archive-nl.com » NL » I » IIPVV.NL

Total: 354

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Programs | IIPVV
    Security Research 2014 De ministries of Security and Justice Interior and Kingdom Relations Defence Economic Affairs Finance Infrastructure and Environment and the Netherlands Organisation of Scientific Research NWO decided at the end of 2013 to give a second impuls to cyber security research in the Netherlands NWO and RVO accepted the assignment and worked together at the second round in cyber security research Also within this round two trajects are developed one for long term research via NWO and the other for short term research via SBIR of RVO Summaries winners call for proposal Cyber Security Research 2014 Call text NWO cybersecurity 2014 NCSRA II 2013 Call for proposal Cyber Security Research 2012 De ministries of Security and Justice Interior and Kingdom Relations Defence Economic Affairs and the Netherlands Organisation of Scientific Research NWO decided at the beginning of 2012 to give a new impuls to cyber security research in the Netherlands NWO and RVO accepted the assignment and worked together at a first tender in cyber security research Within the tender two trajects are developed one for long term research via NWO and the other for short term research via SBIR of RVO Summaries winners call for proposals Cyber

    Original URL path: https://www.iipvv.nl/en/content/programs (2015-09-07)
    Open archived version from archive


  • News | IIPVV
    Workshop Security and Privacy in the Cloud SPC 2015 30 August 2015 The goal of this workshop is to bring together researchers and practitioners who are interested in discussing the security privacy and data protection issues emerging in cloud scenarios and possibl Read more CALL FOR PARTICIPATION workshop SPiCy 2015 26 August 2015 In the modern age Cybermatics is differentiating itself by designing the physical and social places into the cyber space to accomplish the union of three spaces i Physical Cyberworld ii Social C Read more ESORICS 2015 PhD Consortium Call for Presentations 26 August 2015 Call for Presentations in conjunction with the 20th European Symposium on Research in Computer Security ESORICS 2015 Vienna Austria September 25 2015Doctoral Consortium Submission August 28 2 Read more Most security executives lack confidence in security posture 20 August 2015 A new Raytheon Websense survey of security executives at large companies in the U S reveals that confidence in their enterprise security posture is lacking According to the 100 security executives w Read more Call for Papers IFIP SEC 2016 18 August 2015 The IFIP SEC conference is the flagship event of the International Federation for Information Processing IFIP Technical Committee 11 on

    Original URL path: https://www.iipvv.nl/en/news (2015-09-07)
    Open archived version from archive

  • Downloads | IIPVV
    Security Strategie 2 NCSS2 2013 Invulformulier Addendum NCSRA II Invulformulier NSCRA II Discussievoorbereiding schrijvers NCSRA II Workshop Bussines Social Life Op weg naar de 2e matchmaking day NCSRA II Workshop Business Social Life IIP VV over de NCSRA II Workshop Business Social Life 3 juli 2013 Inleiding NCSRA II Workshop Business Social Life 3 juli 2013 Summaries granted cyber security projects 2012 English Cybersecurity Strategy of the European Union An Open Safe and Secure Cyberspace workshop TEGGS projectopzet workshop TEGGS moleculaire markers workshop Teggs fingerprinting National Cybersecurity Framework Manual English Factsheet NCSC Veilig op sociale netwerken Cybersecuritybeeld Nederland juni 2012 Brief aan voorzitter tweede kamer 21 november Bilateraal verdrag voor onderzoek en technologie op het gebied van binnenlandse en civiele veiligheid Presentatie Sentinels door Sandro Etalle op ICTDelta2012 Presentatie Jan Piet Barthel Cyber security research in the Netherlands English Presentatie Eelco Stofbergen The Dutch approach to Cyber Sercurity and Research English Factsheet Sentinels English Factsheet IIPVV English Template Application Form in Word Call Cybersecurity NWO SBIR Cyber Security AgNL NWO Call for proposals Cyber Security English Nederland maakt werk van Cyber Security Summary Nationale Cyber Security Research Agenda NCSRA with short overview of the 7 themes English Presentatie Suzanne Verboon AgNL organisator Presentatie Jan Piet Barthel secretaris IIPVV NWO organisator Presentatie Dick Brandt voorzitter IIPVV PostNL middagvoorzitter Websitebericht van het IIPVV Matchmaking Cyber Security mei 2012 Uitnodiging Matchmaking Klik hier voor de IIPVV presentatie op ICTDelta2011 Download IIPVV poster in pdf formaat 5Mb Factsheet over de Nationale Cyber Security Research Agenda NCSRA Factsheet Sentinels English 2011 Factsheet Sentinels Factsheet IIPVV Nederlands IIPVV Pitch door Willem Jonker Mogelijke bijdrage van IIPVV aan topsector HTSM Mogelijke bijdrage IIPVV aan topsector Agro food Sentinels2 proposal IIP English National Cyber Security Research Agenda NCSRA English Presentatie Reliable Food IIPVV ICTDelta 2010 Pages 1 2

    Original URL path: https://www.iipvv.nl/en/mediabank (2015-09-07)
    Open archived version from archive

  • CS Research | IIPVV
    Sciences Utrecht Saxion University of Applied Sciences The Hague University of Applies Science Unified Vision b v Pages 1 2 3 4 5 next last Back to selection Agenda Vernieuwingsimpuls Informatiebijeenkomst Veni Vidi Vici 17 09 2015 Post HBO Cyber Security Management 30 09 2015 Privacy Forum 2015 07 10 2015 European Cyber Security Privacy Innovation Awards 22 10 2015 Kick off Alert Online 26 10 2015 View the entire

    Original URL path: https://www.iipvv.nl/en/cs-research (2015-09-07)
    Open archived version from archive

  • GCCS Side Event PPP in Cyber Security Research | IIPVV
    and The Netherlands EU are invited to share their RD I vision others are encouraged to react United States of America After the introduction dr Douglas Maughan Department of Homeland Security DHS presented the cybersecurity research strategy of DHS and the process of transitioning technology He explained to what extent international R D cooperation could help in improving the national and international cybersecurity level Cybersecurity investments by DHS are roughly distributed in cybersecurity research done by universities 40 by companies 50 and by governmental agencies labs 10 Maughan is enthusiastic to get as many people around the table to discuss this subject as possible and states that collaboration works Dr Douglas Maughan Click here for the presentation pdf of Dr Douglas Maughan CSD Division Director Department of Homeland Security US Brazil Virgílio Almeida Secretary for Information Technology Policies of the Ministry of Science Technology and Innovation MCTI explained the R D strategy for cybersecurity and cyber defence in Brazil He stated that having a secure online environment is vital Strengthening Brazil s cybersecurity is a national priority His ministry works in close cooperation with the Ministry of Defence on cybersecurity R D questions In the last four years several multidisciplinary workshops were organised in Brazil to work out the cyber defence goals for the long term Brazil and the EU work closely together in research on security and privacy Both partnerships with large economic sectors like banking and telecom as well as collaboration with international research centers of universities working on cyber security are necessary He also stresses the importance of technical sovereignty Mr Virgílio Almeida Click here for the presentation pdf of Mr Virgílio Almeida Secretary of the Ministry of Science Technology and Inovation Brazil Japan Experiences in Japan are different but the motivation to cooperate internationally in PPP s is the same Ms Mari Ichikawa National center of Incident readiness and Strategy for Cybersecurity NISC sketched the situation in Japan listed the issues in information security R D and shared lessons learned in cybersecurity strategy on three different levels the ability to detect and defend cyber attacks the establishment of technology protecting industrial control systems and the development for new services to utilize big data Ms Ichikawa showed a scheme for international collaboration both on governmental level as well as research level Ms Mari Ichikawa Click here for the presentation of Ms Mari Ichikawa Counsellor for International Strategy National center of Incident readiness and Strategy for Cybersecurity Japan The Netherlands Mr Michel van Leeuwen Head of Cyber Security Policy NCTV Ministry of Security and Justice explains the role of the Dutch National Cyber Security Research Agenda NCSRA covering a part of the National cybersecurity strategy He stressed the importance of cybersecurity education and announced that the successor of the current PPP platform on security and privacy will apart from research have a strong focus on cybersecurity education Van Leeuwen is also excited about different opportunities to improve international cooperation in cybersecurity research development and innovation Mr Michel van

    Original URL path: https://www.iipvv.nl/en/content/gccs-side-event-ppp-cyber-security-research (2015-09-07)
    Open archived version from archive

  • Announcement: Nominations for the DCSR Award | IIPVV
    members Professor Thorsten Holz Professor Frank Piessens and Professor Danilo Bruschi under technical chairmanship of Jan Piet Barthel NWO selected the top five research papers out of sixteen papers submitted The top 5 highlights of Dutch Cyber Security Research in alphabetic order are Download abstracts and information about the presenters here On the Practical Exploitability of Dual EC in TLS Implementations Stephen Checkoway et al presented by Ruben Niederhagen Out of Control Overcoming Control Flow Integrity Enes Göktas et al presented by Enes Göktas Quantum secure authentication of a physical unclonable key Sebastianus Goorden et al presented by Boris Skoríc System and Network Security Framing Signals A Return to Portable Shellcode Erik Bosman et al presented by Erik Bosman Verifying Curve25519 Software Yu Fang Chen et al presented by Peter Schwabe Jury members who individually ranked and collectively decided on the quality of the papers were highly impressed by all the research results coming from The Netherlands On March 24 five presenters receive a signed certificate for their paper presentation Then will be clear which paper deserves the predicate best cyber security research paper The presenter of the winning paper will receive the Award form Dr René Penning De Vries In addition Gerard Smit CTO IBM Benelux will give the winner a 500 euro bonus cheque Download information about the jury members here Please join us in the afternoon of March 24 th 2015 at ICT OPEN and register at http www ictopen2015 nl About ICT OPEN ICT OPEN 2015 is the principal ICT research conference in the Netherlands It features two distinguished plenary key notes and invited speakers as well as many presentations The state of the art in ICT research is presented and discussed here ICT OPEN is therefore the place to be for all involved in ICT

    Original URL path: https://www.iipvv.nl/en/content/announcement-nominations-dcsr-award (2015-09-07)
    Open archived version from archive

  • Dutch Cyber Security Research Award on ICT.OPEN 2015 | IIPVV
    led to dozens of new businesses hundreds of highly skilled employees in all major corporations government departments and universities and thousands of scientific publications and patents Dutch Cyber Security Researchpaper Award As well known partner stimulating co operation in the area of ICT research in security and privacy the Dutch ICT Innovation Platform Security and Privacy IIPVV decided this conference would be a good opportunity to introduce a new prize and to reward the best recent non commercial scientific cyber security research paper An organization committee headed by Professor Inald Lagendijk is formed and an appropriate mainly foreign jury has been appointed with well respected members in the scientific field Professor Thorsten Holz Professor Frank Piessens and Professor Danilo Bruschi Out of all papers received the jury will select the top five papers Track Cyber Security Research on ICT OPEN The cyber security track of the ICT OPEN program is scheduled in the afternoon of March 24th 2015 The objective of this track is to demonstrate the progress and achievements in the execution of recent Dutch Cyber Security Research The main researchers of which their papers were selected by the jury will present their research All presenters receive a signed certificate the Dutch Cyber Security Researchpaper Award It is foreseen that being selected in the top five and having received this award is a good reason for the researchers involved to mention this honour on their Curriculum Vitae Other than a certificate of course there will be a photo moment and press attention The jury not only determines the top five but also selects the very best out of these set of papers On behalf of the jury Dr René Penning De Vries recently appointed by the Dutch minister of Economic Affairs as Dutch ICT Figurehead hands over a special

    Original URL path: https://www.iipvv.nl/en/content/dutch-cyber-security-research-award-ictopen-2015 (2015-09-07)
    Open archived version from archive

  • IEEE Workshop Security and Privacy in the Cloud (SPC 2015) | IIPVV
    Cloud to Uphold Data Ownership Pierangela Samarati Universita degli Studi di Milano 09 30 10 45 SESSION 1 PRIVACY PRESERVING DATA PROCESSING chair Alexandra Shulman Peleg Highly Scalable Verifiable Encrypted Search Rosario Gennaro Emmanuel Ekwedike Whitney Drazen Privacy Preserving Distributed Statistical Computation to a Semi Honest Multi Cloud Aida Calvino Sara Ricci Josep Domingo Ferrer Privacy Preserving Cloud Computing through Piecewise Approximation of Multivariate Functions Riccardo Lazzeretti Tommaso Pignata 10 45 11 15 Coffee Break 11 15 12 55 SESSION 2 CLOUD INFRASTRUCTURE SECURITY AND RISK ASSESSMENT A Firewall Algebra for OpenStack Simon Foley Ultan Neville All Your Cluster Grids Are Belong to Us Monitoring the in Security of Infrastructure Monitoring Systems Andrei Costin Securing the Infrastructure and the Workloads of Linux Containers Massimiliano Mattetti Alexandra Shulman Peleg Yair Allouche Antonio Corradi Shlomi Dolev Luca Foschini An Integrated Method for Compliance and Risk Assessment Experiences from a Case Study Samson Esayas Tobias Mahler Fredrik Seehusen Frode Bjornstad Veda Brubakk 12 55 14 00 Lunch 14 00 16 00 SESSION 3 ENCRYPTION FOR DATA PROTECTION IN THE CLOUD chair Rosario Gennaro Efficient and Scalable Aggregate Signcryption Scheme Based on Multi trapdoor Hash Functions Santosh Chandrasekhar Mukesh Singhal Publicly Verifiable Conjunctive Keyword Search in Outsourced Databases Monir Azraoui Kaoutar Elkhiyaoui Melek Onen Refik Molva Integer Arithmetic over Ciphertext and Homomorphic Data Aggregation short paper Yao Chen Guang Gong Windowing Technique for Lazy Sorting of Encrypted Data short paper Ayantika Chatterjee Indranil Sen Gupta Secure Cloud Storage a Framework for Data Protection as a Service in the Multi cloud Environment short paper Quang Hieu Vu Maurizio Colombo Rasool Asal Ali Sajjad Fadi El moussa Theo Dimitrakos Self Protecting Multi Cloud Applications short paper Antonio M Ortiz Torres Erkuden Rios Wissam Mallouli Eider Iturbe Edgardo Montes de Oca 16 00 16 30 Coffee Break

    Original URL path: https://www.iipvv.nl/en/content/ieee-workshop-security-and-privacy-cloud-spc-2015 (2015-09-07)
    Open archived version from archive