Building International Cooperation for Trustworthy ICT

Vrije Universiteit

Loading Map....

De Boelelaan 1105


Download the full report of this session

Terms of Reference
To capitalise on the presence of a large group of system security research communities attending the SysSecworkshop[1] on 6th July, 2011, the BIC session was proposed and accepted to be held within the workshop. In addition, there were a number of other relevant co-located events of interest. For example, the EffectsPlus Clusters Workshop[2] on 4/5th July and DIMVA 2011[3], one of Europe’s leading security events.

The session focused on the mid term (present – 2013) to longer term (2014 – 2020) strategies for sharing skills, common tools and techniques for the development of an International data exchange and collaboration architecture for the scalable cyber-defense coordination. Within this topic, a number of relevant sub-topics can be covered, including:

Development of an architecture for International sharing of data and expert collaboration relevant to cybersecurity;
High leverage cyber data to help track threats in real-time and mitigate them with short term manoeuvres or longer term feedback into architectures;
Enabling technologies such as crypto to support sharing, secure systems to manage data, authorization frameworks to control access, and analytical techniques to understand threats;
Cooperative frameworks to register, analyse, anticipate and mitigate emerging ICT threats within sectors and across countries;
Aligning of data protection and privacy governance;
Enabling legal frameworks for sectoral and international data sharing and collaboration;
Developing a global ICT security policy based on cooperative engagement around cyber defence issues and ostracism of malicious action.
Highlight other potential collaboration subjects that are mutually beneficial and require international collaboration in ICT Trust and Security.
Share information about international projects already underway and generate ideas for new ones.
Decide next steps for the collaborations.

In order to prepare for the BIC session, an organising committee was convened. The OC included the following:

Jim Clarke, Waterford Institute of Technology, Coordinator of the BIC Project
Evangelos Markatos, FORTH, Greece, SysSeC project
John C. Mallery, Massachusetts Institute of Technology, USA
Aljosa Pasic, ATOS Origin, Spain
Karl Levitt, The University of California, Davis, USA
Neeraj Suri, Technische Universitat Darmstadt, Germany
Michel Riguidel, Telecom Paris-Tech
Rebecca Wright, Rutgers University, USA
Agenda, Presentations and Reports




13:30 – 13:35
Overview / Purpose of Session. [bic2011-01-clarke]
Jim Clarke, Waterford Institute of Technology -TSSG

13:35 – 13:55
Part 1. Motivation and Vision:Opening remarks [bic2011-02-weber]US perspective [bic2011-03-levitt]EU perspective [bic2011-04-daskala]
Samuel Weber, National Science Foundation, USAKarl Levitt, Univ. of California DavisBarbara Daskala, ENISA

13:55 – 14:05
Part 2. Threats and Actors [bic2011-05-ioannidis]
Sotiris Ioannidis, FORTH

14:05 – 14:50
Part 3. Straw man architecture for International data exchange and collaborative analysis [bic2011-06-mallery]Data exchange architecture used in a financial application in South Africa [bic2011-07-taute]Identity related issues for data handling and aggregation [bic2011-08-grann]
John C. Mallery, Massachusetts Institute of TechnologyBarend Taute, The Council for Scientific and Industrial Research (CSIR), South AfricaGlenn Gran, IKED. GINI SA project

14:50 – 15:05
Part 4. Legal, Regulatory, Privacy, and Political Challenges [bic2011-09-westby]

Jody Westby, Global Cyber Risk LLC

15:05 – 15:30
Part 5. Next steps for planning of workshop in Q4 2011 [bic2011-10-clarke]

Determining a comprehensive coverage of topics required; any gaps?
Identifying key topics for a workshop to be held in the Fall ’11 (see next pages for initial draft terms of reference);
Identify Organising and Program committee;
Identifying the necessary participants;
Identify how to best collaborate between now and then (eg. establishment of working groups,  electronic, ….)

Jim Clarke

Session Report

A number of additional positions were submitted to the organisers prior to the session and these are included here:

Challenges in streaming temporal and spatial network data (78.1 KB) Chalmers University
Multi-party computation approach as a privacy solution developed in the SEPIA project (314.5 KB) ETH Zurich
Different approaches for data sharing (78.0 KB) Moscow State University
Joint collaboration to guarantee an optimal incident response and post incident data analysis in mobile scenarios (148.2 KB) JRC & KTH

Upcoming Events

  • No events in this location

Comments are closed.