio-economic ecosystems
d) Networking and coordination activities
Max. 10 M€
NoE, CSA
Evaluation done and results expected in April
••• 7
Foil from INFSO/F5 with thanks
8. Identity management, privacy, trust
ABC4TRUST Attribute-based Credentials for Trust
ENDORSE Legal Technical Framework for Privacy Preserving Data Management
GINI-SA Global Identity Networking of Individuals - Support Action
PICOS Privacy and identity management for community services
PrimeLIFE Privacy and identity management in Europe for life
PRISM Privacy-aware Secure Monitoring
SWIFT Secure widespread identities for federated Telecommunications
TAS3 Trusted architecture for securely shared services
uTRUSTit Usable TRUST in the Internet of Things
Foil from INFSO/F5 with thanks
9. TAS3
Trusted Architecture for Securely Shared Services
Obj: Platform for management of personal information,
(generated over a human lifetime), collected & stored
at distributed locations and used in a multitude of
business processes.
• Trusted architecture and set of adaptive security
services which preserves privacy and confidentiality in
dynamic environments and enables:
• complex and highly versatile business processes,
• dynamic user-centric management of policies,
• end-to-end secure transmission of personal information
and user-controlled attributes between heterogeneous,
DigiTrust.EU
context dependent and continuously changing systems.
• Deployment trials in regional service platforms
– Mainly in employment services, and health platforms
10. ABC4Trust
Attribute Based Credentials for Trust
Obj: Federation and interchangeability of
technologies that support trustworthy yet
privacy-preserving ABC.
• Abstraction of concepts, unification of features
• Common unified architecture
– Independent of specific technologies
– Federation of privacy ABC systems (ip: U-prove,
Idemix)
DigiTrust.EU
– Interoperability between different technologies
• For users SP’s and IP’s (no lock-in)
11. Competitiveness and Innovation
(CIP ICT-PSP)
A funding programme in support of trials and demonstrations
using available new technology
• Large Trials:
– STORK (interopable eID in Europe)
– EPSOS (European patient health records)
– SPOCS (Support EU cross border Service Regulation)
– PEPPOL (European eProcurement)
• Networks and coordination:
– BEST (biometrics for authentication)
– PrivacyOS (use of privacy enhancement technologies)
– SEMIRAMIS (secure data storage in public organisatons)
– SSEDIC (platform for Single European Digital Identity Community)
DigiTrust.EU
Also smaller trials in related fields.
Next Calls DL end May 2012 (WP 2012-2013)
12. STORK - Large Scale Pilot
Obj: Framework for providing EU-wide eID
interoperability on top of existing MS systems
• Now 18 MS, 26 Mi funding in 3 phases:
– Common specifications
– Implementation and deployment
– Piloting
• Cross-border authentication platform for e-Services
• Safer Chat
• Student mobility
DigiTrust.EU
• Electronic delivery
• Change of address
• A2A between EU-ECAS and MS authentication
13. EC internal authentication: ECAS
• European Commission Authentication
Service
• Implemented by DIGIT
• Used for external access to EC research
system
• Meant to evolve in cooperation with STORK
into interoperability with MS eID systems
DigiTrust.EU
14. European Institute of Technology
EIT started early last year.
Three Knowledge and Innovation Communities (KIC’s), more coming
1. Climate
2. ICT Labs
3. Innovation in Energy
Supports innovation aspects of existing industry projects.
Consists of group of labs in Europe (Virtual Lab) and partners.
Thematic action lines in ICT Labs:
DigiTrust.EU
Smart spaces; Smart energy systems; Health & Well-being; Digital
Cities of future; Future media & content; delivery, Intell mobility
and transport; Trust and Security
15. Horizon 2020 (2014 – 2020)
EU Strat. FW for Res and Innov, incl: RTD, CIP and EIT
• Excellent Science: ERC, FET, Marie Curie, Research Infrastructures
• Industrial Leadership: in enabling and industrial technologies (ICT,
nano, materials, biotech, adv manufacturing, space and cross-
cutting)
• Societal Challenges:
– Health, demographic change and wellbeing
– Food security, agriculture, marine&maritime, bio-economy
– Secure, clean and efficient energy
– Smart, green and integrated transport
– Climate action, resource efficiency and raw materials
– Inclusive, innovative and secure societies
DigiTrust.EU
• New SME instrument (alike US-SBIR)
– Support of innovative ideas
– only SME apply (possible with others, but lead by SME)
– different phases (feasibility, project, follow-up)
16. The DIGITAL ENLIGHTENMENT FORUM will provide a broad framework for
debate and guidance on the rapid technological changes and their perceived
impact on society and its governance. It will take reference from the
Enlightenment period, as well as from intervening transformations and
evolutions. It will view digital technologies and their application with a fully
open mind so as to prevent carelessly sweeping away values.
www.digitalenlightenment.org
Digital Enlightenment Forum is a follow-up to the RISEPTIS report and established
by a core group of RISEPTIS members
17. Founding Members:
Jacques Bus - Advisor DigiTrust.EU - [Secretary General]
Kim Cameron – Microsoft Distinguished Engineer - [Member of Executive Board]
Malcolm Crompton – Managing Director IIS
Willie Donnelly – Vice President Research, Waterford Institute of Technology
Mireille Hildebrandt – Professor at Erasmus University, Rotterdam
George Metakides - Professor at University of Patras – [President]
Elly Plooij – van Gorsel – Former MEP - [Treasurer]
Reinhard Posch – Professor at Graz University, CIO Austria
Kai Rannenberg – Professor at Goethe University Frankfurt
18. Activities:
- Yearly high level Forum (Luxembourg, on invitation)
- Provide a platform for multidisciplinary discussion through:
- Workshops, Seminars, conferences
(one on 31 Oct in Paris on the future of European eID)
- Web-based discussion and blogs
- Publications
Digital Enlightenment Forum is a not-for-profit association,
based in Luxembourg, financed by sponsoring and donations
19. Thank you
QUESTIONS?
JB@DIGITRUST.EU
DigiTrust.EU
WWW.DIGITRUST.EU