The work described in this website has been conducted within the project NeCS. This project has received funding from the European Union’s Horizon 2020 (H2020) research and innovation programme under the Grant Agreement no 675320. This website and the content displayed in it do not represent the opinion of the European Union, and the European Union is not responsible for any use that might be made of its content.
The International Conference on Availability, Reliability and Security (“ARES”) will bring together researchers and practitioners in the area of dependability. ARES will highlight the various aspects of security - with special focus on the crucial linkage between availability, reliability and security.
ARES aims at a full and detailed discussion of the research issues of security as an integrative concept that covers amongst others availability, safety, confidentiality, integrity, maintainability and security in the different fields of applications.
The International School on Foundations of Security Analysis and Design FOSAD is a one-week yearly school on cyber-security held in Bertinoro (Italy) in August-September. The main aim of the FOSAD school is to offer a good spectrum of current research in foundations of security - ranging from programming languages to analysis of protocols, from cryptographic algorithms to access control policies and trust management - that can be of help for graduate students and young researchers from academia or industry that intend to approach the field.
New computing paradigms, such as cloud computing, big data and the Internet of Things open new horizons to businesses by making possible the provision of high quality services all over the world. All these developments ultimately aim at improving our quality of life, at making it easier to generate wealth, and at ensuring that businesses remain competitive in the global marketplace.
With the rapid development and increasing complexity of computer systems and communication networks, user requirements for trust, security and privacy are becoming more and more demanding. Therefore, there is a grand challenge that traditional security technologies and measures may not meet user requirements in open, dynamic, heterogeneous, mobile, wireless, and distributed computing environments. As a result, we need to build systems and networks in which various applications allow users to enjoy more comprehensive services while preserving trust, security and privacy at the same time.
This proposed workshop will be co-located with the 2017 IEEE International Conference on Software Quality, Reliability, and Security (http://paris.utdallas.edu/qrs17/), in Prague, Czech Republic, July 25-29, 2017.
Cloud computing is transforming the way large-scale computation is performed. Dynamic scalability or -elasticity- provided by the cloud make high-performance computing accessible to everyone. However, cloud computing introduces new challenges with respect to security and privacy. Although virtualization addresses some of these concerns, it has a significant impact on performance: the actual gains in performance depend heavily on the predictability of physical and virtualized resources.
We are going to have our next Webex seminar next Wednesday the 5th of July at 15:00 (CEST). Oleksii Osliak (CNR) is going to be the speaker this time.
Trustworthy, secure software is a core ingredient of the modern world. Hostile, networked environments, like the Internet, can allow vulnerabilities in software to be exploited from anywhere. To address this, high-quality security building blocks (e.g., cryptographic components) are necessary, but insufficient. Indeed, the construction of secure software is challenging because of the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies and the progress of attack vectors.
Information security and privacy continue to grow in importance, as threats proliferate, privacy erodes, and attackers find new sources of value. Yet the security of information systems and the privacy offered by them depends on more than just technology. Each requires an understanding of the incentives and trade-offs inherent to the behavior of people and organizations. As society’s dependence on information technology has deepened, policy-makers have taken notice.
Trust is an essential glue for any society, whether formed by human or artificial agents, whether in a real-life or an online setting. This trust needs to be established, reinforced or abolished to reflect changes in the society and its participants. The mechanisms for such trust management may be psychological or sociological in the case of humans, algorithmic or probabilistic, e.g., in the case of artificial agents.