Dissemination

This section shows the activities related to dissemination along the project duration. Visit this section periodically to get new updates.

Journal & Magazine Publications

Managing Break-The-Glass using Situation-oriented authorizations (IRIT)
April 2014. In in the 9th Conference on Security of Network Architectures and Information Systems - SARSSI 2014 at Saint-Germain-Au-Mont-dOr (Lyon), France.
Specification and Enforcement of Dynamic Authorization Policies oriented by Situations (IRIT) (Article).
January 2014. In the 6th IFIP International Conference On New Technologies, Mobilities and Security (NTMS 14) at Dubai, UAE.
Information Security Technical Report journal (ISTR) (Journal paper). Institut Telecom
2013. In press. "Semantic Analysis of Role Mining Results and Shadowed Roles Detection"
Conflict Detection in a security policy obligations with deadlines (Research paper). Institut Telecom
June 2013. Mont de Marsan - Landes, France. 8th Conference on Security and Network Architectures of Information Systems.
Attribute-based Mining Process for the Organization-Based Access Control Model (Research paper). Institut Telecom
16-18 June 2013. Melbourne, Australia. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2013).
Information security in Finnish small and medium enterprises: current state and future trends (Thesis). NetMan
May 31, 2013. Oulu University of Applied Sciences, Finland. Read abstract
Towards Authorization as a Service: A Study of XACML Standard (Research paper). IRIT
April, 2013. San Diego, California, USA. Communication and Networking Symposium.
Conflict Management in Obligation with Deadline Policies (Research paper). Institut Telecom
March, 2013. Regensburg, Germany. In Proceedings of the eighth International Conference on Availability, Reliability and Security. IEEE Computer Society
International Journal of Secure Software Engineering (IJSSE) 3(4) (Journal paper). Institut Telecom
2013. "Role Mining to Assist Authorization Governance: How Far Have We Gone?"
What is the basis for information security measurement (Blog post). Nixu
January 17, 2013. Oulu, Finland
Iikka Salmela
Read (in Finnish)
Management of stateful firewall misconfiguration (Journal paper). Institut Telecom
2013. Computers and Security journal. In press.
Master of Science Thesis, 105 pages, 2 Appendix pages (Thesis). Nixu
December 5, 2012. Tampere University of Technology. Tampere, Finland.
Business Driven Information Security Measurement
Read pdf (in Finnish)
Data Knowl. Eng. 71(1): 127-147 (2012)(Research paper). Institut Telecom
November 21-23, 2012. Wu Yi Shan, Fujian, China.
Formal enforcement and management of obligation policies
View web site
6th International Conference on Web Reasoning and Rule Systems (RR'12)(Research paper). LISSI
September, 2012. Vienna, Austria.
Rule-based Context Assessment in Smart Cities
View web site
DPM/SETOP 2012: 287-302 (Research paper). Institut Telecom
September 13-14, 2012. Pisa, Italy.
Towards Session-Aware RBAC Delegation: Function Switch
View web site
ARES 2012: 123-132 (Research paper). Institut Telecom
August 20th - 24th, 2012. Prague, Chzech Republic.
Towards Automated Assistance for Mined Roles Analysis in
View web site
6th International Symposium on Rules (RuleML'12)(Research paper). LISSI
August 2012. Germany & Europe.
A Production Rule-based Framework for Causal and Epistemic Reasoning (Received a Best Paper Award)
View web site
AAAI 2012 (Research paper). LISSI
July, 2012. Toronto, Canada.
Machine Learning spotlight track: Framework for Causal and Epistemic Reasoning
View web site
11th International Conference on Service Oriented Computing (Research paper). LISSI
July, 2012. Shanghai, China.
Semantic Service Composition Framework for Multidomain Ubiquitous Computing Applications
Read program
Article of strategical R&D projects for Spanish IT companies, with a focus on PREDYKOT from NEXTEL.
15 June 2012. View article
ICIS 2011 (Research paper). Oulu
December 4-7, 2011. Shanghai, China.
Essential Principles of Information Systems Security Policy Methods: A Meta-Theoretical Approach
Master Thesis, Instructor: Professor Mikko Siponen (Research paper). Oulu
December 7, 2011. Oulu, Finland.
Synthesising information security policy development method from litterature

Conference Publications

EIC 2013 - European Identity and Cloud Conference organized by KuppingerCole analyst.(Conference). Evidian and Nextel
May 14-16, 2013. Munich, Germany.
Creating tomorrow's IAM policy management.
Details of the conference
Read conference agenda
Read Report notes of the conference
Presentation of PREDYKOT usage in the secure communication context (Seminar). Cassidian
May 13, 2013. Elancourt, France. Broadband security working group
Presentation of PREDYKOT research targets on the security aspects. (Seminar). Thales
February 27, 2013. Palaiseau, France.
I+D+i por las nubes (Conference). NEXTEL
December 21, 2012. Zamudio, Spain.
Internal company event
ITEA 2 Symposium 2012. Evidian, Thales, Cassidian, Gemalto
October 2012. La Defense, France.
PREDYKOT booth at ITEA 2 symposium
Kuppinger Cole Analyst. (Analyst briefing). Evidian
August 2012. Germany & Europe.
Presentation to the KuppingerCole analyst about PREDYKOT motivations and objectives, as part of the Evidian strategy
View web site
Ovum Analyst. (Analyst briefing).
July 2012. UK & Europe.
Presentation to the OVUM analyst about PREDYKOT motivations and objectives, as part of the Evidian strategy
X Innovalia Convention. (Conference). Innovalia Association
13 July 2012. Biscay Science and Technology Park (Zamudio), Spain.
PREDYKOT was included at the exhibition booth of Innovalia Association
Turkey Eureka Chairmanship 2012/2013. (Conference).
13 July 2012. Istanbul, Turkey.
Posters on Exhibition Center
View web site
OpenThingsDay. (Dissemination session). Innovalia Association
14 June 2012. Bilbao.
PREDYKOT technologies have been presented by Innovalia Association
View web site
Security Day Meeting / XV Jornadas de Seguridad. NEXTEL
5 June 2012. Bilbao, Spain. View presentation
SEC 2012. (Conference).
4 June 2012. Heraklion, Crete, Greece.
Moataz, Xavier Rimasson: Handling Stateful Firewall Anomalies. SEC 2012: 174-186.
View web site
DBUS 2012. (Conference).
24 May 2012. Aachen, Germany.
Presentation of PREDYKOT at DBUS 2012 as a key strategic way to address IAM Intelligence "Future trends for IAM"
View web site
FInES / EFFRA Workshop. Innovalia Association
9 May 2012. Aalborg.
PREDYKOT technologies have been presented by Innovalia Association
European Identity Conference 2012. (Conference).
18 April 2012. Munich, Germany.
Round Table at the European Identity Conference 2012 "The Future of Identity & Access Management: Embrace, Extend - and don't Replace?"
View web site
EURIPIDES Information Day & Brokerage Event. (Seminar). C2Tech
5 April 2012. Ankara, Turkey.
Middle East Technical University Micro-Electro-Mechanical Systems
View pdf
Euroforensics-3rd International Forensics Sciences. (Conference). C2Tech
21-29 of March 2012. Istanbul, Turkey.
PREDYKOT was included at the exhibition booth of Euroforensics-3rd International Forensics Sciences
View web site
ISS World Asia Pacific. (Conference)
6-8 of December 2011. Kualalumpur, Malaysia.
PREDYKOT was included at the exhibition booth of ISS World Asia Pacific
View web site
Security Day Meeting / XIII Jornadas de Seguridad. NEXTEL
24 November 2011. Bilbao, Spain. Read Program
Read Report notes of the event
View presentation

View Abstract

Focused on Security Information Management and presentation of different market solutions the event joined an audience conformed by a significative part of Nextel's customers and stakeholders. Taking into account this opportunity there were presented different initiatives and projects that NEXTEL is actually performing in several research projects. Conducted by Mikel Uriarte presented PREDYKOT project, and the main goals expected to be achieved A high level description was done focus on the idea of dynamically refine a security policy and put in place the mechanisms to maintain it efficient whatever changes may occur to it.

European Workshop on Safe-Infrastructures. NEXTEL
14-15 November 2011. Technology Park of Biscay (Zamudio). Bilbao, Spain. Read Report notes of the event

View Abstract

It was an initiative from European Technology Platform Industrial Safety ETPIS and supported by PESI Spanish Technology Platform on Industrial Safety. The overall objective of the SafeFuture initiative is to support the EU2020 Strategy, in particular the sustainability targets, while implementing the ETPIS long term vision. SafeFuture initiative has being built around 4 pillars: Safe Infrastructures, Safe Products & Production, Safe Energy and Transversal issues. Focused on these pillars industrial and technological initiatives were showed during the workshop and different organizations had the opportunity to discuss about the progress on the research and development initiatives and the Safe-Infrastructures roadmap. Focused on Security (Critical Infrastructures Protection) NEXTEL presented different initiatives and projects that are being performed in several research projects. Conducted by Joseba Enjuto it was presented PREDYKOT project, and the main goals expected to be achieved A high level description was done focus on the idea of dynamically refine a security policy and put in place the mechanisms to maintain it efficient whatever changes may occur to it.

PREDYKOT at 5EINSE INTECO. NEXTEL
26th, 27th and 28th of October 2011. Leon, Spain. Read Program
Read Report notes of the event
View presentation

View Abstract

The Spanish Government enacted recently the 8/2011 Act to give effect to the terms of the COUNCIL DIRECTIVE 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. This legislation emphasizes the importance of the risk on “Dependence that modern societies have on the complex infrastructures systems which holds and ensures the smooth running of productive sectors, administration and civic life in general”. Focused on Security (Critical Infrastructures Protection) NEXTEL presented different initiatives and projects that are being performed in several research projects. Conducted by Joseba Enjuto it was presented PREDYKOT project, and the main goals expected to be achieved A high level description was done focus on the idea of dynamically refine a security policy and put in place the mechanisms to maintain it efficient whatever changes may occur to it.

Analyst briefing, Evidian
19 October 2011. US
Presentation to the Gartner analysts about PREDYKOT motivations and objectives, as part of the Evidian strategy

Project Dissemination Material

European survey on information security for SME's. (Market survey).
10-31 August 2012. Finland.
Dissemination of ITEA2 & PREDYKOT through a market survey addressed to 3800 Finnish SME's
News about PREDYKOT in the university bulletin. Similar information was sent to newspapers, Oulu
July 2012. Oulu web site View web site
News about the launching of PREDYKOT, C2Tech
November 2011. C2Tech web site View web site
News about the launching of PREDYKOT, NEXTEL
15 November 2011. NEXTEL web site View web site
News about the launching of PREDYKOT, Evidian
20 October 2011. Evidian web site View web site