Deliverable D3.3 Report on the NoE Mobility Program and Assessment of its Results

Size: px
Start display at page:

Download "Deliverable D3.3 Report on the NoE Mobility Program and Assessment of its Results"

Transcription

1 Network of Excellence Deliverable D3.3 Report on the NoE Mobility Program and Assessment of its Results NESSoS

2 NESSoS

3 Project Number : Project Title : NESSoS Deliverable Type : Report Deliverable Number : D3.3 Title of Deliverable : Report on the NoE Mobility Program and Assessment of its Results Nature of Deliverable : R Dissemination Level : Public Internal Version Number : 4.0 (SVN Revision No. 3137) Contractual Delivery Date : September Actual Delivery Date : October Contributing WPs : WP 3 Editor(s) : Manuel Clavel (IMDEA) Author(s) : Manuel Clavel (IMDEA), Carolina Dania (IMDEA) Reviewer(s) : Jorge Cuellar (SIEMENS), Marina Egea (ATOS), Fabio Martinelly (CNR) Abstract The NESSoS Mobility Program is a mechanism that supports the integration of activities across various sites. It brings together researchers working on related topics; it drives knowledge exchange and knowledge generation through union and diversity. It increases the capability of joint cooperation among researchers. This deliverable contains a report covering the first two years of the NESSoS Mobility Program, and includes an assessment of its results. This assessment focuses on the integration of activities across the network partners through the mobility of their researchers among the different sites. Keyword List Mobility, integration, cooperation, exchange. NESSoS

4 Document History Version Type of Change Author(s) 0.1 Initial setup Manuel Clavel (IMDEA) 1.0 Complete draft Manuel Clavel (IMDEA), Carolina Dania (IMDEA) 2.0 Under internal review Manuel Clavel (IMDEA), Carolina Dania (IMDEA) 3.0 Revised version Manuel Clavel (IMDEA), Carolina Dania (IMDEA) 4.0 Approved by the internal reviewers NESSoS

5 Table of Contents LIST OF TABLES INTRODUCTION REPORT ON THE RESULTS The Mobility Portal The Mobility Actions Long-term visits Medium-term visits Short-term visits ASSESSMENT OF THE RESULTS The Mobility Portal The Mobility Actions CONCLUSIONS BIBLIOGRAPHY NESSoS

6 NESSoS

7 List of Tables Table 2.1: Mobility Portal: General statistics Table 2.2: Mobility Portal: Unique visitors in each month Table 2.3: Mobility Actions: Summary Table 2.4: Mobility Actions: by work package Table 2.5: Mobility Actions: by partner of origin Table 2.6: Mobility Actions: by partner of destination NESSoS

8 NESSoS

9 1 Introduction The NESSoS Mobility Program is a mechanism that supports the integration of activities across various sites within the network. It brings together researchers working on related topics; it drives knowledge exchange and knowledge generation through union and diversity; it increases the capability of joint cooperation among researchers. Each mobility action may pursue a different specific purpose e.g., teaching short graduate, undergraduate, or industry-oriented courses in a different hosting organization; collaboration with industrial partners in carrying out industrial case studies; integrating different tools or validating them against large, complex, multi-facet scenarios, but all of them will contribute to increase the cohesion of the research ideas developed within the network and to promote the exchange of knowledge among the different partners. As stated in the NESSoS Description of Work, this deliverable will provide a report on the NoE Mobility Program during its second year, as well as an assessment of its results. This second assessment will focus on the integration of activities across the network partners through the mobility of their researchers among the different sites. Accordingly, in chapter 2 we report on the first 2 years of the NESSoS Mobility Program, and we includes an assessment of its results in chapter 3. NESSoS

10 NESSoS

11 2 Report on the results 2.1 The Mobility Portal The Mobility Portal ( supports the NESSoS Mobility Programme in different ways. A report about the design and functionality of the NESSoS Mobility Portal was already included in Deliverable D3.2 [6]. During this second year, our work on the Mobility Portal has been focused on integrating the portal within the JVRL, so that the users can log in using the same access credentials than for the others JVRL web sites. To provide this functionality, we have enabled a binding with the NESSoS LDAP directory. Tables 2.1 and 2.2 show statistics about the Mobility Portal s visitors during the period from September 1st, 2011 to August 31st, They were automatically generated with Visitors Web Log Analyzer version 0.7. (Note: multiple hits with the same IP, user agent and access day, are considered a single visit). 9/2011-8/ /2011 Number of unique visitors 3, Number of unique visitors from Google Number of unique visitors from NESSoS Web Portal Different pages requested 186,851 34,883 Table 2.1: Mobility Portal: General statistics Jan 136 Feb Mar Apr May Jun Jul Aug Sept 787 Oct 536 Nov 341 Dec 269 Table 2.2: Mobility Portal: Unique visitors in each month. 2.2 The Mobility Actions The Mobility Program fosters short, medium-term, and long-term exchange visits of research professors, post-doctoral and PhD students, and industrial members. These exchange visits can be of different types, with different goals and durations. However, the NESSoS Mobility Program is mostly focused on: Medium-term exchange visits of PhD students, to integrate existing research infrastructure, methodologies and tools, and/or to carry out common case-studies and applications. Medium-term internships of PhD students with industrial partners, to reduce the gap among best practices and research. NESSoS

12 Type Year 2 Year 1 Num. Days Num. Days Short-term Medium-term Long-term Total Table 2.3: Mobility Actions: Summary. WP Year 2 Year 1 Num. Days Num. Days WP1 WP2 1(L) 30 WP3 WP4 1(M), 1(L) 41 1(M) 7 WP5 WP6 2(S), 1(L) 188 1(S) 3 WP7 3(S),5(M),2(L) 106 2(S), 1(L) 98 WP8 10(S) 18 1(S), 1(M) 11 WP9 2(L) 61 WP10 1(L) 182 1(S) 3 WP11 2(L), 1(S) 108 1(L) 30 WP12 1(L) 28 WP13 1(M), 1(L) 41 WP14 WP15 WP16 Table 2.4: Mobility Actions: by work package. Short-term, medium-term postdoctoral visits, to increase cohesion of research ideas, and promote exchange of knowledge. Short-term, medium-term visits of industrial members at academic research partners (and vice versa), to foster industry-driven research and technology transfer. Mobility action applications are submitted using the Mobility Portal. Each application is accompanied by a budget, not exceeding the amount assigned to the corresponding partners for carrying out mobility actions. Applications are evaluated by a small committee, based solely on their potential impact on existing or nascent collaborations among partners. When needed, work packages leaders are consulted before approving a mobility action. Final reports about mobility actions are also submitted using the Mobility Portal. Tables 2.3, 2.4, 2.5, and 2.6 summarize the mobility actions carried out between partners during the first two years of the NoE. Here and elsewhere, short-term visits (S) means visits that long less than 5 days; medium-term visits (M) means visits that long from 1 week to one month; and long-term visits (L) means visits that long more than one month. Next, we provide a brief summary of these mobility actions. In particular, for each mobility action, we will indicate: participant, origin, destination, starting date, total days, work packages, and funding sources (when different from NESSoS). More technical details about the context, background, and results of these actions are to be found in their corresponding work packages. NESSoS

13 Partner Year 2 Year 1 Total Num. Days Num. Days CNR ATOS 1(M), 1(S) 8 5 ETH 1(S) 3 1(S) 5 8 IMDEA 5(L), 3(M) INRIA 1(S) 2 1(S) 3 5 KUL 7(S) LMU 1(M) SIEMENS 1(M), 1(S) 13 1(M) 7 20 SINTEF UDE 1(S) 3 1(S), 1(M) UMA 2(L) 103 2(L) UNITN 2(L) Table 2.5: Mobility Actions: by partner of origin. Partner Year 2 Year 1 Total Num. Days Num. Days CNR 1(L) 28 1(L) ATOS ETH 2(M), 5(L) IMDEA 1(M), 2(S) 18 1(S) 5 23 INRIA 3(S), 1(L) KUL 2(S) 5 1(S) 1(M) LMU 2(M) SIEMENS 1(L), 3(s) 78 1(L) SINTEF 1(L) 182 1(S) UDE UMA 1(M) 11 1(S) 7 18 UNITN 2(S) 6 3 Table 2.6: Mobility Actions: by partner of destination. NESSoS

14 2.2.1 Long-term visits Participant Origin Destination Start Date Days Workpackages Funding Rios, Ruben UMA SIEMENS 15/9/11 90 WP 11 MICINN During this stay SIEMENS and UMA concentrated on location privacy services, in the field of Wireless Sensor Networks (WSN). The work carried out provides a protocol that refrain an attacker from finding out the location of the base station, which is the most critical node in the network. This collaboration has eventually resulted in two joint publications, namely, [2] and [11]. Bielova, Natalia UNITN INRIA 1/2/ WP 9 During this visit the participant from UNITN learned about static analysis techniques and dynamic mechanisms for secure information flow, that were proposed by the researchers at INRIA Rennes. They then identified the classes of security policies that should be enforced for JavaScript web applications and reasoned about the application of static, dynamic or hybrid techniques to enforce these policies in the web browser settings. Le Minh Sang, Tran UNITN SINTEF 1/2/ WP 6, WP 10 The main focus was on studying a method for allowing risk analysts to select a cost-effective strategy for identified risks in software systems. The outcome was a generic approach for selecting a costeffective countermeasure alternatives, which could be applied for defensive risk analysis techniques such as Fault Tree Analysis, CORAS, and so on. This approach was demonstrated by instantiating it to CORAS with an exemplified scenario taken from NESSOS case study [7] Clavel, Manuel IMDEA ETH 1/9/ WP 7, WP 13 Fundación Caja Madrid This mobility action is still ongoing. The main objectives are to write a joint journal paper on the ActionGUI methodology and tools [9], and to co-teach a Master-level course on Security Engineering. García, Miguel A. IMDEA ETH 1/9/ WP 11 This mobility action is still ongoing. The main objectives are to apply the ActionGUI methodology and tools to the NESSoS EHealth Use Case [8] and to write a joint paper on the lessons learned. Dania, Carolina IMDEA ETH 1/9/ WP 11 This mobility action is still ongoing. The main objectives are to further develop a methodology to formally analyse ActionGUI models [10], to apply it to the ActionGUI models which are being developed for the NESSoS EHealth Use Case [8], and to write a joint paper on the results. Valdazo, Javier IMDEA ETH 1/9/ WP 7 IMDEA This mobility action is still ongoing. The main objectives are to further develop an extension of the ActionGUI methodology and tools [9] for modeling business process with security policies (including separation of duties and binding of duties), and to write a joint paper on the results. Ortiz, Gonzalo IMDEA ETH 1/9/ WP 2 IMDEA This mobility action is still ongoing. The main objectives are to further develop the ActionGUI tools (including model editors and code generators) and to launch joint open projects associated to the ActionGUI methodology and tools. Fernández, Carmen UMA CNR 9/28/ WP 4, WP 12 During this stay UMA and CNR worked together closely in the finalization of D12.2 [5] and other aspects towards the preparation of the first review. We also discussed ideas for applying for new EUfunded project on the area of trust management and identified this as an area where joint research UMA-CNR will be done. NESSoS

15 2.2.2 Medium-term visits Participant Origin Destination Start Date Days Workpackages Funding Busch, Marianne LMU IMDEA 13/11/11 13 WP 4, WP 7 The goal of this action was to start a joint project on defining a model-to-model transformation from UWE models to ActionGUI models. UWE is a modeling language developed at LMU which focuses on a high level of abstraction, whereas ActionGUI is a modeling language developed at IMDEA whose models can directly be transformed to code. This collaboration eventually resulted in a joint technical report [1]. García, Miguel A. IMDEA LMU 23/1/12 10 WP 7 Clavel, Manuel IMDEA LMU 26/1/12 5 WP 7 The goal of this action was to continue our joint work on defining a model-to-model transformation from UWE models to ActionGUI models. This collaboration has resulted in a joint technical report [1]. Egea, Marina ATOS ETH 6/2/12 5 WP 7 Clavel, Manuel IMDEA ETH 6/2/12 5 WP 7 During this week, ETH, IMDEA and ATOS worked on a joint journal publication. We also discussed the writing of a book on model-driven security that would contain our results and experiences in this area. Cuellar, Jorge SIEMENS UMA 10/4/12 11 WP 11, WP 9, WP 13 Dr. Cuellar held a short course (10 hours) on Formal Methods for IT-Security. But the main purpose of the visit was to work on location-privacy protection, which will be crucial in FI scenarios. This collaboration has resulted in two joint publications, namely, [2] and [11]. NESSoS

16 2.2.3 Short-term visits Participant Origin Destination Start Date Days Workpackages Funding Ochoa, Martin SIEMENS IMDEA 6/10/11 2 WP 8 SIEMENS and IMDEA gave the first steps in defining a sound non-interference analysis for caches by exploiting existing abstract interpretation techniques. This collaboration has resulted in a joint conference publication [3] and a joint journal publication [4] Schmidt, Holger UDE KUL 10/10/11 3 WP 6, WP 8 UDE and KUL worked on joint research on security requirements engineering, secure software architectures, and security patterns. Burri, Samuel ETH IMDEA 23/11/11 3 WP 7 ETH and IMDEA identified potential extensions of IMDEA s work on model-driven security by ETH s work on authorization-constrained workflows. This collaboration eventually sparked off a Master s Thesis on transforming Secure BPML models into ActionGUI models [12]. Deryck, Philippe KUL SIEMENS 28/11/11 1 WP 8 IWT Van Acker, Steven KUL SIEMENS 28/11/11 1 WP 8 IWT Desmet, Lieven KUL SIEMENS 28/11/11 1 WP 8 IWT During this intensive 1-day research meeting on Web Application Security, KUL and SIEMENS have exchanged expertise on cross-domain communication, HTML5 and JavaScript security as part of ongoing collaborations between the two partners in work package 8, and have identified and discussed new strategic research directions in this domain. Yskout, Koen KUL INRIA 25/1/12 3 WP 7, WP 8 KUL and INRIA explored the conceptual and technical integration of change patterns and runtime reconfiguration with Kevoree for security (and access control in particular). Ben David, Olivier- INRIA KUL 2/5/12 2 WP 7, WP 8 Nathanael During these two days INRIA and KUL worked on the combination of change patterns and runtime adaptation. We studied a problem in relation with access-control. The problem was described with the problem frame notation and we started to implement a solution using Kevoree in order to determine the feasibility of the combination of both approaches. Egea, Marina ATOS UNITN 9/5/12 3 WP 6, WP 11 During this visit, ATOS presented and validated the NESSoS s Smart Grid scenario in the context of the evaluation of the application of erise methodologies to this scenario. It also participated in the students results assessment. Lagaisse, Bert KUL INRIA 22/8/12 1 WP 8 Decat, Maarten KUL INRIA 22/8/12 1 WP 8 The main goal of this visit was to review the possibilities of collaborative work on authorization technologies in the future. Both KUL and UNITN presented their current research, and a discussion was started about which topics could be explored in the future in a collaborative effort. Decat, Maarten KUL UNITN 26/9/12 3 WP 8 This visit happened in the context of a paper, co-authored by KUL and UNITN, about authorization and access control in Software-as-a-Service (SaaS) applications. NESSoS

17 3 Assessment of the results 3.1 The Mobility Portal As expected, given its current main focus on mobility actions among the network s partners (including associated partners), the number of visitors, although increasing, is not high. 3.2 The Mobility Actions As Table 2.3 shows, we seem to be fulfilling our goals. Notice that, if we count a long-term visit as two medium-term visits, we have already satisfied the success criteria established in the DoW for the whole project: namely, the number of short/mid-term visits should be greater or equal than 25. In fact, driven by the increasing integration of research activities across the network, we expect the number of exchange visits to grow (even more) in the third year of the project. More crucially, as Table 2.4 shows, the Mobility Program is indeed supporting the integration of activities, and, in particular, of the research activities, across the various sites within the network. Notice that the large majority of the mobility actions are either associated to research work packages (WP6 WP10), to the workbench work package (WP2), or to the industrial case studies work package (WP11). Finally, as Tables 2.5 and 2.6 show, the main risk that we identified in the DoW for this work package, namely, Weak commitment from partners, has not occurred. Indeed, all partners have already taken part in several mobility actions, either as origin, destination, or both. Notice also that, as proposed in the DoW, to counteract this risk, we have focused on medium-term exchange visits of PhD students and short, medium-term postdoctoral visits. NESSoS

18 NESSoS

19 4 Conclusions The overall goal of the NESSoS Mobility Program is to foster the integration of activities across the network partners. We have reported on the first 24 months of the Program and provided an assessment of its results. In summary, The Mobility Portal is available since month 4. During the second year, there have been 12 short-term visits, 6 medium-term visits, and 9 long-term visits. The large majority of the mobility actions are linked to joint-work within the different research work packages. All partners have been involved in exchange visits, either as origin, destination, or both. Driven by increasing integration of activities across the network, the number of exchange visits is bound to keep growing in the upcoming months. NESSoS

20 NESSoS

21 Bibliography [1] M. Busch and M. A. G. de Dios. ActionUWE: Transformation of UWE to ActionGUI models. Technical report, Ludwig-Maximilians-Universität München, [2] J. Cúellar, M. Ochoa, and R. Rios. Indistinguishable regions in geographic location privacy. In Proc. of the 2012 ACM Symposium on Applied Computing (SAC), Security Track. ACM, [3] B. Köpf, L. Mauborgne, and M. Ochoa. Automatic quantification of cache side-channels. In P. Madhusudan and S. A. Seshia, editors, Computer Aided Verification - 24th International Conference, CAV 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings, volume 7358 of Lecture Notes in Computer Science, pages Springer, [4] B. Köpf, L. Mauborgne, and M. Ochoa. Automatic quantification of cache side-channels. IACR Cryptology eprint Archive, 2012:34, [5] NESSoS. Deliverable 12.2: First report on dissemination and communication activities including the population of the dissemination web portal [6] NESSoS. Deliverable 3.2: Report on the NoE Mobility Program and assessment of its results. http: // [7] NESSoS. Deliverable 10.3: Prototypal tools to support risk and cost analysis. nessos-project.eu, [8] NESSoS. Deliverable 11.3: Initial version of two case studies, evaluating methodologies. http: // [9] NESSoS. Deliverable 7.3: Prototypes supporting secure service architectures and design. http: // [10] NESSoS. Deliverable 9.3: Initial set of prototypal support for security assurance for services. http: // [11] R. Rios, J. Cuellar, and J. Lopez. Robust probabilistic fake packet injection for receiver-location privacy in wsn. In S. Foresti, M. Yung, and F. Martinelli, editors, 17th European Symposium on Research in Computer Security (ESORICS 2012), volume 7459 of LNCS, pages , Pisa, Italy, Sep Springer, Springer. [12] J. Valdazo. Developing secure business applications from Secure BPMN models. Master s thesis, Universidad Complutense de Madrid, Spain, September NESSoS

Deliverable D13.2 Report describing the curricula for a master in Security Engineering for Future Internet Services and the co-tutela program setup

Deliverable D13.2 Report describing the curricula for a master in Security Engineering for Future Internet Services and the co-tutela program setup Network of Excellence on Engineering Secure Future Internet Software Services and Systems Network of Excellence Deliverable D13.2 Report describing the curricula for a master in Engineering for Future

More information

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007

More information

Analysis One Code Desc. Transaction Amount. Fiscal Period

Analysis One Code Desc. Transaction Amount. Fiscal Period Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00

More information

Ashley Institute of Training Schedule of VET Tuition Fees 2015

Ashley Institute of Training Schedule of VET Tuition Fees 2015 Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-

More information

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017 From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days

More information

JISC data.bris project & EPSRC Platform project: progress against workplan (October 2012)

JISC data.bris project & EPSRC Platform project: progress against workplan (October 2012) Project Name : data.bris DBSG/5/2 JISC data.bris project & EPSRC Platform project: progress against workplan (October 2012) WORKPACKAGES Month: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Oct 11 Nov Dec

More information

Guillem Bernat (RAPITA) Communication, Deliverable, Dissemination, Publication, Reporting

Guillem Bernat (RAPITA) Communication, Deliverable, Dissemination, Publication, Reporting D5.2 Project Handbook Document Information Contract Number 249100 Project Website Contractual Deadline Dissemination Level Nature Author Contributors Reviewer Keywords www.proartis-project.eu PM04 Public

More information

GEOTHERMAL ERA-NET: WP3: Towards a European Geothermal Database

GEOTHERMAL ERA-NET: WP3: Towards a European Geothermal Database GEOTHERMAL ERA-NET: WP3: Towards a European Geothermal Database WP3 status Adele Manzella Eugenio Trumpy CNR Organisational structure / work packages WP3 Towards a European Geothermal Information was:

More information

Statistics for www.brageboden.se (2008-08)

Statistics for www.brageboden.se (2008-08) Statistics for www.brageboden.se (-08) Sida 1 av 5-08-10 Last Update: 10 Aug - 10:39 Reported period: Aug OK Summary Reported period Month Aug First visit 01 Aug - 02:19 Last visit 10 Aug - 07:08 Unique

More information

About CREST R&D Grant

About CREST R&D Grant 1 About CREST R&D Grant Philosophy Higher value Electrical & Electronics (E&E) economic sector can be achieved when R&D thrives in the ecosystem This can be accelerated by promoting collaborative research

More information

Federated authorization for SaaS applications

Federated authorization for SaaS applications Federated authorization for SaaS applications Maarten Decat, Bert Lagaisse, Wouter Joosen IBBT-DistriNet, KU Leuven, 3001 Leuven, Belgium Abstract. With Software-as-a-Service (SaaS), a centrally hosted

More information

Deep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison

Deep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison Deep Security/Intrusion Defense Firewall - IDS/IPS Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security and Intrusion Defense Firewall. The document

More information

D9.1 Project Website

D9.1 Project Website H2020 FOF 09 2015 Innovation Action Smart integrated immersive and symbiotic human-robot collaboration system controlled by Internet of Things based dynamic manufacturing processes with emphasis on worker

More information

PowerSteering Product Roadmap Your Success Is Our Bottom Line

PowerSteering Product Roadmap Your Success Is Our Bottom Line Drive strategy. Accelerate results. cloud-based program & portfolio management software PowerSteering Product Roadmap Your Success Is Our Bottom Line Jay Hoskins Director of Product Management PowerSteering

More information

Andrew Pylyp. Capital Market Day. Managing Director Wer liefert was? Stockholm 27. November 2006

Andrew Pylyp. Capital Market Day. Managing Director Wer liefert was? Stockholm 27. November 2006 Capital Market Day Andrew Pylyp Managing Director Wer liefert was? Stockholm 27. November 2006 Wer liefert was? GmbH Capital Market Day, November 27, 2006 134 Company History Media 1932 Business-to-Business

More information

CENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR

CENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR JULY 2015 Area (RS-1) GSR GSR (LCS-1) Texarkana Incorporated July-15 $0.50690/Ccf $0.45450/Ccf $0.00000/Ccf $2.85090/MMBtu $17.52070/MMBtu Texarkana Unincorporated July-15 $0.56370/Ccf $0.26110/Ccf $1.66900/Ccf

More information

CAFIS REPORT 2015.10

CAFIS REPORT 2015.10 CAFIS REPORT 2015.10 INDEX Message CAFIS Inbound 03-06 07-08 CAFIS Arch 09-10 CAFIS Brain 11-12 CAFIS Global 13-14 What We Do 15-16 About CAFIS 17-18 Services for Member Stores 19-34 Services for Card

More information

Federal Cloud Computing Initiative Overview

Federal Cloud Computing Initiative Overview Federal Cloud Computing Initiative Overview Program Status To support the Federal Cloud Computing Direction and Deployment Approach, the ITI Line of Business PMO has been refocused as the Cloud Computing

More information

Weighted Thinned Arrays by Almost Difference Sets and Convex Programming

Weighted Thinned Arrays by Almost Difference Sets and Convex Programming Guidelines for Student Reports Weighted Thinned Arrays by Almost Difference Sets and Convex Programming V. Depau Abstract The design of thinned arrays can be carried out with several techniques, including

More information

NICE and Framework Overview

NICE and Framework Overview NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to

More information

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of

More information

Portal Annual Report 2012/13

Portal Annual Report 2012/13 Portal Annual Report 2012/13 Introduction This report is provided for a diverse audience and covers the year 1st September 2012 31st August 2013, the seventh year of operation of the Portal. The Portal

More information

Detailed guidance for employers

Detailed guidance for employers April 2015 3 Detailed guidance for employers Appendix A: Pay reference periods This document accompanies: Detailed guidance no. 3 Assessing the workforce Pay reference period calendars where the definition

More information

Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison

Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison Deep Security Intrusion Detection & Prevention (IDS/IPS) Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security. The document also outlines a comparison

More information

PROJECT: DLS Website Redesign STATUS REPORT May-June 2015

PROJECT: DLS Website Redesign STATUS REPORT May-June 2015 PROJECT: DLS Website Redesign STATUS REPORT May-June 2015 Key Project Roles Project Sponsor: Karen Johnson Executive Director, DLS Project Advisor: Vanessa Salway Program Manager: Project Manager: Steve

More information

A!Team!Cymru!EIS!Report:!Growing!Exploitation!of!Small! OfCice!Routers!Creating!Serious!Risks!

A!Team!Cymru!EIS!Report:!Growing!Exploitation!of!Small! OfCice!Routers!Creating!Serious!Risks! ATeamCymruEISReport:GrowingExploitationofSmall OfCiceRoutersCreatingSeriousRisks PoweredbyTeamCymru sthreatintelligencegroup Page 1of 14www.team-cymru.com www.team-cymru.com Threat'Intelligence'Group EXECUTIVE

More information

Business Idea Development Product production Services. Development Project. Software project management

Business Idea Development Product production Services. Development Project. Software project management Page 1, 1/20/2003 Ivica Crnkovic Mälardalen University Department of Computer Engineering ivica.crnkovic@mdh.se Development Project Product Lifecycle Business Idea Development Product production Services

More information

PROFESSIONAL INTERESTS WORK EXPERIENCE GINÉS DÓLERA TORMO CURRICULUM VITAE OCTOBER 2014

PROFESSIONAL INTERESTS WORK EXPERIENCE GINÉS DÓLERA TORMO CURRICULUM VITAE OCTOBER 2014 Ginés Dólera Tormo Phone: +49 176 90775273 E-mail: ginesdt@um.es Date of birth: 21 July, 1985 Nationality: Spanish Address: Dossenheimer Landsrtrasse 100 D-69121 Heidelberg, Germany PROFESSIONAL INTERESTS

More information

ESCoRTS A European network for the Security of Control & Real Time Systems

ESCoRTS A European network for the Security of Control & Real Time Systems ESCoRTS A European network for the Security of Control & Real Time Systems Luc Van den Berghe CEN-CENELEC Management Centre 20/05/10 Luxembourg workshop 1 Recommendations from a CEN/BT WG161 Survey in

More information

RBC Insurance Fetes Online Auto/Home Insurance Growth

RBC Insurance Fetes Online Auto/Home Insurance Growth Case Studies, K. Harris Research Note 29 October 2002 RBC Insurance Fetes Online Auto/Home Insurance Growth RBC Insurance's e-business successes are generating greater than $3 million in premiums per month.

More information

Integrating the Internet of Things with Business Process Management: A Process-aware Framework for Smart Objects

Integrating the Internet of Things with Business Process Management: A Process-aware Framework for Smart Objects Integrating the Internet of Things with Business Process Management: A Process-aware Framework for Smart Objects Giovanni Meroni 1 Politecnico di Milano Dipartimento di Elettronica, Informazione e Bioingegneria

More information

European Network on Cyber Security. NeCS Carmen Fernández Gago NICS Lab, Universidad de Málaga

European Network on Cyber Security. NeCS Carmen Fernández Gago NICS Lab, Universidad de Málaga European Network on Cyber Security NeCS Carmen Fernández Gago NICS Lab, Universidad de Málaga 9 December, 2015 A matter of legacy! NESSoS NeCS NeCS 2010-2014 2015-2019 Network and Information Security

More information

How To Get Rid Of A Phish Locker On A Computer (For A Bank)

How To Get Rid Of A Phish Locker On A Computer (For A Bank) PHISH LOCKERS OUT IN THE WILD August 2013 RSA researchers have been increasingly witnessing the activity of highly targeted Trojans, dubbed Phish Lockers, used at the hands of cybercriminals to steal credentials.

More information

ESSEX FIRE AUTHORITY Essex County Fire & Rescue Service

ESSEX FIRE AUTHORITY Essex County Fire & Rescue Service ESSEX FIRE AUTHORITY Essex County Fire & Rescue Service MEETING Policy & Strategy Committee AGENDA ITEM 7 MEETING DATE 25 March 2009 REPORT NUMBER SUBJECT REPORT BY Monitoring IT Transformation Progress

More information

Jeff Haby, P.E. Director Sewer System Improvements. September 15, 2015. Agenda

Jeff Haby, P.E. Director Sewer System Improvements. September 15, 2015. Agenda SAWS Sanitary Sewer Overflow Reduction Program Jeff Haby, P.E. Director Sewer System Improvements SA Military Engineers Meeting Agenda SAWS Overview Consent Decree CD Compliance Programs Program Transition

More information

Educational Technology Services Monthly Report. March, 2009. Prepared by Educational Technology Services, State Fair Community College

Educational Technology Services Monthly Report. March, 2009. Prepared by Educational Technology Services, State Fair Community College Educational Technology Services Monthly Report March, 2009 Prepared by Educational Technology Services, State Fair Community College Robert Paulson, Vice President Service Satisfaction Results HDO Statistics

More information

Computing & Telecommunications Services Monthly Report March 2015

Computing & Telecommunications Services Monthly Report March 2015 March 215 Monthly Report Computing & Telecommunications Services Monthly Report March 215 CaTS Help Desk (937) 775-4827 1-888-775-4827 25 Library Annex helpdesk@wright.edu www.wright.edu/cats/ Last Modified

More information

Synthesis Of Polarization Agile Interleaved Arrays Based On Linear And Planar ADS And DS.

Synthesis Of Polarization Agile Interleaved Arrays Based On Linear And Planar ADS And DS. Guidelines for Student Reports Synthesis Of Polarization Agile Interleaved Arrays Based On Linear And Planar ADS And DS. A. Shariful Abstract The design of large arrays for radar applications require the

More information

Security Analysis Part I: Basics

Security Analysis Part I: Basics Security Analysis Part I: Basics Ketil Stølen, SINTEF & UiO October 2, 2015 1 Objectives for Lectures on Security Analysis Classify security concepts Introduce, motivate and explain a basic apparatus for

More information

Secure Messaging Challenge Technical Demonstration

Secure Messaging Challenge Technical Demonstration Secure Messaging Challenge Technical Demonstration The Open Group EMA Forum Boeing s Messaging Needs Provide access to strongly encrypted e-mail outside the enterprise Reduce complexity of deploying secure

More information

PATIENT JOURNEY BOARDS

PATIENT JOURNEY BOARDS PATIENT JOURNEY BOARDS at Manly, Mona Vale and Hornsby Ku-ring-gai Hospitals Sue Hair : Director of Nursing and Midwifery, Manly Hospital Deb Stewart : Manger Clinical Redesign, Northern Beaches and Hornsby

More information

Deliverable 1.2 Project Presentation

Deliverable 1.2 Project Presentation FP7-PEOPLE-2012-ITN EID Grant agreement no.: 317387 www.secentis.eu Deliverable 1.2 Project Presentation Abstract This document describes the training program, the objectives, the expected results, the

More information

APPROACHABLE ANALYTICS MAKING SENSE OF DATA

APPROACHABLE ANALYTICS MAKING SENSE OF DATA APPROACHABLE ANALYTICS MAKING SENSE OF DATA AGENDA SAS DELIVERS PROVEN SOLUTIONS THAT DRIVE INNOVATION AND IMPROVE PERFORMANCE. About SAS SAS Business Analytics Framework Approachable Analytics SAS for

More information

2015-16 BCOE Payroll Calendar. Monday Tuesday Wednesday Thursday Friday Jun 29 30 Jul 1 2 3. Full Force Calc

2015-16 BCOE Payroll Calendar. Monday Tuesday Wednesday Thursday Friday Jun 29 30 Jul 1 2 3. Full Force Calc July 2015 CM Period 1501075 July 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 August 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

More information

Supervisor Instructions for Approving Web Time Entry

Supervisor Instructions for Approving Web Time Entry Supervisor Instructions for Approving Web Time Entry Time Approval Deadlines by Category Local 2110 Members members submit time by NOON on Monday of the pay week. Time should be approved no later than

More information

2007 University Libraries of Notre Dame

2007 University Libraries of Notre Dame Introduction Ben Heet, Electronic Resources Specialist, bheet1@nd.edu Mark Dehmlow, Electronic Services Librarian, mdehmlow@nd.edu Special Thanks to the Tom Lehman, the Web Presence Improvement Team, and

More information

Application of Internet Traffic Characterization to All-Optical Networks

Application of Internet Traffic Characterization to All-Optical Networks Application of Internet Traffic Characterization to All-Optical Networks Pedro M. Santiago del Río, Javier Ramos, Alfredo Salvador, Jorge E. López de Vergara, Javier Aracil, Senior Member IEEE* Antonio

More information

Stanford Computer Security Lab. TrackBack Spam: Abuse and Prevention. Elie Bursztein, Peifung E. Lam, John C. Mitchell Stanford University

Stanford Computer Security Lab. TrackBack Spam: Abuse and Prevention. Elie Bursztein, Peifung E. Lam, John C. Mitchell Stanford University Abuse and Prevention Stanford University Stanford Computer Security Lab TrackBack Spam: Introduction Many users nowadays post information on cloud computing sites Sites sometimes need to link to each other

More information

City & County of San Francisco Permit & Project Tracking System

City & County of San Francisco Permit & Project Tracking System City & County of San Francisco Permit & Project Tracking System PPTS Sneak Preview March 20, 2013 Welcome & Opening Statements AGENDA 1. Opening Statements Department Directors 2. Project Background 3.

More information

Using Open Source Software to Manage Policies and Clinical Guidelines. Library & Knowledge Service Derby Teaching Hospitals NHS Foundation Trust

Using Open Source Software to Manage Policies and Clinical Guidelines. Library & Knowledge Service Derby Teaching Hospitals NHS Foundation Trust Using Open Source Software to Manage Policies and Clinical Guidelines Library & Knowledge Service Derby Teaching Hospitals NHS Foundation Trust Overview Background Existing System. Requirements. Implementation

More information

Managing ICT contracts in central government. An update

Managing ICT contracts in central government. An update Managing ICT contracts in central government An update Prepared by Audit Scotland June 2015 Auditor General for Scotland The Auditor General s role is to: appoint auditors to Scotland s central government

More information

BILD and WELT: Two successful Paid Content Strategies Capital Markets Day Berlin, December 10, 2014. Donata Hopfen, Publishing Director BILD Group

BILD and WELT: Two successful Paid Content Strategies Capital Markets Day Berlin, December 10, 2014. Donata Hopfen, Publishing Director BILD Group BILD and WELT: Two successful Paid Content Strategies Capital Markets Day Berlin, December 10, 2014 Donata Hopfen, Publishing Director BILD Group Paid content is key to Axel Springer s strategy Start of

More information

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas

More information

Guidelines for Virtual Transportation Management Center Development. National Rural ITS Meeting August 27, 2014

Guidelines for Virtual Transportation Management Center Development. National Rural ITS Meeting August 27, 2014 Guidelines for Virtual Transportation Management Center Development National Rural ITS Meeting August 27, 2014 1 Project Purpose Overview To develop a guidebook that provides technical guidance on planning

More information

Department of Public Welfare (DPW)

Department of Public Welfare (DPW) Department of Public Welfare (DPW) Office of Income Maintenance Electronic Benefits Transfer Card Risk Management Report Out-of-State Residency Review FISCAL YEAR 2012-2013 June 2013 (March, April and

More information

Usage Control in Cloud Systems

Usage Control in Cloud Systems Usage Control in Cloud Systems Paolo Mori Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche Pisa Italy Agenda Examples of usage of Cloud services Usage Control Model Policy Language

More information

Consumer ID Theft Total Costs

Consumer ID Theft Total Costs Billions Consumer and Business Identity Theft Statistics Business identity (ID) theft is a growing crime and is a growing concern for state filing offices. Similar to consumer ID theft, after initially

More information

Open Source Solution for IVI: Tizen IVI. Brett Branch Tizen IVI Product Marketing

Open Source Solution for IVI: Tizen IVI. Brett Branch Tizen IVI Product Marketing Open Source Solution for IVI: Tizen IVI Brett Branch Tizen IVI Product Marketing Agenda The Connected Car ecosystem Connected Car Usages what drives us? Key Requirements Tizen in Automotive Open Standards

More information

Full Time MBA. Enjoy business your way

Full Time MBA. Enjoy business your way Full Time MBA Enjoy business your way Continuous Ascent Rankings Our continued ascent in the rankings demonstrates the effectiveness of our uniquely balanced and teamwork-centric methodology, which attracts

More information

Lossless Compression of Cloud-Cover Forecasts for Low-Overhead Distribution in Solar-Harvesting Sensor Networks

Lossless Compression of Cloud-Cover Forecasts for Low-Overhead Distribution in Solar-Harvesting Sensor Networks Lossless Compression of Cloud-Cover Forecasts for Low-Overhead Distribution in Solar-Harvesting Sensor Networks Christian Renner and Phu Anh Tuan Nguyen ENSsys 14, Memphis, TN, USA November 6 th, 2014

More information

Advisory User Group Meeting. October 18, 2011

Advisory User Group Meeting. October 18, 2011 Advisory User Group Meeting October 18, 2011 1 Agenda 11:30 Welcome Christine Lavoie 11:35 Session Objectives Christine Lavoie 11:40 USC s Research Administration System Christine Lavoie 11:50 Project

More information

Deep Security Vulnerability Protection Summary

Deep Security Vulnerability Protection Summary Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security

More information

Automatic Security Analysis of Business Processes

Automatic Security Analysis of Business Processes Automatic Security Analysis of Business Processes Daniel Ricardo dos Santos 1,2 Advisors: Silvio Ranise 1 Luca Compagna 2 Serena Ponta 2 1 Security and Trust - FBK 2 SAP Labs France October 21st, 2014

More information

Accident & Emergency Department Clinical Quality Indicators

Accident & Emergency Department Clinical Quality Indicators Overview This dashboard presents our performance in the new A&E clinical quality indicators. These 8 indicators will allow you to see the quality of care being delivered by our A&E department, and reflect

More information

Roles: Scrum Master & Project Manager

Roles: Scrum Master & Project Manager Roles: Scrum Master & Project Manager Scrum Master: Facilitate collaborative meetings Track team performance Remove impediments (Risk, Issue) Validate team alignment to Agile framework and scope Drive

More information

Qi Liu Rutgers Business School ISACA New York 2013

Qi Liu Rutgers Business School ISACA New York 2013 Qi Liu Rutgers Business School ISACA New York 2013 1 What is Audit Analytics The use of data analysis technology in Auditing. Audit analytics is the process of identifying, gathering, validating, analyzing,

More information

Market Assessment & Campaign SLA Calculator LOGO WE OPEN THE DOOR, SO YOU CAN CLOSE IT.

Market Assessment & Campaign SLA Calculator LOGO WE OPEN THE DOOR, SO YOU CAN CLOSE IT. Market Assessment & Campaign SLA Calculator LOGO WE OPEN THE DOOR, SO YOU CAN CLOSE IT. Your Market Assessment Overview Your Inbound Market Assessment and Campaign SLA Calculator is broken down into several

More information

Career Opportunities in Physiology Committee

Career Opportunities in Physiology Committee Career Opportunities in Physiology Committee Careers Symposium This annual EB Careers session is intended to address the specific objective in the 2000 APS Strategic Plan, to promote interest in and understanding

More information

Trimble Navigation Limited (NasdaqGS:TRMB) > Public Ownership > Officials' Trading

Trimble Navigation Limited (NasdaqGS:TRMB) > Public Ownership > Officials' Trading Trimble Navigation Limited (NasdaqGS:TRMB) > Public Ownership > Officials' Trading Individual Trades Holder Name Trade Date Range Transacted Shares Transaction Value (USD) Transaction Type Price Range

More information

Applying ICT and IoT to Multifamily Buildings. U.S. Department of Energy Buildings Interoperability Vision Meeting March 12, 2015 Jeff Hendler, ETS

Applying ICT and IoT to Multifamily Buildings. U.S. Department of Energy Buildings Interoperability Vision Meeting March 12, 2015 Jeff Hendler, ETS Applying ICT and IoT to Multifamily Buildings U.S. Department of Energy Buildings Interoperability Vision Meeting March 12, 2015 Jeff Hendler, ETS ETS is an Energy Technology, Behavior Management, and

More information

PNNL Institutional Research Cloud Pilot WENDY COWLEY PNNL

PNNL Institutional Research Cloud Pilot WENDY COWLEY PNNL PNNL Institutional Research Cloud Pilot WENDY COWLEY PNNL Background Wendy Cowley Visual Analytics Researcher, National Security Directorate Project Management, software development 20+ years @ PNNL Interests

More information

Siemens Future Forum @ HANNOVER MESSE 2014. Internet of Things and Services Guido Stephan

Siemens Future Forum @ HANNOVER MESSE 2014. Internet of Things and Services Guido Stephan Siemens Future Forum @ HANNOVER MESSE 2014 Internet of Things and Services Siemens AG 2014. All rights reserved. Hannover Messe 2014 From the Internet to a Web of Things thesis Internet Research Networks

More information

SUMMARY PROFESSIONAL EXPERIENCE. IBM Canada, Senior Business Transformation Consultant

SUMMARY PROFESSIONAL EXPERIENCE. IBM Canada, Senior Business Transformation Consultant Doreen Funk, MA 191 Discovery Ridge Blvd SW, Calgary Cell: 587-434- 0811 E- mail: dorfunk@hotmail.com SUMMARY Senior management consultant with 20 years of experience in applying strategies and implementing

More information

Rapid Consumption and Deployment of SAP Software as Virtual Appliances Using SAP Cloud Appliance Library

Rapid Consumption and Deployment of SAP Software as Virtual Appliances Using SAP Cloud Appliance Library Rapid Consumption and Deployment of SAP Software as Virtual Appliances Using SAP Cloud Appliance Library Sanjay Kulkarni, Chief Expert, Solution Management, Virtualization & Cloud Management May 2013 Customer

More information

2013-2014. oct 03 / 2013 nov 12 / 2013. oct 05 / 2013. oct 07 / 2013. oct 21 / 2013. oct 24 / 2013. nov 07 / 2013 nov 14 / 2013.

2013-2014. oct 03 / 2013 nov 12 / 2013. oct 05 / 2013. oct 07 / 2013. oct 21 / 2013. oct 24 / 2013. nov 07 / 2013 nov 14 / 2013. 2013- ACADEMIC CALENDARS SOUTH UNIVERSITY 2013- ACADEMIC CALENDAR Fall 2013 Winter Spring Summer New Student Orientation Session II (Mid ) oct 03 / 2013 nov 12 / 2013 jan 09 / feb 18 / apr 03 / may 13

More information

Concept and Project Objectives

Concept and Project Objectives 3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the

More information

Anatomy of an Enterprise Software Delivery Project

Anatomy of an Enterprise Software Delivery Project Chapter 2 Anatomy of an Enterprise Software Delivery Project Chapter Summary I present an example of a typical enterprise software delivery project. I examine its key characteristics and analyze specific

More information

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD

SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.

More information

Thanks to an extension of the scope of

Thanks to an extension of the scope of UNIX OPERATION FOR AUTOMOTIVE MANUFACTURER CASE STUDY IT SERVICES AT A GLANCE: Industry: Automotive Founded: 1916 Headquarters: Munich Employees: ~ 110,000 In 2012, an international automotive enterprise

More information

MUNICIPALITY OF CHATHAM-KENT CORPORATE SERVICES INFORMATION TECHNOLOGY SERVICES

MUNICIPALITY OF CHATHAM-KENT CORPORATE SERVICES INFORMATION TECHNOLOGY SERVICES MUNICIPALITY OF CHATHAM-KENT CORPORATE SERVICES INFORMATION TECHNOLOGY SERVICES TO: FROM: Mayor and Members of Council Gene Lusk, B.Eng. Business Analyst, Information Services DATE: January 4, 2013 SUBJECT:

More information

Academic Calendars. Term I (20081) Term II (20082) Term III (20083) Weekend College. International Student Admission Deadlines

Academic Calendars. Term I (20081) Term II (20082) Term III (20083) Weekend College. International Student Admission Deadlines Academic Calendars Term I (20081) Term II (20082) Academic Calendars Term III (20083) Weekend College International Student Admission Deadlines Final Examination Schedule Broward Community College Catalog

More information

Important Dates Calendar 2014-2015 FALL

Important Dates Calendar 2014-2015 FALL Important Dates Calendar 204-205 FALL Rev. 6-8-4 st 8 H st 0 2nd 0 st 5 2nd 5 3rd 5 LSC Advanced Registration Begins May 27 May 27 May 27 May 27 May 27 May 27 May 27 May 27 May 27 Returning Students Advanced

More information

Annexure B: Planning, Budgeting and Performance Management Programme

Annexure B: Planning, Budgeting and Performance Management Programme Annexure B:, Budgeting Programme The following are key activities that need take place in more detail than Time frame Nature Period referred Start Finish 2012/09/01 /08/31 /or September /09/01 /09/26 August

More information

Making Healthcare Meaningful Through Meaningful Use Stage 2

Making Healthcare Meaningful Through Meaningful Use Stage 2 Making Healthcare Meaningful Through Meaningful Use Stage 2 Keith Griffin, MD Chief Medical Information Officer Novant Health Medical Group Novant Health: Making Healthcare Remarkable Not-for-profit, integrated

More information

March 1, 2007 ADVICE 2107-E (U 338-E) PUBLIC UTILITIES COMMISSION OF THE STATE OF CALIFORNIA ENERGY DIVISION

March 1, 2007 ADVICE 2107-E (U 338-E) PUBLIC UTILITIES COMMISSION OF THE STATE OF CALIFORNIA ENERGY DIVISION Akbar Jazayeri Vice President, Revenue and Tariffs March 1, 2007 ADVICE 2107-E (U 338-E) PUBLIC UTILITIES COMMISSION OF THE STATE OF CALIFORNIA ENERGY DIVISION SUBJECT: Late Payment Charge Revenue Balancing

More information

Invoice Magic: Business Intelligence Telecommunications Expense Management Solution

Invoice Magic: Business Intelligence Telecommunications Expense Management Solution Invoice Magic: Business Intelligence Telecommunications Expense Management Solution Award Category Data, Information and Knowledge Management Michigan Department of Information Technology Nominees: Bazella

More information

How to Develop a Mobile Strategy

How to Develop a Mobile Strategy How to Develop a Mobile Strategy 1 Presenter Andy Etemadi EYEMAGINE President & Chief Technology Officer 2 Presenter Greg Lett Lett Direct Vice President Web Marketing 3 Agenda Mobile Trends in ecommerce

More information

Digital Certificate Discovery for Health Care Providers

Digital Certificate Discovery for Health Care Providers Provider Directories Initiative Overview PD PD PD PD PD PD PD January 20, 2012 Table of Contents 1 Introduction to the S&I Framework 2 3 What is unique about the S&I Framework Introduction to Provider

More information

TEMPUS IRIS. Project Scope

TEMPUS IRIS. Project Scope TEMPUS IRIS Fostering Academic International Relations in Israeli Colleges To promote education, research and innovation. Project Scope Project number 53035-TEMPUS--202--IL-TEMPUS-JPGR This project has

More information

Service Management Policy

Service Management Policy Service Management Policy XIT-POL-006 Policy - PUBLIC- Author Jan Pavel Version 1.4 Status Reviewed by Approved by Responsible Final Tomas Kucera Tomas Kucera Pavel JANÁK Valid from 9.6.2010 Scope Whole

More information

MED-DESIRE. MEDiterranean Development of Support schemes for solar Initiatives and Renewable Energies

MED-DESIRE. MEDiterranean Development of Support schemes for solar Initiatives and Renewable Energies MED-DESIRE MEDiterranean Development of Support schemes for solar Initiatives and Renewable Energies The MED-DESIRE Strategic Project At policy level aims at strengthening the capacity of Partner Countries

More information

Web Application Hosting Cloud Architecture

Web Application Hosting Cloud Architecture Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described

More information

NAB Community Microfinance. NAB Microenterprise Loans Minimum requirements for business plans

NAB Community Microfinance. NAB Microenterprise Loans Minimum requirements for business plans NAB Community Microfinance NAB Microenterprise Loans Minimum requirements for business plans Money Magazine s Best of the Best Awards 2009 judged NAB Microenterprise Loans for the second year running,

More information

ACCESS Nursing Programs Session 1 Center Valley Campus Only 8 Weeks Academic Calendar 8 Weeks

ACCESS Nursing Programs Session 1 Center Valley Campus Only 8 Weeks Academic Calendar 8 Weeks Session 1 Academic Calendar August 24, 2015 to October 17, 2015 Tuesday / Thursday, 5:30 pm to 8:30 pm M/W T/TH T/W TH S Saturday lab as scheduled Classes Begin 24-Aug 25-Aug 25-Aug 27-Aug 29-Aug NU205

More information

ACCESS Nursing Programs Session 1 Center Valley Campus Only 8 Weeks Academic Calendar 8 Weeks

ACCESS Nursing Programs Session 1 Center Valley Campus Only 8 Weeks Academic Calendar 8 Weeks Session 1 Academic Calendar August 24, 2015 to October 17, 2015 Tuesday / Thursday, 5:30 pm to 8:30 pm M/W T/TH T/W TH S Saturday lab as scheduled Classes Begin 24-Aug 25-Aug 25-Aug 27-Aug 29-Aug NU205

More information

End of Life Content Report November 2014. Produced By The NHS Choices Reporting Team CH.NHSChoices-Reporting@nhs.net

End of Life Content Report November 2014. Produced By The NHS Choices Reporting Team CH.NHSChoices-Reporting@nhs.net End of Life Content Report November 2014 Produced By The NHS Choices Reporting Team CH.NHSChoices-Reporting@nhs.net End of Life Dashboard Page 1 Overall Choices Site Visits Tag cloud showing end of life

More information

Cyber-Physical System Security of the Power Grid

Cyber-Physical System Security of the Power Grid Course on: Cyber-Physical System Security of the Power Grid April 9-11, 2013 at KTH Royal Institute of Technology, Stockholm, Sweden Background Cyber Security is essential to today s power grid operation

More information