ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange
|
|
|
- Cassandra Myra Richardson
- 10 years ago
- Views:
Transcription
1 ASMONIA Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange Overview on Activities Related to Academic Utilization Contributors: Cassidian Systems ERNW Enno Rey Netzwerke GmbH Fraunhofer Research Institution for Applied and Integrated Security (AISEC) Hochschule Augsburg Nokia Siemens Networks GmbH & Co KG RWTH Aachen Editor: André Egners (RWTH Aachen)
2 Author(s) Company André Egners RWTH Aachen About the ASMONIA project Given their inherent complexity, protecting telecommunication networks from attacks requires the implementation of a multitude of technical and organizational controls. Furthermore, to be fully effective these measures call for the collaboration between different administrative domains such as network operators, manufacturers, service providers, government authorities, and users of the services. ASMONIA is the acronym for the German name* of a research project that aims to improve the resilience, reliability and security of current and future mobile telecommunication networks. For this purpose the ASMONIA consortium made up of several partners from academia and industry performs a number of research tasks, based on the specific expertise of the individual partners. The project running from September 2011 till May 2013 receives funding from the German Federal Ministry of Education and Research (Bundesministerium für Bildung und Forschung, BMBF). Various associated partners further contribute on a voluntary basis. * The full name is "Angriffsanalyse und Schutzkonzepte für MObilfunkbasierte Netzinfrastrukturen unterstützt durch kooperativen InformationsAustausch" (Attack analysis and security concepts for mobile network infrastructures, supported by collaborative information exchange). Partners: Associated Partners: Cassidian Systems ERNW Enno Rey Netzwerke GmbH Fraunhofer Research Institution for Applied and Integrated Security (AISEC) Hochschule Augsburg Nokia Siemens Networks GmbH & Co KG RWTH Aachen Federal Agency for Digital Radio of Security Authorities and Organizations (BDBOS) Federal Office for Information Security (BSI) Deutsche Telecom AG (DTAG) For more details about the project please visit 2 Copyright 2012 ASMONIA consortium. All rights reserved.
3 Executive Summary The purpose of this document is to collect and summarize ongoing and finished work with respect to the academic utilization. Each of the partners involved in the ASMONIA project devoted some resources to utilizing the results achieved during the project s runtime. This includes publications at various conferences, the organization of project workshops, talks or posters at external events, as well as the thematic integration into teaching curricula. Copyright 2012 ASMONIA consortium. All rights reserved. 3
4
5 Table of Contents 1 Publications 6 2 External Workshops st External ASMONIA Workshop 7 3 Posters & Talks Posters Talks 8 4 ASMONIA Website 9 References 10 Glossary and Abbreviations 11 Glossary 11 Abbreviations 11 Revision History 12 Copyright 2012 ASMONIA consortium. All rights reserved. 5
6 1 Publications This chapter presents the publications in conferences proceedings, academic journals, and other written formats of the ASMONIA project as of January Tailored Concepts for Software Integrity Protection in Mobile Networks, Manfred Schäfer (NSN) and Wolf-Dietrich Moeller (NSN), Germany, in International Journal on Advances in Security Volume 4, 2011 [SM2011] Mit Sicherheit zum Geschäftserfolg: Ökonomische Einflüsse von Sicherheitsmechanismen auf die Wertschöpfung in Mobilfunknetzen, Michael Hoche (CASSIDIAN) and Heiko Kirsch (CASSIDIAN), in Praxis der Informationsverarbeitung und Kommunikation (PIK), Volume 34, Issue 4, Walter de Gruyter GmbH & Co. KG, Berlin/Boston, 2011 [HK_PIK2011] 6 Copyright 2012 ASMONIA consortium. All rights reserved.
7 2 External Workshops This chapter presents the workshops of the ASMONIA project as of January st External ASMONIA Workshop Date: This external workshop has been organized by ERNW and was held in conjunction with the Troopers 2011 IT-Security conference in Heidelberg. The slide set of each talk can be found on the ASMONIA website The agenda can be seen below: ASMONIA Overview and Reference Architecture for Collaborative Information Exchange, Hans Hofinger, Fraunhofer AISEC, Garching near Munich, Germany Cyber Fed Model - a Collaborative Threat Mitigation Tool, Scott C. Pinkerton, Argonne National Laboratory, Chicago, IL, US Input for the Local Security Overview and Dashboard, Heiko Kirsch and Michael Hoche, Cassidian Systems, Friedrichshafen, Germany FIDeS: Event Correlation based on Knowledge-Supported Machine Learning, Mirko Horstmann, Technologie-Zentrum Informatik und Informationstechnik, Bremen, Germany Integrity Protection for 4G Devices and NW Elements, Manfred Schäfer and Sascha Wessel, Nokia Siemens Networks and Fraunhofer AISEC, Munich, Germany Femtocell: Femtostep to the Holy Grail, Ravishankar Borgaonkar and Kevin Redon, T-Labs, Berlin, Germany Future Directions in Malware Detection on Mobile Handsets, André Egners, RWTH Aachen University, Germany Project AMSEL: Automatically Collect and Learn to Detect Malware, Michael Meier, Technical University Dortmund, Germany Worldwide Observatory of Malicious Behaviours and Attack Threats, Apostolis Zarras, Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH), Greece Usage Scenarios of Elastic Systems in a Telco Infrastrucutre, Mark Gall, Fraunhofer AISEC, Garching near Munich, Germany Cloud Networking Research in SAIL Project, Dominique Dudkowski, NEC Europe Ltd., Heidelberg, Germany Threats and risks for 4G Mobile Communication Networks and Terminals, Peter Schneider, Nokia Siemens Networks, Munich, Germany Copyright 2012 ASMONIA consortium. All rights reserved. 7
8 3 Posters & Talks This chapter presents the posters and talks of the ASMONIA project as of January Posters "Sharing Knowledge to Improve Misuse Prevention and Situational Awareness", Peter Schoo (Fraunhofer AISEC), BMBF Kongress Zukünftiges Internet 2011, Juli 2011, Berlin ( 3.2 Talks Security and Regulatory Requirements for Public Could Offerings to Support Selected Customer Use Cases, Joachim Lüken (NSN) and Mark Gall (FRAUNHOFER AISEC), Troopers IT-Security Conference 2011 ( _for_cloud_offerings.pdf) Future Directions in Mobile Malware Detection on Mobile Handsets, André Egners (RWTH Aachen), Troopers IT-Security Conference 2011 ( Business Transparency via Security Dashboards, Heiko Kirsch (CASSIDIAN), Michael Hoche (CASSIDIAN), Troopers IT-Security Conference 2011 ( "Innovative Schutzkonzepte für Mobilfunkbasierte Netzinfrastrukturen", Peter Schoo (Fraunhofer AISEC), Kolloquium Universität der Bundeswehr München, 2011 Sicherheit hat ihren Preis: Modellierung des Einflusses von Sicherheitsmechanismen auf Werteflüsse in Informations- und Kommunikationssystemen, Heiko Kirsch (CASSIDIAN), Michael Hoche (CASSIDIAN), in Essener Workshop zur Netzsicherheit 2011 (EWNS11) [HK2011] Business meets Security Risk Economical Insights for Risk-Based Decisions, Heiko Kirsch (CASSIDIAN), Michael Hoche (CASSIDIAN), in 3 rd International Workshop on Early Warning Systems in IT (EWS11) [KH2011] 8 Copyright 2012 ASMONIA consortium. All rights reserved.
9 4 ASMONIA Website Relevant external information concerning the ongoing project is presented on the ASMONIA website News about the project status, press releases, as well the publication of project deliverables can be found on the website. The website is maintained at Fraunhofer AISEC by Hans Hofinger. Figure 1 : ASMONIA Website (December 2011) Copyright 2012 ASMONIA consortium. All rights reserved. 9
10 References [SM_IJAS2011] Manfred Schäfer, Wolf-Dietrich Moeller, "Tailored Concepts for Software Integrity Protection in Mobile Networks", International Journal On Advances in Security Vol.4, September [KH_EWNS2011] Heiko Kirsch, Michael Hoche, "Sicherheit hat ihren Preis: Modellierung des Einflusses von Sicherheitsmechanismen auf Werteflüsse in Informations- und Kommunikationssystemen", Essener Workshop zur Netzsicherheit _CASSIDIAN.pdf [HK_EWS2011] [HK_PIK2011] Michael Hoche, Heiko Kirsch, Business meets Security Risk Economical Insights for Risk-Based Decisions, 3 rd International Workshop on Early Warning Systems in IT (EWS11) Michael Hoche, Heiko Kirsch, Mit Sicherheit zum Geschäftserfolg: Ökonomische Einflüsse von Sicherheitsmechanismen auf die Wertschöpfung in Mobilfunknetzen, Praxis der Informationsverarbeitung und Kommunikation (PIK) Journal, Copyright 2012 ASMONIA consortium. All rights reserved.
11 Glossary and Abbreviations Glossary Term Explanation Source Abbreviations Copyright 2012 ASMONIA consortium. All rights reserved. 11
12 Revision History Version Date Changes Initial Version Review Version Final Version 12 Copyright 2012 ASMONIA consortium. All rights reserved.
ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange
ASMONIA Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange Evaluation of the Intercloud Demonstrator Contributors: Cassidian / EADS
ASMONIA. Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange
ASMONIA Attack analysis and Security concepts for MObile Network infrastructures, supported by collaborative Information exchange Threat and Risk Analysis for Mobile Communication Networks and Mobile Terminals
4G Mobile Networks At Risk
07.05.1203 Consortium Attack analysis and Security concepts for MObile Network infastructures supported by collaborative Information exchange 4G Mobile Networks At Risk The ASMONIA Threat and Risk Analysis
smart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany
smart grids forum Intelligent power grids: How to build in Safety and Security Conference March 21 22, 2013 in Munich, Germany TÜV SÜD AG Embedded Systems TÜV SÜD Akademie GmbH About the Conference To
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
Multi-Agent Systems. Expert Forum Agents within the context of Industry 4.0. Industry 4.0 Machine Learning. Energy and Smart Grids.
Multi-Agent Systems Event Expert Forum Agents within the context of Industry 4.0 Industry 4.0 Machine Learning Material Handling Energy and Smart Grids Energy Management Production Control Operations Scheduling
Industry 4.0 Challenges and Opportunities
Industry 4.0 Challenges and Opportunities Institute of Industrial Management and Innovation Research Graz University of Technology 14 th International Conference on Knowledge Technologies and Data-driven
National Plan for Information Infrastructure Protection
National Plan for Information Infrastructure Protection www.bmi.bund.de Contents 1 Introduction 2 1.1 Germany s information infrastructures 2 1.2 Threats and risks to our information infrastructures 3
for High Performance Computing
Technische Universität München Institut für Informatik Lehrstuhl für Rechnertechnik und Rechnerorganisation Automatic Performance Engineering Workflows for High Performance Computing Ventsislav Petkov
Self-employed business consultant and coach, interested in new consulting, training or coaching work with companies or NGOs in Europe or the US.
Martin Roell Business Consultant, Trainer and Coach [email protected] Summary Self-employed business consultant and coach, interested in new consulting, training or coaching work with companies or NGOs
Research scientist at the Chair of Psychology (Prof. Dr. Hugo M. Kehr)
CURRICULUM VITAE DIPL.-PSYCH. MAIKA RAWOLLE January 21, 1982 Born in Rathenow, Germany CURRENT POSITION Since 01/2007 Technische Universität München, Germany Research scientist at the Chair of Psychology
The Annual Conference 2009 was supported by:
Acknowledgement of sponsors and contributors The Annual Conference 2009 was supported by: Cooperation partner Sponsorer and patron Bundesministerium für Umwelt, Naturschutz und Reaktorsicherheit Patron
Applicant s Research Profile. Univ.-Prof. Dr.-Ing. habil. Dipl.-Wirt. Ing.
Applicant s Research Profile Personal Information Last Name, First Name: Cherif, Chokri Academic Title: Univ.-Prof. Dr.-Ing. habil. Dipl.-Wirt. Ing. Birthday: 24.05.1966 Nationality: Marital Status: Institution:
Photonics Industry report 2013
Key Data Photonics Industry report 2013 Imprint In Charge of Content/ Publisher Workgroup Market Research Photonics Mike Bähren SPECTARIS e.v., Berlin Harald Hartmann SPECTARIS e.v., Berlin Gerhard Hein
Cyber Security From product to system solution
Markus Brändle, Network Management Forum Heidelberg, 8./9./10. October 2013 Cyber Security From product to system solution ABB Network Management Forum October 14, 2013 Slide 1 Cyber Security A definition
Security and Compliance in Clouds: Challenges and Solutions
Security and Compliance in Clouds: Challenges and Solutions Prof. Dr. Jan Jürjens Fraunhofer Institut für Software- und Systemtechnologie ISST, Dortmund http://jan.jurjens.de This Talk What are the challenges?
Security concept for gateway integrity protection within German smart grids
ASE 2014, ECSaR-Workshop Security concept for gateway integrity protection within German smart grids Prof. Dr. Kai-Oliver Detken 1, Carl-Heinz Genzel 2, Olav Hoffmann 3, Prof. Dr. Richard Sethmann 4 1
Incident Response from a Global Enterprise Perspective Public Siemens AG 2015. All rights reserved
eco, From Detection to Response, Thomas Schreck, 19.02.2015 Incident Response from a Global Enterprise Perspective Siemens Page 2 February 2015 Corporate Technology Corporate Technology - RTC Software
Compliance in Clouds A cloud computing security perspective
Compliance in Clouds A cloud computing security perspective Kristian Beckers, Martin Hirsch, Jan Jürjens GI Workshop: Governance, Risk & Compliance on the 19th of March 2010 What is Cloud Computing? Today:
Kick-off Meeting im Förderschwerpunkt des BMBF: Forschung für die nachhaltige Entwicklung der Megastädte von morgen 23. - 25.11.
Kick-off Meeting im Förderschwerpunkt des BMBF: Forschung für die nachhaltige Entwicklung der Megastädte von morgen 23. - 25.11.2005 Trunk Infrastructure and Urban Growth - Managing Rapid Urbanization
Industrie 4.0 and Digital Transformation in NRW: Challenges, Opportunities and Potential for Cooperation Seoul, 20.04.2016
Industrie 4.0 and Digital Transformation in NRW: Challenges, Opportunities and Potential for Cooperation Seoul, 20.04.2016 Industrie 4.0 and Digital Transformation in NRW 1 Challenges Enabling Technologies
Secondary Use of the EHR via Pseudonymisation
Secondary Use of the EHR via Klaus POMMERENING Institut für Medizinische Biometrie, Epidemiologie und Informatik Johannes-Gutenberg-Universität D-55101 Mainz, Germany Michael RENG Klinik und Poliklinik
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
Lehrstuhl für Rechnertechnik und Rechnerorganisation (LRR-TUM) Annual Report 1998/1999
Research Report Series Lehrstuhl für Rechnertechnik und Rechnerorganisation (LRR-TUM) Technische Universität München http://wwwbode.informatik.tu-muenchen.de/ Editor: Prof. Dr. A. Bode Vol. 18 Lehrstuhl
Groups Inside FHNW: Why it s not just another AAI SP
Groups Inside FHNW: Why it s not just another AAI SP Michael Hausherr, Business Applications FHNW 1 Agenda Introduction (Groups) Inside FHNW Issue 1: authentication for different user groups Issue 2: simple
TeleTrusT Bundesverband IT-Sicherheit e.v.
TeleTrusT Bundesverband IT-Sicherheit e.v. TeleTrusT-Workshop "Industrial Security" 2015 München, 11.06.2015 Einführung Industrial Security anhand des IEC 62443; Bedrohungslage für Betreiber von ICS (Industrial
Medical Cyber-Physical Systems On the Research Challenges for the Safe Interconnection of Medical Devices
Medical Cyber-Physical Systems On the Research Challenges for the Safe Interconnection of Medical Devices Franziska Kühn 1,2 Martin Leucker 1 Daniel Thoma 1 {kuehn, leucker, thoma}@isp.uni-luebeck.de 1
Workshop Program 1st German-U.S. Workshop on Predictive Analytics, Cyber-Physical Systems, and Industrie 4.0 in Big Data Environments
Workshop Program 1st German-U.S. Workshop on Predictive Analytics, Cyber-Physical Systems, and Industrie 4.0 in Big Data Environments Technische Universität München, Garching near Munich, 17 18 November
Cyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
Dr. Anna Maria Schneider
Dr. Anna Maria Schneider Postdoctoral Researcher Faculty of Economics and Business Administration Humboldt Universität zu Berlin Rosenstraße 19 10178 Berlin, Germany anna maria.schneider[at]wiwi.hu berlin.de
ETSI TS 102 042: Electronic Signatures and Infrastructures (ESI): Policy
Abbreviations AIS BGBl BNetzA BSI CC CEM CSP DAR DATech DIN EAL ETR ETSI ISO IT ITSEC ITSEF ITSEM JIL PP SF SigG SigV SOF Anwendungshinweise und Interpretationen zum Schema [Guidance and Interpretations
Safety Management in Nuclear Technology
Safety Management in Nuclear Technology Symposium October 16 17, 2014, Munich, Germany TÜV SÜD Akademie GmbH TÜV SÜD Industrie Service GmbH The Symposium is intended for specialists and managers at Nuclear
Security und Compliance in Clouds
Security und Compliance in Clouds Prof. Dr. Jan Jürjens, Kristian Beckers Fraunhofer Institut für Software- und Systemtechnologie ISST, Dortmund http://jan.jurjens.de The NIST Cloud Definition Framework
Creating an Open Innovation Ecosystem at Deutsche Telekom
Creating an Open Innovation Ecosystem at Deutsche Telekom Presentation at the EIRMA & OECD: Symposium on Global Innovation Networks. René Rohrbeck, EICT GmbH, Germany The open innovation ecosystem of Deutsche
Automated assessment of C++ exercises with unit tests
Automated assessment of C++ exercises with unit tests Workshop Automatische Bewertung von Programmieraufgaben Tom-Michael Hesse, Axel Wagner, Barbara Paech Institute of Computer Science Chair of Software
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708
Strategic Planning at the Deutsche Bundesbank
Strategic Planning at the Deutsche Bundesbank Key aspects in Central Bank Governance 1. set of central bank tasks key aspects 5. stakeholders 2. rules for decision making bodies 4. transparency, credibility,
Nokia Networks. security you can rely on
Nokia Networks security you can rely on Protecting communication networks is critical 7 billion mobile subscriptions in 2014 1 Mobile broadband network traffic expected to grow by a factor of 1,000 by
to confirm that its document management- and archiving solution fulfils all applicable audit criteria for document management solutions
The certification body of TÜV Informationstechnik GmbH hereby awards this certificate to the company LOGEX SYSTEM GmbH & Co. KG Joseph-Baader Straße 8 85053 Ingolstadt, Germany to confirm that its document
The internet and digital technologies play an integral part
The Cyber challenge Adjacent Digital Politics Ltd gives an overview of the EU Commission s Cyber Security Strategy and Commissioner Ashton s priorities to increase cyber security in Europe The internet
Deutsche Gesellschaft für Essstörungen German Association of Eating Disorders
Deutsche Gesellschaft für Essstörungen German Association of Eating Disorders President Prof. Dr. Martina de Zwaan University Erlangen Nürnberg Vice President Prof. Dr. Stephan Herpertz Ruhr Universität
How To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
The Society of German Chemists (Gesellschaft Deutscher Chemiker, short: GDCh)
History The history of Germany s Chemistry Information Centre (Fachinformationszentrum Chemie GmbH, short: FIZ CHEMIE Berlin), can be traced back long before its foundation in 1981 and is closely linked
Ontology based Recruitment Process
Ontology based Recruitment Process Malgorzata Mochol Radoslaw Oldakowski Institut für Informatik AG Netzbasierte Informationssysteme Freie Universität Berlin Takustr. 9, 14195 Berlin, Germany [email protected]
EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations
EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations DSS EIT ICT Labs Master Programme Distributed System and Services (Cloud Computing) The programme in Distributed Systems and Services focuses on
trends in mobile malware and importance of network based user protection
trends in mobile malware and importance of network based user protection Sicherheitsnetzwerk München: Praxisforum Anwender und Anbieter im Dialog Mobile Sicherheit im Unternehmen Joachim Lüken, Nokia Networks,
ERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS
ERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS Cyber Physical Systems Sicherheit für eine Welt im Wandel Harald Pötter RF & Smart Sensor Systems Cyber Physical Systems Sicherheit für eine Welt im Wandel Agenda
Oracle Whitepaper April 2015. Security and the Oracle Database Cloud Service
Oracle Whitepaper April 2015 Security and the Oracle Database Cloud Service Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database Cloud
How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph
. Femtocell: Femtostep to the Holy Grail... Ravishankar Borgaonkar, Kévin Redon.. Technische Universität Berlin, SecT ravii/[email protected] TROOPERS 2011, 30 March 2011 3G/UMTS femtocells
Challenges to an Integrated Cost Management during Early Phases of Product Development
Challenges to an Integrated Cost Management during Early Phases of Product Development Dr.-Ing. Markus Mörtl Lehrstuhl für Produktentwicklung / Institute of Product Development Technische Universität München
Spoof Detection and the Common Criteria
Spoof Detection and the Common Criteria Ralph Breithaupt (BSI) Nils Tekampe (TÜViT) Content Today s situation The BSI projects LifeFinger I & II Spoofing The definition Spoof Detection in Common Criteria
Integration of Sustainable Approaches in the Building Design Process
Integration of Sustainable Approaches in the Building Design Process U. Forgber, N. Kohler, V. Koch, University of Karlsruhe Englerstrasse 7 76128 Karlsruhe, Germany F. Schmidt, R. Haller, University of
Network Virtualization and Energy Efficiency
Network Virtualization and Energy Efficiency University of Passau Gergö Lovász, Andreas Fischer, and Hermann de Meer Outline 1. Power Consumption of ICT 2. Economic Principle and Energy Efficiency Benchmarks
D1.3 Industry Advisory Board
Project acronym: Project full name: EDSA European Data Science Academy Grant agreement no: 643937 D1.3 Industry Advisory Board Deliverable Editor: Other contributors: Deliverable Reviewers: Mandy Costello
Smart Factory Innovation Forum
Smart Factory Innovation Forum White Paper Managing security, safety and privacy in Smart Factories Based on a Panel Discussion during the Smart Factory Innovation Forum 2014 Held on September 25th, 2014
ROS-INDUSTRIAL. Technologies, Trends, Applications
FRAUNHOFER INSTITUTe FoR Manufacturing engineering and Automation IPA Conference June 9, 2015 ROS-INDUSTRIAL Technologies, Trends, Applications Preface The Event at a Glance Established already in robotics
Beraterprofil. Prof. Dr. Frank H. Witt. Managementberater
Beraterprofil Prof. Dr. Frank H. Witt Managementberater Geschäftsgebiet International Project Management Business Development and Growth Strategy and Change Bilstein & Kollegen Partnerbüro Hong Kong c/o
1 Business Modeling. 1.1 Event-driven Process Chain (EPC) Seite 2
Business Process Modeling with EPC and UML Transformation or Integration? Dr. Markus Nüttgens, Dipl.-Inform. Thomas Feld, Dipl.-Kfm. Volker Zimmermann Institut für Wirtschaftsinformatik (IWi), Universität
Smart Energy made in Germany
Smart Energy made in Germany How ICT makes the change happen Ludwig Karg, B.A.U.M., Head of E-Energy Ancillary Research www.bmwi.de Decisions made! 2 Key Challenges in Energy geothermal triangle of hope
Towards Open Urban Platforms for Smart Cities and Communities. Memorandum of Understanding
Towards Open Urban Platforms for Smart Cities and Communities Memorandum of Understanding 1. Outline of this Memorandum 1.1. The market for current Urban Platform(s) is fragmented and uncertain on the
A guide for enterprise-specific design of EA models
A guide for enterprise-specific design of EA models Master s Thesis Markus Bauer Kickoff Presentation sebis Advanced Seminar 2013-07-08 Set-Up Organizational issues Title Supervisor Advisors A guide for
SECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Sabine Bendiek, Geschäftsführerin EMC Deutschland GmbH
SECURITY REDEFINED Managing risk and securing the business in the age of the third platform Sabine Bendiek, Geschäftsführerin EMC Deutschland GmbH 1 BILLIONS OF USERS MILLIONS OF APPS 2010 HUNDREDS OF
Deutsche Nachwuchswissenschaftler in den USA
Deutsche Nachwuchswissenschaftler in den USA Perspektiven der Hochschul- und Wissenschaftspolitik German Scientists in the United States: Results of the C R I S Online Survey Christoph F. Buechtemann und
Advantages of VoIP in the german research network
Advantages of VoIP in the german research network Falko Dressler Regional Computing Center (RRZE) / Department of Computer Science IV (Operating Systems) University of Erlangen-Nuremberg Martensstrasse
AUTOMATION - AUTOMOTIVE - RENEWABLE ENERGIES
AUTOMATION - AUTOMOTIVE - RENEWABLE ENERGIES DUAL.solutions Action-based and media-supported Professional Training in different technical sectors Wolfgang Lay, General Manager, Dr.-Ing. Paul Christiani
Windows HPC Server 2008 Deployment
Windows HPC Server 2008 Michael Wirtz [email protected] Rechen- und Kommunikationszentrum RWTH Aachen Windows-HPC 2008 19. Sept 08, RWTH Aachen Windows HPC Server 2008 - Agenda o eines 2 Knoten Clusters
Adhesive bonding technology. Adhesive bonding in transportation construction. Intelligent solutions for transportation construction
Adhesive bonding technology Adhesive bonding in transportation construction Intelligent solutions for transportation construction Content New opportunities in 1 transportation construction Reliable bonding
Business Continuity Policy
Business Continuity Policy Software, consultancy and services for global trade and supply chain management Business Continuity Policy Companies using AEB solutions for managing and monitoring their logistics
Workshop Security of Mass Transportation
Workshop Security of Mass Transportation Deutsche Bahn AG Jens Puls 1 Chief Security Officer; President COLPOFER Berlin, 18 March 2009 Why can t the public transport system provide the same level of security
What is Industrie 4.0
What is Industrie 4.0 Prof. Dr.-Ing. Reiner Anderl Computer Integrated Design (Datenverarbeitung in der Konstruktion, DiK) Fachbereich Maschinenbau Technische Universität Darmstadt Otto-Berndt-Straße 2
Privacy and Security Assessment. Technical Security and Data Privacy in a Single Process.
Privacy and Security Assessment. Technical Security and Data Privacy in a Single Process. Deutsche Telekom AG Friedrich-Ebert-Allee 140 D-53113 Bonn www.telekom.com Contents. 2 Technical Security and Data
Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
GERMAN UNIVERSITIES LIAISON OFFICES NEW YORK
GERMAN UNIVERSITIES LIAISON OFFICES NEW YORK German University Alliance (FU Berlin / LMU München) ConRuhr (Dortmund/ Duisburg-Essen / Bochum) Universität Heidelberg RWTH Aachen UAS 7 Hessen Universities
e-journal of Practical Business Research
e-journal of Practical Business Research Six Views on the Business Rule Management System Workshop summary paper: Business Rule based Service Management (Business-Rule-basierte Servicesteuerung) at Informatik
A Note on the Security in the Card Management System of the German E-Health Card
A Note on the Security in the Card Management System of the German E-Health Card Marcel Winandy (Ruhr-University Bochum) 3rd International ICST Conference on Electronic Healthcare for the 21st Century
Intellectual Capital Management and Open Innovation
XXII Brazilian National Science Parks and Business Incubators Seminar XX ANPROTEC Workshop Intellectual Capital Management and Open Innovation Foz do Iguaçu, 19 th September 2012 Dr.-Ing. Markus Will Head
Applied and Integrated Security. C. Eckert
Applied and Integrated Security 1 Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass
COSMOS events, activities and trainings in Austria, BM:UKK
This is a summary of events, activities and trainings in Austria. By: Jutta Jerlich, Elisabeth Zistler, Christian Reimers, Thomas Lebzelter The following summary is listed according to the date of the
Education standards in Intellectual Property Rights in German Speaking Countries
Sources of Competitive Advantages in the 21 st Century Conference of the World Economy Research Institute Warsaw School of Economics 4./5.6.2009 Education standards in Intellectual Property Rights in German
Information event «ehealth Suisse» and IHE Suisse
Information event «ehealth Suisse» and IHE Suisse Agenda 1. Benefit for the practitioner Franz Marty, Medizinisches Zentrum gleis d AG, Chur, Switzerland 2. Evolution and Functions Tony Schaller, medshare
