Up to £5k funding for start-up, micro, small and medium-sized enterprises to work with an external expert to gain the knowledge to innovate and grow. This voucher is only for cyber security advice including advice leading to certification under the Cyber Essentials Scheme.
For more information click here.
Closing 5 January 2016 – 12pm Noon.
Contact a member of the funding development team if you have any questions .
Innovate UK is committing up to £4M to fund novel and innovative ideas in ways to counter cyber threats in industries such as healthcare, transport, energy and smart cities through a competition opening in March 2015.
Attend the workshop in London on 15 January 2015 and have the chance to help identify challenge areas to be addressed that will feed into the scope of the competition brief. Also your knowledge can help shape the competition by providing insights and observations around cyber threat challenges facing our digital economy.
Click here to register your place.
Please join us today for a cyber security seminar on:
“Reduction of Access Control Decisions”
Coyne Lecture Theatre
4pm – 5pm
Speaker: Dr. Nicola Zannone (Eindhoven University of Technology)
Access control has been proposed as “the” solution to prevent unauthorized accesses to sensitive system resources. Historically, access control models use a two-valued decision set to indicate whether an access should be granted or denied. Many access control models have extended the two-valued decision set to indicate, for instance, whether a policy is applicable to an access query or an error occurred during policy evaluation. Decision sets are often coupled with operators for combining decisions from multiple applicable policies. Although a larger decision set is more expressive, it may be necessary to reduce it to a smaller set in order to simplify the complexity of decision making or enable comparison between access control models. Moreover, some access control mechanisms like XACML v3 uses more than one decision set. The projection from one decision set to the other may result in a loss of accuracy, which can affect the final access decision. In this talk, we present a formal framework for the analysis and comparison of decision sets centered on the notion of decision reduction. In particular, we introduce the notion of safe reduction, which ensures that a reduction can be performed at any level of policy composition without changing the final decision. We demonstrate the framework by analyzing XACML v3 against the notion of safe reduction. From this analysis, we draw guidelines for the selection of the minimal decision set with respect to a given set of combining operators.
Speaker Bio: Nicola Zannone received the Ph.D. in Computer Science at the University of Trento in 2007. He won the IBM PhD fellowship award for the 2006-07 academic year. He visited the Center for Secure Information Systems at George Mason University in 2005 and at IBM Zurich Research Laboratory in 2006. In 2007-2008, he was a post-doc at the Department of Computer Science of the University of Toronto. In 2008-2012, he has a post-doc position in the Security Group at the Eindhoven University of Technology. Since November 2012, he is assistant professor in the same group. His research interests include computer security, formal methods, privacy and data protection.