Talks

EU Cyber Security and Privacy Forum 2012

Speaking at the EU Cyber Security and Privacy Forum (EU CSP), cluster workshop 2 on applications of security and privacy policies.

My topic is VALID Rules - a language for cloud security, showing how the VALID security policy language can be used for topology verification. See Cloud Security Assurance.

Image Gallery

Cloud1 Ideal-world view of an abstract infrastructure cloud topology Cloud2 Real-world complexity of a production infrastructure cloud topology Cloud3 Information flow analysis by graph coloring exemplified with a small color tree Cloud4 Tool-supported information flow analysis against an abstract attack state - 1 Same zone Cloud5 Tool-supported information flow analysis against an abstract attack state - 2 VLAN separation Cloud6 Tool-supported information flow analysis against an abstract attack state - 3 Isolation breach found Cloud7 Overview of our architecture for tool-supported infrastructure cloud analysis

SlideShare Talk

(Needs JavaScript and Adobe Flash Player)