| 
			  
			   |  |  
					| Page Content | | 2012 SG 17 Orientation session for newcomers, Arkadiy Kremer, SG 17 ChairmanPersonalized, Privacy-enhancing Identity Management -A Service Provisioning Infrastructure for a Global Ecosystem, supported by interconnected Operators, Thomas Andersson, IKED.Introduction to ASTAP Expert Group Security (EG IS), Miho Naganuma, chairman of ASTAP EG ISCERN Computer Security, Stefan Lueders, CERNInformation session on Direct Document Posting, Maite Comas Barnés, TSBCyber Security Research at the American University of Beirut”, Imad H. Elhajj, American University of Beirut, LebanonCloud Computing Security”, Frédéric Gittler, HP Laboratories/FranceDescribing and serializing structured data - A history and comparison of approaches”, John Larmouth, Q12/17 RapporteurIntroduction and Discussion to OGC Open GeoSMS Standard”, Kuo-Yu "Slayer" Chuang/editor of the OGC Open GeoSMS specificationGlobal Collaboration on Automotive, ITS and Standards - ITS security – a topic for Study Group 17?”; Reinhard Scholl, Deputy to the Director, TSBITS – a security, safety and privacy challenge for society and technology”, Scott Cadzow, ETSI ITS WG 5 chairOperationalize Policy with Marketing - Reach, Transparency and Trust; Marc Kaplan, Soli United
 2011 3rd Generation eID - Agile eIDs for Widespread National Use, Jon Shamah, Head, EMEA Sales, eSecurity, NETSSecuring the Cyber Ecosystem - Automation and Standards to Build Security In, Robert Martin, MITRE/USARFID Security & Privacy at both Physical and System Levels, Professor Robert Deng and Professor Yingjiu Li, Singapore Management University, SingaporeDEMONS - Decentralized, cooperative and privacy preserving Monitoring for trustworthiness, Dr. Sathya Rao, KYOS, Geneva, SwitzerlandIF-MAP Overview, Jan Ursi, InfobloxITU-T Study Group 17, Security, A brief overview for newcomersKorea’s experience of massive DDoS attacks from Botnet, Heung Youl YOUM, SG 17 Vice chairmanITU Smart Exchange Addresses (SEA) - An exclusive ITU BCG 2 BCG Services, Thierry Zaradey, ITU SecGen/IS
 2010 Application of CYBEX (Cybersecurity Information Exchange) techniques to future networks, Tony RutkowskiX.500/LDAP as OID and URN resolver, Erik AndersenReference Model of Cloud Computing, Public Carrier’s View, Vladimir BelenkovichDRM Interoperability using as examples Marlin, Coral and DECE, Albhy GalutenHarmonizing identity management, privacy and security in the cloud and in the grid: Dynamic distributed key infrastructures and dynamic identity verification and authentication, Andre BrissonUNCITRAL legislative standards on electronic communications and electronic signatures: an introduction, Luca G. CastellaniIMPACT - Bridging Governments, Academia & Industry, Sivanathan Subramaniam
 2009 Organization for the Advancement of Structured Information Standards (OASIS ), Abbie BarbirDe-Mail: A reliable and secure online communication platform, Armin WappenschmidtSignificant Cybersecurity Developments: A global cybersecurity information exchange framework, plus Clouds, SmartGrid, and eHealth, Tony Rutkowski, Rapporteur Q.4/17Positioning of .oid in the DNS, John Larmouth, Rapporteur Q.12/17ETSI Security Standardisation, Dr. Carmine Rizzo, ETSIStandards in biometrics, Short insight in thesis results, Martin Adolph, ITU/TSB
 Past tutorials | 
 | 
 |  |  |  
					|  |  |