We develop support for policy specification of mobile security



A collaboration of: Getronics PinkRoccade, Fox-IT, Bizzdesign, Belastingdienst/CICT, Atos Origin
Funded by:STW Sentinels
Duration:January 2007 until December 2011
Contact:Prof.Dr. R.J. Wieringa (Roel)

Information Systems Group, University of Twente (is.ewi.utwente.nl)

Project: VISPER (the VIrtual Security PERimeter for digital, physical and organisational security)

The security perimeter, which once was simply defined as the fence around the premises of an organisation, is becoming increasingly flexible and adaptable to the environment and the circumstances. We call this process re-perimeterisation (ReP). The effects of ReP are felt in the digital domain (where data moves from organisation to organisation through networks), the social domain (where one individual may play a variety of roles in cooperating organisations) and the physical domain (where appliances such as mobile phones and laptops move around).

ReP brings about new security risks because of the difficulty of keeping the domains aligned. For example, stealing a laptop (social domain) with a motion sensor triggers an alarm (physical domain), which then selects a security policy that blocks access to all sensitive data (digital domain). By making the security perimeter explicit in business processes, security policies and security mechanisms, we intend to foster alignment of the three domains. This would then mitigate the risks of ReP

Project information

Period: 2007–2011

Sponsor: STW Sentinels

Partners: Getronics PinkRoccade, Fox-IT, Bizzdesign, Belastingdienst/CICT, Atos Origin

Publications

More information: see the project proposal and the VISPER website



[BACK]