archive-nl.com » NL » I » IIPVV.NL

Total: 354

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Downloads | IIPVV
    Zoeken Sorteren op Datum Titel Volgorde A Z Z A Invulformulier Addendum NCSRA II Invulformulier NSCRA II Discussievoorbereiding schrijvers NCSRA II Workshop Bussines Social Life Op weg naar de 2e matchmaking day NCSRA II Workshop Business Social Life IIP VV over de NCSRA II Workshop Business Social Life 3 juli 2013 Inleiding NCSRA II Workshop Business Social Life 3 juli 2013 Factsheet Sentinels English Template Application Form in Word Call Cybersecurity NWO SBIR Cyber Security AgNL NWO Call for proposals Cyber Security English Presentatie Suzanne Verboon AgNL organisator Presentatie Jan Piet Barthel secretaris IIPVV NWO organisator Presentatie Dick Brandt voorzitter IIPVV PostNL middagvoorzitter Uitnodiging Matchmaking Factsheet Sentinels English 2011 Factsheet Sentinels Sentinels2 proposal IIP English Presentatie Reliable Food IIPVV ICTDelta 2010 Reliable Food Innovatieprogramma Projectplan 2009 Sentinels Program Report English Aanvraag Mijn Vitaminen PID regio Zuidoost Nederland 2008 Sentinels Call 3 English Terug naar selectie Agenda Vernieuwingsimpuls Informatiebijeenkomst Veni Vidi Vici 17 09 2015 Post HBO Cyber Security Management 30 09 2015 Privacy Forum 2015 07 10 2015 European Cyber Security Privacy Innovation Awards 22 10 2015 Kick off Alert Online 26 10 2015 Bekijk de volledige agenda Meer NCSRA II SBIR Cyber Security Hogeronderwijslijst HBO WO Winnaar DCSRA 2015

    Original URL path: https://www.iipvv.nl/nl/mediabank?media_type=174 (2015-09-07)
    Open archived version from archive


  • Downloads | IIPVV
    Presentatie Jan Piet Barthel Cyber security research in the Netherlands English Presentatie Eelco Stofbergen The Dutch approach to Cyber Sercurity and Research English Nederland maakt werk van Cyber Security Summary Nationale Cyber Security Research Agenda NCSRA with short overview of the 7 themes English Factsheet over de Nationale Cyber Security Research Agenda NCSRA National Cyber Security Research Agenda NCSRA English Terug naar selectie Agenda Vernieuwingsimpuls Informatiebijeenkomst Veni Vidi Vici 17

    Original URL path: https://www.iipvv.nl/nl/mediabank?media_type=173 (2015-09-07)
    Open archived version from archive

  • Site map | IIPVV
    Actueel Nieuws Agenda Reportages Vacatures Academic Transfer Vacatures Downloads IIPVV Programs Other Nieuwsbrief Terug naar selectie Agenda Vernieuwingsimpuls Informatiebijeenkomst Veni Vidi Vici 17 09 2015 Post HBO Cyber Security Management 30 09 2015 Privacy Forum 2015 07 10 2015 European Cyber Security Privacy Innovation Awards 22 10 2015 Kick off Alert Online 26 10 2015 Bekijk de volledige agenda Meer NCSRA II SBIR Cyber Security Hogeronderwijslijst HBO WO Winnaar DCSRA

    Original URL path: https://www.iipvv.nl/nl/sitemap (2015-09-07)
    Open archived version from archive

  • Algemene voorwaarden | IIPVV
    op grond van de toepasselijke wet en regelgeving is niet toegestaan De informatie op deze site is met grote zorgvuldigheid samengesteld Ondanks deze zorgvuldigheid kan informatie soms niet volledig zijn achterhaald worden door de wetenschap vatbaar zijn voor meerdere uitleg of zelfs onjuistheden bevatten STW aanvaardt enkele aansprakelijkheid voor schade als gevolg van het gebruik van de toegang tot of de onmogelijkheid gebruik te maken van de informatie noch zal STW aansprakelijk zijn voor eventuele onvolledige of onjuiste informatie Niet alle sites gelinkt aan deze site zijn door STW gecontroleerd en STW wijst dan ook iedere verantwoordelijkheid af voor de inhoud van zulke websites en sluit iedere aansprakelijkheid voor eventueel daaruit ontstane schade uit Gebruik maken van een link gebeurt geheel op eigen risico STW behoudt zich het recht voor om zonder vooraankondiging veranderingen aan te brengen op deze website Deze website met internetadres www iipvv nl en alle informatie die hieronder is geplaatst is gericht op inwoners van Nederland en niet daarbuiten Terug naar selectie Agenda Vernieuwingsimpuls Informatiebijeenkomst Veni Vidi Vici 17 09 2015 Post HBO Cyber Security Management 30 09 2015 Privacy Forum 2015 07 10 2015 European Cyber Security Privacy Innovation Awards 22 10 2015 Kick off

    Original URL path: https://www.iipvv.nl/nl/content/algemene-voorwaarden (2015-09-07)
    Open archived version from archive

  • Terms and Conditions | IIPVV
    text prevails unless explicitly stated otherwise The information and contact data on this website are emphatically not intended to be used for purposes outside the scope and interest of STW Without STW s written permission no data of this website may be included in databases relation files or products that serve such purposes Terug naar selectie Agenda Vernieuwingsimpuls Informatiebijeenkomst Veni Vidi Vici 17 09 2015 Post HBO Cyber Security Management

    Original URL path: https://www.iipvv.nl/nl/node/4722 (2015-09-07)
    Open archived version from archive

  • Contact | IIPVV
    are required You will receive a copy of this message Email info iipvv nl Back to selection Agenda Vernieuwingsimpuls Informatiebijeenkomst Veni Vidi Vici 17 09 2015 Post HBO Cyber Security Management 30 09 2015 Privacy Forum 2015 07 10 2015 European Cyber Security Privacy Innovation Awards 22 10 2015 Kick off Alert Online 26 10 2015 View the entire agenda Meer NCSRA II SBIR Cyber Security Hogeronderwijslijst HBO WO Winnaar

    Original URL path: https://www.iipvv.nl/en/contact (2015-09-07)
    Open archived version from archive

  • IIPVV
    on national policies and strategies and may ultimately contribute to a more secure cyber environment Speakers representing the United States of America Brazil Japan and The Netherlands EU are invited to share their RD I vision others are encouraged to react United States of AmericaAfter the introduction dr Douglas Maughan Department of Homeland Security DHS presented the cybersecurity research strategy of DHS and the process of transitioning technology He explained to what extent international R D cooperation could help in improving the national and international cybersecurity level Cybersecurity investments by DHS are roughly distributed in cybersecurity research done by universities 40 by companies 50 and by governmental agencies labs 10 Maughan is enthusiastic to get as many people around the table to discuss this subject as possible and states that collaboration works Dr Douglas Maughan Click here for the presentation pdf of Dr Douglas Maughan CSD Division Director Department of Homeland Security US BrazilVirgílio Almeida Secretary for Information Technology Policies of the Ministry of Science Technology and Innovation MCTI explained the R D strategy for cybersecurity and cyber defence in Brazil He stated that having a secure online environment is vital Strengthening Brazil s cybersecurity is a national priority His ministry works in close cooperation with the Ministry of Defence on cybersecurity R D questions In the last four years several multidisciplinary workshops were organised in Brazil to work out the cyber defence goals for the long term Brazil and the EU work closely together in research on security and privacy Both partnerships with large economic sectors like banking and telecom as well as collaboration with international research centers of universities working on cyber security are necessary He also stresses the importance of technical sovereignty Mr Virgílio Almeida Click here for the presentation pdf of Mr Virgílio Almeida Secretary of the Ministry of Science Technology and Inovation Brazil Japan Experiences in Japan are different but the motivation to cooperate internationally in PPP s is the same Ms Mari Ichikawa National center of Incident readiness and Strategy for Cybersecurity NISC sketched the situation in Japan listed the issues in information security R D and shared lessons learned in cybersecurity strategy on three different levels the ability to detect and defend cyber attacks the establishment of technology protecting industrial control systems and the development for new services to utilize big data Ms Ichikawa showed a scheme for international collaboration both on governmental level as well as research level Ms Mari Ichikawa Click here for the presentation of Ms Mari Ichikawa Counsellor for International Strategy National center of Incident readiness and Strategy for Cybersecurity Japan The NetherlandsMr Michel van Leeuwen Head of Cyber Security Policy NCTV Ministry of Security and Justice explains the role of the Dutch National Cyber Security Research Agenda NCSRA covering a part of the National cybersecurity strategy He stressed the importance of cybersecurity education and announced that the successor of the current PPP platform on security and privacy will apart from research have a strong focus on cybersecurity education Van Leeuwen is also excited about different opportunities to improve international cooperation in cybersecurity research development and innovation Mr Michel van Leeuwen and Dr Dick Brandt Click here for the presentation pdf Michel van Leeuwen Head of Cyber Security Policy Department of Cybersecurity NCTV NL After the four presentations the Indian delegation made a firm statement formulated by the National Cyber Security Coordinator Gulshan Rai about export controls engaging the private sector civil centers of excellence and the need to learn and exchange more Mr Gulshan RaiDick Brandt opens the broader discussions Many questions were raised and discussed by participants representing several countries Norway Indonesia Nepal the UK Belgium Switzerland and institutions European Cibercrime Center EC3 Technical University Delft and several companies Examples are how to get knowledge into the broad society engage as many international partners avoiding deconflictions i e working on the same research questions without knowing fixing the last mile from new knowledge into practical innovative solutions best practices like the Innovation Quarter Oxford center of cybersecurity continuity threats for government services and lessons learned the value of PPP in pre competitive R D etc Indonesian delegatesThis side event is organised by the Dutch platform IIP VV in cooperation with The Netherlands Organisation for Scientific Research www nwo nl Read more And the DCSRA 2015 winner is Out of Control Out of Control Overcoming Control Flow Integrity by Enes Göktas Elias Athanasopoulos Herbert Bos and Georgios Protokalidis is unanimously selected by the jury as excellent Dutch Cyber Security Research paper Click here for pictures of the best paper track and award ceremony pdf The paper is a product from the System Security group of the VU in Amsterdam and it is presented at ICT OPEN 2015 by its primary author Enes Göktas Out of control Overcoming Control Flow Integrity was first published in May 2014 at the IEEE Symposium on Security Privacy one of the most important and prestigious venues in security research The title nicely summarizes what the paper is about the hijacking of the control flow It demonstrates bypasses of several Control Flow Integrity CFI implementations In fact it was the first paper proving the limitations of state of the art CFI implementations in other words it underlined the inefficacy of some countermeasures on very sophisticated forms of attack René Penning De Vries Enes GöktasWinner DCSRAThe winner Enes Göktas receives the DCSR best paper Award from dr René Penning De Vries recently appointed by the Dutch minister of Economic Affairs as Dutch ICT Figurehead Johan Arts IBM Enes Göktas Bonus from IBMAlso a special bonus from IBM a 500 cheque for the team of authors responsible for the best cybersecurity paper is personally presented to the primary author and speaker by IBM Director Security Software Europe Johan Arts Highly impressed Three jury members international well respected professors in the cybersecurity research arena Thorsten Holz Germany Frank Piessens Belgium and Danilo Bruschi Italy individually ranked and collectively decided on the quality of the papers for the Dutch Cyber Security Research Award DCRSA They were highly impressed by the research results coming from The Netherlands During ICT OPEN 2015 invited presenters received a signed certificate for their paper presentation The Jury called Out of Control Overcoming Control Flow Integrity an excellent paper The paper triggered many researchers around the world to search for better solutions which are able to stop increasingly sophisticated attacks They concluded this is a very timely topic with very high impact resulting in further debate follow up research and follow up papers This debate under researchers is still going on From left to right Johan Arts IBM Erik Bosman VU Ruben Niederhagen TUE Enes Göktas VU Peter Schwabe Radboud Boris Skoríc TUE René Penning De Vries ICT Team Jan Piet Barthel NWO IIP VV More information about the DSCRA Click here for the Jury report pdf https www iipvv nl en content announcement nominations dcsr award https www iipvv nl en content dutch cyber security research award ictopen 2015 Inald Lagendijks link https hbr org 2015 02 where the digital economy is moving the fastest Foto s Sjoerd van der Hucht Read more Announcement Nominations for the DCSR Award The cybersecurity track Highlights of Dutch Cyber Security Research at the ICT OPEN program is scheduled in the afternoon of March 24th 2015 The objective is to demonstrate the progress and achievements in the execution of recent Dutch cybersecurity research In the track the Dutch Cyber Security Research paper Award DCSRA will be introduced It is a new price rewarding the best recent non commercial scientific cybersecurity research paper Jury members Professor Thorsten Holz Professor Frank Piessens and Professor Danilo Bruschi under technical chairmanship of Jan Piet Barthel NWO selected the top five research papers out of sixteen papers submitted The top 5 highlights of Dutch Cyber Security Research in alphabetic order are Download abstracts and information about the presenters here On the Practical Exploitability of Dual EC in TLS Implementations Stephen Checkoway et al presented by Ruben Niederhagen Out of Control Overcoming Control Flow Integrity Enes Göktas et al presented by Enes Göktas Quantum secure authentication of a physical unclonable key Sebastianus Goorden et al presented by Boris SkorícSystem and Network Security Framing Signals A Return to Portable Shellcode Erik Bosman et al presented by Erik BosmanVerifying Curve25519 Software Yu Fang Chen et al presented by Peter Schwabe Jury members who individually ranked and collectively decided on the quality of the papers were highly impressed by all the research results coming from The Netherlands On March 24 five presenters receive a signed certificate for their paper presentation Then will be clear which paper deserves the predicate best cyber security research paper The presenter of the winning paper will receive the Award form Dr René Penning De Vries In addition Gerard Smit CTO IBM Benelux will give the winner a 500 euro bonus cheque Download information about the jury members here Please join us in the afternoon of March 24th 2015 at ICT OPEN and register at http www ictopen2015 nl About ICT OPENICT OPEN 2015 is the principal ICT research conference in the Netherlands It features two distinguished plenary key notes and invited speakers as well as many presentations The state of the art in ICT research is presented and discussed here ICT OPEN is therefore the place to be for all involved in ICT research in the Netherlands ICT OPEN 2015 takes places the 24th and 25th of March 2015 in De Flint in Amersfoort Read more Nieuws CfP Cyber Security by Design Singapore This is not an opportunity to be missed Submit a technical paper in the research industry or tools track Engage in conversations with the top researchers and practitioners from across the world in the area of cyber security Visit the most advanced realistic testbeds in cyber physical systems and enjoy a game of attack and defence And of course enjoy the ever beautiful Singapore Students are strongly encouraged to participate and compete for many cash prizes Theme Cyber Security by Design January 14 15 2016 http itrust sutd edu sg sg crc 2016 The inaugural Singapore Cyber Security R D Conference will be held in Singapore on January 14 15 2016 at the campus of the Singapore University of Technology and Design SUTD The conference will bring together academics and practitioners from across the world to participate in a vibrant programme consisting of research papers industrial best practices and tools exhibition Students undergraduate and graduate are encouraged to participate in specially organised sessions Several cash awards and certificates will be given to the best contributions in various student categories This year s theme focuses on the importance of bringing a technically grounded element of design that integrates cyber security into a system early in the process rather than an afterthought The element of design is integral to a process be it a purely software system such as one engaged in managing online transactions or a combination of hardware and software such as in Industrial Control Systems pacemakers and a multitude of IoT devices This design element pervades the entire development process from the beginning till the end and even during operation and maintenance SG CRC 2016 will focus on how design as an element can be made explicit early in the development process using novel techniques based on sound mathematical tools and engineering approaches SubmissionsAuthors are invited to submit original work on any of the topics listed below Submissions that fall in the general area of cyber security but not exactly in any of the topics below will also be considered Submissions may focus on theoretical results experiments or a mix of both Attacker and attack models Biometrics Cyber Security Education Data privacy Defence against side channel attacks Design of runtime security Design of secure controllers Design of secure systems from insecure components Digital Forensics Economic models of cyber security EV AV security Formal methods in cyber security Hardware software cyber defense mechanisms IoT security Legal aspects of cyber security Lightweight crypto and security Methodologies for assessing system security and risk Mobile security Protection of public infrastructure power water and transportation Security by design Security in healthcare Security policies and compliance Social Engineering and cyber security Testbeds for experimentation Testing for cyber security Urban transportation system security Verified security design Details of submission can be found in the Conference website http itrust sutd edu sg sg crc 2016 Theme Cyber Security by Design January 14 15 2016 http itrust sutd edu sg sg crc 2016 This is not an opportunity to be missed Submit a technical paper in the research industry or tools track Engage in conversations with the top researchers and practitioners from across the world in the area of cyber security Visit the most advanced realistic testbeds in cyber physical systems and enjoy a game of attack and defence And of course enjoy the ever beautiful Singapore Students are strongly encouraged to participate and compete for many cash prizes The inaugural Singapore Cyber Security R D Conference will be held in Singapore on January 14 15 2016 at the campus of the Singapore University of Technology and Design SUTD The conference will bring together academics and practitioners from across the world to participate in a vibrant programme consisting of research papers industrial best practices and tools exhibition Students undergraduate and graduate are encouraged to participate in specially organised sessions Several cash awards and certificates will be given to the best contributions in various student categories This year s theme focuses on the importance of bringing a technically grounded element of design that integrates cyber security into a system early in the process rather than an afterthought The element of design is integral to a process be it a purely software system such as one engaged in managing online transactions or a combination of hardware and software such as in Industrial Control Systems pacemakers and a multitude of IoT devices This design element pervades the entire development process from the beginning till the end and even during operation and maintenance SG CRC 2016 will focus on how design as an element can be made explicit early in the development process using novel techniques based on sound mathematical tools and engineering approaches SubmissionsAuthors are invited to submit original work on any of the topics listed below Submissions that fall in the general area of cyber security but not exactly in any of the topics below will also be considered Submissions may focus on theoretical results experiments or a mix of both Attacker and attack models Biometrics Cyber Security Education Data privacy Defence against side channel attacks Design of runtime security Design of secure controllers Design of secure systems from insecure components Digital Forensics Economic models of cyber security EV AV security Formal methods in cyber security Hardware software cyber defense mechanisms IoT security Legal aspects of cyber security Lightweight crypto and security Methodologies for assessing system security and risk Mobile security Protection of public infrastructure power water and transportation Security by design Security in healthcare Security policies and compliance Social Engineering and cyber security Testbeds for experimentation Testing for cyber security Urban transportation system security Verified security design Details of submission can be found in the Conference website http itrust sutd edu sg sg crc 2016 Read more IEEE Workshop Security and Privacy in the Cloud SPC 2015 The goal of this workshop is to bring together researchers and practitioners who are interested in discussing the security privacy and data protection issues emerging in cloud scenarios and possible solutions to them IEEE SPC 2015 will be held in Florence Italy on September 30 2015 in conjunction with the IEEE Conference on Communications and Network Security CNS 2015 The workshop will be a 1 day event featuring one keynote talk Pierangela Samarati Universita degli Studi di Milano and SPC technical program 9 full papers and 8 short papers REGISTRATIONRegistration information is available at http cns2015 ieee cns org registration Early registration fees apply until August 31 2015 Special discount for combined registration conference workshop HOTEL AND VENUEInformation on the workshop venue is available at http cns2015 ieee cns org travel PROGRAM 08 30 08 40 Opening Remarks 08 40 09 30 KEYNOTE TALK Enforceable Security in the Cloud to Uphold Data Ownership Pierangela Samarati Universita degli Studi di Milano 09 30 10 45 SESSION 1 PRIVACY PRESERVING DATA PROCESSING chair Alexandra Shulman Peleg Highly Scalable Verifiable Encrypted Search Rosario Gennaro Emmanuel Ekwedike Whitney Drazen Privacy Preserving Distributed Statistical Computation to a Semi Honest Multi Cloud Aida Calvino Sara Ricci Josep Domingo Ferrer Privacy Preserving Cloud Computing through Piecewise Approximation of Multivariate Functions Riccardo Lazzeretti Tommaso Pignata 10 45 11 15 Coffee Break 11 15 12 55 SESSION 2 CLOUD INFRASTRUCTURE SECURITY AND RISK ASSESSMENT A Firewall Algebra for OpenStack Simon Foley Ultan Neville All Your Cluster Grids Are Belong to Us Monitoring the in Security of Infrastructure Monitoring Systems Andrei Costin Securing the Infrastructure and the Workloads of Linux Containers Massimiliano Mattetti Alexandra Shulman Peleg Yair Allouche Antonio Corradi Shlomi Dolev Luca Foschini An Integrated Method for Compliance and Risk Assessment Experiences from a Case Study Samson Esayas Tobias Mahler Fredrik Seehusen Frode Bjornstad Veda Brubakk 12 55 14 00 Lunch 14 00 16 00 SESSION 3 ENCRYPTION FOR DATA PROTECTION IN THE CLOUD chair Rosario Gennaro Efficient and Scalable Aggregate Signcryption Scheme Based on Multi trapdoor Hash Functions Santosh Chandrasekhar Mukesh Singhal Publicly Verifiable Conjunctive Keyword Search in Outsourced Databases Monir Azraoui Kaoutar Elkhiyaoui Melek Onen Refik Molva Integer Arithmetic over Ciphertext and Homomorphic Data Aggregation short paper Yao Chen Guang Gong Windowing Technique for Lazy Sorting of Encrypted Data short paper Ayantika Chatterjee Indranil Sen Gupta Secure Cloud Storage a Framework for Data Protection as a Service in the Multi cloud Environment short paper Quang Hieu Vu Maurizio Colombo Rasool Asal Ali Sajjad Fadi El moussa Theo Dimitrakos Self Protecting Multi Cloud Applications short paper Antonio M Ortiz Torres Erkuden Rios Wissam Mallouli Eider Iturbe Edgardo Montes

    Original URL path: https://www.iipvv.nl/en (2015-09-07)
    Open archived version from archive

  • About IIPVV | IIPVV
    Dutch economy Although security en safety research questions are dealt with in a multidisciplinary context for the IIP the use of ICT is crucial Platform members work on a range of topics such as privacy enhancing technologies camera surveillance digital identities critical infrastructure protection cyber crime prevention and reliable food Back to selection Agenda Vernieuwingsimpuls Informatiebijeenkomst Veni Vidi Vici 17 09 2015 Post HBO Cyber Security Management 30 09 2015

    Original URL path: https://www.iipvv.nl/en/content/about-iipvv (2015-09-07)
    Open archived version from archive



  •