Searched for: subject%3A%22ISEC%255C%2B%255C-%255C%2BInformation%255C%2BSecurity%22
(1 - 20 of 88)

Pages

document
This magazine is the first edition of the Dutch Cyber Security Shared Research Program (SRP), a collaboration involving TNO, ING, ABN AMRO, Rabobank and Achmea. The magazine serves two purposes; to share our experiences in cooperating in a shared research Program and to share some of the results that have been achieved in this Program. We hope...
report 2017
document
van der Pol, R. (author), Gijsen, B.M.M. (author), Zuraniewski, P. (author), Romão, D.F.C. (author), Kaat, M. (author)
This paper describes how state-of-the-art SDN technology can be used to create and validate a user configurable, on-demand VPN service. In the Community Connection (CoCo) project an architecture for the VPN service was designed and a prototype was developed based on the OpenFlow protocol and the OpenDaylight controller. The CoCo prototype...
article 2016
document
Elands, P.J.M. (author), de Kraker, J.K. (author), Laarakkers, J. (author), Olk, J.G.E. (author), Schonagen, J.J. (author)
On request of the Dutch National Coordinator for Security and Counterterrorism (NCTV) of the Ministry of Security and Justice, TNO has investigated the issues and corresponding risks which arise from the introduction and use of drones in the national airspace. The issues identified are primarily related to safety and security and to the...
report 2016
document
Veugen, P.J.M. (author), Blom, F. (author), de Hoogh, S.J.A. (author), Erkin, Z. (author)
Due to high complexity, comparison protocols with secret inputs have been a bottleneck in the design of privacy-preserving cryptographic protocols. Different solutions based on homomorphic encryption, garbled circuits and secret sharing techniques have been proposed over the last few years, each claiming high efficiency. Unfortunately, a fair...
article 2015
document
Veugen, P.J.M. (author)
In the field of signal processing in the encrypted domain, linear operations are usually easy to perform, whereas multiplications, and bitwise operations like comparison, are more costly in terms of computation and communication. These bitwise operations frequently require a decomposition of the secret value into bits. To minimize the...
article 2015
document
Bortolameotti, R. (author), Peter, A. (author), Everts, M.H. (author), Bolzoni, D. (author)
Internet applications use SSL to provide data confidentiality to communicating entities. The use of encryption in SSL makes it impossible to distinguish between benign and malicious connections as the content cannot be inspected. Therefore, we propose and evaluate a set of indicators for malicious SSL connections, which is based on the...
bookPart 2015
document
Siljee, B.I.J. (author)
This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid software developers with the realization of privacy by...
conference paper 2015
document
Fransen, F. (author), Smulders, A.C.M. (author), Kerkdijk, H. (author)
The last couple of years we have seen an increase in interests and initiatives in establishing threat intelligence sharing communities, and on the development of standards and platforms for automated cyber security information sharing. These initiatives are focused on helping organisations to increase their resilience to new attacks and threats....
article 2015
document
Luiijf, H.A.M. (author), te Paske, B.J. (author)
Our society and its citizens depend on the undisturbed functioning of (critical) infrastructures and their services. Crucial processes in most critical infrastructures, and in many other organisations, rely on the correct and undisturbed functioning of Industrial Control Systems (ICS). A failure of ICS may both cause critical services to fail...
book 2015
document
Veugen, P.J.M. (author), de Haan, R. (author), Cramer, R. (author), Muller, F. (author)
We provide a generic framework that, with the help of a preprocessing phase that is independent of the inputs of the users, allows an arbitrary number of users to securely outsource a computation to two non-colluding external servers. Our approach is shown to be provably secure in an adversarial model where one of the servers may arbitrarily...
article 2015
document
Roosendaal, A.P.C. (author), Ooms, M. (author), Hoepman, J.H. (author)
Vanuit de Tweede Kamer is de vraag gekomen hoe de positie van Nederland is wat betreft de bescherming van privacy van burgers door de overheid in vergelijking met andere Europese landen. Dit kan onderzocht worden in een benchmarkstudie waarin Nederland op dit terrein wordt vergeleken met een aantal andere Europese landen. Om deze studie goed op...
report 2015
document
Joosten, H.J.M. (author), Smulders, A.C.M. (author)
Networked Risk Management (NRM) is a methodology aimed at managing dynamic risks. The methodology facilitates the mind shift from risk management to success governance. The result is an accountable prioritisation of risks that could lead to being unsuccessful. NRM is applicable in combination with existing methods for risk assessments and...
report 2014
document
Veugen, P.J.M. (author)
When processing data in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Integer division of encrypted data however requires an additional protocol between the client and the server and will be relatively expensive. We present new solutions for dividing encrypted data in the semi-honest...
article 2014
document
van Rest, J.H.C. (author), Boonstra, D. (author), Everts, M.H. (author), van Rijn, M. (author), van Paassen, R.J.G. (author)
The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of enterprises. This elevates the importance of mitigation of privacy risks. This paper makes Privacy by Design more concrete, and positions it as the mechanism to mitigate these privacy risks. In this vision paper, we...
bookPart 2014
document
Erkin, Z. (author), Veugen, P.J.M. (author)
Millions of people are now increasingly using smart devices at home to improve the quality of their lives. Unfortunately, the smart devices that we use at home for comfort and sim-plicity make our lives more complicated in terms of man-agement due to several issues like mismatching interfaces and complexity of the micro-management. One approach...
conference paper 2014
document
Makri, E. (author), Everts, M.H. (author), de Hoogh, S. (author), Peter, A. (author), op den Akker, H. (author), Hartel, P.H. (author), Jonker, W. (author)
We treat the problem of privacy-preserving statistics verification in clinical research. We show that given aggregated results from statistical calculations, we can verify their correctness efficiently, without revealing any of the private inputs used for the calculation. Our construction is based on the primitive of Secure Multi-Party...
conference paper 2014
document
Wijbenga, J.P. (author), MacDougall, P.A. (author), Kamphuis, R. (author), Sanberg, T. (author), van den Noort, A. (author), Klaassen, E.A.M. (author)
Whereas other smart grid field trials optimize for a single objective, PowerMatching City phase 2 demonstrates that multiple objectives can be achieved in a coordinated virtual power plant. A system that incorporates both consumer community proposition incentives and trade dispatch incentives (as well as end-user comfort) was designed,...
conference paper 2014
document
Erkin, Z. (author), Veugen, T. (author), Lagendijk, R.L. (author)
Recommender systems play a crucial role today in on-line applications as they improve the customer satisfaction, and at the same time results in an increase in the profit for the service provider. However, there are serious privacy concerns as such systems rely on the personal data of the customers. There have been several proposals to provide...
conference paper 2013
document
Everts, M.H. (author), Hoepman, J.H. (author), Siljee, B.I.J. (author)
Passwords are the only ubiquitous form of authentication currently available on the web. Unfortunately, passwords are insecure. In this paper we therefore propose the use of strong cryptography, using the fact that users increasingly own a smartphone that can perform the required cryptographic operations on their behalf. This is not as trivial...
conference paper 2013
document
Joosten, H.J.M. (author)
De Europese Commissie heeft in januari 2012 een nieuwe richtlijn en verordening voorgesteld betreffende de bescherming van natuurlijke personen in verband met de verwerking van persoonsgegevens [1, 2]. Deze zijn bedoeld om de huidige Data Protection Directive 95/46/EC te vervangen. Als de verordening wordt aangenomen moet niet alleen compliance...
article 2013
Searched for: subject%3A%22ISEC%255C%2B%255C-%255C%2BInformation%255C%2BSecurity%22
(1 - 20 of 88)

Pages