.
Direkt zum Inhalt.
Direkt zum Inhalt.
Tagungskalender 2006
Jänner
.
Februar
.
März
.
April
.
Mai
.
Juni
.
März
  Mo Di Mi Do Fr Sa So  
 
.
.
1
.
2
.
3
.
4
.
5
.
 
  6
.
7
.
8
.
9
.
10
.
11
.
12
.
 
  13
.
14
.
15
.
16
.
17
.
18
.
19
.
 
  20
.
21
.
22
.
23
.
24
.
25
.
26
.
 
  27
.
28
.
29
.
30
.
31
.
.
.
 
 
.
.
.
.
.
.
.
 
 
.
.
.
.
.
.
.
 
Service
.
.
.
.
.
.
.

Hintergrundinformationen (EN)

High Level Research Seminar on “TRUST IN THE NET”

 

1. The Context

In its initiative “i2010 – A European Information Society for growth and employment”  the Commission identifies Security as one of the four main challenges posed by the digital convergence, which is at the heart of the creation of the single European Information Space. It states:

“Trustworthy, secure and reliable ICT are crucial for a wide take up of converging digital services. During 2006 the Commission will propose a Strategy for a Secure Information Society to combine and update the instruments available, including raising awareness of the need for self-protection, vigilance and monitoring of threats, rapid and effective response to attacks and system failures. Support will be given to targeted research to ‘design-in’ security and to deployment measures that test solutions for key issues such as identity management. Revision of regulation will be considered where necessary, for example in protection of privacy, electronic signature or discouraging illegal and harmful content.”

In addition, concerning research and innovation the Commission states:

“The co-ordination of the Commission’s research and deployment instruments will be enhanced by focusing them on key bottlenecks such as interoperability, security and reliability, identity management, rights management and ease of use. Research and deployment instruments will be coordinated to demonstrate technological and organisational solutions in areas, where a shared EU level approach can help to build economies of scale and encourage investors.”

The seminar aims at discussing longer term research to create trust in the Net and fight malicious software and spam. This includes identity and privacy management, interoperable authentication for electronic services with wide recognition (reputation systems and dynamic trust marking), and technologies to support law enforcement activities.

top

 

2. Research & Development for Trust and Security

Significant research is already ongoing in the area of “ICT for Trust and Security” (with a total budget of 140Mio Euro for Framework Programme 6), on Identity management for eGovernment services, in eHealth related to health card and data management, and in ICT for Enterprise Networks concerning trusted business platforms and RFID.

We do now have to prepare the next Framework Programme (FP7) which, as proposed by the Commission includes such topics as:

  • Software, Grids, security and dependability: dynamic, adaptive, dependable and trusted software and services, and new processing architectures, including their provision as a utility.
  • Personal environments: personal communication and computing devices, accessories, wearables, implants; their interfaces and interconnections to services and resources.
  • ICT meeting societal challenges: New systems and services in areas of public interest improving quality, efficiency, access and inclusiveness; user friendly applications, integration of new technologies and initiatives such as ambient assisted living. This is in support of health, inclusion, mobility, environment and government.
  • ICT for trust and confidence: identity management; authentication and authorization; privacy enhancing technologies; rights and asset management; protection against cyber threats.

The RTD actions to be developed in FP7 must be consistent and in support of the overall strategy developed under i2010. It should seamlessly connect to the deployment strategies developed in the Competitiveness and Innovation Framework Programme (CIP) and make use of research infrastructures for real live demonstrators.

top

 

3. Objectives of the Seminar

The seminar will bring together high-level actors from industry, research, governments, public administrations and user organisations to discuss longer term research actions to fight malware and spam and thus improve trust in the Net for business and citizens. The seminar should produce recommendations on:

  1. Research priorities in the seventh framework programme as part of the  “Strategy for a Secure Information Society announced in i2010;
  2. Testbeds and validation actions that can advance trust in the Net;
  3. Types of partnership, including international ones, to be pursued and promoted in order to ensure the effectiveness of such actions as well as maximize the impact of the future research.

top

 

4. Structure

The discussion will be structured around two main technology areas needed to build trust in the net for businesses and citizens.

  • Trust and certainty in electronic communications - building an infrastructure that supports trusted computing, includes filtering techniques and leverage reputation and dynamic trust marking systems, which is based on open standards, interoperability and trusted global network governance.
  • Identity in the Information Space – leveraging identity management systems and authentication for trust in the use of Internet. In this context, the suitable use of electronic identity and reliance on electronic authentication developed in e-government environments must be investigated and linked to the need to ensure the privacy and freedom of choice to users. This should also be addressed with a view to the future ambient intelligent world of transactions between systems.

The seminar will be opened by the Austrian Presidency, our Commissioner and a representative of the future Finnish Presidency. The opening session will be followed by a session on business and societal concerns and strategies. Then, two high-level thematic panels will focus on the two areas mentioned above:

  1. Trust and certainty in electronic communications
    The pervasiveness of communication networking and the always-on connectivity of broadband have made it easier for anybody to adversely exploit such capabilities against business and citizens. In this scenario, the development of trusted computing may significantly contribute to building trust and certainty in electronic communications. Provided that due consideration would be given to critical interoperability and privacy issues and concerns. Whereas long term research will be needed on innovative security technologies and solutions to improve the security and resilience of networks, protocols and applications, in the short and medium term the use of effective and privacy-respecting filtering technologies as well as the development of borderless and global reputation and dynamic trust marking systems will be essential to create and trust and certainty in the electronic communications. The global use of these technologies demands both innovative architectures for interoperability as well as common standards at the EU and global level. To facilitate these developments, large scale demonstrators or test-beds shall be established. Lastly, trust and certainty also need harmonised definitions for malware and shared metrics and benchmarks for technological solutions and products.
  2. Identity in the Information Space
    The borderless and secure use of identification and authentication systems for commercial and open space applications and electronic transactions will be essential to create trust in the net. Long term research would investigate innovative authentication and authorization systems (e.g. email signing, domain authentication, sender authentication, etc.), multilayered interoperable solutions for authentication, management of multiple identities for commercial applications and privacy protection. To support and stimulate this research, there would be a need to pursue shorter term goals like setting up large scale demonstrators, taking into account privacy concerns and the overall goal of avoiding identity theft. The discussion will also address how electronic identity and e-authentication systems developed in e-government environments could be leveraged for communications and transactions in the Information space that would ensure the privacy and freedom of choice to users. In this respect, inputs will come from the event being organised by the Modinis study on Identity Management.

The composition of the panels shall ensure that the international dimension of the issues at hand would be well covered. The seminar will end with summary remarks and recommendations by the two Session Chairs and the closure by the Conference Chair who would also introduce the event of the next day.

After the Conference there will be a social event organised by the Austrian presidency with a Dinner Speech given by the Commissioner on the plans and actions in this area.

top

 

5. Proposed profile of Speakers

The profile of speakers to be considered for the sessions (opening and plenary) and the panels would be:

  • Opening session: the session will be chaired by Chief Information Officer for Austria and the participation at Ministerial level from Austria and Finland is confirmed. The Commissioner will also contribute to this session with a videotaped speech.
  • The plenary session: we shall involve high level representatives (CEO Level) from influential security technology industry both from business side and the user side, as well as other stakeholders in the field as appropriate.
  • Panel 1: executives from security technology industries, ISPs, Telecom, Directors General of National CERTs/CSIRTs, experts from EICAR, etc. We shall also  invite a representative of ENISA Management Board;
  • Panel 2: executives from security technology industries, the Chair of Liberty Alliance, high level civil servants of Member States’ Ministries, and other stakeholders active in Identity management; representative(s) from Modinis study on Identity management.

top

 

6. The next Steps (in preparation)

In order to prepare the Seminar it is proposed to organise at least 2 small expert meetings: one meeting on each of the two themes for the panels with max 10/15 experts each. Every meeting shall lead to the articulation of concrete proposals and recommendations for action. The time frame for these meeting should be September – November 2005. The experts in these meetings should at least relate directly to the executives present in the opening sessions and the panel discussions.

top

 

Datum: 07.03.2006