AU2EU has organized a dedicated workshop “Workshop on Security and Privacy in Cloud-based Application”
Theworkshop was organized in conjunction with ARES conference (The 10th International Conference on Availability, Reliability and Security, IEEE), at Université Paul Sabatier, Toulouse, France between 24-28 August 2015.The official page of the ARES EU Symposium – AU2EU is http://www.ares-conference.eu/ares2015/.
AU2EU has actively disseminated the event through multiple channels (e.g. WikiCFP, ACM conferences calendar, DBWorld, World Conference Calendar) and mailing lists (LOGINF, OGSA-WG, ISN, EDUCAUSE). The call for papers is provided in Appendix B. The front matters is provided in Appendix C.
We received 7 papers, of which 5 were accepted. The full list of accepted papers is provided below:
- A secure integrated platform for rapidly formed multi organisation collaboration. Authors: John Zic; Nerolie Oakes; Dongxi Liu; Jane Li; Chen Wang and Shiping Chen; paper presented by John Zic
- Attribute Based Authentication and Authorization for Collaborative Services. Authors: Stefan Thaler, Jerry den Hartog, Dhouha Ayed, Dieter Sommer, Michael Hitchens; paper presented by Stefan Thaler
- The Measurement of Data Locations in the Cloud. Authors: Ulrich Waldmann, Annika Selzer, Sebastian Luhn, Reiner Kraft, Bernd Jaeger; paper presented by Sebastian Luhn
- Virtual Machine Introspection: Techniques and Applications. Authors: Yacine Hebbal, Sylvie Laniepce, Jean-Marc Menaud; paper presented by Yacine Hebbal
- Nomad: A Framework for Developing Mission-Critical Cloud-based Applications. Authors: Mamadou Diallo, Michael August, Roger Hallman, Megan Kline, Henry Au, Vic Beach; paper presented by Mamadou Diallo
Out of these 5 papers, the first two disseminate results obtained within AU2EU.
Besides the two accepted papers, there were another two presentations disseminating technologies and results achieved in the project: the overall presentation of the project and a presentation by an invited speaker. These are mentioned below:
- AU2EU: Integrated eAuthentication and eAuthorization platform for Collaborative Services. Presented by Milan Petkovic
- Anonymous Authentication in a Cloud Context. Invited Talk by Jan Camenisch, IBM Research
The results of the project were also disseminated through leaflets shared with the participants and with a banner that was shown in the conference venue. The number of participants to the conference was estimated to 300.
The SRI Security Congress Security on the Move 2014, 1-3 December, 2014, Perth, Western Australia
The SRI Security Congress hosted 5 security based conferences over 3 days. The 2014 Security Congress aims to draw together all areas of security professions and disciplines as part of a holistic engagement with the wider security discourse.
The modern security environment is increasingly mobile that process vast amounts of data. In the first half of 2013 Australians purchased 2.6 million tablets or smart phones. The increasing heterogeneity, mobility and emergent expansion of the Internet through the adoption of mobile platforms and emergent IP version 6 will not abate. The mobility and flux this produces in a network generates increasing uncertainty in decision-making for cyber security. We are now in a state of dealing with a highly chaotic, entropic and some would say, decaying level of security and by implication order.
The aim of this conference is to explore methods which help to increase the efficacy and ability of decision making in an increasingly chaotic network. It should also explore methods, tools, techniques and frameworks in dealing with some of the wicked problems that our increasingly interconnected, digitised systems are producing that threaten our economic and social well-being. The 5 hosted conferences are:
- 15th Australian Information Warfare Conference
- 12th Australian Information Security Management Conference
- 12th Australian Digital Forensics Conference
- 7th Australian Security and Intelligence Conference
- 3rd Australian eHealth Informatics and Security Conference
AU2EU presented two papers, "Authentication and Authorisation in Entrusted Unions" and "Attribute-based Encryption with Encryption and Decryption outsourcing" which won the best paper award.
More information about Security on the Move
AU2EU will present at 8th International Conference on Security Technology. SecTech 2015, November 25 - 28, 2015. Jeju Island, Korea, More information about SecTech2015. The paper on ``Secure Collaboration Platform: a Case Study in the Biosecurity Domain'' was presented by CSIRO;
CENTRIC 2015. AU2EU presented at Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services (CENTRIC 2015), November 15 - 20, 2015 - Barcelona, Spain, More information on CENTRIC 2015. The paper “Why we need privacy-preserving authentication in the Facebook age” was presented by ECU
The 10th IARIA International Conference on Systems and Networks Communications (ICSNC 2015). AU2EU presented at tenth International Conference on Systems and Networks Communications, ICSNC 2015. November 15 - 20, 2015 - Barcelona, Spain. More information about ICSNC 2015,
- the paper ``A two-tiered user feedback-based approach for spam detection'' was presented by ECU;
- the keynote on ``Why we need privacy-preserving authentication in the Facebook age'' was given by ECU
AU2EU presented at 40th IEEE LCN, 26-29 October 2015. The 40th IEEE Conference on Local Computer Networks (LCN), October 26-29, 2015, Clearwater Beach, Florida, USA, the paper on ``Method for providing secure and private fine-grained access to outsourced data'' was presented by UNSW;
AU2EU presented at SaSeIoT, 26-27 October 2015. The 2nd EAI International Conference on Safety and Security in Internet of Things (SaSEIoT), the IOT360 Summit, October 27-29, 2015,Rome, Italy, the paper on ``Controlled Android application execution for the IoT infrastructure'' was presented by ECU;
AU2EU presented at APC 2015 The Amsterdam Privacy Conference 2015, 23-25 October, Amsterdam The Netherlands, the paper on ``European health data privacy and eID rules in aged care coordination'' was presented by TU/e, Bicore and UNSW
Collaboration with CSP Forum for AU2EU presence at the exhibition space at the 3rd Annual European Cybersecurity Conference, Brussels 1st October 2015
AU2 EU presented at DPM 2015, 10th International Workshop on Data Privacy Management, - Vienna, Austria, September 21–22, 2015, http://deic.uab.cat/conferences/dpm/dpm2015/ The paper Stronger Security Definition for Sanitizable Signatures was presented by IBM.
AU2EU presented at RATSP 2015, The 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications held in conjunction with IEEE TrustCom-15, August 20-22, 2015, Helsinki, Finland, https://research.comnet.aalto.fi/Trustcom2015/ratsp2015/ the paper on`` Proofs of encrypted data retrievability with probabilistic and homomorphic message authenticators'' was presented by CSIRO
AU2EU presented at SITB 2015, 5th Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux, 2015, pp. 96–103. Brussel, 6-7 May 2015, the paper on ``DNA sequence modeling based on context trees'' was presented by TU/e
AU2EU presented at ESIT 2015, European School of Information Theory, April 2015, Zandvoort, the Netherlands. The poster ``Privacy-preserving genome analysis'' was presented by TU/e;
AU2EU presented at IEEE West European Student and Young Professional Congress, May 2015, Eindhoven, The Netherlands. The Netherlands, the poser on ``Privacy-preserving modeling of DNA sequences,'' was presented by TU/e;
Collaboration with CSP Innovation Forum 2015, 28th & 29th April, ‘Cybersecurity & Privacy Innovation Forum 2015’ in Brussels, Belgium. A joint event by DG CONNECT (Unit H4 – Trust & Security) and CSP Forum.
3rd Trust in Digital World Conference (Madrid, 25-26 February 2015)
Winter School on Cybersecurity and Privacy (CySeP) 27-31 October 2014, Stockholm, Sweden, https://people.kth.se/~papadim/cysep/ AU2EU has been participating in the event by Milan Petkovic (Philips)
IFIP Summer School on Privacy and Identity Management for the Future Internet in the Age of Globalisation, Patras University/Greece, September 7-12, 2014, http://ifip2014.cti.gr/
AU2EU has been participating in the event delivering a keynote talk on "Privacy in Services Science and Big Data Analytics" by Christine M O'Keefe, CSIRO
AU2EU presented at CBD 2014, 20-22 November 2014, the paper ``Protecting and Analysing Health Care Data on Cloud'' was presented by CSIRO;
AU2EU presented at CCS2014, 3-7 November 2014, the paper ``Analysis of XACML Policies with SMT'' was presented by TU/e;
AU2EU presented at Trust 2014, 30 June - 2 July 2014. AU2EU presented two papers ``Integration of Data-minimising Authentication into Authorization'' (presented by TU/e) and ``Challenges in Establishing Trustworthy Collaborations for Timely Responses to Emergency Animal Disease Incidents'' (presented by TU/e) at International Conference on Trust & Trustworthy Computing (TRUST 2014), Heraklion, Greece, Crete, June 30 - July 2, 2014;
AU2EU presented at WISTP2014, 30 June - 2 July 2014. AU2EU presented the paper ``Privacy Preserving Matching of DNA Sequence'' at Information Security Theory and Practice (WISTP2014), Heraklion, Greece, Crete, June 30 - July 2, 2014. The paper was presented by TU/e;
AU2EU was present at the 2nd Trust in Digital World Conference (Vienna April 2014) - Enabling the Economics of Trust. Hosted by the Austrian Economic Chamber - 07-08 April 2014, Vienna, Austria. Milan Petkovic (TU/e) chaired the eAuthentication track, where AU2EU delivered three talks by TU/e, IBM and CSIRO;
ATTPS/TDL meeting, January 21-22, 2014, SAP Labs France, Mougins. AU2EU presented as observer by TU/e
Bioinformatics & Systems Biology conference, BioSB 2015, May 20-21, 2015, Lunteren, The Netherlands, the poster & abstract ``Privacy preserving modeling of DNA sequences'' was presented by TU/e;
The 7th IEEE International Workshop on Information Forensics and Security, November 16-19 2015, Rome, Italy, AU2EU participated by TU/e;
The 13th Australian Information Security Management Conference, November 30 - December 2 2015, Perth, Western Australia,
- the paper on ``Timing Attack Detection on BACnet via a Machine Learning Approach'' will be presented by ECU and TU/e;
- the paper on ``Selection of Penetration Testing Methodologies: A Comparison and Evaluation'' will be presented by ECU;
The 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015), December 14-16, 2015, London, UK, the paper on ``Secure distributed key generation in attribute-based encryption systems'' will be presented by TU/e and Philips;
TDL/ATTPS has organised the Winter School on Cybersecurity and Privacy (CySeP) 27-31 October 2014, Stockholm, Sweden.
AU2EU has been participating in the event by Milan Petkovic (Philips)
More information about the winter school
2014 MIT Kerberos & Internet Trust Conference on Social Machines Building Logistics Networks Understanding the Supply Chains of Identity, Trust and Data, 16-19 September 2014
John Zic (from CSIRO, who is an AU2EU member) visited MIT Consortium for Kerberos and Internet Trust from Tuesday 16th to Friday 19th September, and participated in the MIT KIT Advisory Board Meeting on Wednesday 17th September. The Advisory Board discussed the direction of the MIT KIT and the impact of using OpenID Connect, OAuth and UMA, particularly in relation to a proposed pilot for user–centric health care and control of personal health records.
On Thursday 18 September, John was the panel chair for the first session of the 2014 MIT KIT Conference “Social Machines”, with distinguished panellists being Alex “Sandy” Pentland, Professor at MIT Media Lab and MIT Connection Science; John Henry Clippinger, Research Scientist at the MIT Media Lab Human Dynamics Group and co-founder and Executive Director, ID3 (Institute for Institutional Innovation & Data Driven Design); Scott David, Executive Director of Law, Technology & Arts Group, University of Washington Law School and Eric Scace, Consultant specialising in identity systems and the protection of sensitive data.
Later, John gave a presentation to the MIT KIT Conference. Here several use cases were presented that emphasised the impact of risk vs benefits on success (or failure) of supply chains in delivering outcomes to a community. Two of the use cases presented are the pilots for the AU2EU project: the AAL pilot, the supply chain of health care for an individual, and in the biosecurity incident response pilot, the eradication of a disease through a supply chain organisations, specialist capabilities and technologies.
On Friday 19 September, John participated in a workshop that developed a new OpenID-connect based work group focussed on delivering appropriate technological frameworks for application in the ONC/VA Privacy on FHIR Pilot: providing patients with online digital health services. This pilot is aimed to conclude at the end of 2015, in alignment with the AAL pilot in the AU2EU project; indeed the two approaches being taken are different, but a comparison of outcomes and experiences will be interesting once the pilots conclude.
More information on the conference.
IFIP Summer School on Privacy and Identity Management for the Future Internet in the Age of Globalisation
AU2EU will be participating in the event delivering a keynote talk on "Privacy in Services Science and Big Data Analytics" by Christine M O'Keefe, CSIRO
More information about the summer school
WISTP 2014, 30 June - 2 July 2014
TRUST 2014, 30 June - 2 July 2014
Trust in the Digital World congress, 7 - 8 April 2014
AU2EU was present at the Trust in the Digital World congress – Enabling the Economics of Trust
Hosted by the Austrian Economic Chamber – 07-08 April 2014, Vienna, Austria
More information can be found here
EU Cybersecurity Stragegy - High level conference, 28 Februari 2014
Alcide de Gasperi room (GASP), Charlemagne building, Rue de la Loi 170, B-1000 Brussels, Belgium
The conference offered a wonderful opportunity to promote the AU2EU project with interesting discussions regarding AU2EU with project officers, researchers, an Australian journalist living in Brussels, and other participants. Pictures of the conference can be viewed below. (You can also see EU commissioner Neelie Kroes passing by the AU2EU banner).
The Conference took stock of the progress of the EU Cybersecurity strategy, in the first year after its adoption. It has provided information on the state of play of the implementation of the five main priorities of the Strategy and showcase highlights of the main actions in the Strategy. Ms Neelie Kroes, Commission Vice-President for the Digital Agenda and Mr Maciej Popowski, Deputy Secretary General of the European External Action Service, introduced the Conference.
Kick-off AU2EU project
Sydney (Australia), December 10th 2013. At the AU2EU Kick-off Conference in Sydney today an Australian-European consortium of leading industry and research organisations in presence of European Officials, start a new initiative to address the fundamental societal issue of trust in new and emerging digital services. Funded by the Seventh Framework Programme for Research and Technological Development (FP7) with a total budget of 8.7 Million, the project aims at fostering the adoption of security and privacy-by-design technologies in European and global markets. More specifically the aim of the project is to implement and demonstrate in a real-life environment an integrated e-Authentication and e-Authorisation framework to enable trusted collaborations and delivery of services across different organisational and governmental jurisdictions. The project will contribute to increased trust, security and privacy, which in turn shall lead to increased adoption of (cloud-based) critical infrastructures and collaborative delivery of services dealing with sensitive data.