Hi [[ session.user.profile.firstName ]]

ETSI - The Standards People

  • Date
  • Rating
  • Views
  • Developing SW for Multi-access Edge Computing with ETSI
    Developing SW for Multi-access Edge Computing with ETSI
    Dario Sabella, ETSI MEC Vice-Chair, Sami Kekki, ETSI MEC Vice-Chair and Walter Featherstone ETSI MEC DECODE Working Group Cha Recorded: May 21 2019 60 mins
    The webinar will provide a guidance for software developers on how to properly approach architecting and developing applications with components that will run in edge clouds, such as those compliant with ETSI’s MEC standards.

    This webinar will also offer a live demo on how to use APIs, as suitable tools to use MEC technology, they will also be showcased at the forthcoming MEC Hackathon in September.
  • ETSI User Centric approach in the digital ecosystem
    ETSI User Centric approach in the digital ecosystem
    Jean-Yves Monfort, Vice Chair of the ETSI Committee USER, and Noemie Simoni, expert in the comittee. Recorded: Apr 16 2019 57 mins
    Two experts from the ETSI Special Committee USER, will present results of their work on future solutions for a new role of users and consequently providers. This presentation, based on the results of two surveys and the analysis of several use cases, introduces a generic model for this new approach. The webinar also introduces the concepts of composition of services and of “as a service”, including the definition of profiles. A special attention has been drawn on security, data protection, privacy and Quality of Experience.
  • Quantum-Safe Cryptography (QSC) in TC CYBER
    Quantum-Safe Cryptography (QSC) in TC CYBER
    Mark Pecen, CEO of Approach Infinity, Inc., Chairman of TC CYBER Working Group Quantum Safe Cryptography Recorded: Oct 29 2018 58 mins
    Quantum computing will break today’s public key cryptography standards that we use to secure communications today. The ETSI Quantum-Safe Cryptography (QSC) working group is publishing standards that will secure data in a world where quantum computers exist. This webinar will cover the basics of what quantum computing is, how it works and its impacts on currently-used security practices and cryptography. We’ll then cover the industry response to quantum-based security threats and present the landscape of quantum-safe security mechanisms.
  • Attribute-Based Encryption for Access Control and Personal Data Protection
    Attribute-Based Encryption for Access Control and Personal Data Protection
    François Ambrosini, Security and Data Protection Expert, IBIT Ambrosini UG; Christoph Striecks, Cryptographic Researcher, Aus Recorded: Oct 23 2018 60 mins
    Attribute Based Encryption (ABE) bundles strong confidentiality with very flexible access control policies. Here, we present the ABE toolkit developed in ETSI TC CYBER through the standards ETSI TS 103 458 and ETSI TS 103 532. This webinar will introduce the challenges related to access control and protection of personal data and describe the ABE toolkit in detail. It will also provide real-world scenarios as example and an outlook on future developments of the toolkit.
  • Middlebox Security Protocol explained
    Middlebox Security Protocol explained
    Tony Rutkowski, Center for Internet Security, Daniel Powell, NCSC, Steve Fenter, Enterprise Data Center Operators & US Bank, Recorded: Oct 15 2018 80 mins
    ETSI's new Middlebox Security Protocol (MSP) standards describe a new approach to network security; using middleboxes for layered defence and for management of secure enterprise networks – without infringing user privacy. The MSP standards are designed to protect enterprise networks, facilitating secure management and vital network operations, whilst giving control of user data back to the user.
    This webinar will describe use cases for MSP, outline projects from the hackathon held on 13 June 2018 and explain the standard for implementers.
  • ETSI Cyber Security Standardization Overview
    ETSI Cyber Security Standardization Overview
    Alex Leadbeater, Head of Global Obligations Futures and Standards, BT Security, Chairman of TC CYBER Recorded: Oct 8 2018 60 mins
    Hosted by the Chairman of TC CYBER, which is the most security-focused Technical Committee in ETSI, this webinar will cover work, standards and developments in cyber security eco-system. It will address protection of personal data and communications, IoT security and privacy, cyber security for critical infrastructures, enterprise and individual cyber security, cyber security tools to support government activities, forensic activities, direct support to EU Legislation and the Quantum-Safe Cryptography working group.
  • MEC at work: 4G and 5G deployments.
    MEC at work: 4G and 5G deployments.
    Sami Kekki, Huawei and Fabio Giust, Athonet, active participants of the ETSI MEC ISG. Recorded: Sep 13 2018 60 mins
    ETSI ISG MEC is the home of MEC standards. ETSI MEC has developed a flexible API framework for multi-access networks that can be deployed not only in 5G systems but in current 4G systems. MEC specifications support the transition from 4G to 5G, by enhancing the capabilities of current systems with full forward compatibility with the next generation. This webinar will explain these concepts, illustrating a few deployment options of MEC in 4G. It will also describe its relation with the key elements and functionalities of the brand new 5G architecture and explain their collaborative interactions with MEC. The content of this webinar is supported by two recently published ETSI white papers, “MEC Deployments in 4G and Evolution Towards 5G” and “MEC in 5G networks.”
  • ETSI Multi-access Edge Computing: where we are, where we are going
    ETSI Multi-access Edge Computing: where we are, where we are going
    Alex Reznik, HPE, chair of ETSI MEC. Dario Sabella, Intel, secretary of ETSI MEC, Dirk Lindemeier, Nokia Recorded: May 16 2018 61 mins
    Multi-access Edge Computing (MEC) is one of the key building blocks of 5G and a market driver for current 4G networks. After a short introduction to MEC, this webinar will bring you through ETSI MEC progress and how the industry is using it to build actual commercial products, based on Nokia use case. We will also share how ETSI drives activities to help accelerate market adoption through hackathons, Proofs of Concepts, best practice and informative white papers.
  • Introduction to ETSI Software Radio Reconfiguration Standards
    Introduction to ETSI Software Radio Reconfiguration Standards
    Dr. Markus Mueck, Intel, Chairman of ETSI’s technical committee for Reconfigurable Radio Systems (TC RRS). Recorded: Dec 8 2017 59 mins
    Software radio reconfiguration offers solutions to recurring issues when linking hardware radio systems with software, allowing the upgrade and patching of radio systems deployed in the field. However, software radio systems must address a number of issues:

    • How to transfer and install radio software components in a secure way

    • How to provide access to new software components to a user/operator

    • How to deal with device certification and type approval issues when new radio software components can modify the radio behaviour of a device

    • How to provide software portability and achieve efficient radio performance

    • How to gradually evolve a system towards software reconfigurability

    ETSI’s Software Radio Reconfiguration model provides a modular and scalable solution to the challenge of deploying and using software radio systems. The solution, described in a recent ETSI white paper and in the EN 303 146 series of European Standards, allows a gradual and stepwise deployment of software reconfigurable radio, through different generations of equipment. This enables device manufacturers to gradually implement software reconfigurable radios, developing confidence at each step of the way.

    Dr. Markus Mueck, of Intel, is the chairman of ETSI’s technical committee for Reconfigurable Radio Systems (TC RRS). In this webinar, he will explain in more details the advantages of software radio reconfiguration, and explain how the ETSI Software Radio Reconfiguration model addresses each of the issues identified above.
  • Getting started with ETSI Test Description Language
    Getting started with ETSI Test Description Language
    Philip Makedonski, University of Göttingen, TC MTS and Martti Käärik, Elvior, TC MTS Recorded: Nov 21 2017 62 mins
    This webinar walks the audience through the main ingredients of the Test Description Language (TDL) standardized at ETSI. It showcases the use of TDL for designing scenario-based test purposes and test descriptions, using examples from test suites standardized at ETSI. An integrated development environment for TDL, developed as part of the TDL Open Source Project (TOP) under the guidance of the ETSI Technical Committee Method for Testing and Specification (TC MTS), will be demonstrated as means to get started with using TDL today.

Embed in website or blog