Building the Future: Tokenization, Blockchain and Citizen-focused Systems
Bill Buchanan, Edinburgh Napier University, United Kingdom
Next Generation Information Warfare: Challenges and Research Directions
Roberto Di Pietro, Hamad Bin Khalifa University, Qatar
Challenges of GDPR and the NIS Directive
Gerald Quirchmayr, Department of Computer Science, University of Vienna, Austria
Building the Future: Tokenization, Blockchain and Citizen-focused Systems
Bill Buchanan
Edinburgh Napier University
United Kingdom
https://www.napier.ac.uk/people/bill-buchanan
Brief Bio
Prof. Bill Buchanan, OBE, PhD, FBCS, FIET, PFHEA is a Prof. in the School of Computing at Edinburgh Napier University, and a Fellow of the BCS, the IET and a Principle Fellow of the HEA. He was appointed an Officer of the Order of the British Empire (OBE) in the 2017 for services to Cyber Security. Recently received an "Outstanding Contribution to Knowledge Exchange" award at the Scottish Knowledge Exchange awards, and was the Cyber Evangelist of the Year in 2016. Currently he leads the Centre for Distributed Computing, Networks, and Security and The Cyber Academy (thecyberacademy.org).
His research has led to three successful spin-out companies, including Zonefox, and he has developed a number of patents. He has published over 280 academic papers and 30 academic books. His main research focus is around information sharing, threat analysis, cryptography, Blockchain, e-Health, and triage within digital forensics. Bill regularly appears on TV and radio related to computer security, and has given evidence to both the UK and Scottish parliaments.
Abstract
This talk will outline the future of digital systems which are citizen focused, and which preserve the rights to privacy, consent and ownership. It will outline the methods that can be used to create integrated trusted architectures, and where data can be protected at every stage. This includes methods around Anonymised Transactions, Zero Knowledge Proof (ZKP), Homomorphic Encryption and Distributed Ledgers. The talk will also outline how complex systems such as health care can be remodelled into a more citizen focused infrastructure, and how tokenization can be used to protect data.
Next Generation Information Warfare: Challenges and Research Directions
Roberto Di Pietro
Hamad Bin Khalifa University
Qatar
Brief Bio
Prof. Dr. Roberto Di Pietro is currently full professor of cyber security at the HBKU College of Science and Engineering, Doha-Qatar, leading the effort to establish a world class research and innovation center in cyber security.Prior to that, he served as Global Lead for Security Research at Bell Labs from 2013 to 2017. In that capacity, he coordinated three Security Research Depts.-based in Paris, Munich, and Espoo - counting 40+ researchers and research engineers, striving to lead security research in alignment with the strategicbusiness goals and to move research results into innovation. Besides his position at Nokia Bell Labs, Dr. Roberto Di Pietro was also Professor at University of Padova (with tenure). Prior to the above assignments, he was a faculty at University of Roma Tre (Roma, Italy), always dedicated to security research, research mentoring, and innovation.From 2009-2010 he was a Seconded National Expert to EUROJUST (The Hague). In 2011-12 he was awarded a Chair of Excellence at University CarlosIII, Madrid, for his research results in security. In 2011 he co-founded a research-inspired start-up, providing innovative commercial solutions in the domain of Access Control (exited 2015). From 2013-2015 he was the scientific director of an EU project devoted to devise novel digital forensics tools to support the investigation of EU anti-cartel agencies.He started his Computer Scientist career back to the 1995, serving for a few years as senior military technical officer, within the Italian MoD, managing complex ICT projects with focus on security, aiming at supporting investigations, forensics, and operations.His research interests include Cloud Security, Distributed Systems Security, Blockchain Technology, Wireless Security, On-line Social Networks Security, OSINT, Intrusion Detection, Access Control, Forensics. On these topics, he has been publishing 180+ scientific papers, and has been contributing with patents and books.He holds a M.Sc. in Computer Science from University of Pisa, a PhD in Computer Science, and a Post-degree Specialization Diploma in Operations Research and Strategic Decisions from University of Roma “La Sapienza”, as well as professional certifications such as CISA, CISSP, CISM, CRISC, CGEIT. As for Google Scholar, he has totaling 7100+ citation, with h-index=41, and i-index=110.
Abstract
Information has always played a decisive role in any type of conflict (be it war, revolution, or market competition). Knowing even with little advance the next course of action decided by an opponent, could provide a capital advantage.
Hence, it should come with little surprise that a crucial phase of any conflict is being fought from the information perspective. In particular, a specific segment of interest is constituted by the fact that information trusted by a target may be subject to manipulation, without the target's awareness. Thus, making decisions based on this counterfeit information is absolutely against the interests of the intended victim, since its decision process could be influenced, if not controlled, by its adversary. The manipulation of trusted information is part of Information warfare.
Over the years, we have witnessed an evolution in the way information is produced, transmitted, and consumed In particular, the advent of the Internet made communication distances almost irrelevant, completely revolutionizing the information communication ecosystem. The related introduction of web pages, fora, and Social Media has radically changed many aspects of users' lives from a social point of view, leading to a new logic of information that prefers speed and
immediacy to accuracy and reliability. The information during the sharing process undergoes adjustments, enrichment, teasing an active participation by a dynamic audience, resulting in the fact that original source, opinions, and even fake contributions can hardly be discerned.
People - and eventually the Society -, are also potential target of modern Information warfare.
In this talk, I will revise typical target of Information warfare interpreting them according to the modern information age, focusing on the fabric of society, the economy, and critical Infrastructures.
For each entity we build one or more plausible detailed real-world scenarios, showing the related possible threats from the information warfare point of view.
In addition, we will dive into the description of the still open problems and the countermeasures that can be implemented, possibly inspiring further research in the domain.
Finally, we will also touch one special subjects: Next Generation of Information Warfare Technologies. Here, we will offer a thorough and detailed description of the technologies involved in the above depicted scenarios.
Challenges of GDPR and the NIS Directive
Gerald Quirchmayr
Department of Computer Science, University of Vienna
Austria
Brief Bio
Gerald Quirchmayr holds doctors degrees in computer science and law from Johannes Kepler University in Linz (Austria) and currently is Professor in the Multimedia Systems Research Group of the Faculty of Computer Science at the University of Vienna.
In 2001/2002 he held a Chair in Computer and Information Systems at the University of South Australia. He first joined the University of Vienna in 1993 from the Institute of Computer Science at Johannes Kepler University in Linz (Austria) where he had previously been teaching.
In 1989/1990 he taught at the University of Hamburg (Germany). His wide international experience ranges from the participation in international teaching and research projects, very often UN- and EU-based, several research stays at universities and research centres in the US, Asia and EU Member States to extensive teaching in EU staff exchange programs in the United Kingdom, Sweden, Finland, Germany, Spain, and Greece, as well as teaching stays in the Czech Republic and Poland. International teaching and specialist missions include UN-coordinated activities in Egypt, Russia and the Republic of Korea.
He has served as a member of program committees of many international conferences, chaired several of them, has contributed as reviewer to scientific journals and has also served on editorial boards. He is a member of the Austrian and German computer societies and a member of IFIP working groups. For his contributions to the international IT community he was received the IFIP Silver Core Award in 1995.
His major research focus is on information systems in business and government with a special interest in security, applications, formal representations of decision making and legal issues. His publication record comprises approximately 150 peer reviewed papers plus several edited books and conference proceedings as well as nationally and internationally published project reports.
In July 2002 he was appointed as Adjunct Professor at the School of Computer and Information Science of the University of South Australia. From January 2005 until January December 2010 he headed the Department of Distributed and Multimedia Systems, Faculty of Computer Science, at the University of Vienna and served as Vice Dean of the Faculty of Computer Science from October 2008 until October 2010. Since January 2011 he serves as deputy head of the Multimedia Systems Research Group group. In 2011 he was appointed as Deputy Director of the Doctoral Studies Programme Natural and Technical Sciences, served as the programs Director from October 2014 until October 2016 and then again as Deputy Director until October 2018.
Abstract
The talk will start with an overview of the major new obligations introduced by legislation that came into effect in May 2018. While this new legislation, the GDPR and the NIS Directive, is a major step towards updating existing privacy laws in Member States of the European Union and is necessary for improving the security of ICT components in critical infrastructures, it also poses substantial challenges for the ICT industry, especially software development, and for supply chain management. The context of smart manufacturing / industry 4.0 makes these issues even more pressing. The focus of the talk will be on a discussion of arising challenges.