1 / 10

security in the openness

Changing the paradigm for security. EU policies. security. eEurope. science & technology. security in the openness. security in obscurity. Security and dependability in FP6. On-line privacy is a key requirement for mobile Information Society

arden
Download Presentation

security in the openness

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Changing the paradigm for security EU policies security eEurope science & technology security in the openness security in obscurity

  2. Security and dependability in FP6 • On-line privacy is a key requirement for mobile Information Society • There is a growing policy intereston technical developments on virtual identity, virtual persona, anonymity, etc. with related tensions and open questions • in IS the personal sphere of individualswould be more and more a technically open environment (AmI, instant networking, smart dust, etc.) • Privacy is a human right that we need to preserve and technologyshould work to avoid a privacy crisis • Security and dependability are key requirements for AmI - they embrace all the attributesand properties of “critical systems” • There is a growing policy intereston security and dependability of information infrastructuresand related interdependencies (economic security, protection of assets and IT investments, etc.) • The IST Advisory Grouphas identified dependabilityasan important topic for AmI - further reinforced after 9/11 • Focussing on dependabilityimplies stimulating an holistic reflection on our dependency on technology

  3. The need for a more integratedapproached in IST • The ISTAG report on Trust and security • To promote/support the migration to the AmI Space paradigm through ensuring rapid and effective communication within the Security community of latest understanding of requirements and options. • High-level advisory group • shaping the relevant programme and its content • being an enabler for the development of new markets • synergy from communication and cross-fertilisation among researchers • ERA dimension + international co-operation dimension

  4. Why an integrated approach to security in Information Society • ICT and applications are more and more pervasive to Society, leading to new types of and larger scale vulnerabilities • Economic and Societal interests go beyond technical security, as they relate to • business opportunities and growth: new business models, virtual enterprising, delocalised workforces, tailored services, digital asset management, economic value of knowledge, etc. • individual: privacy, confidentiality, intimacy, cyber-crime, protection of minors, ethics, etc. • society: new dependencies on volatile technologies, long lasting preservation of knowledge and culture, digital divide, etc. • governments’ recognition and power: interdependencies, critical infrastructures, national defence, social order, international governance, etc.

  5. Why an integrated approach to security in Information Society (2) • More and more intelligence and autonomy go in components/systems at lower and lower scale • large scale systems of casually networked and evolving embedded devices, • mobile codes in heterogeneous and mobile environments, • volatility of networks and service infrastructures • Security issues in the digital environment are global • geographical and jurisdictional boundaries disappeared • the ultimate basis for “trust” and the recognition of “powers” in the digital environments are changing - recognition of states is blurring, new and local “trusted third parties” emerge, etc. • easy, uncontrolled and unlimited access to potentially harmful technologies. • the scale of potential disruptions is global

  6. Example of potential co-ordinated actions in security Specific targeted research projects Securingmobileservices Personal trusteddevices Dependableinfra-structures Privacy National programmes & industrial investments NoE’s to generate knowledge and technologies SecuringContent Basic technologiese.g. crypto, biometrics,... IP’s to generate breakthroughs

  7. Building on Call 1 - S.O. 2.3.1.5 • 89 proposals - 21 IP, 9 NoE, 51 STREP, 8 Other. • Provisional results • 7 IPs on secure IPv6, secure personal devices, identity management, quantum crypto, biometrics, secure justice and secure travel documents; • 2 NoEs on advanced crypto and identity management; • 7 STREPs on secure justice, policy-based network protections, digital passport, smart cards, trust relations, biometrics and CIP. • Overall budget of ~76M€

  8. Constituency Building Derive Research DDSI WG-ALPINE Roadmaps Dependability policy support Active LossPrevention AMSD : Overall Dependability e-business embedded CIP privacy BVN Biometrics PAMPAS mobile privacy & security AMSD dependable embedded systems ACIP critical infrastruct. protection RAPID Privacy / Identity Mgmt RESET Smart Cards STORK Crypto Building on the Roadmap Projects

  9. WEB sites www.cordis.lu www.cordis.lu/ist www.cordis.lu/rtd2002 IST helpdesk Fax : +32 2 296 83 88 E-Mail : ist@cec.eu.int Instruments: http://www.cordis.lu/rtd2002/fp-activities/instruments.htm EoI: http://www.cordis.lu/fp6/eoi-instruments/ IRG Workshop on T&S http://www.cordis.lu/ist/events/workshops.htm ISTAG papers: ftp://ftp.cordis.lu/pub/ist/docs/istag_kk4402464encfull.pdf Roadmap projects: http://www.cordis.lu/ist/ka2/rmapsecurity.html T&S Workshops: http://www.cordis.lu/ist/ka2/rptspolicyconf.htm

More Related