Compliance Monitoring of Third-Party Applications in Online Social Networks
|
|
- Posy Franklin
- 6 years ago
- Views:
Transcription
1 Compliance Monitoring of Third-Party Applications in Online Social Networks Florian Kelbert, Imperial College London Alexander Fromm, Technical University of Munich
2
3
4
5
6 Problem
7 Problem How to ensure that data is used in correspondence with policies?
8 Problem How to ensure that data is used in correspondence with policies?
9 Problem How to ensure that data is used in correspondence with policies?
10 Problem How to ensure that data is used in correspondence with policies?
11 Problem How to ensure that data is used in correspondence with policies?
12 Problem How to ensure that data is used in correspondence with policies? You may cache the content for up to 24 hours
13 Problem How to ensure that data is used in correspondence with policies? You may cache the content for up to 24 hours Only use friend data in the person s experience in your app
14 Problem How to ensure that data is used in correspondence with policies? You may cache the content for up to 24 hours Only use friend data in the person s experience in your app You may not disclose confidential information to a third party without the prior explicit consent of Tumblr.
15 To start with...
16 To start with... Social Networks are trusted
17 To start with... Social Networks are trusted
18 To start with... Social Networks are trusted Third Party Applications are not
19 To start with... Social Networks are trusted Third Party Applications are not Thousands of apps and developers
20 Overview
21 Overview User Data OSN Operator (trusted)
22 Overview User Data OSN Operator (trusted)
23 Overview User Data 1. Policy Provisioning Policy Database OSN Operator (trusted)
24 Overview Applications (untrusted) User Data 1. Policy Provisioning Policy Database OSN Operator (trusted)
25 Overview Applications (untrusted) PaaS / SEE (trusted) User Data 1. Policy Provisioning Policy Database PaaS Provider (trusted) OSN Operator (trusted)
26 Overview Applications (untrusted) User Data Libraries PaaS / SEE (trusted) 1. Policy Provisioning Policy Database PaaS Provider (trusted) OSN Operator (trusted)
27 Overview Applications (untrusted) Libraries User Data Monitor PaaS / SEE (trusted) 1. Policy Provisioning Policy Database PaaS Provider (trusted) OSN Operator (trusted)
28 Overview Applications (untrusted) 2. Request Libraries User Data Monitor PaaS / SEE (trusted) 1. Policy Provisioning Policy Database PaaS Provider (trusted) OSN Operator (trusted)
29 Overview Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request Policy Database Coordinator PaaS Provider (trusted) OSN Operator (trusted)
30 Overview Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies Policy Database Coordinator PaaS Provider (trusted) OSN Operator (trusted)
31 Overview Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 5. Policies Policy Database Coordinator PaaS Provider (trusted) OSN Operator (trusted)
32 Overview Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 5. Policies Decision Engine PaaS Provider (trusted) Policy Database Coordinator OSN Operator (trusted)
33 Overview Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)
34 Overview 7. Request Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)
35 Overview 7. Request 8. Response Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)
36 Overview 7. Request 8. Response Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 9. Response 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)
37 Overview 7. Request 8. Response Applications (untrusted) User Data 10. Response 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 9. Response 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)
38 Overview 7. Request 8. Response Applications (untrusted) User Data Continuous policy evaluation 10. Response 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 9. Response 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)
39 Some details follow...
40 Some details follow... Policy Provisioning
41 Some details follow... Policy Provisioning
42 Some details follow... Policy Provisioning
43 Policy Provisioning
44 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date
45 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date
46 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours
47 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours
48 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours Event: Condition: Action:
49 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours Event: Condition: Action: process(data)
50 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours Event: process(data) Condition: Action: <inhibit>
51 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours Event: process(data) Condition: not(repmin(24[hours], 1, receive(data))) Action: <inhibit>
52 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours Event: process(data) Condition: not(repmin(24[hours], 1, receive(data))) Action: <inhibit> Complex LTL formulas: propositional temporal cardinal spatial constraints
53 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours Event: process(data) Condition: not(repmin(24[hours], 1, receive(data))) Action: <inhibit> Complex LTL formulas: propositional temporal cardinal spatial constraints
54 Some details follow... Policy Provisioning Application Deployment
55 Some details follow... Policy Provisioning Application Deployment
56 Some details follow... Policy Provisioning Application Deployment
57 Application Deployment
58 Application Deployment Analysis of binary app to find
59 Application Deployment Analysis of binary app to find Data sources e.g., retrieve from OSN
60 Application Deployment Analysis of binary app to find Data sources e.g., retrieve from OSN Data sinks e.g., data usage/sharing
61 Application Deployment Analysis of binary app to find Data sources e.g., retrieve from OSN Data sinks e.g., data usage/sharing Dependencies between them
62 Application Deployment Analysis of binary app to find Data sources e.g., retrieve from OSN Data sinks e.g., data usage/sharing Dependencies between them Instrumentation of sources and sinks for
63 Application Deployment Analysis of binary app to find Data sources e.g., retrieve from OSN Data sinks e.g., data usage/sharing Dependencies between them Instrumentation of sources and sinks for Data flow tracking Policy decisions
64 Some details follow... Policy Provisioning Application Deployment Event signaling for data flow tracking policy decisions
65 Event Signaling
66 Event Signaling Signal invocations of data sources data sinks
67 Event Signaling Signal invocations of data sources data sinks to decision engine:
68 Event Signaling Signal invocations of data sources data sinks to decision engine: Is data read from source? Is data written to sink?
69 Event Signaling Signal invocations of data sources data sinks to decision engine: Is data read from source? Is data written to sink? } i.e., does event of ECA rule match? Event: Condition: Action: process(data) not(repmin(24[hours], 1, receive(data))) <inhibit>
70 Event Signaling Signal invocations of data sources data sinks to decision engine: Is data read from source? Is data written to sink? } i.e., does event of ECA rule match? If Yes: Evaluate condition Event: Condition: Action: process(data) not(repmin(24[hours], 1, receive(data))) <inhibit>
71 Event Signaling Signal invocations of data sources data sinks to decision engine: Is data read from source? Is data written to sink? } i.e., does event of ECA rule match? If Yes: Evaluate condition If True: Apply action Event: Condition: Action: process(data) not(repmin(24[hours], 1, receive(data))) <inhibit>
72 Event Signaling Signal invocations of data sources data sinks to decision engine: Is data read from source? Is data written to sink? } i.e., does event of ECA rule match? If Yes: Evaluate condition If True: Apply action Event: Condition: Action: process(data) not(repmin(24[hours], 1, receive(data))) <inhibit>
73 Overview 7. Request 8. Response Applications (untrusted) User Data Continuous policy evaluation 10. Response 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 9. Response 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)
74 Evaluation
75 Evaluation Between 15% and 41% performance overhead
76 Evaluation Between 15% and 41% performance overhead Depends much on the application and policy
77 Evaluation Between 15% and 41% performance overhead Depends much on the application and policy Problem: Real-world apps are not available
78 Summary
79 Summary Protection from data misuse is possible
80 Summary Protection from data misuse is possible Critical requirements
81 Summary Protection from data misuse is possible Critical requirements User awareness
82 Summary Protection from data misuse is possible Critical requirements User awareness Transparency for all involved parties
83 Summary Protection from data misuse is possible Critical requirements User awareness Transparency for all involved parties
Data Warehouse Risk Assessment (GDPR)
Data Warehouse Risk Assessment (GDPR) The new data protection law is effective from 25.05.2018. Individuals will have more control of their personal data and organisations will have to implement a risk
More informationLBI Public Information. Please consider the impact to the environment before printing this.
LBI Public Information. Please consider the impact to the environment before printing this. DGPC Framework People Executive management commitment Engaged management team Integrated governance organization
More informationThe West End Community Trust Privacy Policy
The West End Community Trust Privacy Policy We are committed to protecting your personal information and being transparent about what we do with it, however you interact with us. We are therefore committed
More informationISO27018 a step toward cloud standardisation? GuidelinesCambria
ISO27018 a step toward cloud standardisation? GuidelinesCambria 32pt) Palo Alto Mark Webber, Partner Fieldfisher January 2015 Brussels / Düsseldorf / Hamburg / London / Manchester / Munich / Palo Alto /Paris
More information1 Privacy Statement INDEX
INDEX 1 Privacy Statement Mphasis is committed to protecting the personal information of its customers, employees, suppliers, contractors and business associates. Personal information includes data related
More informationCloud Computing Briefing Presentation. DANU
Cloud Computing Briefing Presentation Contents Introducing the Cloud Value Proposition Opportunities Challenges Success Stories DANU Cloud Offering Introducing the Cloud What is Cloud Computing? IT capabilities
More information1.2 This Privacy Policy applies to the games provided by GAMESTURE sp. z o. o. (GAMESTURE, We, Our company)
1. Privacy 1.1 This Privacy Policy explains how information is collected and utilized by GAMESTURE sp. z o. o. seated in ul. Grodziska 8, 60-363 POZNAŃ 1.2 This Privacy Policy applies to the games provided
More informationHYPERFAST BROADBAND. Acceptable Usage Policy (GCAUP)
Acceptable Usage Policy (GCAUP) Acceptable Usage Policy grainconnect.com Contents 1. General Information 3 2. The Policy 3 2 1. General Information 1.1 Grain s relationship with other networks and ultimately
More informationRepresentation-Independent Data Usage Control
Representation-Independent Data Usage Control Alexander Pretschner, Enrico Lovat, Matthias Büchler Karlsruhe Institute of Technology, Germany {pretschner,lovat,buechler}@kit.edu Abstract. Usage control
More informationPublic Sector Cloud Service Adoption: The Nigerian Case
Public Sector Cloud Service Adoption: The Nigerian Case Dr. Olayinka David-West & Immanuel Umukoro Department of Operations, Marketing and Information Systems Email: ydavid-west@lbs.edu.ng Outline v Introduction
More informationSecurity as a Architectural Concern, Chrome Arch, and NFP Measurement Reid Holmes
Material and some slide content from: - Software Architecture: Foundations, Theory, and Practice - Krzysztof Czarnecki Security as a Architectural Concern, Chrome Arch, and NFP Measurement Reid Holmes
More informationModule 5: Performance Issues in Shared Memory and Introduction to Coherence Lecture 9: Performance Issues in Shared Memory. The Lecture Contains:
The Lecture Contains: Data Access and Communication Data Access Artifactual Comm. Capacity Problem Temporal Locality Spatial Locality 2D to 4D Conversion Transfer Granularity Worse: False Sharing Contention
More informationETSY.COM - PRIVACY POLICY
At Etsy, we value our community. You trust us with your information, and we re serious about that responsibility. We believe in transparency, and we re committed to being upfront about our privacy practices,
More informationThe Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec
The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec James Edwards Product Marketing Manager Dan Watson Senior Systems Engineer Disclaimer This session may contain product
More informationFormal Methods in Software Engineering. Lecture 07
Formal Methods in Software Engineering Lecture 07 What is Temporal Logic? Objective: We describe temporal aspects of formal methods to model and specify concurrent systems and verify their correctness
More informationCloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel
Cloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel Legal Disclaimer Intel may make changes to specifications
More informationIsoStack Highly Efficient Network Processing on Dedicated Cores
IsoStack Highly Efficient Network Processing on Dedicated Cores Leah Shalev Eran Borovik, Julian Satran, Muli Ben-Yehuda Outline Motivation IsoStack architecture Prototype TCP/IP over 10GE on a single
More informationIt applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).
Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations
More informationSCONE: Secure Linux Container Environments with Intel SGX
SCONE: Secure Linux Container Environments with Intel SGX S. Arnautov, B. Trach, F. Gregor, Thomas Knauth, and A. Martin, Technische Universität Dresden; C. Priebe, J. Lind, D. Muthukumaran, D. O'Keeffe,
More informationHow the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015
How the European Commission is supporting innovation in mobile health technologies Nordic Mobile Healthcare Technology Congress 2015 Claudia Prettner, Unit for Health and Well-Being, DG CONNECT Table of
More informationMobile Application Privacy Policy
Mobile Application Privacy Policy Introduction This mobile application is hosted and operated on behalf of your health plan. As such, some information collected through the mobile application may be considered
More informationetouches, Inc. Privacy Policy
etouches, Inc. Privacy Policy Effective Date: March 1, 2017 This privacy policy applies to etouches, Inc. ( etouches ) and covers the site, www.etouches.com corporate site and application(s) accessed via
More informationWhen we refer to Toyota, we mean Toyota Motor Sales, USA, Inc. and its affiliated entities.
SOUTHEAST TOYOTA DISTRIBUTORS, LLC PRIVACY POLICY Last modified: September 15, 2016 The protection and proper use of information we collect about you is a responsibility we take seriously. Our primary
More informationPrivacy Policy. Last Updated: August 2017
Privacy Policy Last Updated: August 2017 Here at ConsenSys we know how much you value privacy, and we realize that you care about what happens to the information you provide to us through our website,
More informationIslam21c.com Data Protection and Privacy Policy
Islam21c.com Data Protection and Privacy Policy Purpose of this policy The purpose of this policy is to communicate to staff, volunteers, donors, non-donors, supporters and clients of Islam21c the approach
More informationPrivacy Code of Conduct on mhealth apps the role of soft-law in enhancing trust ehealth Week 2016
Privacy Code of Conduct on mhealth apps the role of soft-law in enhancing trust ehealth Week 2016 Pēteris Zilgalvis, J.D., Head of Unit for Health and Well-Being, DG CONNECT Table of Contents 1. Context
More informationA Haskell and Information Flow Control Approach to Safe Execution of Untrusted Web Applications
A Haskell and Information Flow Control Approach to Safe Execution of Untrusted Web Applications Deian Stefan Stanford University April 11, 2011 Joint work with David Mazières, Alejandro Russo, Daniel B.
More informationArchitecture Assessment Case Study. Single Sign on Approach Document PROBLEM: Technology for a Changing World
Technology for a Changing World Architecture Assessment Case Study Single Sign on Approach Document PROBLEM: Existing portal has Sign on Capabilities based on the SQL Server database and it s not having
More informationPrivacy Policy. I. How your information is used. Registration and account information. March 3,
Privacy Policy This Privacy Policy describes how and when we collect, use and share your information across our App. When using our App you consent to the collection, transfer, storage, disclosure, and
More informationCIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products
CIAM: Need for Identity Governance & Assurance Yash Prakash VP of Products Key Tenets of CIAM Solution Empower consumers, CSRs & administrators Scale to millions of entities, cloud based service Security
More informationSeparating Access Control Policy, Enforcement, and Functionality in Extensible Systems. Robert Grimm University of Washington
Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems Robert Grimm University of Washington Extensions Added to running system Interact through low-latency interfaces Form
More informationA Tutorial on Runtime Verification and Assurance. Ankush Desai EECS 219C
A Tutorial on Runtime Verification and Assurance Ankush Desai EECS 219C Outline 1. Background on Runtime Verification 2. Challenges in Programming Robotics System Drona). 3. Solution 1: Combining Model
More informationTABLE OF CONTENTS. Page
TABLE OF CONTENTS Page Policy Statement... 1 What kinds of personal information do we collect?... 1 How do we collect and hold personal information?... 1 How do we hold personal information?... 2 Purposes
More informationADMA Briefing Summary March
ADMA Briefing Summary March 2013 www.adma.com.au Privacy issues are being reviewed globally. In most cases, technological changes are driving the demand for reforms and Australia is no exception. From
More informationUnderstanding the Platform
Understanding the Platform Contents 2 Contents Understanding the Platform... 3 Platform Architecture... 3 Services Layer...3 Understanding Jive Search... 4 About Cloud Search... 4 About On-Premise Search...5
More informationWidget security model based on MIDP and Web Application based on a security model with TLS/SSL and XMLDsig
Widget security model based on MIDP and Web Application based on a security model with TLS/SSL and XMLDsig Claes Nilsson Technology Area Group Leader Web Browsing Marcus Liwell Technology Area Group Leader
More informationPrivacy hacking & Data Theft
Privacy hacking & Data Theft Cloud Computing risks & the Patricia A RoweSeale CIA, CISA, CISSP, CRISC, CRMA The IIA (Barbados Chapter) Internal Audit Portfolio Director CIBC FirstCaribbean Objectives Cloud
More informationSample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.
Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring
More informationPrivacy-Preserving Photo Sharing based on Secure JPEG
Privacy-Preserving Photo Sharing based on Secure Lin Yuan, Touradj Ebrahimi Multimedia Signal Processing Group - MMSPG Ecole Polytechnique Fédérale de Lausanne EPFL CH-1015 Lausanne, Switzerland Touradj.Ebrahimi@epfl.ch
More informationFundamental Concepts and Models
Fundamental Concepts and Models 1 Contents 1. Roles and Boundaries 2. Cloud Delivery Models 3. Cloud Deployment Models 2 1. Roles and Boundaries Could provider The organization that provides the cloud
More informationPrivacy Policy. Personal Data collected for the following purposes and using the following services:
Privacy Policy This Application collects some Personal Data from its Users. Summary Personal Data collected for the following purposes and using the following services: Access to third party services'
More informationWebsite Privacy Policy
Website Privacy Policy Village Emergency Center Privacy Policy Updated: 1/22/18. PLEASE READ THIS PRIVACY POLICY (Privacy Policy) CAREFULLY. By accessing and using this website, you agree to be bound by
More informationEagles Charitable Foundation Privacy Policy
Eagles Charitable Foundation Privacy Policy Effective Date: 1/18/2018 The Eagles Charitable Foundation, Inc. ( Eagles Charitable Foundation, we, our, us ) respects your privacy and values your trust and
More informationMicrosoft. MS-101 EXAM Microsoft 365 Mobility and Security. m/ Product: Demo File
Page No 1 https://www.dumpsplanet.com m/ Microsoft MS-101 EXAM Microsoft 365 Mobility and Security Product: Demo File For More Information: MS-101-dumps Question: 1 Your company uses Windows Defender Advanced
More informationAn Access Control Model for Collaborative Management of Shared Data in OSNS
An Access Control Model for Collaborative Management of Shared Data in OSNS Ch. Aruna 1, G. Minni 2 1 M.Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India. 2 Asst. Professor, Dept.of
More informationYou can find a brief summary of this Privacy Policy in the chart below.
In this policy Shine TV Limited with registered office at Shepherds Building Central, Charecroft Way, Shepherds Bush, London, W14 0EE, UK (Company or we) informs you about how we collect, use and disclose
More informationUsing Positive Tainting and Syntax-Aware Evaluation to Counter SQL Injection Attacks
Using Positive Tainting and Syntax-Aware Evaluation to Counter SQL Injection Attacks Alex Orso with William Halfond and Pete Manolios Georgia Institute of Technology {orso whalfond manolios}@cc.gatech.edu
More informationFACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?
FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit
More informationManaging SaaS risks for cloud customers
Managing SaaS risks for cloud customers Information Security Summit 2016 September 13, 2016 Ronald Tse Founder & CEO, Ribose For every IaaS/PaaS, there are 100s of SaaS PROBLEM SaaS spending is almost
More informationData Protection and Privacy Policy PORTOBAY GROUP Version I
Data Protection and Privacy Policy PORTOBAY GROUP 2018-03-07 Page 1 of 12 Contents Commitment to Data Protection and Privacy... 3 Definitions... 3 Entity Responsible for Processing... 4 Contact information
More informationWebsite and Marketing Privacy Policy
Website and Marketing Privacy Policy In this policy Endemol Shine UK and its group of companies (Company or we) informs you about how we collect, use and disclose personal data from and about you and your
More informationBeyond BYOD Mobility, Cloud and the Internet of Everything
Beyond BYOD Mobility, Cloud and the Internet of Everything COCCOC-2002 Donald Gunn, Program Manager Cisco IT Agenda Changing Environment Devices Security Support Cloud & Apps Questions COCCOC-2002 2015
More informationImplicit BPM Business Process Platform for Transparent Workflow Weaving
Implicit BPM Business Process Platform for Transparent Workflow Weaving Rubén Mondéjar, Pedro García, Carles Pairot, and Enric Brull BPM Round Table Tarragona Contents Context Introduction 01/27 Building
More informationData Subject Access Request Procedure. Page 1 KubeNet Data Subject Access Request Procedure KN-SOP
Data Subject Access Request Procedure Page 1 Table of contents 1. Scope, Purpose and Users... 3 2. Reference Documents... 3 3. Data Subject Access Request ( DSAR )... 3 4. The Rights of a Data Subject...
More informationALGORITHMIC TRADING AND ORDER ROUTING SERVICES POLICY
ALGORITHMIC TRADING AND ORDER ROUTING SERVICES POLICY Please respond to: Trading Operations THE LONDON METAL EXCHANGE 10 Finsbury Square, London EC2A 1AJ Tel +44 (0)20 7113 8888 Registered in England no
More informationPOLICY ON ALGORITHMIC TRADING AND ORDER ROUTING SERVICES
Appendix 2 POLICY ON ALGORITHMIC TRADING AND ORDER ROUTING SERVICES [This is the LME s current proposal it may be subject to change following the feedback from the consultation.] Introduction 1. This document
More informationWhen and what information does Kantar Worldpanel collect?
Shoppix Privacy Policy [16 th march 2017] Kantar Worldpanel (herein referred to as we or us ) which operates Shoppix, recognises that your privacy is important and that you have the right to know what
More informationSOFTWARE PLATFORM INFRASTRUCTURE. as a Service. as a Service. as a Service. Empower Users. Develop Apps. Manage Machines
SOFTWARE as a Service PLATFORM as a Service INFRASTRUCTURE as a Service Empower Users Develop Apps Manage Machines 2013 2009 $2.9B $5.7B $6.9B $13.3B $14.0B $17.6B By 2014, cloud computing services will
More informationLeveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group
Leveraging the Cloud for Law Enforcement Richard A. Falkenrath, PhD Principal, The Chertoff Group Law Enforcement Information Management Training Conference & Technology Exposition May 21,2013 Outline
More information#mytweet via Instagram: Exploring User Behaviour Across Multiple Social Networks
1 #mytweet via Instagram: Exploring User Behaviour Across Multiple Social Networks Bang Hui Lim, Dongyuan Lu Tao Chen, Min-yen Kan Web Information Retrieval / Natural Language Processing Group 1. http://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/
More informationecare Vault, Inc. Privacy Policy
ecare Vault, Inc. Privacy Policy This document was last updated on May 18, 2017. ecare Vault, Inc. owns and operates the website www.ecarevault.com ( the Site ). ecare Vault also develops, operates and
More informationVMware Hybrid Cloud Solution
VMware Hybrid Cloud Solution Simplifying and Accelerating Your Multi-Cloud Strategy Bunyamin Ozyasar System Engineer Manager 2017 VMware Inc. All rights reserved. Today s Agenda 1 2 3 VMware SDDC Approach
More informationPRIVACY POLICY GUESTS WEB OR CONTACTS. The Privacy Policy is part of that govern this Website.
PRIVACY POLICY The Privacy Policy is part of that govern this Website. Who is responsible for the processing of your data? SERVATUR S.A. CIF: A35032200 Address: Calle Doramas, 4, 35129, Mogán (Las Palmas)
More informationData Protection Policy
Data Protection Policy Introduction Stewart Watt & Co. is law firm and provides legal advice and assistance to its clients. It is regulated by the Law Society of Scotland. The personal data that Stewart
More informationDate Approved: Board of Directors on 7 July 2016
Policy: Bring Your Own Device Person(s) responsible for updating the policy: Chief Executive Officer Date Approved: Board of Directors on 7 July 2016 Date of Review: Status: Every 3 years Non statutory
More informationIntroduction To Cloud Computing
Introduction To Cloud Computing What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,
More informationGeneral Data Protection Regulation BT s amendments to the proposed Regulation on the protection of individuals with regard to the processing of
General Data Protection Regulation BT s amendments to the proposed Regulation on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General
More informationPrivacy Policy V2.0.1
Privacy Policy V2.0.1 Effective date 25/5/2018 1. Introduction ParkMagic values the trust our users and customers place in us when they give us access to their Personal Information. The Privacy Policy
More informationPlus500UK Limited. Website and Platform Privacy Policy
Plus500UK Limited Website and Platform Privacy Policy Website and Platform Privacy Policy Your privacy and trust are important to us and this Privacy Statement (Statement) provides important information
More informationRegulating Telemedicine: the
Regulating Telemedicine: the EU perspective ETSI ehealth workshop On telemedicine 6-7 May 2014 Céline Deswarte, Policy officer Unit Health and Well-Being European Commission i Table of Contents t 1) Legal
More information<Document Title> INFORMATION SECURITY POLICY
INFORMATION SECURITY POLICY 2018 DOCUMENT HISTORY DATE STATUS VERSION REASON NAME 24.03.2014 Draft 0.1 First draft Pedro Evaristo 25.03.2014 Draft 0.2 Refinement Pedro Evaristo 26.03.2014
More informationINFS 214: Introduction to Computing
INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing
More informationExperiences with. data for use in apps
Experiences with publishing INSPIRE data for use in apps Presentation to: Author: Date: INSPIRE Conference 2014 Clemens Portele 2014 06 18 From INSPIRE Conference 2013: "How to use INSPIRE data?" INSPIRE
More informationAt Sound United, we re committed to protecting and respecting your privacy.
HEOS Privacy Policy At Sound United, we re committed to protecting and respecting your privacy. What is the purpose of this policy? This Policy explains when and why we collect personal information about
More informationAbstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight
ESG Lab Review InterSystems Data Platform: A Unified, Efficient Data Platform for Fast Business Insight Date: April 218 Author: Kerry Dolan, Senior IT Validation Analyst Abstract Enterprise Strategy Group
More informationIBM Bluemix platform as a service (PaaS)
Cloud Developer Certification Preparation IBM Bluemix platform as a service (PaaS) After you complete this unit, you should understand: Use cases for IBM Bluemix PaaS applications Key infrastructure components
More informationSDMS Assessor Web Portal User Manual PMKVY2.0
SDMS Assessor Web Portal User Manual PMKVY2.0 29 th MAY, 2017 Campus Management Corp., Campus Management, Talisma, CampusNexus, the Campus Management logo, the CampusNexus logo, and the Talisma logo are
More informationCyberpeace A Guide to. Social Networking And Privacy Settings
Cyberpeace A Guide to Social Networking And Privacy Settings facebook Facebook gives the user the ability to choose his or her own privacy settings. By clicking the arrow and then the link that says Privacy
More informationVerified Volunteers. A division of Sterling Talent Solutions. Privacy Policy. Last Updated: June 21, 2016
Verified Volunteers A division of Sterling Talent Solutions Privacy Policy Last Updated: June 21, 2016 Verified Volunteers, a division of Sterling Talent Solutions ( Company, we, us, or our ) provide this
More informationMySQL CLOUD SERVICE. Propel Innovation and Time-to-Market
MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service
More informationPrivacy Statement for DROP Connect Products and Services
Privacy Statement for DROP Connect Products and Services Policy active as of February 7, 2018 This Privacy Statement for DROP Products and Services ( Privacy Statement ) describes information that Chandler
More informationEnsuring β-availability in P2P Social Networks
Ensuring β-availability in P2P Social Networks Nashid Shahriar, Shihabur R. Chowdhury*, Mahfuza Sharmin**, Reaz Ahmed*, Raouf Boutaba*, and Bertrand Mathieu Dept. of CSE, Bangladesh University of Engineering
More informationBYOD Business year of decision!
Bucharest, Romania April 24, 2013 BYOD Business year of decision! Cisco on Cisco Christoph Nienhaus IT Leader for EMEAR Central - DACH 2011 2012 Cisco and/or its affiliates. All rights reserved. Cisco
More informationMaking Smart Use of Geo-location Data
Making Smart Use of Geo-location Data Using geolocation in a trustworthy and compliant way Simon.Hania@tomtom.com Trends that threaten trust 2 Connected cars with downloadable apps Location services, cloud,
More informationDistributed and Cloud Computing
Distributed and Cloud Computing K. Hwang, G. Fox and J. Dongarra Chapter 9: Ubiquitous Clouds and The Internet of Things (suggested for use in 5 lectures in 250 minutes) Prepared by Kai Hwang University
More informationStreaming as a pattern. Peter Mattson, Richard Lethin Reservoir Labs
Streaming as a pattern Peter Mattson, Richard Lethin Reservoir Labs Streaming as a pattern Streaming is a pattern in efficient implementations of computation- and data-intensive applications Pattern has
More informationDistributed File System Support for Virtual Machines in Grid Computing
Distributed File System Support for Virtual Machines in Grid Computing Ming Zhao, Jian Zhang, Renato Figueiredo Advanced Computing and Information Systems Electrical and Computer Engineering University
More informationSocial Engineering Hacking the Human Element
Social Engineering Hacking the Human Element cliftonlarsonallen.com Agenda Explain attacker motivations Identify Social Engineering techniques Identify sound security measures to protect critical assets
More informationSegSlice: new primitives for trustworthy computing
SegSlice: new primitives for trustworthy computing Sergey Bratus, PKI/Trust Lab, Dartmouth College Michael Locasto, George Mason U. Brian Schulte, George Mason U. A policy should prevent the system transitions
More informationPlanning and Administering SharePoint 2016
Planning and Administering SharePoint 2016 Course 20339A 5 Days Instructor-led, Hands on Course Information This five-day course will combine the Planning and Administering SharePoint 2016 class with the
More informationOneKey Mobile App USER GUIDE
USER GUIDE Updated in September 2017 All rights reserved. No part of this publication may be produced or transmitted in any form or by any means, including photocopying and recording, without seeking the
More informationCloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
More informationPlanning an architecture for the. Internet of Things. IoT Expo, Nov 5, Sumit Sharma Director, API Solutions.
Planning an architecture for the Internet of Things IoT Expo, Nov 5, 2014 Sumit Sharma Director, API Solutions sumit.sharma@mulesoft.com Leading connectivity platform for enterprise applications, mobile
More informationACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION
ACCOUNTING TECHNICIANS IRELAND DATA PROTECTION POLICY GENERAL DATA PROTECTION REGULATION Document Control Owner: Distribution List: Data Protection Officer Relevant individuals who access, use, store or
More informationThe Software Driven Datacenter
The Software Driven Datacenter Three Major Trends are Driving the Evolution of the Datacenter Hardware Costs Innovation in CPU and Memory. 10000 10 µm CPU process technologies $100 DRAM $/GB 1000 1 µm
More informationIEEE 2013 JAVA PROJECTS Contact No: KNOWLEDGE AND DATA ENGINEERING
IEEE 2013 JAVA PROJECTS www.chennaisunday.com Contact No: 9566137117 KNOWLEDGE AND DATA ENGINEERING (DATA MINING) 1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
More informationData Protection Modernization: Meeting the Challenges of a Changing IT Landscape
Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape Tom Clark IBM Distinguished Engineer, Chief Architect Software 1 Data growth is continuing to explode Sensors & Devices
More informationThe Ladder to AI. Rob Thomas General Manager, IBM
The Ladder to AI Rob Thomas General Manager, IBM Analytics @robdthomas Value Clients Are Advancing Their Use of Data for Business Value Operational BI and Data Warehousing Most are here Self-Service Analytics
More informationPrivacy Statement Tai Ceredigion Cyf Site Privacy Statement
Privacy Statement Tai Ceredigion Cyf Site Privacy Statement Introduction to this Statement This Privacy statement relates to this site together with any associated software applications or devices. You
More information