Hi [[ session.user.profile.firstName ]]

Attribute-Based Encryption for Access Control and Personal Data Protection

Attribute Based Encryption (ABE) bundles strong confidentiality with very flexible access control policies. Here, we present the ABE toolkit developed in ETSI TC CYBER through the standards ETSI TS 103 458 and ETSI TS 103 532. This webinar will introduce the challenges related to access control and protection of personal data and describe the ABE toolkit in detail. It will also provide real-world scenarios as example and an outlook on future developments of the toolkit.
Recorded Oct 23 2018 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
François Ambrosini, Security and Data Protection Expert, IBIT Ambrosini UG; Christoph Striecks, Cryptographic Researcher, Aus
Presentation preview: Attribute-Based Encryption for Access Control and Personal Data Protection

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Artificial Intelligence for networks: understanding it through ETSI ENI use case Apr 17 2020 1:00 pm UTC 60 mins
    Luca Pesando, Yue Wang
    Artificial Intelligence for networks: understanding it through ETSI ENI use cases
  • Multi-access Edge Computing in Action for Application Developers – special insig Mar 16 2020 2:00 pm UTC 60 mins
    Dario Sabella, Walter Feathersone, Salvetone Scarpina, Edoardo Bonetto
    Multi-access Edge Computing in Action for Application Developers – special insights from the MEC Hackathons.
  • Launching the 5th generation of fixed network with ETSI F5G. Feb 25 2020 3:00 pm UTC 75 mins
    Several high level speakers from various sectors in the ecosystem.
    We are entering an exciting new era of communications, and fixed networks play an essential role in that evolution alongside and in cooperation with mobile networks. Our speakers will guide you through the challenges and opportunities of ubiquitous fibre connections and will share with us why they joined the new ETSI F5G Industry Specification Group. The ETSI F5G group aims at bringing a new communication experience for homes, industries and smart cities leading to a better digital future through a full-fibre world.
  • Digital Transformation at the Edge enabled by standardization Recorded: Feb 20 2020 37 mins
    Cristina Badulescu, Vice Chair, NFV ISG, ETSI
    As 5G roll-outs take off, enabling a variety of new applications and services running at the network Edge plays an essential role in establishing new business models and revenue streams. Digital transformation becomes a pre-requisite for the 5G networks offering automation, zero-touch management and orchestration of not only the necessary resources and connectivity needed for edge computing and of the edge computing platforms offered, but also the applications running at the edge.

    Multi-vendor deployments require interoperability, enabled by the current standardization work support as well as its further evolution in support of emerging business models and their required deployment models. Standards Developing Organizations such as ETSI NFV, ETSI ZSM as well as 3GPP and open source initiatives are building blocks for multi-vendor deployments and for rapidly adding new edge applications and services.
  • Using Network Orchestration to Build an Open, Elastic Edge Recorded: Feb 20 2020 36 mins
    Diego R. Lopez, Senior Technology Expert at Telefonica I+D, chair ETSI ISGs NFV and PDL
    The most promising use cases for edge computing, related to demanding network features and scenarios like industrial IoT, require to go beyond current network services, and support a much more dynamic way of consuming them.

    The traditional borders between local and wide area networks, between network segments, and between application and network services themselves tend to blur into a continuum of network services supporting user applications.

    Techniques like the emerging In-Network Computing paradigm require multi-dimensional openness (among computing environments, across network segments, along geographical areas and operators…) and have to rely on holistic network orchestration to achieve the promise of an elastic edge.
  • Part 2: Running cloud-native Network Services with OSM Release SEVEN. Recorded: Jan 16 2020 91 mins
    Gerardo García, Telefónica OSM TSC Member, Tytus Kurek, Canonical, Mats Eriksson, Arctos Labs.
    This session, the 2nd of a 2 part webinar will provide a deep dive on how to deploy Cloud Native Network Functions on Kubernetes with OSM, using either helm charts or Juju bundles and how to benefit from the new automatic placement feature in OSM for edge deployments.
  • Part 1: Overview of OSM Release SEVEN. Recorded: Jan 15 2020 85 mins
    Francisco Javier Ramon Salguero, ETSI OSM Chair, Gianpietro Lavado, WhiteStack and Francisco Rodríguez, Indra.
    This session, the 1st of a 2 part webinar, will give you an overview of Open Source MANO, the main highlights in Release SEVEN, how to achieve full life cycle automation of real network services and how to enable self-monitoring of OSM components on Kubernetes.
  • The ETSI Zero-touch network and Service Management (ZSM) architecture framework Recorded: Nov 6 2019 60 mins
    Uwe Rauschenback, Rapporteur for the Architecture
    The pivotal deployment of 5G and network slicing has triggered the need for a radical change in the way networks and services are managed and orchestrated. Full end-to-end automation of network and service management has become an urgent necessity for delivering services with agility and speed and ensuring the economic sustainability of the very diverse set of services offered by Digital Service Providers. The ultimate automation target is to enable largely autonomous networks which will be driven by high-level policies and rules (AKA intent); these networks will be capable of self-configuration, self-monitoring, self-healing and self-optimization without further human intervention. All this requires a new flexible end-to-end architecture framework designed for closed-loop automation and optimized for data-driven machine learning and artificial intelligence algorithms.
    The ETSI ISG ZSM was formed with the goal to accelerate the definition of the required end-to-end architecture, and the presenter will introduce the ETSI ZSM architecture that was published on August 2019.
  • ETSI standard on consumer IoT security: key steps to secure 'smart' products Recorded: Oct 28 2019 58 mins
    Jasper Pandza, ETSI TC CYBER rapporteur
    The ETSI Technical Committee on cybersecurity published the first globally applicable standard for consumer IoT security, ETSI TS 103 645, in February 2019. The standard will soon become a European standard (EN). This standard has also inspired the development of a test specification. This webinar will go over the 13 key areas which establish a security baseline for internet-connected consumer products and could provide the basis for future IoT certification schemes.
  • Standardization framework for trust services Recorded: Oct 21 2019 60 mins
    Nick Pope, ETSI TC ESI Vice-Chair
    This webinar will provide an update of the latest activities of the ETSI Technical Committee Electronic Signatures and Infrastructures to provide a standardization framework for trust services.
    It will cover digital signatures formats and procedures and policies for their creation and validation; policy, security and technical requirements for trust service providers (TSP) such as certification authorities, time-stamping authorities, TSP providing remote signature creation or validation functions, registered e-delivery providers, and long-term data preservation providers. It will also address Trusted Lists that enhance the confidence of parties relying on certificates or other services related to digital signatures by indicating whether a given TSP was operating under the approval of any recognized scheme.
  • ETSI cybersecurity standardization overview: 2019 update Recorded: Oct 7 2019 61 mins
    Alex Leadbeater, TC CYBER Chair
    Hosted by the Chairman of TC CYBER, which is the most security-focused Technical Committee in ETSI, this webinar will cover work, standards and developments in cybersecurity eco-system. It will address protection of personal data and communications, IoT security and privacy, cybersecurity for critical infrastructures, enterprise and individual cybersecurity, cybersecurity tools to support government activities, forensic activities, direct support to EU Legislation and the Quantum-Safe Cryptography working group.
  • Developing SW for Multi-access Edge Computing with ETSI Recorded: May 21 2019 60 mins
    Dario Sabella, ETSI MEC Vice-Chair, Sami Kekki, ETSI MEC Vice-Chair and Walter Featherstone ETSI MEC DECODE Working Group Cha
    The webinar will provide a guidance for software developers on how to properly approach architecting and developing applications with components that will run in edge clouds, such as those compliant with ETSI’s MEC standards.

    This webinar will also offer a live demo on how to use APIs, as suitable tools to use MEC technology, they will also be showcased at the forthcoming MEC Hackathon in September.
  • ETSI User Centric approach in the digital ecosystem Recorded: Apr 16 2019 57 mins
    Jean-Yves Monfort, Vice Chair of the ETSI Committee USER, and Noemie Simoni, expert in the comittee.
    Two experts from the ETSI Special Committee USER, will present results of their work on future solutions for a new role of users and consequently providers. This presentation, based on the results of two surveys and the analysis of several use cases, introduces a generic model for this new approach. The webinar also introduces the concepts of composition of services and of “as a service”, including the definition of profiles. A special attention has been drawn on security, data protection, privacy and Quality of Experience.
  • Quantum-Safe Cryptography (QSC) in TC CYBER Recorded: Oct 29 2018 58 mins
    Mark Pecen, CEO of Approach Infinity, Inc., Chairman of TC CYBER Working Group Quantum Safe Cryptography
    Quantum computing will break today’s public key cryptography standards that we use to secure communications today. The ETSI Quantum-Safe Cryptography (QSC) working group is publishing standards that will secure data in a world where quantum computers exist. This webinar will cover the basics of what quantum computing is, how it works and its impacts on currently-used security practices and cryptography. We’ll then cover the industry response to quantum-based security threats and present the landscape of quantum-safe security mechanisms.
  • Attribute-Based Encryption for Access Control and Personal Data Protection Recorded: Oct 23 2018 60 mins
    François Ambrosini, Security and Data Protection Expert, IBIT Ambrosini UG; Christoph Striecks, Cryptographic Researcher, Aus
    Attribute Based Encryption (ABE) bundles strong confidentiality with very flexible access control policies. Here, we present the ABE toolkit developed in ETSI TC CYBER through the standards ETSI TS 103 458 and ETSI TS 103 532. This webinar will introduce the challenges related to access control and protection of personal data and describe the ABE toolkit in detail. It will also provide real-world scenarios as example and an outlook on future developments of the toolkit.
  • Middlebox Security Protocol explained Recorded: Oct 15 2018 80 mins
    Tony Rutkowski, Center for Internet Security, Daniel Powell, NCSC, Steve Fenter, Enterprise Data Center Operators & US Bank,
    ETSI's new Middlebox Security Protocol (MSP) standards describe a new approach to network security; using middleboxes for layered defence and for management of secure enterprise networks – without infringing user privacy. The MSP standards are designed to protect enterprise networks, facilitating secure management and vital network operations, whilst giving control of user data back to the user.
    This webinar will describe use cases for MSP, outline projects from the hackathon held on 13 June 2018 and explain the standard for implementers.
  • ETSI Cyber Security Standardization Overview Recorded: Oct 8 2018 60 mins
    Alex Leadbeater, Head of Global Obligations Futures and Standards, BT Security, Chairman of TC CYBER
    Hosted by the Chairman of TC CYBER, which is the most security-focused Technical Committee in ETSI, this webinar will cover work, standards and developments in cyber security eco-system. It will address protection of personal data and communications, IoT security and privacy, cyber security for critical infrastructures, enterprise and individual cyber security, cyber security tools to support government activities, forensic activities, direct support to EU Legislation and the Quantum-Safe Cryptography working group.
  • MEC at work: 4G and 5G deployments. Recorded: Sep 13 2018 60 mins
    Sami Kekki, Huawei and Fabio Giust, Athonet, active participants of the ETSI MEC ISG.
    ETSI ISG MEC is the home of MEC standards. ETSI MEC has developed a flexible API framework for multi-access networks that can be deployed not only in 5G systems but in current 4G systems. MEC specifications support the transition from 4G to 5G, by enhancing the capabilities of current systems with full forward compatibility with the next generation. This webinar will explain these concepts, illustrating a few deployment options of MEC in 4G. It will also describe its relation with the key elements and functionalities of the brand new 5G architecture and explain their collaborative interactions with MEC. The content of this webinar is supported by two recently published ETSI white papers, “MEC Deployments in 4G and Evolution Towards 5G” and “MEC in 5G networks.”
  • ETSI Multi-access Edge Computing: where we are, where we are going Recorded: May 16 2018 61 mins
    Alex Reznik, HPE, chair of ETSI MEC. Dario Sabella, Intel, secretary of ETSI MEC, Dirk Lindemeier, Nokia
    Multi-access Edge Computing (MEC) is one of the key building blocks of 5G and a market driver for current 4G networks. After a short introduction to MEC, this webinar will bring you through ETSI MEC progress and how the industry is using it to build actual commercial products, based on Nokia use case. We will also share how ETSI drives activities to help accelerate market adoption through hackathons, Proofs of Concepts, best practice and informative white papers.
  • Introduction to ETSI Software Radio Reconfiguration Standards Recorded: Dec 8 2017 59 mins
    Dr. Markus Mueck, Intel, Chairman of ETSI’s technical committee for Reconfigurable Radio Systems (TC RRS).
    Software radio reconfiguration offers solutions to recurring issues when linking hardware radio systems with software, allowing the upgrade and patching of radio systems deployed in the field. However, software radio systems must address a number of issues:

    • How to transfer and install radio software components in a secure way

    • How to provide access to new software components to a user/operator

    • How to deal with device certification and type approval issues when new radio software components can modify the radio behaviour of a device

    • How to provide software portability and achieve efficient radio performance

    • How to gradually evolve a system towards software reconfigurability

    ETSI’s Software Radio Reconfiguration model provides a modular and scalable solution to the challenge of deploying and using software radio systems. The solution, described in a recent ETSI white paper and in the EN 303 146 series of European Standards, allows a gradual and stepwise deployment of software reconfigurable radio, through different generations of equipment. This enables device manufacturers to gradually implement software reconfigurable radios, developing confidence at each step of the way.

    Dr. Markus Mueck, of Intel, is the chairman of ETSI’s technical committee for Reconfigurable Radio Systems (TC RRS). In this webinar, he will explain in more details the advantages of software radio reconfiguration, and explain how the ETSI Software Radio Reconfiguration model addresses each of the issues identified above.
In depth coverage of ETSI's standards
ETSI's webcasts cover all our standardization in telecommunications, radiocommunications and ICT. Find out more about our work and how you can get involved at www.etsi.org

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Attribute-Based Encryption for Access Control and Personal Data Protection
  • Live at: Oct 23 2018 2:00 pm
  • Presented by: François Ambrosini, Security and Data Protection Expert, IBIT Ambrosini UG; Christoph Striecks, Cryptographic Researcher, Aus
  • From:
Your email has been sent.
or close