muses poster4evostar2013
TRANSCRIPT
Multiplatform Usable Multiplatform Usable
The overall purpose of MUSES isThe overall purpose of MUSES is
by reducing the risks introducedby reducing the risks introduced
Most corporate security incidents are caused by organizationMost corporate security incidents are caused by organization
malicious behaviour.
MUSES will provide a device independent, user-centric and selfMUSES will provide a device independent, user-centric and self
concept of seamless working experience on different devices, in
follow up the process on different ones, without corporate digitalfollow up the process on different ones, without corporate digital
MUSES aims at the benefit of the company
Evolutionary Computation will be used in Evolutionary Computation will be used in
User modelling with models optimised to match
observations using EC.observations using EC.
MUSES will try to create a model of users and
their context so that behaviours that can lead totheir context so that behaviours that can lead to
security problems can be previewed and, if
possible, avoided. These user models will dependpossible, avoided. These user models will depend
on observations of the context, but also will
employ heuristics to match them to known non-employ heuristics to match them to known non-
safe behaviours. EC will be used as asafe behaviours. EC will be used as a
metaheuristic to obtain optimal models
matching reality.matching reality.
MUSES partners
S2 Grupo (ES), Universidad de Granada (ES), HITEC (DE), Un
MUSES partners
S2 Grupo (ES), Universidad de Granada (ES), HITEC (DE), Un
Engineering – CURE (AT), Wind Telecomunicazioni (IT), TXT e-so
Project No. 318508 FP7-ICT-2011-8Project No. 318508 FP7-ICT-2011-8
MUSES Budget: 4.76M€
EU Funding: 3.59M€
Contact: Anna I. Esparcia – [email protected]
Usable Endpoint Security
Contact: Anna I. Esparcia – [email protected]
JJ Merelo – [email protected]
Usable Endpoint Security
is to foster corporate securityis to foster corporate security
introduced by user behaviourintroduced by user behaviour
insiders, either by their lack of knowledge or inadequate orinsiders, either by their lack of knowledge or inadequate or
self-adaptive corporate security system, able to cope with theself-adaptive corporate security system, able to cope with the
in which a user may start a session on a device and location and
digital asset loss.digital asset loss.
company, but focusing on the user
will be used in MUSES in two different contexts:will be used in MUSES in two different contexts:
Complex Event Processing using EC so that the
underlying mechanisms can be found out.underlying mechanisms can be found out.
In some cases, and independently of specific user
behaviour, sequences of actions might lead tobehaviour, sequences of actions might lead to
possible security failures. Complex Event
Processing captures these sequences in real timeProcessing captures these sequences in real time
and tries to model them so that the next action
can be foreseen. To create these models, EC willcan be foreseen. To create these models, EC will
be applied also in conjunction with otherbe applied also in conjunction with other
heuristics.
Université de Genève (CH), Center for Usability Research &Université de Genève (CH), Center for Usability Research &
solutions (IT), KU Leuven (BE) and Sweden Connectivity (SE).