SlideShare a Scribd company logo
IBBT security departement
        security, privacy and trust of E-*




                                Wouter Joosen

                      IBBT - COSIC – DistriNet – ICRI
                         3/05/2011, We-BBT Brussel
enhance the leading position
of ICT-security research in Flanders
essential objectives:
   • perform first class basic and applied research in key
     areas from ICT security (core)
   • transfer the acquired basic knowledge into the economy
     (traditional notion of valorization)
   • lower the cost of regulatory compliance of new
     hardware, software and applications (specific:
     valorization)
   • contribute actively to training of undergraduate and PhD
     students, and of industry (valorization too)
not too different from IBBT as a whole
ICT security research:
context, application and technology trends
1. security research – a strong tradition in Flanders.
2. security is directly related to dependability, and to
   trustworthiness – trustworthiness will remain essential
3. security cannot be achieved as an after-thought;
   core to software applications and the development &
   deployment processes (engineering)
4. security problems arise anywhere in systems (not only
   at front- and backdoors):
   end-to-end quality is required.
5. trustworthiness requires full life-cycle support
   (management support)
security, privacy and trust of E-*
• Many Future Internet Applications need the solutions:
  being dependable, secure and trustworthy…

• For example: Future health – Future Media <IP TV and
  video on demand> - Smart grids - Smart infrastructures
  – Mobile applications – Telematics – V2V..
security expertise (1/2)
• secure programming languages (Clarke, Piessens, Joosen)
• security middleware and component frameworks (Piessens, Desmet, Joosen)
• secure development process (Scandariato, Joosen)
• security monitoring and management (Desmet, Huygens, Joosen)
• security for computer networks and pervasive systems
 (Verbaeten, Huygens, Preneel, Verbauwhede)
• security for ad-hoc and wireless networks (Preneel, Verbauwhede)
• privacy enhancing technologies, identity management (De Decker, Preneel)
• cryptographic software and software obfuscation (Piessens, Preneel)
• cryptographic hardware and embedded systems (Verbauwhede, Preneel, Rijmen)
• document security, watermarking and perceptual hashing (Preneel)
• trusted computing (Verbauwhede, Preneel)
• legislation, compliance & policy(Dumortier)
security expertise (2/2)
• cryptographic algorithms and protocols, foundations of cryptography and
  provable security (Rijmen, Preneel)
• risk management (Huygens. Joosen)
• authorisation technologies (Piessens, Joosen, Desmet)
• secure system software (Piessens, Joosen)
• HW implementation of DRM, watermarking and perceptual hashing
 (Verbauwhede, Preneel, Rijmen)
• side-channel attacks and countermeasures (Verbauwhede, Rijmen, Preneel)
• embedded biometry (Verbauwhede, Tuyls)
• security for RFID’s, smart-cards, sensor nodes (Verbauwhede, Batina, Preneel,
 Huygens, Joosen)
• evaluation of system security, including requirements, security
  architectures, software, hardware, cryptographic libraries and smart
  cards (All)
“one stop shop for
ICT security research”
track record – a sample
• about 20 FP6/FP7 projects that relate to trust and security
  (a separate chapter in the Framework Programmes, “alongside” for
  example infrastructures and service engineering)
• featuring some NoE’s:
   • Cryptology, Bart Preneel from COSIC is currently
     coordinating ECRYPT II (Network of Excellence on
     Cryptology), which is a successor to ECRYPT.
   • Software and Software Engineering: Wouter Joosen
     (DistriNet) currently is the Research Director of NESSoS:
     Engineering Secure Software and Systems for Future
     Internet Services.
• in the security and data protection area, ICRI also in a
  number of FP7-projects, such as PICOS, TURBINE, TAS3
  and Primelife.
track record: Rijndael/AES
track record - valorization
home of many succesfull industry training courses
  (e.g. secappdev.org)

home of the AES cryptography standard

home of some strong spin-off companies
• Utimaco
• Ubizen (now part Verizon Business Solutions)
   • Checkout Market Analysis for Managed Security
     Solutions: 2009, 2010
research focus
For the business – applied to many hot application
domains:
1. Assurance, compliance of new applications, typically
   Future Internet Services
  a. Cloud computing (the next big one after SOA)
  b. IoT and embedded software and systems
2. Very long term: Enabling Cost and Risk Assessment

For Society: focus on
1. Privacy (Social Networks) – SBO SPION
2. Long Term: Cybercrime



                                                          11
research focus - progammes

•   Embedded Security
•   Privacy and identity Management
•   Secure Software
•   Security in the engineering process
•   Legal Research
•   Distributed (Internet) Software
    • (middleware)


• What does it mean?
one example: Bravehealth (FP7-IP 2010-2013)
The BRAVEHEALTH system will enable the integration of services provided by mobile
resources, legacy applications, data and computing intensive services within a mobile
grid to offer personalized e-health services to mobile, nomadic, stationary users.
another example: NextGenITS (IBBT/ICON)
 privacy preserving electronic toll
GPS Satellites         Fee Calculation                   Service Provider     Driver
                                 OBU       Updates

                 GPS                         GSM

                                         Fee Reporting                 Bill


                                                   Encrypted Location Data

 •   only final fee transmitted to Service Provider
 •   only driver has access to location data
 •   authenticity of reported fee and location data
 •   confidentiality of communications
structure of the department




                              15
security united >140 FTE’s

COSIC                      DistriNet                  ICRI
                                                      Prof. Jos Dumortier
Prof. Bart Preneel         Prof. Dave Clarke
                                                      Prof. Peggy Valcke
Prof. Vincent Rijmen       Prof. Bart De Decker
Prof. Ingrid Verbauwhede   Prof. Christophe Huygens   2 postdocs
Prof. Claudia Diaz         Prof. Wouter Joosen        15+ junior researchers

                           Prof. Frank Piessens
7 postdocs
40+ junior researchers     Prof. Yolande Berbers
                           Prof. Tom Holvoet
                           Prof. Bart Jacobs

                           15 postdocs
                           50+ junior researchers
collaboration between departments: obvious
overlapping expertise and interest in enabling technologies
(FIA) – enabling service platforms
- Telecom SOA (TCASE, WTE+) + (CSEMAP)
- Cloud Computing (CUSTOMSS) + (DREAMaaS, PUMA)

strategic application domains include
- Future Health (EHIP, Share4Health)
- E-Media (CUPID)
- Telematica (NextGenITS)
- Logistics (MultiTr@ns, DEUS, Admid)
- E-government (IDEM) +(CSEMAP)
- …
                                                        17
partnerships
research partners:
•   European universities: Cambridge University, ENS Paris, T.U.Graz, T.U.Eindhoven, R.U.Bochum,
    Danish Technical University, EPFLausanne, TUDarmstadt, ULancaster, TCD Dublin, UTwente,
    Univ. Trento, Open University (UK), ESRC Centre for Analysis of Risk and Regulation (Londen
    School of Economics), Tilburg Law and Economics Center (Tilburg University), Institute for
    Information Law (IViR) (Universiteit Amsterdam), Institute for European Media Law (EMR,
    Germany), Hans Bredow Institute (Germany), Wissenschaftliches Institut für Infrastruktur und
    Kommunikationsdienste (WIK, Germany), Helsinki Institute for Information Technology (HIIT,
    Finland).
•   universities outside Europe: Brown University, Korea University, Virginia Tech, Mc Gill University,
    University of Colorado at Boulder (USA), Annenberg School of Communications at Penn State
    University (USA), Center for Information Policy Research of the University of Wisconsin (USA),
    the University of Technology Sydney (Australia) and Hitotsubashi University (Japan).


strategic partners:
•   Flemish companies (or companies with a strong representation in Flanders):Agfa (e-health),
    Alcatel-Lucent, Barco, Belgacom, Telenet, VRT
•   European companies: Orange Labs (telecommunications), STMicroelectronics (microelectronics),
    Gemalto, Giesecke & Devriendt (smart cards), Irdeto and Nagra (content protection), Philips, SAP,
    Siemens(HQ), Thales, ATOS and Docomo Labs.
•   International Industry Research Labs Microsoft, Google, and IBM; Sony and Hitachi.


                                                                                                   18
conclusion

• nature of the department: highly interdisciplinary in itself
• critical mass beats (most – all?) of the European competition

• international recognition is a fact
• track record: long term and versatile

• stable base for sustained success
  ..no matter what the buzz words are or will be

More Related Content

PDF
Introductory Presentation on COMNET Aalto Department
PDF
SMi Group's 5th annual European Smart Grid Cyber Security conference
PDF
Priorities for Research on Current and Emerging Network Technologies
PDF
Department of Information and Communication Technologies (DTIC- UPF) in a nut...
PDF
Overview on Smart City: Smart City for Beginners
PDF
Department of Information and Communication Technologies. Univ. Pompeu Fabra,...
PDF
skills 4 cloud
PPT
Process Protection Lieu Final
Introductory Presentation on COMNET Aalto Department
SMi Group's 5th annual European Smart Grid Cyber Security conference
Priorities for Research on Current and Emerging Network Technologies
Department of Information and Communication Technologies (DTIC- UPF) in a nut...
Overview on Smart City: Smart City for Beginners
Department of Information and Communication Technologies. Univ. Pompeu Fabra,...
skills 4 cloud
Process Protection Lieu Final

What's hot (19)

PPT
0 110211-cluster-panel-inter-isp
PDF
Department of Information and Communication Techn - UPF, Barcelona in a nutshell
PDF
UniSA ITR 25 Years Booklet Final
PPTX
Open Access, Preservation and eGovernment
PPT
1.5
PDF
Codesign Athens Course Gentes
PDF
Ethical Guidelines for undertaking ICT research in FP7
PPTX
Cloud views2010
PPTX
Bild 1
PDF
Multimedia Communications Lab (KOM) - TU Darmstadt - Research Overview
PPTX
9780840024220 ppt ch02
PPT
Aparsen panel on trust at ipres 2012
PDF
An overview on application of machine learning techniques in optical networks
PDF
cv Matteo Fici eng
PDF
Seserv athens-workshop-brief-report
PDF
PDF
Trend Internet of Things
0 110211-cluster-panel-inter-isp
Department of Information and Communication Techn - UPF, Barcelona in a nutshell
UniSA ITR 25 Years Booklet Final
Open Access, Preservation and eGovernment
1.5
Codesign Athens Course Gentes
Ethical Guidelines for undertaking ICT research in FP7
Cloud views2010
Bild 1
Multimedia Communications Lab (KOM) - TU Darmstadt - Research Overview
9780840024220 ppt ch02
Aparsen panel on trust at ipres 2012
An overview on application of machine learning techniques in optical networks
cv Matteo Fici eng
Seserv athens-workshop-brief-report
Trend Internet of Things
Ad

Viewers also liked (20)

PDF
Japanese paper
PDF
Benoit Felten - The Universal Connectivity Revolution
PDF
Ad Ketelaars - Services offered over municipal network
PDF
20081114 Friday Food iLabt Ingrid Moerman
PDF
Brokerage2006 grid computing in de industrie ervaringen uit media productie
PDF
2008 Brokerage 02 Test Beds And Living Labs [Compatibility Mode]
PPTX
MamaBear Family Tech Conference: Paid Acquisition for Startups
PDF
2008 brokerage 06 multimodal logistics [compatibility mode]
PDF
I Minds2009 Kpi Ware
PPT
Presentation Powerpoint
PDF
Acknowledge 07 Automated Retrieval And Categorization Of Texts In An E Learni...
PDF
Crsm 6 Crsm 2009 Filip Louagie The Flemish Cognitive Radio Research Cluster
PPT
03 Bart De Nil Situering Erfgoed 2 0
PPT
Syllable OS
PDF
Brokerage2006 wim dewaele ibbt een overzicht van 2 jaren werking & onze plan...
PDF
Erfgoed2 0 4 The Development Of Location Based Applications For The Public ...
PDF
Ddo5 Lieven Vermaele 20081017 Vermaele From Digital Dividend To Digital D...
PPTX
Jan Coppens - Acceleration & Internationalization
PDF
Ecrea3g Shameen Mahmud Ppt
PDF
I Minds2009 Amy Shuen What Is Web 2 0
Japanese paper
Benoit Felten - The Universal Connectivity Revolution
Ad Ketelaars - Services offered over municipal network
20081114 Friday Food iLabt Ingrid Moerman
Brokerage2006 grid computing in de industrie ervaringen uit media productie
2008 Brokerage 02 Test Beds And Living Labs [Compatibility Mode]
MamaBear Family Tech Conference: Paid Acquisition for Startups
2008 brokerage 06 multimodal logistics [compatibility mode]
I Minds2009 Kpi Ware
Presentation Powerpoint
Acknowledge 07 Automated Retrieval And Categorization Of Texts In An E Learni...
Crsm 6 Crsm 2009 Filip Louagie The Flemish Cognitive Radio Research Cluster
03 Bart De Nil Situering Erfgoed 2 0
Syllable OS
Brokerage2006 wim dewaele ibbt een overzicht van 2 jaren werking & onze plan...
Erfgoed2 0 4 The Development Of Location Based Applications For The Public ...
Ddo5 Lieven Vermaele 20081017 Vermaele From Digital Dividend To Digital D...
Jan Coppens - Acceleration & Internationalization
Ecrea3g Shameen Mahmud Ppt
I Minds2009 Amy Shuen What Is Web 2 0
Ad

Similar to Wouter Joossen - Security (20)

PPTX
Wouter Joossen - IBBT Security departement
PDF
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...
PPT
Intro: UBI-SERV
PPTX
SILECS: Super Infrastructure for Large-scale Experimental Computer Science
PPT
CTIT and Innovation, Iddo Bante
PDF
Jacques Bus F I I R L Presentation J B
PDF
RECAP at ETSI Experiential Network Intelligence (ENI) Meeting
PDF
Internet of things_by_economides_keynote_speech_at_ccit2014_final
PDF
Profile tulasi digital_health
PDF
TNS Living Lab by Yiouli Kritikou
PPTX
SILECS/SLICES - Super Infrastructure for Large-Scale Experimental Computer Sc...
PPTX
European Open Science Cloud: Concept, status and opportunities
PDF
Telecom security issues (Raoul Chiesa, day 1 )
DOCX
santoskumaarResume - updated
PPTX
Challenges of the io t v1
PDF
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
PDF
Trustless Computing Initiative
PDF
LTCI Information Communications Lab
PDF
Huawei 6 month industrail training program
PDF
H2020 project WITDOM overview
Wouter Joossen - IBBT Security departement
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...
Intro: UBI-SERV
SILECS: Super Infrastructure for Large-scale Experimental Computer Science
CTIT and Innovation, Iddo Bante
Jacques Bus F I I R L Presentation J B
RECAP at ETSI Experiential Network Intelligence (ENI) Meeting
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Profile tulasi digital_health
TNS Living Lab by Yiouli Kritikou
SILECS/SLICES - Super Infrastructure for Large-Scale Experimental Computer Sc...
European Open Science Cloud: Concept, status and opportunities
Telecom security issues (Raoul Chiesa, day 1 )
santoskumaarResume - updated
Challenges of the io t v1
Katastrophen-Einsatz-Überwachung mit survival sensor networks on IPv6
Trustless Computing Initiative
LTCI Information Communications Lab
Huawei 6 month industrail training program
H2020 project WITDOM overview

More from imec.archive (20)

PDF
iMinds-iLab.o, Open Innovation in ICT
PDF
Accio presentation closing event
PPTX
PRoF+ Patient Room of the Future
PPTX
Results of the Apollon pilot in homecare and independent living
PPTX
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
PDF
NMMU-Emmanuel Haven Living Lab
PDF
The Humanicité workshops
PPTX
A Real-World Experimentation Platform
PDF
ENoLL @ AAL Forum 2012
PDF
ENoLL 6th Wave Results Ceremony (Jesse Marsh)
PDF
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
PDF
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
PPT
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
PPT
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
PPT
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
PPT
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
PPTX
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
PPTX
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
PPTX
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
PPT
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
iMinds-iLab.o, Open Innovation in ICT
Accio presentation closing event
PRoF+ Patient Room of the Future
Results of the Apollon pilot in homecare and independent living
Delivery of feedback on Health, Home Security and Home Energy in Aware Homes ...
NMMU-Emmanuel Haven Living Lab
The Humanicité workshops
A Real-World Experimentation Platform
ENoLL @ AAL Forum 2012
ENoLL 6th Wave Results Ceremony (Jesse Marsh)
The Connected Smart Cities Network and Living Labs - Towards Horizon 2020 - K...
Apollon-23/05/2012-9u30- Parallell session: Living Labs added value
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 16:00 - Smart Open Cities and the Future Internet
Apollon - 22/5/12 - 11:30 - Local SME's - Innovating Across borders
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems
Apollon - 22/5/12 - 09:00 - User-driven Open Innovation Ecosystems

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Electronic commerce courselecture one. Pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Spectroscopy.pptx food analysis technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation theory and applications.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
MYSQL Presentation for SQL database connectivity
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
The AUB Centre for AI in Media Proposal.docx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Advanced methodologies resolving dimensionality complications for autism neur...
sap open course for s4hana steps from ECC to s4
Electronic commerce courselecture one. Pdf
MIND Revenue Release Quarter 2 2025 Press Release
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Spectroscopy.pptx food analysis technology
Spectral efficient network and resource selection model in 5G networks
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation theory and applications.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
MYSQL Presentation for SQL database connectivity

Wouter Joossen - Security

  • 1. IBBT security departement security, privacy and trust of E-* Wouter Joosen IBBT - COSIC – DistriNet – ICRI 3/05/2011, We-BBT Brussel
  • 2. enhance the leading position of ICT-security research in Flanders essential objectives: • perform first class basic and applied research in key areas from ICT security (core) • transfer the acquired basic knowledge into the economy (traditional notion of valorization) • lower the cost of regulatory compliance of new hardware, software and applications (specific: valorization) • contribute actively to training of undergraduate and PhD students, and of industry (valorization too) not too different from IBBT as a whole
  • 3. ICT security research: context, application and technology trends 1. security research – a strong tradition in Flanders. 2. security is directly related to dependability, and to trustworthiness – trustworthiness will remain essential 3. security cannot be achieved as an after-thought; core to software applications and the development & deployment processes (engineering) 4. security problems arise anywhere in systems (not only at front- and backdoors): end-to-end quality is required. 5. trustworthiness requires full life-cycle support (management support)
  • 4. security, privacy and trust of E-* • Many Future Internet Applications need the solutions: being dependable, secure and trustworthy… • For example: Future health – Future Media <IP TV and video on demand> - Smart grids - Smart infrastructures – Mobile applications – Telematics – V2V..
  • 5. security expertise (1/2) • secure programming languages (Clarke, Piessens, Joosen) • security middleware and component frameworks (Piessens, Desmet, Joosen) • secure development process (Scandariato, Joosen) • security monitoring and management (Desmet, Huygens, Joosen) • security for computer networks and pervasive systems (Verbaeten, Huygens, Preneel, Verbauwhede) • security for ad-hoc and wireless networks (Preneel, Verbauwhede) • privacy enhancing technologies, identity management (De Decker, Preneel) • cryptographic software and software obfuscation (Piessens, Preneel) • cryptographic hardware and embedded systems (Verbauwhede, Preneel, Rijmen) • document security, watermarking and perceptual hashing (Preneel) • trusted computing (Verbauwhede, Preneel) • legislation, compliance & policy(Dumortier)
  • 6. security expertise (2/2) • cryptographic algorithms and protocols, foundations of cryptography and provable security (Rijmen, Preneel) • risk management (Huygens. Joosen) • authorisation technologies (Piessens, Joosen, Desmet) • secure system software (Piessens, Joosen) • HW implementation of DRM, watermarking and perceptual hashing (Verbauwhede, Preneel, Rijmen) • side-channel attacks and countermeasures (Verbauwhede, Rijmen, Preneel) • embedded biometry (Verbauwhede, Tuyls) • security for RFID’s, smart-cards, sensor nodes (Verbauwhede, Batina, Preneel, Huygens, Joosen) • evaluation of system security, including requirements, security architectures, software, hardware, cryptographic libraries and smart cards (All)
  • 7. “one stop shop for ICT security research”
  • 8. track record – a sample • about 20 FP6/FP7 projects that relate to trust and security (a separate chapter in the Framework Programmes, “alongside” for example infrastructures and service engineering) • featuring some NoE’s: • Cryptology, Bart Preneel from COSIC is currently coordinating ECRYPT II (Network of Excellence on Cryptology), which is a successor to ECRYPT. • Software and Software Engineering: Wouter Joosen (DistriNet) currently is the Research Director of NESSoS: Engineering Secure Software and Systems for Future Internet Services. • in the security and data protection area, ICRI also in a number of FP7-projects, such as PICOS, TURBINE, TAS3 and Primelife.
  • 10. track record - valorization home of many succesfull industry training courses (e.g. secappdev.org) home of the AES cryptography standard home of some strong spin-off companies • Utimaco • Ubizen (now part Verizon Business Solutions) • Checkout Market Analysis for Managed Security Solutions: 2009, 2010
  • 11. research focus For the business – applied to many hot application domains: 1. Assurance, compliance of new applications, typically Future Internet Services a. Cloud computing (the next big one after SOA) b. IoT and embedded software and systems 2. Very long term: Enabling Cost and Risk Assessment For Society: focus on 1. Privacy (Social Networks) – SBO SPION 2. Long Term: Cybercrime 11
  • 12. research focus - progammes • Embedded Security • Privacy and identity Management • Secure Software • Security in the engineering process • Legal Research • Distributed (Internet) Software • (middleware) • What does it mean?
  • 13. one example: Bravehealth (FP7-IP 2010-2013) The BRAVEHEALTH system will enable the integration of services provided by mobile resources, legacy applications, data and computing intensive services within a mobile grid to offer personalized e-health services to mobile, nomadic, stationary users.
  • 14. another example: NextGenITS (IBBT/ICON) privacy preserving electronic toll GPS Satellites Fee Calculation Service Provider Driver OBU Updates GPS GSM Fee Reporting Bill Encrypted Location Data • only final fee transmitted to Service Provider • only driver has access to location data • authenticity of reported fee and location data • confidentiality of communications
  • 15. structure of the department 15
  • 16. security united >140 FTE’s COSIC DistriNet ICRI Prof. Jos Dumortier Prof. Bart Preneel Prof. Dave Clarke Prof. Peggy Valcke Prof. Vincent Rijmen Prof. Bart De Decker Prof. Ingrid Verbauwhede Prof. Christophe Huygens 2 postdocs Prof. Claudia Diaz Prof. Wouter Joosen 15+ junior researchers Prof. Frank Piessens 7 postdocs 40+ junior researchers Prof. Yolande Berbers Prof. Tom Holvoet Prof. Bart Jacobs 15 postdocs 50+ junior researchers
  • 17. collaboration between departments: obvious overlapping expertise and interest in enabling technologies (FIA) – enabling service platforms - Telecom SOA (TCASE, WTE+) + (CSEMAP) - Cloud Computing (CUSTOMSS) + (DREAMaaS, PUMA) strategic application domains include - Future Health (EHIP, Share4Health) - E-Media (CUPID) - Telematica (NextGenITS) - Logistics (MultiTr@ns, DEUS, Admid) - E-government (IDEM) +(CSEMAP) - … 17
  • 18. partnerships research partners: • European universities: Cambridge University, ENS Paris, T.U.Graz, T.U.Eindhoven, R.U.Bochum, Danish Technical University, EPFLausanne, TUDarmstadt, ULancaster, TCD Dublin, UTwente, Univ. Trento, Open University (UK), ESRC Centre for Analysis of Risk and Regulation (Londen School of Economics), Tilburg Law and Economics Center (Tilburg University), Institute for Information Law (IViR) (Universiteit Amsterdam), Institute for European Media Law (EMR, Germany), Hans Bredow Institute (Germany), Wissenschaftliches Institut für Infrastruktur und Kommunikationsdienste (WIK, Germany), Helsinki Institute for Information Technology (HIIT, Finland). • universities outside Europe: Brown University, Korea University, Virginia Tech, Mc Gill University, University of Colorado at Boulder (USA), Annenberg School of Communications at Penn State University (USA), Center for Information Policy Research of the University of Wisconsin (USA), the University of Technology Sydney (Australia) and Hitotsubashi University (Japan). strategic partners: • Flemish companies (or companies with a strong representation in Flanders):Agfa (e-health), Alcatel-Lucent, Barco, Belgacom, Telenet, VRT • European companies: Orange Labs (telecommunications), STMicroelectronics (microelectronics), Gemalto, Giesecke & Devriendt (smart cards), Irdeto and Nagra (content protection), Philips, SAP, Siemens(HQ), Thales, ATOS and Docomo Labs. • International Industry Research Labs Microsoft, Google, and IBM; Sony and Hitachi. 18
  • 19. conclusion • nature of the department: highly interdisciplinary in itself • critical mass beats (most – all?) of the European competition • international recognition is a fact • track record: long term and versatile • stable base for sustained success ..no matter what the buzz words are or will be