University of Twente The Netherlands Centre for Telematics and Information Technology Fostering Trust A work package proposal for DESIRE Pieter Hartel,

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

Privacy-Enhancing Models and Mechanisms for Securing Provenance and its Use October 2010 Lead PI: Ravi Sandhu (UT San Antonio) PIs: Elisa Bertino (Purdue),
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Centre for Irish and European Security "Societal Security R&D” Perspectives, Conclusions and Recommendations from Workshop of July 1st 2010 Purpose of.
Risk Aware Decision Framework for Trusted Mobile Interactions September 2005 Daniele Quercia and Stephen Hailes CS department University College London.
Lecture 19 Page 1 CS 111 Online Protecting Operating Systems Resources How do we use these various tools to protect actual OS resources? Memory? Files?
TCPA TCPA TCPA T rusted C omputing P latform A lliance Saurabh Phansalkar.
How does a web-service’s apparent trustworthiness affect people’s intention to adopt? a.k.a. “Seal of Approval and Multidimensionality of Perceived Trustworthiness.
Next Steps toward More Trustworthy Interfaces Burt Kaliski, RSA Laboratories 1 st Workshop on Trustworthy Interfaces for Passwords and Personal Information.
Introduction Cloud characteristics Security and Privacy aspects Principal parties in the cloud Trust in the cloud 1. Trust-based privacy protection 2.Subjective.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
Privacy and Security Implications of Cloud Computing 17 November IGF Laurent Bernat - OECD.
Using Secure Coprocessors to Protect Access to Enterprise Networks Dr. José Carlos Brustoloni Dept. Computer Science University of Pittsburgh
International Workshop for Technology, Economy, Social and Legal Aspects of Virtual Goods 2004, May Ilmenau, Germany Licensing Structured Data.
A problem in IMS Learning Design To promote interoperability, few services Local tool frameworks like LAMS have much richer tool environment –Easy provisioning.
6/17/2015Lars Björnshauge1 The Next Generation of IRs – enabling closer cooperation & networking International Workshop on institutional repositories and.
June 11-13, 2003Michael Weiss, FIW 031 Feature Interactions in Web Services Michael Weiss Carleton University.
Trusted Computing Platform Alliance – Introduction and Technical Overview – Joe Pato HP Labs MIT 6.805/ October 2002.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
EHealth Challenges and Opportunities E-health: Multi-disciplinary of E (ICT) and Healthcare, or applied ICT in healthcare (Design oriented), or healthcare.
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Cloud Usability Framework
KYUSHUUNIVERSITYKYUSHUUNIVERSITY SAKURAILABORATORYSAKURAILABORATORY 1 Introduction of Sakurai Lab. Kyushu Univ. JAPAN.
Atif Iqbal, R. K. Bagga.  Appropriate mechanism for good governance with the involvement of Information Technology in the system of the government and.
Digital Catapult Paul Galwas #DigitalCatapult. Who are we? A national centre to rapidly advance the UK’s best digital ideas.
Identity Management Marco Casassa Mont Trusted E-Services Lab Hewlett-Packard Laboratories Bristol, UK June 2002.
Usability Studies Encryption Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech.
FaceTrust: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos, Kyungbaek Kim and Xiaowei Yang in collaboration with J.W.
3rd annual EHTEL Conference Dimitrios Venizeleas Relevance of Open Source for Health Research Dimitrios Venizeleas Coordinating centre for clinical trials,
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Porvoo7 – Reykjavík 26. May 2005 – Hótel Loftleiðir European Network of National Test-beds for eBusiness, ETeB The Porvoo Group 7th Seminar on Interoperable.
IST 2006 – 22/11/2006 Aljosa Pasic Atos Origin Security, Dependability and Trust in Service Infrastructures.
Mario Hoffmann (Chair) Fraunhofer Institute SIT, Germany Wang, Hu (Vice Chair) Huawei Technologies, China.
Chapter 14 Part II: Architectural Adaptation BY: AARON MCKAY.
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
Grid-based Future Internet with Wireless sensor network By Mohammad Mehedi Hassan Student ID:
Piemonte Workshop 1 11 September 2006 Paolo Salieri European Commission DG ENTR-H4 Security research in FP7.
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK
Interagency Collaboration: Transition’s Reality Show Sharon deFur Jeanne Repetto coe.ufl.edu.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
Astana Economic forum - May 2012 Prevention of corruption systems and institutional frameworks Francesco Checchi, UNDP Anti Corruption Specialist.
CSIIR Workshop March 14-15, Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
SRA Security “put the user in control” Sandro Etalle, TU/e Pieter Hartel, UT Inald Lagendijk, TUD.
Internet of Things in Industries
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
Trusted Operating Systems
Computer Science and Engineering 1 Mobile Computing and Security.
Doc.: IEEE /0098r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide Security Procedures Notice: This document has been.
INSERT PROJECT ACRONYM HERE BY EDITING THE MASTER SLIDE (VIEW / MASTER / SLIDE MASTER) Using WS-Agreement for Risk Management in the Grid European Commission.
Grid Deployment Technical Working Groups: Middleware selection AAA,security Resource scheduling Operations User Support GDB Grid Deployment Resource planning,
T Special Course in OS Security (Dan Forsberg) – Two possible steps from integrity-based remote attestation to the next level Property.
ARTEMIS Industry Association Title Presentation - 1 ASP 6 Report by: Sandro Etalle
The GEO-Label: a Service for Data Users and a Tool for Facilitating Societal Benefits of Earth Observations Hans-Peter Plag University of Nevada, Reno,
IoT R&I on IoT integration and platforms INTERNET OF THINGS
1 Enabling Smart Cities/Campuses to Serve the Internet of People Florence Hudson Senior Vice President & Chief Innovation Officer Internet2 TNC16 June.
The Division includes two lines of effort:
Bob Jones EGEE Technical Director
Information Security, Theory and Practice.
WP3 Security SQA INDIGO - DataCloud
Idea_Title (1/2) Privacy, Security & Trust Idea
Cloud & Developing Nations
Certificates An increasingly popular form of authentication
Smart Learning concepts to enhance SMART Universities in Africa
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
We secure the communication
Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services Marco.
Towards Accountable Management of Privacy and Identity Information
International context
Presentation transcript:

University of Twente The Netherlands Centre for Telematics and Information Technology Fostering Trust A work package proposal for DESIRE Pieter Hartel, Sandro Etalle Univ. of Twente, The Netherlands Alessandro Armando, Giorgio Delzanno Univ. of Genova, Italy Albert Levi, Sabanci University, Turkey. In cooperation with Siani Pearson, HP labs, Bristol, U.K. Anna Vaccarelli, IIT-CNR, Italy.

University of Twente The Netherlands Centre for Telematics and Information Technology Rationale  users: In the long run, people won’t use a system they don’t trust.  developers: need tools for designing systems that are trustworthy enough to use in new challenging situations. think of ad-hoc & home networks.

University of Twente The Netherlands Centre for Telematics and Information Technology Trust is about Confidence & Control  To boost trust we need to design trustworthy systems, that give the user a high degree of control. convey trustworthiness to the user, enhancing confidence.  Many conflicting aspects, e.g.: anonymity vs. accountability. ease of use vs. control. comfort vs. privacy.

University of Twente The Netherlands Centre for Telematics and Information Technology CONFIDENCE  Confidence in the system can be increased by providing tools for proving the trustworthiness of a system. formal methods are no luxury here. providing a trustworthy platform is often more practical than providing a secure one. providing tools for measuring trustworthiness & dependability. metrics, and user assessment tools. certification, by parties the user trusts. increasing the user’s awareness level.

University of Twente The Netherlands Centre for Telematics and Information Technology CONTROL  Control can be enhanced by providing tools that allow implementing accountability. making offending parties accountable. revocation of data access and use. confining and tracing personal data (could be addressed by RAPID, such technologies could be integrated). combination of existing technologies, e.g. OS compartmentalization. binding data to a platform and sealing it to a software environment (TCPA platform). data tagging, smartcards, etc…

University of Twente The Netherlands Centre for Telematics and Information Technology Related Initiatives  TRUST (IIT-CNR et al.) - can be part of Desire. Security. Formal methods. Biometrics.  RAPID. Privacy. Potential for leveraging industry involvement.  Wireless (sensor) networks - various initiatives. Including cooperation with Univ. of Rome,Prof. L.Mancini.

University of Twente The Netherlands Centre for Telematics and Information Technology Summarizing  Confidence and Control. are needed to foster the trust of the citizen in the system she has to use. crucial for the design of new technology.  Security cannot be an ADD-on, but have to be a design principle.