Compliance Monitoring of Third-Party Applications in Online Social Networks

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Compliance Monitoring of Third-Party Applications in Online Social Networks"

Transcription

1 Compliance Monitoring of Third-Party Applications in Online Social Networks Florian Kelbert, Imperial College London Alexander Fromm, Technical University of Munich

2

3

4

5

6 Problem

7 Problem How to ensure that data is used in correspondence with policies?

8 Problem How to ensure that data is used in correspondence with policies?

9 Problem How to ensure that data is used in correspondence with policies?

10 Problem How to ensure that data is used in correspondence with policies?

11 Problem How to ensure that data is used in correspondence with policies?

12 Problem How to ensure that data is used in correspondence with policies? You may cache the content for up to 24 hours

13 Problem How to ensure that data is used in correspondence with policies? You may cache the content for up to 24 hours Only use friend data in the person s experience in your app

14 Problem How to ensure that data is used in correspondence with policies? You may cache the content for up to 24 hours Only use friend data in the person s experience in your app You may not disclose confidential information to a third party without the prior explicit consent of Tumblr.

15 To start with...

16 To start with... Social Networks are trusted

17 To start with... Social Networks are trusted

18 To start with... Social Networks are trusted Third Party Applications are not

19 To start with... Social Networks are trusted Third Party Applications are not Thousands of apps and developers

20 Overview

21 Overview User Data OSN Operator (trusted)

22 Overview User Data OSN Operator (trusted)

23 Overview User Data 1. Policy Provisioning Policy Database OSN Operator (trusted)

24 Overview Applications (untrusted) User Data 1. Policy Provisioning Policy Database OSN Operator (trusted)

25 Overview Applications (untrusted) PaaS / SEE (trusted) User Data 1. Policy Provisioning Policy Database PaaS Provider (trusted) OSN Operator (trusted)

26 Overview Applications (untrusted) User Data Libraries PaaS / SEE (trusted) 1. Policy Provisioning Policy Database PaaS Provider (trusted) OSN Operator (trusted)

27 Overview Applications (untrusted) Libraries User Data Monitor PaaS / SEE (trusted) 1. Policy Provisioning Policy Database PaaS Provider (trusted) OSN Operator (trusted)

28 Overview Applications (untrusted) 2. Request Libraries User Data Monitor PaaS / SEE (trusted) 1. Policy Provisioning Policy Database PaaS Provider (trusted) OSN Operator (trusted)

29 Overview Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request Policy Database Coordinator PaaS Provider (trusted) OSN Operator (trusted)

30 Overview Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies Policy Database Coordinator PaaS Provider (trusted) OSN Operator (trusted)

31 Overview Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 5. Policies Policy Database Coordinator PaaS Provider (trusted) OSN Operator (trusted)

32 Overview Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 5. Policies Decision Engine PaaS Provider (trusted) Policy Database Coordinator OSN Operator (trusted)

33 Overview Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)

34 Overview 7. Request Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)

35 Overview 7. Request 8. Response Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)

36 Overview 7. Request 8. Response Applications (untrusted) User Data 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 9. Response 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)

37 Overview 7. Request 8. Response Applications (untrusted) User Data 10. Response 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 9. Response 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)

38 Overview 7. Request 8. Response Applications (untrusted) User Data Continuous policy evaluation 10. Response 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 9. Response 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)

39 Some details follow...

40 Some details follow... Policy Provisioning

41 Some details follow... Policy Provisioning

42 Some details follow... Policy Provisioning

43 Policy Provisioning

44 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date

45 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date

46 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours

47 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours

48 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours Event: Condition: Action:

49 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours Event: Condition: Action: process(data)

50 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours Event: process(data) Condition: Action: <inhibit>

51 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours Event: process(data) Condition: not(repmin(24[hours], 1, receive(data))) Action: <inhibit>

52 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours Event: process(data) Condition: not(repmin(24[hours], 1, receive(data))) Action: <inhibit> Complex LTL formulas: propositional temporal cardinal spatial constraints

53 Policy Provisioning If you cache data you receive from us, [... ] keep it up to date Whenever some data is processed by the application, then it must have been received from the OSN within the last 24 hours Event: process(data) Condition: not(repmin(24[hours], 1, receive(data))) Action: <inhibit> Complex LTL formulas: propositional temporal cardinal spatial constraints

54 Some details follow... Policy Provisioning Application Deployment

55 Some details follow... Policy Provisioning Application Deployment

56 Some details follow... Policy Provisioning Application Deployment

57 Application Deployment

58 Application Deployment Analysis of binary app to find

59 Application Deployment Analysis of binary app to find Data sources e.g., retrieve from OSN

60 Application Deployment Analysis of binary app to find Data sources e.g., retrieve from OSN Data sinks e.g., data usage/sharing

61 Application Deployment Analysis of binary app to find Data sources e.g., retrieve from OSN Data sinks e.g., data usage/sharing Dependencies between them

62 Application Deployment Analysis of binary app to find Data sources e.g., retrieve from OSN Data sinks e.g., data usage/sharing Dependencies between them Instrumentation of sources and sinks for

63 Application Deployment Analysis of binary app to find Data sources e.g., retrieve from OSN Data sinks e.g., data usage/sharing Dependencies between them Instrumentation of sources and sinks for Data flow tracking Policy decisions

64 Some details follow... Policy Provisioning Application Deployment Event signaling for data flow tracking policy decisions

65 Event Signaling

66 Event Signaling Signal invocations of data sources data sinks

67 Event Signaling Signal invocations of data sources data sinks to decision engine:

68 Event Signaling Signal invocations of data sources data sinks to decision engine: Is data read from source? Is data written to sink?

69 Event Signaling Signal invocations of data sources data sinks to decision engine: Is data read from source? Is data written to sink? } i.e., does event of ECA rule match? Event: Condition: Action: process(data) not(repmin(24[hours], 1, receive(data))) <inhibit>

70 Event Signaling Signal invocations of data sources data sinks to decision engine: Is data read from source? Is data written to sink? } i.e., does event of ECA rule match? If Yes: Evaluate condition Event: Condition: Action: process(data) not(repmin(24[hours], 1, receive(data))) <inhibit>

71 Event Signaling Signal invocations of data sources data sinks to decision engine: Is data read from source? Is data written to sink? } i.e., does event of ECA rule match? If Yes: Evaluate condition If True: Apply action Event: Condition: Action: process(data) not(repmin(24[hours], 1, receive(data))) <inhibit>

72 Event Signaling Signal invocations of data sources data sinks to decision engine: Is data read from source? Is data written to sink? } i.e., does event of ECA rule match? If Yes: Evaluate condition If True: Apply action Event: Condition: Action: process(data) not(repmin(24[hours], 1, receive(data))) <inhibit>

73 Overview 7. Request 8. Response Applications (untrusted) User Data Continuous policy evaluation 10. Response 2. Request Libraries Monitor 1. Policy Provisioning PaaS / SEE (trusted) 3. Request 4. getpolicies 9. Response 5. Policies Decision Engine PaaS Provider (trusted) 6. deploypolicy Policy Database Coordinator OSN Operator (trusted)

74 Evaluation

75 Evaluation Between 15% and 41% performance overhead

76 Evaluation Between 15% and 41% performance overhead Depends much on the application and policy

77 Evaluation Between 15% and 41% performance overhead Depends much on the application and policy Problem: Real-world apps are not available

78 Summary

79 Summary Protection from data misuse is possible

80 Summary Protection from data misuse is possible Critical requirements

81 Summary Protection from data misuse is possible Critical requirements User awareness

82 Summary Protection from data misuse is possible Critical requirements User awareness Transparency for all involved parties

83 Summary Protection from data misuse is possible Critical requirements User awareness Transparency for all involved parties

LBI Public Information. Please consider the impact to the environment before printing this.

LBI Public Information. Please consider the impact to the environment before printing this. LBI Public Information. Please consider the impact to the environment before printing this. DGPC Framework People Executive management commitment Engaged management team Integrated governance organization

More information

1 Privacy Statement INDEX

1 Privacy Statement INDEX INDEX 1 Privacy Statement Mphasis is committed to protecting the personal information of its customers, employees, suppliers, contractors and business associates. Personal information includes data related

More information

Cloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel

Cloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel Cloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel Legal Disclaimer Intel may make changes to specifications

More information

Widget security model based on MIDP and Web Application based on a security model with TLS/SSL and XMLDsig

Widget security model based on MIDP and Web Application based on a security model with TLS/SSL and XMLDsig Widget security model based on MIDP and Web Application based on a security model with TLS/SSL and XMLDsig Claes Nilsson Technology Area Group Leader Web Browsing Marcus Liwell Technology Area Group Leader

More information

Privacy hacking & Data Theft

Privacy hacking & Data Theft Privacy hacking & Data Theft Cloud Computing risks & the Patricia A RoweSeale CIA, CISA, CISSP, CRISC, CRMA The IIA (Barbados Chapter) Internal Audit Portfolio Director CIBC FirstCaribbean Objectives Cloud

More information

Eagles Charitable Foundation Privacy Policy

Eagles Charitable Foundation Privacy Policy Eagles Charitable Foundation Privacy Policy Effective Date: 1/18/2018 The Eagles Charitable Foundation, Inc. ( Eagles Charitable Foundation, we, our, us ) respects your privacy and values your trust and

More information

VMware Hybrid Cloud Solution

VMware Hybrid Cloud Solution VMware Hybrid Cloud Solution Simplifying and Accelerating Your Multi-Cloud Strategy Bunyamin Ozyasar System Engineer Manager 2017 VMware Inc. All rights reserved. Today s Agenda 1 2 3 VMware SDDC Approach

More information

Data Protection and Privacy Policy PORTOBAY GROUP Version I

Data Protection and Privacy Policy PORTOBAY GROUP Version I Data Protection and Privacy Policy PORTOBAY GROUP 2018-03-07 Page 1 of 12 Contents Commitment to Data Protection and Privacy... 3 Definitions... 3 Entity Responsible for Processing... 4 Contact information

More information

Cyberpeace A Guide to. Social Networking And Privacy Settings

Cyberpeace A Guide to. Social Networking And Privacy Settings Cyberpeace A Guide to Social Networking And Privacy Settings facebook Facebook gives the user the ability to choose his or her own privacy settings. By clicking the arrow and then the link that says Privacy

More information

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS? FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit

More information

When and what information does Kantar Worldpanel collect?

When and what information does Kantar Worldpanel collect? Shoppix Privacy Policy [16 th march 2017] Kantar Worldpanel (herein referred to as we or us ) which operates Shoppix, recognises that your privacy is important and that you have the right to know what

More information

Implicit BPM Business Process Platform for Transparent Workflow Weaving

Implicit BPM Business Process Platform for Transparent Workflow Weaving Implicit BPM Business Process Platform for Transparent Workflow Weaving Rubén Mondéjar, Pedro García, Carles Pairot, and Enric Brull BPM Round Table Tarragona Contents Context Introduction 01/27 Building

More information

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service

More information

ecare Vault, Inc. Privacy Policy

ecare Vault, Inc. Privacy Policy ecare Vault, Inc. Privacy Policy This document was last updated on May 18, 2017. ecare Vault, Inc. owns and operates the website www.ecarevault.com ( the Site ). ecare Vault also develops, operates and

More information

BYOD Business year of decision!

BYOD Business year of decision! Bucharest, Romania April 24, 2013 BYOD Business year of decision! Cisco on Cisco Christoph Nienhaus IT Leader for EMEAR Central - DACH 2011 2012 Cisco and/or its affiliates. All rights reserved. Cisco

More information

Regulating Telemedicine: the

Regulating Telemedicine: the Regulating Telemedicine: the EU perspective ETSI ehealth workshop On telemedicine 6-7 May 2014 Céline Deswarte, Policy officer Unit Health and Well-Being European Commission i Table of Contents t 1) Legal

More information

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud-Security: Show-Stopper or Enabling Technology? Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics

More information

Security Readiness Assessment

Security Readiness Assessment Security Readiness Assessment Jackson Thomas Senior Manager, Sales Consulting Copyright 2015 Oracle and/or its affiliates. All rights reserved. Cloud Era Requires Identity-Centric Security SaaS PaaS IaaS

More information

Distributed File System Support for Virtual Machines in Grid Computing

Distributed File System Support for Virtual Machines in Grid Computing Distributed File System Support for Virtual Machines in Grid Computing Ming Zhao, Jian Zhang, Renato Figueiredo Advanced Computing and Information Systems Electrical and Computer Engineering University

More information

OneKey Mobile App USER GUIDE

OneKey Mobile App USER GUIDE USER GUIDE Updated in September 2017 All rights reserved. No part of this publication may be produced or transmitted in any form or by any means, including photocopying and recording, without seeking the

More information

Streaming as a pattern. Peter Mattson, Richard Lethin Reservoir Labs

Streaming as a pattern. Peter Mattson, Richard Lethin Reservoir Labs Streaming as a pattern Peter Mattson, Richard Lethin Reservoir Labs Streaming as a pattern Streaming is a pattern in efficient implementations of computation- and data-intensive applications Pattern has

More information

DROPBOX.COM - PRIVACY POLICY

DROPBOX.COM - PRIVACY POLICY Dropbox Privacy Policy Last Modified: October 15, 2012 This Privacy Policy provides our policies and procedures for collecting, using, and disclosing your information. Users can access the Dropbox service

More information

Protecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series

Protecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series Protecting your Data in the Cloud Cyber Security Awareness Month Seminar Series October 24, 2012 Agenda Introduction What is the Cloud Types of Clouds Anatomy of a cloud Why we love the cloud Consumer

More information

Privacy Policy. NOTE: FOR ALL LOGIN OR SUPPORT QUESTIONS, PLEASE CONTACT:

Privacy Policy. NOTE: FOR ALL LOGIN OR SUPPORT QUESTIONS, PLEASE CONTACT: Privacy Policy NOTE: FOR ALL LOGIN OR SUPPORT QUESTIONS, PLEASE CONTACT: support@healthcaresource.com. This is the privacy policy ( Privacy Policy ) for the healthcaresource.com Website with a front page

More information

Lecture Embedded System Security Introduction to Trusted Computing

Lecture Embedded System Security Introduction to Trusted Computing 1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Summer Term 2015 Roadmap: Trusted Computing Motivation Notion of trust

More information

THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017

THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017 THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017 An IT Architect s Guide to Implementation Considerations and Best Practices When Developing a BYOD Strategy As the consumerization

More information

e-transfer means the transfer of funds to Recipients using their address or mobile number;

e-transfer means the transfer of funds to Recipients using their  address or mobile number; Royal Bank of Canada MASTER CLIENT AGREEMENT FOR BUSINESS CLIENTS INTERAC e-transfer Service Materials These are Service Materials for Royal Bank s INTERAC e-transfer Service, and form part of the Master

More information

Cisco Cloud Strategy. Uwe Müller. Leader PreSales Cloud & Datacenter Germany

Cisco Cloud Strategy. Uwe Müller. Leader PreSales Cloud & Datacenter Germany Cisco Cloud Strategy Uwe Müller Leader PreSales Cloud & Datacenter Germany 277X Data created by IoE devices v. end-user 30M New devices connected every week 180B Mobile apps downloaded in 2015 78% Workloads

More information

Internet Engineering Task Force (IETF) Request for Comments: TU Muenchen K. Ishibashi NTT. April 2011

Internet Engineering Task Force (IETF) Request for Comments: TU Muenchen K. Ishibashi NTT. April 2011 Internet Engineering Task Force (IETF) Request for Comments: 6183 Updates: 5470 Category: Informational ISSN: 2070-1721 A. Kobayashi NTT B. Claise Cisco Systems, Inc. G. Muenz TU Muenchen K. Ishibashi

More information

CS 350 Winter 2011 Current Topics: Virtual Machines + Solid State Drives

CS 350 Winter 2011 Current Topics: Virtual Machines + Solid State Drives CS 350 Winter 2011 Current Topics: Virtual Machines + Solid State Drives Virtual Machines Resource Virtualization Separating the abstract view of computing resources from the implementation of these resources

More information

Automating Information Lifecycle Management with

Automating Information Lifecycle Management with Automating Information Lifecycle Management with Oracle Database 2c The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated

More information

I appreciate it is a busy time of year.

I appreciate it is a busy time of year. From: "Greenop, Daz" Subject: RE: Evaluation of NHS England Whistleblower Employment Support Date: 29 September 2017 at 20:43:36 BST To: 'Minh Alexander' No Probs

More information

Runtime Integrity Checking for Exploit Mitigation on Embedded Devices

Runtime Integrity Checking for Exploit Mitigation on Embedded Devices Runtime Integrity Checking for Exploit Mitigation on Embedded Devices Matthias Neugschwandtner IBM Research, Zurich eug@zurich.ibm.com Collin Mulliner Northeastern University, Boston collin@mulliner.org

More information

2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1

2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Cisco AnyConnect as a Service György Ács Regional Security Consultant Mobile User Challenges Mobile and Security Services Web Security

More information

Fundtech JRE 1.7 Update 45 Issues and Resolution

Fundtech JRE 1.7 Update 45 Issues and Resolution Fundtech JRE 1.7 Update 45 Issues and Resolution 10/17/2013 Summary of Issues Oracle released JRE 1.7 update 45 in the late morning of 10/15/2013. Changes in this version of the JRE created the following

More information

Full Clinical Psychotherapist

Full Clinical Psychotherapist 2nd Floor, Edward House 2 Wakley Street London EC1V 7LT Tel: 020 7014 9955 Fax: 020 7014 9977 Email: membership@ukcp.org.uk www.psychotherapy.org.uk Application for membership of UKCP Full Clinical Psychotherapist

More information

A Component Framework for HPC Applications

A Component Framework for HPC Applications A Component Framework for HPC Applications Nathalie Furmento, Anthony Mayer, Stephen McGough, Steven Newhouse, and John Darlington Parallel Software Group, Department of Computing, Imperial College of

More information

DATA PROTECTION AND PRIVACY POLICY

DATA PROTECTION AND PRIVACY POLICY DATA PROTECTION AND PRIVACY POLICY Data Protection Act London Capital Group (Cyprus) Limited (LCG) may process information relating to you, including holding such information in a manual format or electronic

More information

GLBA. The Gramm-Leach-Bliley Act

GLBA. The Gramm-Leach-Bliley Act GLBA The Gramm-Leach-Bliley Act Table of content Introduction 03 Who is affected by GLBA? 06 Why should my organization comply with GLBA? 07 What does GLBA require for email compliance? 08 How can my organization

More information

Functional Skills ICT Level 2 Sample assessment Funfair. Total time available: 2 hours

Functional Skills ICT Level 2 Sample assessment Funfair. Total time available: 2 hours Functional Skills ICT Level 2 Sample assessment 3748-025 Funfair Candidate Name (First, Middle, Last) www.cityandguilds.com September 2011 Version 1.0 For examiner s use only Question Mark Candidate enrolment

More information

Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android

Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android Vaibhav Rastogi 1, Zhengyang Qu 2, Jedidiah McClurg 3, Yinzhi Cao 4, and Yan Chen 2 1 University of Wisconsin and Pennsylvania

More information

Intro - Authenticating the Campus and Beyond Pg 1. University of Groningen Pg 3. Pennsylvania State University Pg 4. Document Centric Solutions Pg 5

Intro - Authenticating the Campus and Beyond Pg 1. University of Groningen Pg 3. Pennsylvania State University Pg 4. Document Centric Solutions Pg 5 REFERENCES Intro - Authenticating the Campus and Beyond Pg 1 University of Groningen Pg 3 Pennsylvania State University Pg 4 Document Centric Solutions Pg 5 Goethe Pg 6 UZ Leuven Pg 7 Rotterdam University

More information

Using MySQL in a Virtualized Environment. Scott Seighman Systems Engineer Sun Microsystems

Using MySQL in a Virtualized Environment. Scott Seighman Systems Engineer Sun Microsystems Using MySQL in a Virtualized Environment Scott Seighman Systems Engineer Sun Microsystems 1 Agenda Virtualization Overview > Why Use Virtualization > Options > Considerations MySQL & Virtualization Best

More information

TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE

TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE 1. General The term PPS refers to: Professional Provident Society Holdings Trust, (The Holding Trust); Professional

More information

Subject Cooperative activities. Explain the commands of HTML Use the HTML commands. Add textbox-radio button

Subject Cooperative activities. Explain the commands of HTML Use the HTML commands. Add textbox-radio button Name: Class :.. The week Subject Cooperative activities 1 Unit 1 The form- Form tools Explain the commands of HTML Use the HTML commands. Add textbox-radio button 2 Form tools Explain some of HTML elements

More information

Detection of lost status of mobile devices

Detection of lost status of mobile devices Technical Disclosure Commons Defensive Publications Series November 22, 2017 Detection of lost status of mobile devices Sandro Feuz Victor Carbune Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

0x1A Great Papers in Computer Security

0x1A Great Papers in Computer Security CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ slide 1 X. Chen, T, Garfinkel, E. Lewis, P. Subrahmanyam, C. Waldspurger, D. Boneh, J. Dwoskin,

More information

FlexPod. The Journey to the Cloud. Technical Presentation. Presented Jointly by NetApp and Cisco

FlexPod. The Journey to the Cloud. Technical Presentation. Presented Jointly by NetApp and Cisco FlexPod The Journey to the Cloud Technical Presentation Presented Jointly by NetApp and Cisco Agenda Alliance Highlights Introducing FlexPod One Shared Vision and Journey FlexPod for the Oracle base base

More information

Going Serverless. Building Production Applications Without Managing Infrastructure

Going Serverless. Building Production Applications Without Managing Infrastructure Going Serverless Building Production Applications Without Managing Infrastructure Objectives of this talk Outline what serverless means Discuss AWS Lambda and its considerations Delve into common application

More information

Lecture Embedded System Security Introduction to Trusted Computing

Lecture Embedded System Security Introduction to Trusted Computing 1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Summer Term 2012 Roadmap: Trusted Computing Motivation Notion of trust

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Secure Access & SWIFT Customer Security Controls Framework

Secure Access & SWIFT Customer Security Controls Framework Secure Access & SWIFT Customer Security Controls Framework SWIFT Financial Messaging Services SWIFT is the world s leading provider of secure financial messaging services. Their services are used and trusted

More information

The Honest Advantage

The Honest Advantage The Honest Advantage READY TO CHALLENGE THE STATUS QUO GSA Security Policy and PCI Guidelines The GreenStar Alliance 2017 2017 GreenStar Alliance All Rights Reserved Table of Contents Table of Contents

More information

Low Latency Data Grids in Finance

Low Latency Data Grids in Finance Low Latency Data Grids in Finance Jags Ramnarayan Chief Architect GemStone Systems jags.ramnarayan@gemstone.com Copyright 2006, GemStone Systems Inc. All Rights Reserved. Background on GemStone Systems

More information

Bring Your Own Design: Implementing BYOD Without Going Broke or Crazy. Jeanette Lee Sr. Technical Marketing Engineer Ruckus Wireless

Bring Your Own Design: Implementing BYOD Without Going Broke or Crazy. Jeanette Lee Sr. Technical Marketing Engineer Ruckus Wireless Bring Your Own Design: Implementing BYOD Without Going Broke or Crazy Jeanette Lee Sr. Technical Marketing Engineer Ruckus Wireless Taking the Scary out of BYOD What Enterprises REALLY Want 1 2 3 4 5 6

More information

Electronic Communication of Personal Health Information

Electronic Communication of Personal Health Information Electronic Communication of Personal Health Information A presentation to the Porcupine Health Unit (Timmins, Ontario) May 11 th, 2017 Nicole Minutti, Health Policy Analyst Agenda 1. Protecting Privacy

More information

Seminar report Google App Engine Submitted in partial fulfillment of the requirement for the award of degree Of CSE

Seminar report Google App Engine Submitted in partial fulfillment of the requirement for the award of degree Of CSE A Seminar report On Google App Engine Submitted in partial fulfillment of the requirement for the award of degree Of CSE SUBMITTED TO: SUBMITTED BY: www.studymafia.org www.studymafia.org Acknowledgement

More information

License Reporting Manager 8.5. Physical Data Model for an Oracle Database

License Reporting Manager 8.5. Physical Data Model for an Oracle Database License Reporting Manager 8.5 Physical Data Model for an Oracle Database The information contained herein is proprietary and confidential and cannot be disclosed or duplicated without the prior written

More information

We reserve the right to modify this Privacy Policy at any time without prior notice.

We reserve the right to modify this Privacy Policy at any time without prior notice. This Privacy Policy sets out the privacy policy relating to this site accessible at www.battleevents.com and all other sites of Battle Events which are linked to this site (collectively the Site ), which

More information

Cisco AnyConnect Secure Mobility Solution. György Ács Regional Security Consultant

Cisco AnyConnect Secure Mobility Solution. György Ács Regional Security Consultant Cisco AnyConnect Secure Mobility Solution György Ács Regional Security Consultant Mobile User Challenges Mobile and Security Services Web Security Deployment Methods Live Q&A 2011 Cisco and/or its affiliates.

More information

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer Modelos de Negócio na Era das Clouds André Rodrigues, Cloud Systems Engineer Agenda Software and Cloud Changed the World Cisco s Cloud Vision&Strategy 5 Phase Cloud Plan Before Now From idea to production:

More information

Episerver Digital Experience Cloud Norge Thechforum 2017

Episerver Digital Experience Cloud Norge Thechforum 2017 Digital Experience Cloud Norge Thechforum 2017 Daniel Browne Cloud Sales Solution Architect 8/31/2017 4 So let s talk cloud! 8/31/2017 5 What's the difference between all the different available cloud

More information

Why Nomadesk is the right product! for your reseller!!

Why Nomadesk is the right product! for your reseller!! Why Nomadesk is the right product! for your reseller!! What is Nomadesk? secure file sharing and synchronization designed for business professionals Zero thought, in-the-flow file sharing, synchronization

More information

Springfield, Illinois Police Department

Springfield, Illinois Police Department Directive Number: ADM-46 01-084 Issue Date: 05/28/01 Distribution: C,E* Revision Dates: 06/01/01 Effective Date: 06/01/01 Related CALEA Standards: 82.1.7 References: CALEA Standards Manual Rescinds: ADM-46/01-015

More information

Securing Enterprise or User Brought mobile devices

Securing Enterprise or User Brought mobile devices Securing Enterprise or User Brought mobile devices Wilfried Baeten Business Line Director Projects&Consulting Econocom Managed Services 20/09/2013 WWW.ECONOCOM.COM Agenda Introduction The mobile security

More information

Technology for a Changing World

Technology for a Changing World Technology for a Changing World Cisco Expo 2009 Axel Clauberg Director, Solutions & Architectures, Emerging Markets, Cisco Systems November 10, 2009 1 VISION Changing the way the World Lives, Works, Plays

More information

IT Redefined. Hans Timmerman CTO EMC Nederland. Copyright 2015 EMC Corporation. All rights reserved.

IT Redefined. Hans Timmerman CTO EMC Nederland. Copyright 2015 EMC Corporation. All rights reserved. IT Redefined Hans Timmerman CTO EMC Nederland 1 INDUSTRIES FACE STRUCTURAL CHANGE 2 More CEOs See IT As Driver Of Digital Business Innovation And Growth IT has the highest business priority in more than

More information

Sandboxing Untrusted Code: Software-Based Fault Isolation (SFI)

Sandboxing Untrusted Code: Software-Based Fault Isolation (SFI) Sandboxing Untrusted Code: Software-Based Fault Isolation (SFI) Brad Karp UCL Computer Science CS GZ03 / M030 9 th December 2011 Motivation: Vulnerabilities in C Seen dangers of vulnerabilities: injection

More information

NAI Mobile Application Code

NAI Mobile Application Code 2015 UPDATE TO THE NAI Mobile Application Code June 2017 INTRODUCTION The 2015 The NAI may publish from time to time additional guidance documents related to requirements in the App Code. update to the

More information

GM Information Security Controls

GM Information Security Controls : Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5

More information

Connect & take control

Connect & take control Connect & take control RealVNC invented VNC screen sharing technology over twenty years ago. We deliver secure screen sharing for a wide range of industry applications on all major computer and mobile

More information

Comprehensive cloud platform. Cost savings and increased efficiencies. Support for a modern work style

Comprehensive cloud platform. Cost savings and increased efficiencies. Support for a modern work style 2 Comprehensive cloud platform Complete, built-in virtualization platform Industry-leading scalability and performance, so you can virtualize every application Ability to achieve business continuity with

More information

Users Application Virtual Machine Users Application Virtual Machine Users Application Virtual Machine Private Cloud Users Application Virtual Machine On-Premise Service Providers Private Cloud Users Application

More information

Implementation Guide - VPN Network with Static Routing

Implementation Guide - VPN Network with Static Routing Implementation Guide - VPN Network with Static Routing This guide contains advanced topics and concepts. Follow the links in each section for step-by-step instructions on how to configure the following

More information

CHALLENGES GOVERNANCE INTEGRATION SECURITY

CHALLENGES GOVERNANCE INTEGRATION SECURITY CLOUD SERVICES The adoption and migration to the cloud is rooted in the need for speed and flexibility in creating and managing services. These benefits are often impacted by the difficulty of enterprises

More information

2011 INTERNATIONAL COMPARISON PROGRAM

2011 INTERNATIONAL COMPARISON PROGRAM 2011 INTERNATIONAL COMPARISON PROGRAM 2011 ICP DATA ACCESS AND ARCHIVING POLICY GUIDING PRINCIPLES AND PROCEDURES FOR DATA ACCESS ICP Global Office November 2011 Contents I. PURPOSE... 3 II. CONTEXT...

More information

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Microsoft SharePoint Server 2013 Plan, Configure & Manage Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that

More information

Secure Enterprise Access to Support Collaboration on Clinical Research

Secure Enterprise Access to Support Collaboration on Clinical Research Secure Enterprise Access to Support Collaboration on Clinical Research Oracle9iR2 Database Security Oracle World, Sept. 9, 2003 Nitin Sawhney, Ph.D. Cal Collins and Tom Hickerson Akaza Research, Cambridge,

More information

SHAREPOINT 2016 ADMINISTRATOR BOOTCAMP 5 DAYS

SHAREPOINT 2016 ADMINISTRATOR BOOTCAMP 5 DAYS SHAREPOINT 2016 ADMINISTRATOR BOOTCAMP 5 DAYS WHY TAKE 10 DAYS AWAY FROM THE OFFICE WHEN YOU ONLY NEED 5? Need to gain knowledge for both the 203391 Planning and Administering Microsoft SharePoint 2016

More information

Service Manager. Ops Console On-Premise User Guide

Service Manager. Ops Console On-Premise User Guide Service Manager powered by HEAT Ops Console On-Premise User Guide 2017.2.1 Copyright Notice This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates

More information

Hosting Your Data. Website Hosting, Security, Data Protection & Information Governance (IG)

Hosting Your Data. Website Hosting, Security, Data Protection & Information Governance (IG) Hosting Your Data Website Hosting, Security, Data Protection & Information Governance (IG) LHM is a web solutions provider that creates technology, products and software that is meaningful and measurable.

More information

Evidence for Accountable Cloud Computing Services

Evidence for Accountable Cloud Computing Services Thomas Rübsamen, Christoph Reich Hochschule Furtwangen University HFU Aryan Taherimonfared, Tomasz Wiktor Wlodarczyk, Chunming Rong Center for IP-based Service Innovation, TN-IDE, University of Stavanger

More information

CANADA S ANTI-SPAM LEGISLATION: Getting ready for July 1 st, 2014

CANADA S ANTI-SPAM LEGISLATION: Getting ready for July 1 st, 2014 CANADA S ANTI-SPAM LEGISLATION: Getting ready for July 1 st, 2014 Investment Industry Association of Canada Adam Kardash Partner, Privacy and Data Management Osler, Hoskin & Harcourt LLP akardash@osler.com;

More information

SPATIAL CORRELATION BASED CLUSTERING ALGORITHM FOR RANDOM AND UNIFORM TOPOLOGY IN WSNs

SPATIAL CORRELATION BASED CLUSTERING ALGORITHM FOR RANDOM AND UNIFORM TOPOLOGY IN WSNs SPATIAL CORRELATION BASED CLUSTERING ALGORITHM FOR RANDOM AND UNIFORM TOPOLOGY IN WSNs Bhavana H.T 1, Jayanthi K Murthy 2 1 M.Tech Scholar, Dept. of ECE, BMS College of Engineering, Bangalore 2 Associate

More information

Graphene-SGX. A Practical Library OS for Unmodified Applications on SGX. Chia-Che Tsai Donald E. Porter Mona Vij

Graphene-SGX. A Practical Library OS for Unmodified Applications on SGX. Chia-Che Tsai Donald E. Porter Mona Vij Graphene-SGX A Practical Library OS for Unmodified Applications on SGX Chia-Che Tsai Donald E. Porter Mona Vij Intel SGX: Trusted Execution on Untrusted Hosts Processing Sensitive Data (Ex: Medical Records)

More information

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking

More information

Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy

Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy Business Challenges Investment in the Industrial Internet of Things (IIoT) is expected to top $60 trillion during the next 15 years.

More information

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,

More information

OPEN STORAGE IN THE ENTERPRISE with GlusterFS and Ceph

OPEN STORAGE IN THE ENTERPRISE with GlusterFS and Ceph DUSTIN L. BLACK, RHCA OPEN STORAGE IN THE ENTERPRISE with GlusterFS and Ceph Dustin L. Black, RHCA Principal Technical Account Manager Red Hat Strategic Customer Engagement 2014-10-13 Dustin L. Black,

More information

ALTO Problem Statement

ALTO Problem Statement ALTO Problem Statement draft-marocco-alto-problem-statement-02 Enrico Marocco Vijay Gurbani 72 nd IETF Meeting Outline History The problem Main issues Use cases The cache location sub-problem Internet

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

ARM mbed Technical Overview

ARM mbed Technical Overview ARM mbed Technical Overview Jerry Wang, FAE, ISG ARM Tech Forum Taipei July 4 th 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application

More information

Managing Devices and Corporate Data on ios

Managing Devices and Corporate Data on ios Managing Devices and Corporate Data on ios Overview Businesses everywhere are empowering their employees with iphone and ipad. Contents Overview Management Basics Separating Work and Personal Data Flexible

More information

NPR.ORG - PRIVACY POLICY

NPR.ORG - PRIVACY POLICY Effective Date February 06, 2013 See related: NPR Terms of Use At NPR, we recognize the importance of privacy to visitors of NPR.org, NPR's mobile sites and applications, NPR's interactive voice response

More information

Moving Databases to Oracle Cloud: Performance Best Practices

Moving Databases to Oracle Cloud: Performance Best Practices Moving Databases to Oracle Cloud: Performance Best Practices Kurt Engeleiter Product Manager Oracle Safe Harbor Statement The following is intended to outline our general product direction. It is intended

More information

DNSSEC Why, how, why now? Olaf Kolkman (NLnet Labs)

DNSSEC Why, how, why now? Olaf Kolkman (NLnet Labs) DNSSEC Why, how, why now? Olaf Kolkman (NLnet Labs) olaf@nlnetlabs.nl Stichting NLnet Labs page 2 Registrars/ Registrants DNS Architecture As friend secondary As ISP Cache server Registry DB primary As

More information

Comments, Concerns, Compliments and Complaints

Comments, Concerns, Compliments and Complaints i If you need your information in another language or medium (audio, large print, etc) please contact Customer Care on 0800 374 208 or send an email to: customercare@ salisbury.nhs.uk You are entitled

More information