Projects
Improving information security through model driven IT governance KU Leuven
The ubiquitous use of technology has caused a critical dependency on Information Technology. This dependency has shed light on the importance of establishing a high-level IT Governance (ITG) model in organizations. The ultimate goal of such model is to incorporate leadership as well as organizational processes and structures to ensure that the organization’s IT extends and sustains its strategies and objectives (De Haes & Grembergen, ...
Organisation and coordination of a network on the co-ordination of social security schemes within the European Union - Lot 2: Information and training Ghent University
The project is a network of experts who conduct research into the problems regarding social security for migrants, in particular as drawn up in the European Regulations on social security (883/2004 and 987/2009). This projectU+2019s objective is to provide broad information about the European framework and about the problems regarding social security for migrants for an expert audience, consisting of the social security institutions with ...
Crypto: evaluation and certification for cryptology and information security. KU Leuven
Belgian fundamental research network on cryptology and information security Ghent University
This project encompasses 5 belgian and 2 european (T.U. Hamburg-Harburg and T.U. Graz) partners, and investigates a great variety on problems in cryptology. We investigate mathematical problems in cryptology, cryptographic algorithms and protocols, watermarking, and secure software and hardware. We also focus on three specific applications of cryptology.
Establish Pan-European Information Space to Enhance Security of Citizens. KU Leuven
In a disaster situation three things contribute to a success: having the right resource available in the shortest time, with the highest relevance and at the right location. Access to necessary information, communication with other rescuers and stakeholders as well as the availability of resources are key factors in minimizing damage and loss of life.
Large scale disasters and crisis situations increase the requirements on man and ...
Privacy-Friendly Protocols for Cloud Security KU Leuven
The increasing use of untrusted ICT-based environments for storage and processing demands for effective access control and protection mechanisms for the outsourced user data. Failure to secure the user data results in eliminating the benefits of such services. Cloud computing has several advantages like cheap service costs, higher computing power, scalability and higher performance but there are security issues for cloud providers as well as ...
Security and Reliability for Emerging IoT Networks KU Leuven
The research focuses on security and reliability issues in contemporary IoT networks and devices. As the application domain of the IoT expands, information security and reliable operation have become of paramount importance. Networks and end-devices have adopted the fundamental goals of information security (Confidentiality, Integrity, and Availability). However, as IoT devices are resource-constrained their design must be tailored for each ...
Automated Threat Analysis for Security and Privacy KU Leuven
Security and privacy are long recognized as key concerns in the development of software systems. Despite their recognized importance, much of the attention is focused only on the code-level implementation of these principles. However, the design-level consideration of these principles is instrumental to fully realize secure and privacy-preserving software and avoid costly design flaws. Avoiding these security and privacy flaws requires ...
A security architecture for trustworthy networked embedded systems. KU Leuven
Many embedded systems provide hardware security extensions such as custominstruction or co-processors instead of standard security features present in high-end processors. We intend to explore what the advantages, limits and trade-offs are of software support for specific hardware security. This includes a secure boot process, runtime integrity and remote verification, ...