Hi [[ session.user.profile.firstName ]]

ETSI ENI Architecture: AI for robust and manageable systems and applications.

This is an AI-based, context-aware architecture that uses Intent and other types of Policy Rules to improve the operator experience. This architecture is designed to provide recommendations and/or commands, and does not impose requirements on the systems that it aids that change the function or APIs of those systems. The ENI System Architecture will be described using a functional block approach, emphasising external and internal Reference Points to standardise communication. Its innovative closed control loops and model-driven engineering approaches will also be described.
Recorded May 6 2020 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John Strassner
Presentation preview: ETSI ENI Architecture:  AI for robust and manageable systems and applications.

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • TTCN-3 language extensions object-oriented features Oct 9 2020 8:00 am UTC 75 mins
    Jens Grabowski, Axel Rennoch, György Réthy, Kristóf Szabados, Tomas Urban, Jacob Wieland
    The new TTCN-3 extension “Object-oriented features” introduces the concepts “classes”, “objects” and “exception handling” into the TTCN-3 language. Even though some of these concepts have been implemented implicitly in the TTCN-3, the concepts are now integrated explicitly into the language allowing a new style of test specification that provides new ways of designing abstract data types, in the form of user defined classes, and integrating external data by means of external classes. This presentation informs TTCN-3 users, test engineers and test managers about the newest developments of the language.
  • OSM Release EIGHT Oct 7 2020 1:00 pm UTC 90 mins
    Guillermo Calvino Sanchez, Javier Ramon, Jose Miguel Guzman, Mona Hrapkowisz, Gianpietro Lavado, Sivia Almagia
    Agenda:
    1)OSM Intro by Francisco-Javier Ramon, OSM Chair, Telefonica
    2)Demo: OSM System Features in action by Guillermo Calvino, Canonical
    Live demo featuring: Next Generation User Interface, High Availability, System Quotas and Monitoring
    3)Demo: Network Service Deployment with OSM by Gianpietro Lavado, Canonical
    Live demo featuring: Magma EPC Deployment, High Performance Network Functions, VNF Catalog
  • TTCN-3 general concepts and applications Oct 6 2020 8:00 am UTC 75 mins
    Axel Rennoch, Jens Grabowski, György Réthy, Kristóf Szabados, Tomas Urban, Jacob Wieland
    The Testing and Test Control Notation TTCN-3 is the only standardized test specification and implementation language used in industry and research to define and execute different types of tests in multiple domains like e.g. telecommunication or automotive. The notation supports an abstract description of test scenarios. Due to multiple tool support, including powerful open source projects, it is successfully worldwide in use e.g. for testing and certification of mobile phones by 3GPP or the oneM2M products. The presentation introduces the goals, technical concepts and various applications of the TTCN-3 technology.
  • Boost innovation and create business opportunities with mobile edge computing Oct 1 2020 1:00 pm UTC 105 mins
    Nurit Sprecher, Dave Bolan, Omar Elloumi, Alex Reznik, Suresh Chitturi
    Mobile edge computing is a keystone of the Ultra-Reliable, Low Latency Connectivity (URLLC) and the digital transformation and mobilization of the enterprise industries. It also enables a new class of premium applications that require real-time delivery of live and on-demand content as well as a high degree of interactivity, for example: gaming, 360 video delivery, AR/VR, etc. ETSI ISG MEC and 3GPP have both worked on their own architectures for edge computing within the boundaries of their different scopes. Their common purpose, however, is to create an open and standardized IT service environment for hosting and supporting third-party applications in edge clouds while also leveraging the underlying network infrastructure. In order to accelerate time-to-market and promote industry adoption, it is essential to ensure alignment, leverage synergies and offer common practices and tools for the developers. This will foster innovation and enable the developers to write a single application software module that can run on every edge environment, and support the GSMA requirements for federation.
    The speakers will review the emerging mobile edge computing use cases and the recently updated 5-year mobile edge computing market forecast from DellOro. They will also highlight the role of standards, the value proposition of the different standards streams and will show how those standards can complement each other when it comes to operational deployments. Some deployment scenarios will also be introduced.
  • Education about ICT Standardization Sep 24 2020 1:00 pm UTC 105 mins
    Dr. habil Nazir Abdelkafi, Prof. Rafaele Bolla, Dr. Alejandro Rodriguez-Ascaso, Dr. Michelle Wetterwald, Dr. Ray Walshe
    Education is an important instrument in raising awareness and providing support for standardization. To promote the ICT standardization process, it is important to increase the understanding and attractiveness of standards with lecturers and students alike. Strong teaching materials provide a major tool that can be used to convey the value of standardization.
    ETSI has published a detailed textbook and corresponding slide presentation in 2018. Entitled “Understanding ICT Standardization: Principles and Practice”, they have been produced in order to assist academia and students in understanding the value of well written technology standards. The textbook and slides can be downloaded from the ETSI website. The overall objective of this initiative is to get feedback for the material as we move into 2020-2021 as ICT is an ever-changing field.
  • Decentralised Trust on Internet Infrastructure: Securing Inter-Domain Routing Recorded: Sep 15 2020 44 mins
    Albert Cabellos
    The Border Gateway Protocol (BGP) glues the Internet, it provides reachability and routing to the building blocks of the Internet, networks referred as Autonomous Systems (ASes). BGP was not designed with security in mind, and as a consequence it contains critical security issues that can affect the Internet infrastructure. There have been several instances of attackers exploiting such security issues that have resulted in important disruption of services provided over the Internet. The most common security threats are: (i) prefix hijacking: where an attacker takes over control over a set of IP addresses (ii) path hijack: where attackers control the path of the flow of information between ASes and (iii) route leaks, where an AS announces a path incorrectly. Give the importance of the security of BGP for the entire Internet infrastructure, research efforts have been devoted to mitigate such attacks. Existing proposals aims to secure BGP by using a standard centralized Public Key Infrastructure approach. In this talk we will show how BGP can be secured using a decentralised approach. By taking advantage of Decentralized Ledger Technologies, we research and design a Decentralized Internet Infrastructure that effectively protects BGP against all three attacks: prefix hijack, path hijack and route leaks. In addition, we have built a prototype and at the end of the talk we will briefly demonstrate how it works.
  • IPv6 Best Practices, Benefits, Transition Challenges and the Way Forward Recorded: Sep 14 2020 92 mins
    A Brand, L Ladid, P Thubert, E Metz, Chongfeng Xie, C Ralli Ucendo, C Filsfils, S Lourdez, R Li
    Today over 1.2 billion Internet netizens are using IPv6 without even knowing it. In the 5G & cloud era, the number of nodes connected to the Internet will exceed 100 billion. IP networks continue to scale rapidly, while network services become more diversified than ever. IPv6 provides a tremendous number of IP addresses and greater options for IP packet forwarding, creating opportunities to offer better network services.
    In this webinar, which follows the release of ETSI White Paper No.35, we plan to detail the progress made to date, IPv6 best practices, the benefits, transition challenges, and IPv6 Enhanced Innovation. All of this will also point to the way forward.
  • TETRA to 2035 and beyond Recorded: Sep 10 2020 40 mins
    Brian Murgatroyd, TC TCCE Chair, David Chater-Lea, Jeppe Jepson
    TETRA to 2035 and beyond. Marketing overview, InteropTesting, TETRA and standards development, packet date enhancements, TETRA security, interworking with critical communications broadband systems
  • More Advanced Cryptography - Fully Homomorphic Encryption Recorded: Jun 23 2020 64 mins
    Kirsty Paine, Moderator, Ilaria Chillotti, Mariya Georgieva
    More Advanced Cryptography - Fully Homomorphic Encryption
  • ETSI Security Week:Industry Applications and Use Cases for Advanced Cryptography Recorded: Jun 19 2020 99 mins
    François Ambrosini,, Moderator, Scott Cadzow, Dr. Yang Cui, Dr. Jinguang Han
    The benefits of Advanced Cryptography are recognised by ETSI, as its members make developments and standards in Identity-Based Cryptography, Attribute-Based Encryption and other forms of Advanced Cryptography. This session focuses on applications of Advanced Cryptography, including a privacy-preserving electronic ticket scheme using attribute-based credentials to protect users' privacy, and a survey on how Attribute-Based Encryption could be deployed to protect mobile networks.
  • ETSI Security Week: Fully Homomorphic Encryption Recorded: Jun 18 2020 2 mins
    Kirsty Paine, Moderator
    Homomorphic encryption is one of the technologies allowing the public cloud to operate on secret data without leaking any information about the data. In these two talks, the speakers give a general overview of the capabilities of homomorphic encryption and of the general security model. They will detail some of the tools and technologies that make it usable for concrete use-cases and share the latest advances in practical homomorphic encryption with a strong emphasis on applications to deep learning.
  • ETSI Security Week: Security Challenges and Regulatory Aspects Recorded: Jun 18 2020 89 mins
    Bengt Sahlin, Moderator, Tomasz Osko, David Soldani
    This session discusses security challenges due to new technological advancements, and discussed regulatory aspects related to 5G security
  • ETSI Security Week: 5G Network Certification Recorded: Jun 17 2020 98 mins
    Colin Whorlow, Moderator, Domenico Ferrara, Sven Lachmund, Goran Milenkovic, Marcus Wong
    This webinar will provide a status of the policy and industry actions to enable effective security of and trust in 5G networks.
  • ETSI Security Week: 5G Security Evolution Recorded: Jun 16 2020 97 mins
    Noamen Ben Henda, Moderator, Takahito Yoshikawa, James Skuse
    This session includes presentations on the most recent 5G security features, and efforts within the industry for continuous improvement of 5G security.
  • SKINNY LATTE: Scalable Hierarchical Identity Based Encryption over Lattices Recorded: Jun 15 2020 42 mins
    Kirsty Paine, Moderator, Sarah Mc Carthy,
    The ETSI-standardised TETRA communications system is used for instantaneous communication within emergency services and for military personnel. Whilst considering its transition to the PS-LTE network, it was proposed that identity-based encryption (IBE) could be used as a low latency solution. However, the scheme which was considered, MIKEY-SAKKE, is not resistant to quantum computing attacks.
  • ETSI Security Week: ETSI Standardisation in Advanced Cryptography Recorded: Jun 11 2020 85 mins
    François Ambrosini, Moderator, Christoph Striecks,
    The academic community and the industry thrive with innovative cryptography that enable advanced access control and secure communication use cases. Functional Encryption is one such family of schemes. This session will introduce Attribute-Based Encryption (ABE), Identity-Based Encryption (IBE), and their related standardisation efforts in ETSI, including a quantum-safe hierarchical IBE scheme.
    ABE is a cryptographic mechanism that enforces access control solely on the mathematical level with strong security guarantees. A main incentive using ABE is to provide a proper and versatile replacement for software-only access-control mechanisms that need to embed all trust into (often seen to be error-prone) software components by design. Applications of ABE in EU research projects and ETSI TS 103 532 will be presented.
    IBE is a form of asymmetric encryption in which the participants’ identities (such as a phone number or an email address) serve as public keys. Participants wishing to securely communicate can do so directly, without having to aggree on keying material beforehand. IBE is well suited for the seamless onboarding of participants in cases where the task of establishing secure communications can be delegated to a trusted third party. The properties of IBE schemes will be summarised and the study conducted in ETSI TR 103 719 will be presented.
    As quantum computing poses a threat to the long-term security of most of the currently used encryption mechanisms, this session will also present ongoing efforts in the development of quantum-safe IBE, with a focus on a hierarchical IBE scheme based on structured lattices and described in ETSI TR 103 618.
  • ETSI Security Week: Consumer IoT Security - Certification Schemes Recorded: Jun 11 2020 92 mins
    Sonia Compans, Moderator, David Mudd, Roland Atoui, Juhani Eronen, Jamie Randall, Alex Buchan, Laurens Vanoijen
    Product assurance schemes play an important role in consumer IoT security. Typically, they provide a consumer-facing assurance label or kitemark which demonstrates that the product has undergone independent testing or a robust self-assessment process, thus helping consumers make security-conscious purchasing decisions. Assessment feedback can also be communicated privately to manufacturers to help them improve their product. But operating an assurance scheme for consumer IoT can be challenging, not least due to the broad diversity of relevant products and the rapid innovation in this space.
    This webinar panel features speakers with experience in this area. It will consider options for managing these challenges and look ahead to a possible IoT security certification scheme under the EU Cybersecurity Act.
  • ETSI Security Week: Consumer IoT security standards Recorded: Jun 11 2020 62 mins
    Jasper Pandza, Moderator, Gisela Meister
    A significant proportion of consumer Internet of Things (IoT) or ‘smart’ products currently on the market lack basic cyber security provisions. ETSI TC CYBER has developed European Standard (EN) 303 645 “Cyber Security for Consumer Internet of Things: Baseline Requirements”, which is expected to be published in July, to bring together widely considered good security / privacy practice for consumer IoT devices. The EN has been developed in collaboration with CEN/CENELEC JTC 13 experts. It is expected to inform the development of new legislation on IoT security in Europe and beyond.

    TC CYBER is also taking forward TS 103 701, which will set out test scenarios for assessing products against EN 303 645. It is to set out mandatory and recommended assessments, as well as guidance and examples to support their implementation. The document is intended to be used by testing labs and certifying bodies that provide assurance on the security of relevant products, as well as manufacturers that wish to carry out a self-assessment. The document is intended as input to a future EU common cybersecurity certification scheme as proposed in the Cybersecurity Act.
  • ETSI Security Week: 5G security for verticals Recorded: Jun 10 2020 89 mins
    Stefan Schroeder, Moderator, Ian Oliver, Rong Wu, Haitham Cruickshank
    The best-known security features of a 5G network ensure secure operation of a public network: strong subscriber authentication, protection against fraud and eavesdropping, secure billing, robust services etc. Security addresses the typical trust relation between network operators and their customers.
    5G applications and deployments in vertical industries have complementary security requirements and different multi-party trust models that need to be addressed in addition, often on top of the 5G network. Moreover, the 5G deployment models may be different from the usual public mobile network, ranging from non-public campus networks in factories, over specific network slices for safety-critical applications like healthcare or railways, up to global V2X networks for transport applications.
    The EU Toolbox of risk mitigating measures for 5G explicitly mentions the need to address the risk of exploitation of IoT, handsets or smart devices - i.e. the verticals' domain- in addition to the need to secure the network.
  • Insight into the First Steps of the Cybersecurity Act Reality Recorded: Jun 10 2020 94 mins
    Andreas Mitrakas, Moderator, Aristotelis.Tzafalias, Philippe Blot, Eric.Vetillard
    EC& ENISA will provide the progress of work on the first schemes being under preparation: Common Criteria and Cloud Security certification. They will share the lessons learnt from the preparation of those schemes. EC will also provide an update on the latest steps taken within the Cybersecurity Act, such as an overview of the first Rolling Work Programme, potential next schemes…..
In depth coverage of ETSI's standards
ETSI's webcasts cover all our standardization in telecommunications, radiocommunications and ICT. Find out more about our work and how you can get involved at www.etsi.org

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: ETSI ENI Architecture: AI for robust and manageable systems and applications.
  • Live at: May 6 2020 3:00 pm
  • Presented by: John Strassner
  • From:
Your email has been sent.
or close