University of Valencia logo Logo University Research Institute on Robotics and Information and Communication Technologies (IRTIC) Logo del portal

CENIT – SEGURA (Security and Trust in the Information Society)

The SEGURA project articulates its work around three main lines of research (Reliable networks, Identity and Privacy Guarantee and Network self-protection).
Description

These three lines are derived in turn, in order to achieve its goals, in a number of technologies for working in a practical way and in technological environments that allow bring together and order these technologies to provide comprehensive solutions and architectures.


The LISITT participates as public research organization outsourced by the company ECIJA Abogados in conducting certain activities of R&D.
Then, the six main activities (AP), in which this proposal will reflect this work scheme, are listed.


AP1: Identification, authentication and network access control technologies.

This activity tries to cover two objectives:

  • Obtaining assurance technologies of identity (identification, authentication and access control) between parts, allows covering a wide range of scenarios and actors, so an identity solution for a wide range of situations and resources is prepared. Biometrics, digital signature, multifactor authentication mechanisms, indoor location, the electronic ID, and its related protocols and algorithms will be the fields where the projects will be developed.
  • Improved technologies for secure access to the network of users, from the point of view of security cooperative and networks of trust, that prioritize the service to reliable users and punish “no reliable” users; and the security in wireless access to the network (due to its wide circulation)

AP2: Technologies for customers and systems self-protection.

This activity aims to meet several objectives:

  • To avoid dependence on Microsoft technology, developing complementary alternative software to the hardware security model TPM projected for Windows Vista. The European Commission completely rejects the dependence of programs and data of the EU in favour of a TPM and DRM chip. The development of a security model based on software is necessary to be an European alternative to the TPM model. This offers a way for future free choice of users between Windows Vista and/or Linux.
  • To maximize the terminals security, increasing users confidence in using new technologies. For this purpose the redesigning of the PC platform must be robust not only before the accidental error, but against intentional attack.
  • To advance in the use of secure identification systems, to guarantee the trust in online transactions for both people and applications and processes.


AP3: Technologies of monitoring and intrusion detection

The main objective of this AP is the basic research in technologies for monitoring, detecting and responding to intrusions on networks as well as the pro-active reaction against possible malfunctions.


AP4: Technologies for risk analysis and crisis simulation

The main objective is developing models of quantitative risk analysis for the services of the information society, as well as for the networks and systems that support them. Researching and moving forward different lines of business that will develop the pieces that compose the models will be necessary.


AP5: Technological environment for integrated management of digital identity

The aim of this AP is to establish a proposal of functional architecture for the integrated management of digital identity as a whole. To achieve this, the architecture will consider the necessary technological environment for:

  • The management of identities and its privacy.
  • The management of mechanisms to ensure the veracity of identities. Also, it will incorporate a model for the management of the entire proposal, in order to assess the viability of building in the future integrated identity services based on this architecture.

AP6: Technological environment for security management

This AP aims to study the design and development of a technological environment for the cooperative management of information security in public networks providing services to information society or in corporate enterprises networks and the verification of its requirements on different operational scenarios.


As the activities’ name suggests, the AP1 and AP2 will work in a number of technologies that will apply the results in the technological environment constructed in the AP5, although this activity will develop, in turn, their own parts of the environment not coming from the previous AP but they are necessary to generate a broad, global environment that allows displaying the objectives set by the project.


Similarly, AP3 and AP4 will deal with the technologies that come in a set of results that can be assigned in the projects to develop in the AP6.
 

Start date
2010 September
End date
2010 December
Partners:

ECIJA ABOGADOS