Home » Marketplace » Awareness and Training, Data Security

Awareness and Training, Data Security

Papers and publications of SPECIAL

As a research and development project, SPECIAL offers open access to its publications, which includes scientific papers and presentations, studies and essays, and other dissemination material. All of these are available trough the site linked below.

SPECIAL project deliverables

Find here the public deliverables created in SPECIAL. Our vision is to reconcile Big Data and personal data protection via an innovative data handling solution and a transparency framework. We develop this technology to ease industry’s difficulties with GDPR compliance and to enable respectful treatment of personal information. This introduces new ways of user interaction on data protection, fostering trusted customer relationships. Thus, we
- build a big data architecture to handle linked data for privacy policies, as well as deploy scalable, queryable encryption

CANVAS book

The book The Ethics of Cybersecurity discusses the full plethora of ethical aspects of cybersecurity and has a strong practical focus, including case studies that outline ethical dilemmas in cybersecurity and guidelines and other measures to tackle those dilemmas. The book is published open access and is freely available for everybody.

CANVAS MOOC

The CANVAS Massive Open Online Course (MOOC) transports the main insights of CANVAS to a broad public. In particular, the MOOC provides a comprehensive overview of the central principles and challenges in the fields of cyber security, privacy and trust. Concrete case studies from health, business and national security spheres are presented. Technical, legal and ethical perspectives on the issues are included.

CANVAS Reference Curriculum

The CANVAS Reference Curriculum integrates the value perspective into cybersecurity design decisions, with a focus on academia and industry training programs. It contains an overview document outlining the structure of the curriculum, for each lecture a content descriptor (summary, learning goals, freely available presentation slides, literature and videos) and nine case study documents (1 page descriptor; 2 page example solution). It has been developed upon the basis of the identification of good practices of teaching ethics, responsible science, technology and engineering

CANVAS briefing packages

The CANVAS Briefing Packages are a set of summarized, easily digestible information on challenges as well as possible, value-driven solution approaches linked to European cybersecurity policy. Addressing mainly (but not exclusively) EU and national policy makers, they provide guidance for decisions in this area. They discuss the following challenges: 1) Achieving Trust in EU Cybersecurity. 2) Cybersecurity and the European Data Protection Framework. 3) All Fundamental Rights are relevant for Cybersecurity.

WITDOM Protection Orchestrator

The Protection Orchestrator (PO) coordinates several protection components and services in order to effectively protect data before they leave a trusted environment for processing or storing reasons. The PO is in charge of parsing the protection configuration of an application and applying it. This is done by building requests to Protection Components deployed in the trusted domain and calling them for protecting the input data that a service in the untrusted domain will need, or for unprotecting the results after a service in the untrusted domain has processed them.

WITDOM Identity Access Management

The WITDOM Identity and Access Management (IAM) component ensures that sensitive data in WITDOM is only accessible to individuals who are granted explicit entitlements to specific services, and has the ability to monitor / audit access to data and operations.

CREDENTIAL Cryptographic Components

All server-side and client-side components and apps needed for secure and privacy-friendly data sharing and identity management in the cloud. It is an open and flexible cloud identity wallet architecture to easily connect to other identity management systems

TREDISEC Security Primitives

"Piece of software that facilitates the Cloud Security technology providers to manage the entire lifecycle of the TREDISEC Primitives and Recipes. The framework also supports consumers of such technologies in locating and identifying them in a simple and effective manner, as well as in testing and deploying those in a specific cloud-based environment, in order to fulfil consumers’ own requirements. "

Pages

News

We already know CONCORDIA WOMEN’s AWARDS winners for the RESEARCH category!

Future Events

The M-Sec and Fed4IoT projects will organize next Wednesday 29th of September 2021 at 09h00-11h00am CET (Brussels Time) its joint final project event on “Advanced technologies for hyper-connected societies”.

Sister-projects, both M-Sec and Fed4IoT aimed at research, develop and test advanced technologies combining security, IoT, cloud and bigdata, and interoperable technologies of IoT devices/platforms in the context of smart cities.

29/09/2021

After the highly successful EuroCybersec2018 organized by Prof. Erol Gelenbe (IITIS-PAN & Lab I3S, Université Côte d’Azur), whose proceedings with Springer enjoyed over 140,000 downloads, IoTAC will organize the EuroCybersec2021 Workshop in Nice, France, chaired by Prof. Gelenbe with the help of a Program Committee of experts. The deadline for paper submissions is September 17, 2021.
https://iotac.eu/eurocybersec2021-workshop/

 

 

25/10/2021 to 26/10/2021