3. Examples of FP7 Project Research
Security in Network Infrastructures
– Resilience of and across heterogeneous networks
– Data gathering & analysis for preventing cyber threats
Security in service architectures
– Assuring security level and regulatory compliance
– Specification and validation of trust and security of SOAs
User-centric identity and privacy management
– In Future Networks and Services (Future Internet)
– Trusted SOA enabling user-centric data management policies
– Privacy-preserving network monitoring
Critical Infrastructure protection
– Interactions and complexity in ICT with other infrastructures
– Secure and resilient information and process control systems
Enabling technologies
– Crypto; Trusted Computing; Biometrics
– Secure software and software assurance
4. Priority areas for
Trustworthy ICT in WP09-10 (Call closed Oct 09)
90 M€
Call 5
•Privacy protecting interoperable
•Securing the FI
services on the FI
•Monitoring and managing threats
Trustworthy Network Trustworthy Service
•Interoperable frameworks for identity
•Trustworthy infrastructures & virtual IP,
Infrastructures Infrastructures
management for persons and objects
entities min 40m€(user-centricity, privacy).
•Experimentation – Socio-economics •Managing trustworthiness throughout
life-cycle of service infrastructures
•Experimentation – Privacy, user-
centricity and socio-economics
• In the network (control, things, malware)
• For services (ID and privacy mgt tools, risk mgt)
STREPs, Technology and Tools for Trustworthy ICT
• For data management (integrity, availability, long term storage,…)
min 24m€ • Software assurance, secure software engineering
• Enabling technologies (biometrics, crypto, …)
Threats and vulnerabilities, Security and resilience in software and services,
CAs, NoEs Economics of security, Interoperable standards, certification, Legal and
Networking, Coordination and Support
max 10m€ societal aspects of technology, International cooperation
6. Th Digital Data Explosion
e Lo
ng
business, personalized T ail
applications and services. In
clouds for SAAS, …
citizens, to communicate and
interact, improve the quality of
their life (Web 2.0)
governments to service citizens
and business (e-ID, e-government,
e-education or e-health)
Linked Data
w
ado
al Sh
Digit
Governments: provide public security
(against crime or terrorism)
7. Trusted & Smart “everything”
Digital
DVC STB Game Machine
Living
TV
PC
Energy
Space
Networks Audio
Smart
DVD
Telephone
Future Internet
Transport eHealth &
Networks Health
networks
8. “Future Internet Assembly”
A call for EU action
The Future Internet: an opportunity for Europe
Cooperate to exploit European strength (telecom, research,
societal freedom, stability, multi-culturalism)
Competitiveness for small business, through standard platforms
Social acceptance and trustworthiness
But it requires:
“Complexity management” and open innovation
Ecosystem of consumers and suppliers (up- and down-stream)
and technologists and law makers
Reducing fragmentation of efforts;
Bridging the gap between technology and applications
9. Three strategy lines
1. Greater coordination of on-going EU R&D
activities
Look for higher impact and take-up of results
Articulate cross-cutting activities with policy requirements
2. PPP complementing the FP7-ICT WP
activities
Bridge the gap between the technologies and key application
sectors (energy, health, transport, etc)
Address large scale demonstration settings
Involve new actors and innovation opportunities
3. A Forum of Member States
Further develop a Europe wide strategy on Future Internet
Share best practices and reduce fragmentation
10. Security, Privacy, Trust
Interplay in the Information Society
• Complexity, ease of use
• Role of end-users
• Society-protecting business models
Technology & End-Users &
Innovation the Society
Trustworthy
• Global ICT - national “frontiers”
frontiers”
Information • Security, privacy, identity
• “Economics of security”
security” Society? • Protection of human values
• Policies for privacy-respecting
privacy- • Transparency, accountability
Trust and Identity? • Auditing and Law enforcement
Policy & Regulation
12. RISEPTIS Advisory Board
Research and Innovation in SEcurity, Privacy and
Trustworthiness in the Information Society
Objective: provide visionary guidance on policy and research
challenges in the field of security and trust in the Information
Society.
Chair: George Metakides (U Patras, CTI)
Members: Dario Avallone(Engineering), Giovanni Barontini (Finmeccanica), Kim
Cameron (Microsoft), William Dutton (Oxford Internet Institute), Anja Feldmann
(Deutsche Telekom), Laila Gide (Thales), Carlos Jimenez (Secuware), Willem Jonker
(Philips), Mika Lauhde (Nokia), Sachar Paulus (U. Brandenburg, ISSECO), Reinhard
Posch (CIO GOV. Austria, TU Graz, A-SIT), Bart Preneel (KU Leuven), Kai
Rannenberg (U. Frankfurt, CEPIS), Jacques Seneca (Gemalto);
Observer: Peter Hustinx (Observer)
Support: Willie Donnelly (WIT), Keith Howker (WIT), Sathya Rao (Telscom), Michel
Riguidel (ENST), Neeraj Suri (U. Darmstadt)
Jacques Bus, Thomas Skordas, Dirk van Rooy (EC)
13. Stimulating Research and Technology Development
In view of economic, societal and legal viability
Priority Fields:
Trustworthy network, service and computing
environments (incl. FI)
Trust, privacy and identity management
frameworks
Engineering principles and architectures for
trustworthiness (metrics, crypto, secure SW, …)
Data and policy governance, socio-economic
aspects, liability, management
14. Public-Private large scale projects advancing a
Trustworthy Information Society
Common EU framework for
identity and authentication
management as an essential
building block
Other possibilities could be:
– Next generation social networks
(privacy, interoperability)
– EU-wide legally accepted electronic documents
on various media
– European trustworthy Cloud infrastructure
15. Technology, Law and Jurisdiction
An ecosystem of technology and law
for data protection, privacy, consumer
protection and related policy and
regulation, ensuring a smooth
transposition of European values into
digital life
International cooperation to promote
the development of standards,
interoperability frameworks and
procedures to control cyber crime and
promote trust in the Information Society
17. EU - International Cooperation Actions
EU-US Seminars on Dependability and Security
15-16 Nov 2006, Dublin, IRL
26-27 April, Urbana, Champaign, Illinois, US
INCO-TRUST 30 months, 830 K€ EC funding
International Cooperation in ICT Security & Trust
(USA (NSF, DHS), Japan, Australia, Canada, S. Korea)
Security, Privacy and Trust in Large-scale global Networks
Workshop Madrid, 31/4-1/5 2009
Next workshop: US April 2010
Ongoing seminars in broader context:
EU-Japan, 2008, 2009
EU-South Korea, Brussels Nov 2008
Further extension being worked on:
Brazil – joint Call in 2010
South Africa – still to be discussed
18. International Cooperation
Instruments
Joint Seminars, discussing priorities and joint
research agenda
Cooperation between ongoing FP7 ICT
projects and 'partner-projects' funded in other
industrialised countries
Joint or coordinated calls