In this context, security and dependability are absolutely vital if all stakeholders, including companies and consumers, are to adopt new technologies. To ensure continued developments in the area of information communication technologies (ICT), the European Commission has supported the SecurIST project, a European-wide taskforce charged with establishing the Strategic Research Agenda for ICT Security and Dependability research and development in Europe for 2007 – 2013.
"The project should provide Europe with a clear European level view of the strategic opportunities, strengths, weakness and threats in the area of Security and Dependability," says Jim Clarke,co-ordinator of SecurIST and programme manager at the Waterford Institute of Technology in Ireland. "It will identify priorities for Europe and mechanisms to effectively focus efforts on those priorities, identifying instruments for delivering on those priorities and a coherent time frame for delivery."
The project has established an EU-based security and dependability taskforce with Europe's leading security and dependability experts. It will create a roadmap and ICT strategy to take Europe beyond 2010 and leverage the knowledge base created by past, current and future researchers and projects in the security and dependability domains.
The establishment of the taskforce was a daunting task made somewhat more manageable by splitting the work into a series of linked workgroups called Initiatives. These Initiatives look at different areas like security policy, application security, dependability and trust, identity and privacy, digital asset management and biometrics, amongst others, all linked to a broader Initiative on methods, standards and certification across all the domains.
"While many of them are quite focused, there is an overarching initiative called Security Research Initiative, which is examining the work of all the initiatives in order to ensure there are no gaps or overlaps. These working groups generate quite detailed challenges and the priorities which, from their perspective, the roadmap and the Strategic Research Agenda (SRA) should address," says Clarke.
The 200+ researchers in the specific Initiatives of the taskforce are greatly complemented by a core Advisory Board of key EU experts in security and dependability, whose role is to oversee, advise, enhance and promote the work of the security and dependability taskforce.
Recently, based upon the earlier work of the Initiatives and a number of key workshops, the Advisory Board published its recommendations for a security and dependability research framework, a key step in the project's work. These recommendations are challenging because they address so many stakeholders: researchers, policymakers, technology and service companies and, of course, consumers.
"Empowerment of the citizen is vital as there is a clear technological trend towards the decentralization of technology and its management and control. Current centralized control structures need to be enhanced, or perhaps even replaced, since security and risk management considerations, identity theft for example, in fact, imply that responsibility, authority and control have to move more towards the end user," the Advisory board writes.
It's a goal made all the more difficult given Europe's broad cultural mix. "Europe has a very particularly, yet heterogeneous culture, history and set of attitudes to trust and society," the board continues. "The European Information Society will have the possibility to compete successfully with information societies in other countries if, and only if, Europe-specific needs are taken into account and actively addressed by technological and socio-technical research projects in a structured manner."
User focused and Europe-specific responses to the security and dependability challenge are just two of nine key areas in the project’s work. Others include issues like infrastructure robustness, interoperability or methods for aiding the development of more secure and dependable systems seamlessly from the very first stages of any system design.
Another key area is the security and dependability for a service-oriented architecture, a software design philosophy that focuses on small, reusable programs that can perform one function well. The particularly attractive novelty of this architecture is that these functions can be combined on the fly in real time to fulfil all sorts of useful services, without the costly development of large software programs. It will change the software development and promises to unlock prosperity from new services.
Another key issue is the development of enabling technologies for security. "Underlying all these is the need to provide higher assurance of trusted communication and handling of digital information. The two fundamental sciences and technologies are (a) cryptology and (b) trusted functionality and computing," says Clarke. "Cryptology ensures the protection of information stored or in transit outside a trusted area. The trusted functionality creates and maintains that trusted area, and ensures that information is handled within it as intended, and that the cryptographic processes are correctly executed. Security protocols establish and maintain trusted communication between trusted areas."
Tara Morris | alfa
Supercomputing the emergence of material behavior
18.05.2018 | University of Texas at Austin, Texas Advanced Computing Center
Keeping a Close Eye on Ice Loss
18.05.2018 | Alfred-Wegener-Institut, Helmholtz-Zentrum für Polar- und Meeresforschung
So-called quantum many-body scars allow quantum systems to stay out of equilibrium much longer, explaining experiment | Study published in Nature Physics
Recently, researchers from Harvard and MIT succeeded in trapping a record 53 atoms and individually controlling their quantum state, realizing what is called a...
The historic first detection of gravitational waves from colliding black holes far outside our galaxy opened a new window to understanding the universe. A...
A team led by Austrian experimental physicist Rainer Blatt has succeeded in characterizing the quantum entanglement of two spatially separated atoms by observing their light emission. This fundamental demonstration could lead to the development of highly sensitive optical gradiometers for the precise measurement of the gravitational field or the earth's magnetic field.
The age of quantum technology has long been heralded. Decades of research into the quantum world have led to the development of methods that make it possible...
Cardiovascular tissue engineering aims to treat heart disease with prostheses that grow and regenerate. Now, researchers from the University of Zurich, the Technical University Eindhoven and the Charité Berlin have successfully implanted regenerative heart valves, designed with the aid of computer simulations, into sheep for the first time.
Producing living tissue or organs based on human cells is one of the main research fields in regenerative medicine. Tissue engineering, which involves growing...
A team of scientists of the Max Planck Institute for the Structure and Dynamics of Matter (MPSD) at the Center for Free-Electron Laser Science in Hamburg investigated optically-induced superconductivity in the alkali-doped fulleride K3C60under high external pressures. This study allowed, on one hand, to uniquely assess the nature of the transient state as a superconducting phase. In addition, it unveiled the possibility to induce superconductivity in K3C60 at temperatures far above the -170 degrees Celsius hypothesized previously, and rather all the way to room temperature. The paper by Cantaluppi et al has been published in Nature Physics.
Unlike ordinary metals, superconductors have the unique capability of transporting electrical currents without any loss. Nowadays, their technological...
02.05.2018 | Event News
13.04.2018 | Event News
12.04.2018 | Event News
18.05.2018 | Power and Electrical Engineering
18.05.2018 | Information Technology
18.05.2018 | Information Technology