List of participants

back to list
Company

University of Malaga

Street
Severo Ochoa, 4
ZIP Code
29590
City
Malaga
Country
Spain


Company Profile:
NICS Lab is an international leading Security research group headed by Javier Lopez, Full Professor of the Computer Science Department at University of Malaga. NICS is composed of 20 persons, including faculty members, post-docs researchers, top PhD students, and technical and management staff.

We mainly focus on the following research topics: Critical Infraestructure Protection, Identity Management, Non-repudiation, RFID, Trust & Reputation Management and Wireless Sensor Networks.
Profiltitel

Advanced Incident Response Mechanisms for the Protection of Critical Infrastructures

What we offer:
Our technology employ reputation to automatically and intelligently manage SCADA alarms in two ways. Firstly, we designed an Early Warning System based on Wireless Sensor Networks (WSN) and reputation for controling the network behaviour. The WSN are organized into clusters where a Cluster Head (CH) is designated. This CH will contain a Reputation Manager Module. Secondly, we designed an algorithm for assigning an incidence to the most suitable human operator to take it up. Such assignment will depend on a set of factors, among them the criticality of the alarm and the actual operators’ reputation. Basically, reputation allows the system to identify which human operator is more suitable to attend an incidence.

What we are looking for:
We are looking for enterprises or research groups interested in commercial, licensing, technical or other type of collaboration agreements, as well as partners for national or international R&D public calls.

You can search our technology portfolio on www.nics.uma.es. We also welcome contact from commercial partners from all business sectors on an international basis.

Keywords:
  • Traffic & Transport Security
  • Computer Security
  • Security against Terrorism
  • Emergencies
  • Defence


Responsible

Mr Gerardo Fernandez Navarrete

Project Manager

Profiltitel

RFID-based solutions for healthcare scenarios

What we offer:
We have designed a solution for the integration of RFID in healthcare scenarios that can be used by hospitals and medical centres, who want to securely integrate RFID technology in their processes to enhance patient care and control, as well as real-time location of their medical equipment. Thanks to this integration of medical processes, incorrect data input can be prevented and errors in patient treatment or missed drug administrations can be detected in real-time, reducing potential for incorrect diagnosis. Moreover, the adoption of RFID-based real-time tracking systems can prevent the continuous losses of valuable assets and lack of control of equipment location, providing a remarkable cost reduction in acquisition of medical equipment and rental fees.

What we are looking for:
We are looking for enterprises or research groups interested in commercial, licensing, technical or other type of collaboration agreements, as well as partners for national or international R&D public calls.

You can search our technology portfolio on www.nics.uma.es. We also welcome contact from commercial partners from all business sectors on an international basis.

Keywords:
  • Computer Security


Responsible

Mr Gerardo Fernandez Navarrete

Project Manager

Profiltitel

Privacy of Individuals in Location-Based Services

What we offer:
We have designed a solution to protect privacy of the individuals while accessing location-based services. In order to implement our scheme the user is equipped with an IEEE 802.15.4 compliant device that identifies the user against the deployed infrastructure. While the user moves it receives some challenges from the infrastructure that must be responded to get access to the services. To prevent user tracking any identifiable information in the communication packets is removed. Finally, the identification is done at application level by means of shared keys between the user and the infrastructure. Only the service provider can link the identity of the user with the responses received from the intermediaries.

What we are looking for:
We are looking for enterprises or research groups interested in commercial, licensing, technical or other type of collaboration agreements, as well as partners for national or international R&D public calls.

You can search our technology portfolio on www.nics.uma.es. We also welcome contact from commercial partners from all business sectors on an international basis.

Keywords:
  • Traffic & Transport Security
  • Computer Security


Responsible

Mr Gerardo Fernandez Navarrete

Project Manager

Profiltitel

Anonymous age verification based on DNI-e

What we offer:
Protecting the privacy and security of underage confirming that they do not access inappropriate content remains a priority for parents. Users should benefit from all the advantages of technology and information while they are protected from inappropriate content aimed at their age group. Currently, there are few solutions used to verify the age of a user anonymously. Therefore, an user should be able to, autonomously and with minimal information disclosure, provide its (verified) age in order to access determined services.
To meet this goal, we developed a verified age provider, so that users can prove their age when accessing to certain content or applications. To do this, we used on one hand the existing electronic identity infrastructure in Spain (DNIe), and secondly, the possibility of using Information Cards to provide authentication tokens to users.

What we are looking for:
We are looking for enterprises or research groups interested in commercial, licensing, technical or other type of collaboration agreements, as well as partners for national or international R&D public calls.

You can search our technology portfolio on www.nics.uma.es. We also welcome contact from commercial partners from all business sectors on an international basis.

Keywords:
  • Computer Security


Responsible

Mr Gerardo Fernandez Navarrete

Project Manager

back to list

Participants

© 2012 www.converve.com | Networking at events software