ETSI ISG QKD. Martin Ward. Industry Specification Group in Quantum Key Distribution ETSI / IQC Quantum Safe Workshop, 14 September 2017
|
|
- Jesse Wells
- 5 years ago
- Views:
Transcription
1 ETSI ISG QKD Martin Ward Industry Specification Group in Quantum Key Distribution ETSI / IQC Quantum Safe Workshop, 14 September 2017
2 ETSI Industry Specification Group in QKD Mission: To develop ETSI Group Specifications / Group Reports describing quantum cryptography for ICT networks Publishes GS (or since 2016 GR) Documents based on QKD use cases, Application Interfaces, Security Proofs, Module Specification, Ontology, Characterisation of Components and Modules, Deployment Parameters and Implementation Security Membership includes large industry, telecom operators, SMEs, NMIs and universities Open to new members and participants Contact the ISG Chair Andrew Shields (andrew.shields@crl.toshiba.co.uk) Next ISG Meeting in Munich, 4 5 December 2017
3 Main Areas of Activity Components and module characterisation Correct characterisation important for implementation security Define market for specialist components and modules Implementation Security Promote best practice in implementation security Mitigate risks of side channels and active attacks Deployment scenarios Ensuring effective communication over deployments, network requirements etc. Interfaces Enabling interoperability and application development
4 Component and module characterisation GS QKD 011 published in 2016 Component characterization: characterizing optical components for QKD systems Specifications for the components used in QKD systems will stimulate a supply chain for the technology Define a market for specialist components such as photon sources and detectors New metrology of standard telecommunications components for quantum applications Some parameters related back to primary standards e.g., pulse photon number Specifications benefit companies manufacturing components for quantum technologies and QKD manufacturers
5 Module characterisation Work item DGS/QKD 0013_TransModChar Characterisation of Optical Output of QKD transmitter modules Performing metrology on complete QKD modules Additional challenges over measuring bare components Want to verify behaviours in optical outputs and confirm correct operation In a QKD module interferometers and time varying signals etc. Test procedures require and involvement of manufacturer Talk by Christopher Chunnilall (NPL) tomorrow at 13:30
6 Implementation security All security systems need to be designed to avoid side channels QKD security is based in the optical layer on the properties of light at a small scale Inability to fully measure / clone photons useful for forward security Some potential side channels are common with classical systems use existing standards Need to understand how implementations differ from ideal protocols QKD assumes eavesdropping and quantifies information leak Same approach often applicable for side channels if these cannot be eliminated by design: quan fy and use privacy amplifica on
7 Implementation security DGS/QKD 0010_ISTrojan Implementation security: protection against Trojan horse attacks in one way QKD systems Specifies passive countermeasures against attack Defines metrology to quantify optical isolation of QKD system Design guidelines for receiver modules Enables manufacturer to apply necessary privacy amplification to remove residual risk Consideration of certification Aim to ensure ISG security documents are structured to help future certification work Series of conference calls during 2017 to consider approach
8 Deployment scenarios DGS/QKD 0012_DeployParam Device and Communication Channel Parameters for QKD Deployment Define the main communication resources involved in a QKD system Communication channels Common architectures Planning a QKD Deployment: Entities and Contexts Information exchange template Help parties to understand what matters for a successful deployment and to communicate requirement effectively
9 Application Interfaces GS QKD 004 Application Interface Internal interface for key requests Function calls not network protocols DGS/QKD 014KeyDeliv Protocol and data format of key delivery API to Applications For application developers to make simple calls to a QKD network to request cryptographic keys Allow interoperability of equipment from different vendors Required as active integration work by manufacturers Single QKD link or an extended network Future ISG work items likely on integration into SDN architectures and wider key management issues
10 Update work Reviewing earlier documents due to Technical progress Contents moved to more detailed specifications E.g., GS QKD 003 Components and Internal Interfaces (under revision) GS QKD 011 Component characterization (replaces parts of GS QKD 003) Improve uniformity of terminology used in ISG documents Ontology
11 Summary The rate of innovation in QKD remains high New protocols Improved performance and ease of use of systems Satellite links to extend reach Several network being constructed ETSI remains central in leading the development of standards for QKD The ISG is working to enable the future interoperability of quantum communications networks being developed around the world Promotes best practice in implementation security Mitigate the risks of side channels and active attacks For further details on QKD please visit:
Marco Lucamarini, Martin Ward, Andrew Shields (Toshiba Research Europe Ltd)
UPDATE ON ETSI ISG QKD Marco Lucamarini, Martin Ward, Andrew Shields (Toshiba Research Europe Ltd) Industry Specification Group in Quantum Key Distribution Global Deployments of Quantum Key Distribution
More informationAndrew Shields (Toshiba Research Europe Ltd)
ETSI S ROLE IN THE DEPLOYMENT OF QUANTUM KEY DISTRIBUTION Andrew Shields (Toshiba Research Europe Ltd) Industry Specification Group in Quantum Key Distribution Quantum Key Distribution optical fibre Quantum
More informationAn Update on ETSI ISG QKD
An Update on ETSI ISG QKD Andrew Shields (Chair) Industry Specification Group in Quantum Key Distribution Global Deployments of QKD EU Flagship Programme UK Quantum Network TREL Tokyo QKD Network Cambridge
More informationMobile Edge Computing
Mobile Edge Computing A key technology towards 5G 1 Nurit Sprecher (Chair of ETSI MEC ISG) 5G World 2016, London, UK 5G Use Cases and Requirements 5G Use Cases Families and Related Examples Build a virtual
More informationCloud Security Alliance Quantum-safe Security Working Group
Don Hayford 3rd ETSI/IQC Workshop on Quantum-Safe Cryptography Seoul, Korea October 5, 2015 Session 3: Joint Global Efforts Cloud Security Alliance Quantum-safe Security Working Group 1 Cloud Security
More informationstandards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in
ISO/IEC JTC 1/SC 27/WG 4 IT Security Controls and Services M. De Soete, ISO/IEC JTC 1 SC27 Vice Chair copyright ISO/IEC JTC 1/SC 27, 2014. This is an SC27 public document and is distributed as is for the
More informationSecurity Perspectives for Quantum Key Distribution
Security Perspectives for Quantum Key Distribution Norbert Lütkenhaus Institute for Quantum Computing & Department of Physics and Astronomy University of Waterloo, Canada Ontario Research Funds DARPA Office
More informationExtensible standards and impact on technology switching costs. Mark Pecen, Sr. VP, BlackBerry Research and Advanced Technology September 2013
Extensible standards and impact on technology switching costs Mark Pecen, Sr. VP, BlackBerry Research and Advanced Technology September 2013 Agenda Why standardize? Impact of standardization on adoption
More informationETSI GS QKD 005 V1.1.1 ( ) Group Specification
GS QKD 005 V1.1.1 (2010-12) Group Specification Quantum Key Distribution (QKD); Security Proofs Disclaimer This document has been produced and approved by the Quantum Key Distribution (QKD) Industry Specification
More informationNational Network of Quantum Technologies Hubs: Quantum Communications Hub. Director: Professor Tim Spiller Affiliation
National Network of Quantum Technologies Hubs: Quantum Communications Hub Director: Professor Tim Spiller Affiliation Quantum Communications Hub: Partners Academic partners: York (lead), Bristol, Cambridge,
More informationSecurity Standardization
ISO-ITU ITU Cooperation on Security Standardization Dr. Walter Fumy Chairman ISO/IEC JTC 1/SC 27 Chief Scientist, Bundesdruckerei GmbH, Germany 7th ETSI Security Workshop - Sophia Antipolis, January 2012
More informationWorld Class Standards. Sophia Antipolis, December Margot Dor
WORKSHOP WIRELESS FACTORY Sophia Antipolis, 15-16 December 2008 Margot Dor margot.dor@etsi.org ETSI, a helicopter view World Class Standards ICT standards organization, open to direct participation Global
More informationNational Cybersecurity Challenges and NIST. Matthew Scholl Chief Computer Security Division
National Cybersecurity Challenges and NIST Matthew Scholl Chief Computer Security Division National Archives The Importance of Standards Article I, Section 8: The Congress shall have the power to fix the
More informationonem2m - A Common Service Layer for IoT Basic principles and architecture overview
onem2m - A Common Service Layer for IoT Basic principles and architecture overview Presented by: Xavier Piednoir For: ILNAS & ETSI Workshop IoT & Technical Standardization 6 July 2018 ETSI 2018 Contents
More informationAuthentication and routing in simple Quantum Key Distribution networks
Authentication and routing in simple Quantum Key Distribution networks Andrea Pasquinucci UCCI.IT, via Olmo 26, I-23888 Rovagnate (LC), Italy arxiv:cs/0506003v1 [cs.ni] 1 Jun 2005 June 02, 2005 Abstract
More information5G security activities and future plan in ITU-T SG17
5G security activities and future plan in ITU-T SG17 Heung Youl Youm, PhD Chairman, ITU-T SG17 Professor, Soonchunhyang University, Korea(Rep. of) Content Strategic Vision for ITU-T SG17 Overview of 5G
More informationPerformance and Security Evaluation of SDN Networks in OMNeT++/INET. Marco Tiloca, Alexandra Stagkopoulou, Gianluca Dini
Performance and Security Evaluation of SDN Networks in OMNeT++/INET Marco Tiloca, Alexandra Stagkopoulou, Gianluca Dini Software Defined Networking - Overview Key concepts Separation of Control plane and
More informationETSI Zero touch network and Service Management (ZSM)
ETSI Zero touch network and Service Management (ZSM) Enabling agile service delivery and new business opportunities Presented by: Nurit Sprecher ETSI ISG ZSM Vice Chair For: SDN NFV World Congress 2018
More informationETSI Zero touch network and Service Management (ZSM)
ETSI Zero touch network and Service Management (ZSM) Enabling agile service delivery and new business opportunities Presented by: Klaus Martiny, Chair, ETSI ISG ZSM For: NFV SDN World Congress 2018 11.10.2018
More informationSecurity analysis and assessment of threats in European signalling systems?
Security analysis and assessment of threats in European signalling systems? New Challenges in Railway Operations Dr. Thomas Störtkuhl, Dr. Kai Wollenweber TÜV SÜD Rail Copenhagen, 20 November 2014 Slide
More informationA Quantum Cryptography Communication Network Based on Software Defined Network
A Quantum Cryptography Communication Network Based on Software Defined Network Hongliang Zhang 1.*, Dongxiao Quan 1.*, Changhua Zhu 1.*, and Zhigang Li 1.* 1 Skate Key Laboratory of Integrated Services
More informationSecurity
Security +617 3222 2555 info@citec.com.au Security With enhanced intruder technologies, increasingly sophisticated attacks and advancing threats, your data has never been more susceptible to breaches from
More informationDynamic program analysis
Dynamic program analysis Pierre.Girard@gemalto.com RE-TRUST workshop Meudon, March 19, 2009 Mission of the day Give an overview of tools and procedures for dynamic software analysis in an industrial security
More informationDigital Platforms for 'Interoperable and smart homes and grids'
25 October 2017, Brussels Digital Platforms for 'Interoperable and smart homes and grids' Focus Area "Digitising and Transforming European Industry and Services by Svet Mihaylov DG CONNECT WP 2018-2020
More informationSAFEcrypto: Secure Architectures of Future Emerging cryptography
SAFEcrypto: Secure Architectures of Future Emerging cryptography Máire O Neill Queen s University Belfast This project has received funding from the European Union H2020 research and innovation programme
More informationTECHNICAL ORGANIZATION
TECHNICAL ORGANIZATION Organizing the work ETSI Seminar ETSI 2013. All rights reserved Technical Organization, Technical Bodies The ETSI Technical Organization comprises three types of Technical Body (TB):
More informationCyber-Physical Chain (CPChain) Light Paper
Cyber-Physical Chain (CPChain) Light Paper Decentralized Infrastructure for Next Generation Internet of Things Cyber-Physical Chain (CPChain) Team December 10, 2017 Abstract Deeply integrating blockchain
More informationMASP Chapter on Safety and Security
MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio
More informationPatching and Updating your VM SUSE Manager. Donald Vosburg, Sales Engineer, SUSE
Patching and Updating your VM SUSE Manager Donald Vosburg, Sales Engineer, SUSE dvosburg@suse.com Why should I care? I just clone my base VM image, and after that it is not my problem... Understand the
More informationETSI Multi-Access Edge Computing
ETSI Multi-Access Edge Computing MEC POCS 1 Dario Sabella (Intel), ETSI ISG Secretary and Lead of Industry Group Global IoT Summit 2017 - June 8, 2017, Geneva, Switzerland Why Edge Computing? as in Real
More informationERCI cybersecurity seminar Guildford ERCI cybersecurity seminar Guildford
Cybersecurity is a EU strategic priority DG CONNECT* > The Digital Single Market strategy aims to open up digital opportunities for people and business and enhance Europe's position as a world leader in
More informationResearch, development, and perspective of Tokyo QKD Network
Presentation at ETSI meeting on 26 th 27 th, Sep, 2013 Research, development, and perspective of Tokyo QKD Network Kiyoshi Tamaki NTT basic research lab, Japan Project overview of Tokyo QKD Network Main
More informationEvolving IoT with Smart Objects
Evolving IoT with Smart Objects John Soldatos (jsol@ait.gr) Associate Professor Athens Information Technology isprint Workshop, Brussels, September 19th, 2017 Monolithic IoT applications (2005-2010) IoT
More informationSecurity and resilience in Information Society: the European approach
Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments
More informationAtras Network Communications
Atras Network Communications Guide to Information and Communications Technology (ICT) Standards developed and published by the Telecommunications Industry Association (TIA) The Telecommunications Industry
More informationITU-T Y Next generation network evolution phase 1 Overview
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.2340 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2016) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL
More informationBridging the gap. New initiatives at ETSI. World Class Standards. between research and standardisation
Bridging the gap between research and standardisation New initiatives at ETSI 4 th e-infrastructure Concertation Meeting 5-6 December 2007 Ultan Mulligan Director, Strategy & New Initiatives, ETSI ETSI
More informationSoftware Development for B92 Quantum Key Distribution Communication Protocol
Software Development for B92 Quantum Key Distribution Communication Protocol Shirantha Wijesekera Dr. Sajal Palit Dr. Bala Balachandran University of Canberra University of Canberra University of Canberra
More informationDigital (Virtual) Identities in Daidalos and beyond. Amardeo Sarma NEC Laboratories Europe
Digital (Virtual) Identities in Daidalos and beyond Amardeo Sarma NEC Laboratories Europe Who wants to pay for more Bandwidth? More Access Bandwidth? No one pays extra for volume or time plain usage is
More informationPresentation of Industry Specification group on Augmented Reality Framework (ISG ARF)
Presentation of Industry Specification group on Augmented Reality Framework (ISG ARF) Presented by: ARF Chairman For: ETSI 2018 The context AR is a promising market with high revenue forecast e.g. 80$B
More informationSmart Grid and Cyber Security
Smart Grid and Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology December 10, 2009 President s Cyberspace Policy Review
More informationISO/IEC JTC 1 Study Group on Smart Cities
ANSI WORKSHOP ISO/IEC JTC 1 Study Group on Smart Cities Presented by Alex Tarpinian Senior Manager, IBM ANSI WORKSHOP: Smart and Sustainable Cities November 21, 2013 1 Overview ISO/IEC JTC 1 Study Group
More informationAdvances in the security analysis of CVQKD. Sébastien Kunz-Jacques
Advances in the security analysis of CVQKD Sébastien Kunz-Jacques SeQureNet 2013-09-26 1/17 CVQKD: Gaussian protocol Grosshans-Grangier 2002 Send coherent states with Gaussian distribution Measurement:
More informationPractical application of Quantum Key Distribution and wider security implications.
Practical application of Quantum Key Distribution and wider security implications. Luke Beeson, VP Security 1 The exploding threat landscape. BT's viewpoint. What really matters: Alignment to business
More informationQuantum Secure Network - Architecture and Applications -
[NEC Group Internal Use Only] 4 th ETSI/IQS Workshop on Quantum-Safe Cryptography Quantum Secure Network - Architecture and Applications - A. Tajima 1, T. Kondoh 1, T. Ochi 1, M. Fujiwara 2, K. Yoshino
More informationSmart Manufacturing and Standards: The NIST Role
Smart Manufacturing and Standards: The NIST Role Al Wavering, Chief Intelligent Systems Division Engineering Laboratory National Institute of Standards and Technology U.S. Department of Commerce October
More informationIntroduction. January 1, 2015
Introduction January 1, 2015 Radio Frequency IDentification Technologies that enable the capture of data about objects remotely using radio energy Our Mission To promote the public good by promoting high
More informationArabian Cloud Computing Project
ITU Workshop on Standardization on IMT, M2M, IoT, Cloud Computing and SDN (Algiers, Algeria, 8 September 2013) Arabian Cloud Computing Project Algiers, Algeria, 8 September 2013 Miss. Soumaya Benbartaoui
More informationSEAMLESS AIR ALLIANCE CONNECTED SKIES
SEAMLESS AIR ALLIANCE CONNECTED SKIES Seamless Air Alliance 2018 2018 SAFE HARBOR The following is intended to outline general information and direction only. It is intended for information purposes only,
More informationITU Workshop on 5G Security
All Sessions Outcome ITU Workshop on 5G Security Geneva, Switzerland, 19 March 2018 Session 1: Understanding threats and security requirements of 5G 1. Identified 5G security topics, such as threats, requirements,
More informationWORKSHOP WIRELESS FACTORY AGENDA
WORKSHOP WIRELESS FACTORY ETSI 15-16 December 2008 Sophia Antipolis ETSI (www.etsi.org) produces globally-applicable standards for Information and Communications Technologies (ICT), including fixed, mobile,
More information[Draft] RDA Resource Description and Access
1 To: From: Subject: Joint Steering Committee for Revision of AACR Deirdre Kiorgaard, Chair, JSC Draft statement of objectives and principles for RDA [Draft] RDA Resource Description and Access Objectives
More informationNetwork Functions Virtualisation. Kazuaki OBANA Media Innovation Laboratory, NTT Network Innovation Laboratories
Network Functions Virtualisation Looking to the Future NFV ETSI Industry Specification Group Kazuaki OBANA Media Innovation Laboratory, NTT Network Innovation Laboratories Network Functions Virtualisation:
More informationWorkshop on Smart Sustainable Cities Samarkand, Uzbekistan, 1-2 June 2017 ITU-T Focus Group on Data Processing and Management
Workshop on Smart Sustainable Cities Samarkand, Uzbekistan, 1-2 June 2017 ITU-T Focus Group on Data Processing and Management Gyu Myoung Lee ITU-T Chair of FG-DPM, WP3/13 Co-chair, Q16/13 and Q4/20 Rapporteur
More informationIEEE Conformity Assessment Program (ICAP) June12, 2013
IEEE Conformity Assessment Program (ICAP) June12, 2013 Understanding Conformity Assessment Understanding Conformity Assessment What is Conformity Assessment? Conformity Assessment is defined as the process
More informationOptical network virtualization. Optical network virtualization. Transport SDN for cloud-centric networking
Optical network virtualization Optical network virtualization Transport SDN for cloud-centric networking 1 Transport SDN for the cloud Manually initiated and managed provisioning processes do not provide
More informationThird annual ITU IMT-2020/5G Workshop and Demo Day 2018
All Sessions Outcome Third annual ITU IMT-2020/5G Workshop and Demo Day 2018 Geneva, Switzerland, 18 July 2018 Session 1: IMT-2020/5G standardization (part 1): activities and future plan in ITU-T SGs 1.
More informationCybersecurity Testing
Cybersecurity Testing Tim Palmer Chief Technical Advisor, SAS Business Unit Torch Technologies, Inc. EXPERTISE // INNOVATION // CUSTOMER FOCUS // EXCELLENCE // INTEGRITY // COOPERATION // RELIABILITY About
More informationIoT Week Workshop on Globally Interoperable IoT Identification and Data Processing Identifiers in IoT
IoT Week 2017 - Workshop on Globally Interoperable IoT Identification and Data Processing Identifiers in IoT Juergen Heiles, Siemens AG AIOTI WG3 IoT Identifier Task Force Co-Chair 1 Introduction In any
More informationNFC Forum Certification Program. Mikko Saarisalo Nokia Vice Chairman, NFC Forum
NFC Forum Certification Program Mikko Saarisalo Nokia Vice Chairman, NFC Forum April 21, 2011 NFC Forum Certification is Good for Business 1. Brings together a set of addressable markets whose combined
More information5G Initiative 5G Roadmap Working Group Proposal for Contribution
5G Initiative 5G Roadmap Working Group Proposal for Contribution Cagatay Buyukkoc, AT&T Meryem Simsek, ICSI IEEE 5G Initiative Roadmap Mission statement Based on horizon scanning, interviews and expert
More informationASEAN Connectivity and Infrastructure Financing Challenges
ASEAN Connectivity and Infrastructure Financing Challenges Gizella Marie A. Herrera Senior Officer, Connectivity Division, ASEAN Secretariat Policy Dialogue on Infrastructure Financing Strategies for South-
More informationCDMA2000 Workshop. Paul Le Rossignol. Nortel Networks, OMA Board Director
CDMA2000 Workshop Paul Le Rossignol Nortel Networks, OMA Board Director Open Mobile Alliance 1 2 3 4 Vision and Mission of OMA OMA s Market Position & Industry Benefits Structure & Scope OMA Interoperability
More informationReachback: A Crucial Cross-cutting Element of Nuclear Security Detection Architecture
Reachback: A Crucial Cross-cutting Element of Nuclear Security Detection Architecture Harri Toivonen HT Nuclear Ltd, Finland Magic Maggiore, Technical Reachback Workshop, EC/JRC/ERNCIP and GICNT ISPRA,
More informationSpoofing Attack Against an EPC Class One RFID System
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2009 Spoofing Attack Against an EPC Class One RFID System Christopher
More informationNIS Standardisation ENISA view
NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number
More informationEMBRACE CHANGE Computacenter s Global Solutions Center helps organizations take the risk out of business transformation and IT innovation
EMBRACE CHANGE Computacenter s Global Solutions Center helps organizations take the risk out of business transformation and IT innovation SOLUTIONS CENTER SOLUTION SUMMARY From digitalization initiatives
More informationETSI GS ZSM 006 V1.1.1 ( )
GS ZSM 006 V1.1.1 (2018-05) GROUP SPECIFICATION Zero touch network and Service Management (ZSM); Proof of Concept Framework Disclaimer The present document has been produced and approved by the Zero touch
More informationStrong encryption and superior availability at the same time. Complies with the stringent demands posed by mission-critical systems (MCS)
Strong encryption and superior availability at the same time Complies with the stringent demands posed by mission-critical systems (MCS) Fanless, robust hardware integrated in the C20 platform End-to-end
More informationKENYA YOUR RELIABLE PARTNER AT THE ITU. Candidate for the ITU Council in Region D
KENYA YOUR RELIABLE PARTNER AT THE ITU Candidate for the ITU Council in Region D KENYA: CANDIDATE FOR ITU COUNCIL IN REGION D (AFRICA) The Republic of Kenya has been a member of the International Telecommunication
More informationGeneral Framework for Secure IoT Systems
General Framework for Secure IoT Systems National center of Incident readiness and Strategy for Cybersecurity (NISC) Government of Japan August 26, 2016 1. General Framework Objective Internet of Things
More informationCybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities OAS Hemispheric Workshop on the Development of a National Framework for Cyber Security 16 in Rio de Janeiro, Brazil Souheil Marine Head,
More informationTwilio cloud communications SECURITY
WHITEPAPER Twilio cloud communications SECURITY From the world s largest public companies to early-stage startups, people rely on Twilio s cloud communications platform to exchange millions of calls and
More informationSession 3: Lawful Interception
Session 3: Lawful Interception Secure, verifiable and intelligible audit logs to support computer forensics in lawful interception 3 rd ETSI Security Workshop Elena de la Calle Vian Ministry of Industry
More informationNFV and SDN. Andy Reid BT Research and Innovation
NFV and SDN Andy Reid BT Research and Innovation Clarifying what we mean by: SDN Separation of control plane logic/processing data plane header look up and forwarding Motivation Development of new control
More informationStudy on data encryption technology in network information security. Jianliang Meng, Tao Wu a
nd International Workshop on Materials Engineering and Computer Sciences (IWMECS 05) Study on data encryption technology in network information security Jianliang Meng, Tao Wu a School of North China Electric
More informationOpen Group Security Forum Overview
Open Group Security Forum Overview To the I3C, July 23, 2003 Mike Jerbic Chair Security Forum Office: 408.257.1648 m.jerbic@opengroup.org www.opengroup.org The Open Group is... A global consortium committed
More informationMobile Edge Computing Presented by Nurit Sprecher (ETSI ISG MEC Chair) Location Based Services Event, June 2-3, 2015, London, UK
Mobile Edge Computing Presented by Nurit Sprecher (ETSI ISG MEC Chair) Location Based Services Event, June 2-3, 2015, London, UK 1 ETSI 2013. All rights reserved Trends and market drivers Growth in mobile
More informationITU-T SG 17 Q10/17. Trust Elevation Frameworks
ITU-T SG 17 Q10/17 Trust Elevation Frameworks Abbie Barbir, Ph.D. ITU-T SG 17 Q10 Rapporteur Martin Euchner SG 17 Advisor ITU Workshop on "Future Trust and Knowledge Infrastructure July 1 2016 Contents
More informationSAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity
SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity 1. We, APEC Ministers responsible for the Telecommunications and Information Industry,
More informationETSI Security Standards Workshop January 2006
ETSI Security Standards Workshop Adrian Scrase ETSI CTO adrian.scrase@etsi.org 1 Welcome to ETSI 2 ETSI is A European standards organization Active in all areas of ICT Setting globally-applicable standards
More informationA Secure Architecture for the Range-Level Command and Control System of a National Cyber Range Testbed
A Secure Architecture for the Range-Level Command and Control System of a National Cyber Range Testbed Michael Rosenstein / Frank Corvese Michael Rosenstein michael.rosenstein@securedecisions.com 631.759.3910
More informationETSI GS MEC-IEG 005 V1.1.1 ( )
GS MEC-IEG 005 V1.1.1 (2015-08) GROUP SPECIFICATION Mobile-Edge Computing (MEC); Proof of Concept Framework Disclaimer This document has been produced and approved by the Mobile-Edge Computing (MEC) Industry
More informationITU-T FG-DPM: Key Activities and Future Plans
1st ITU Workshop on Data Processing and Management for IoT and Smart Cities & Communities (Brussels, Belgium, 19 February 2018) ITU-T FG-DPM: Key Activities and Future Plans Gyu Myoung Lee Chair, ITU-T
More informationAIR FORCE INSTITUTE OF TECHNOLOGY
SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD) THESIS Carole A. Harper, Captain, USAF AFIT/GSE/ENV/12-M05 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE
More informationUGANDA NATIONAL BUREAU OF STANDARDS LIST OF DRAFT UGANDA STANDARDS ON PUBLIC REVIEW
UGANDA NATIONAL BUREAU OF STANDARDS LIST OF DRAFT UGANDA STANDARDS ON PUBLIC REVIEW S/No. STANDARDS CODE TITLE(DESCRIPTION) SCOPE 1. DUS ISO/IEC 29151:2017 technology -- Security techniques -- Code of
More informationThe threat landscape is constantly
A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions
More information1 Quantum Cryptography
J. Rothberg March 3, 204 Quantum Cryptography. Quantum Key Distribution A better name for this application of Quantum Mechanics is Quantum Key Distribution since what is transmitted is not a message but
More informationEuropean Responsible Care Forum. Security & Safe Maintenance
European Responsible Care Forum Security & Safe Maintenance Brussels, Thursday 7 April 2011 Mike Zeegers - Director Europe Agenda: History IMPROVE PROJECT To enhance Secure infrastructure Objective of
More informationVirtual Private Networks.
Virtual Private Networks thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Virtual Private Networks VPN Basics Protocols (IPSec, PPTP, L2TP) Objectives of VPNs Earlier Companies
More informationCisco Cloud Application Centric Infrastructure
Cisco Cloud Application Centric Infrastructure About Cisco cloud application centric infrastructure Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) is a comprehensive solution for simplified
More informationAltice Labs 5G activities
Altice Labs 5G activities IEEE 5G Summit Portugal, Lisbon, ISCTE Luis Miguel Silva 19 January 2017 Altice labs is an Information and Communications Technology company belonging to the Altice Group, a multinational
More informationCOMPANION FINAL EVENT 14 TH & 15 TH September 2016
COMPANION FINAL EVENT 14 TH & 15 TH September 2016 Update on recent developments related to Connected and Automated Driving Myriam COULON CANTUER Smart Mobility & Living Communication Networks, Content
More informationCloud Systems 2018 Training Programs. Catalog of Course Descriptions
Cloud Systems 2018 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...3 Open 2 2018 Introduction Ericsson has developed a comprehensive Training Programs service
More informationNFV ACCELERATION INTRODUCTION. Presenter Ning Zong
NFV ACCELERATION INTRODUCTION Presenter Ning Zong (zongning@huawei.com) 1 Some History - Why Acceleration is Beneficial to NFV PoC#21 - Network Intensive and Compute Intensive Hardware Acceleration ETSI
More informationNatural Security Alliance
Natural Security Alliance Business model and pilot projects ITU 14 & 15 October 2014 Philippe'Batard' Batard&&&Partners' Summary Natural Security Alliance: an initiative from retailers and banks The solution
More informationAn Overview of ISO/IEC family of Information Security Management System Standards
What is ISO/IEC 27001? The ISO/IEC 27001 standard, published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), is known as Information
More informationPlenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014
Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014 WGPL AHG Document DL/13(Rev.2)- E 28 October 2014 English only WGPL Ad Hoc Group on Resolution 174 RESOLUTION 174 (GUADALAJARA, 2010REV.
More informationCompany. Olivetel S.A is a certified manufacturer owner of the trademarks:
Company Olivetel was set up on 1993 following the major development seen in information technology, telecommunications and energy sectors, in order to respond a specific and demanding customer needs and
More informationNCSF Foundation Certification
NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity
More information