際際滷shows by User: CigdemSengul / http://www.slideshare.net/images/logo.gif 際際滷shows by User: CigdemSengul / Wed, 23 Sep 2020 16:29:30 GMT 際際滷Share feed for 際際滷shows by User: CigdemSengul IoT security presented in Ada's List Conference /slideshow/iot-security-presented-in-adas-list-conference/238623471 iotsecurityadaslist-200923162930
This talk is on IoT security and will use the UK Code of Practice for Consumer IoT Security to underpin the discussion.I describe various vulnerabilities and attacks that made the news headlines, which are the underlying reason why we need these rules now. In October 2018, the UK Government published the Code of Practice for Consumer IoT Security to support all parties involved in the development, manufacturing and retail of consumer IoT. The talk will open the floor to question whether regulation can be a fix to make us all more secure.]]>

This talk is on IoT security and will use the UK Code of Practice for Consumer IoT Security to underpin the discussion.I describe various vulnerabilities and attacks that made the news headlines, which are the underlying reason why we need these rules now. In October 2018, the UK Government published the Code of Practice for Consumer IoT Security to support all parties involved in the development, manufacturing and retail of consumer IoT. The talk will open the floor to question whether regulation can be a fix to make us all more secure.]]>
Wed, 23 Sep 2020 16:29:30 GMT /slideshow/iot-security-presented-in-adas-list-conference/238623471 CigdemSengul@slideshare.net(CigdemSengul) IoT security presented in Ada's List Conference CigdemSengul This talk is on IoT security and will use the UK Code of Practice for Consumer IoT Security to underpin the discussion.I describe various vulnerabilities and attacks that made the news headlines, which are the underlying reason why we need these rules now. In October 2018, the UK Government published the Code of Practice for Consumer IoT Security to support all parties involved in the development, manufacturing and retail of consumer IoT. The talk will open the floor to question whether regulation can be a fix to make us all more secure. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/iotsecurityadaslist-200923162930-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This talk is on IoT security and will use the UK Code of Practice for Consumer IoT Security to underpin the discussion.I describe various vulnerabilities and attacks that made the news headlines, which are the underlying reason why we need these rules now. In October 2018, the UK Government published the Code of Practice for Consumer IoT Security to support all parties involved in the development, manufacturing and retail of consumer IoT. The talk will open the floor to question whether regulation can be a fix to make us all more secure.
IoT security presented in Ada's List Conference from Cigdem Sengul
]]>
202 0 https://cdn.slidesharecdn.com/ss_thumbnails/iotsecurityadaslist-200923162930-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Trends and transients_2019_cigdem_sengul /CigdemSengul/trends-and-transients2019cigdemsengul trendsandtransients2019cigdemsengul-200729135147
This is the talk I've given in the Trends and Transients session, in XML summer school in 2019. ]]>

This is the talk I've given in the Trends and Transients session, in XML summer school in 2019. ]]>
Wed, 29 Jul 2020 13:51:46 GMT /CigdemSengul/trends-and-transients2019cigdemsengul CigdemSengul@slideshare.net(CigdemSengul) Trends and transients_2019_cigdem_sengul CigdemSengul This is the talk I've given in the Trends and Transients session, in XML summer school in 2019. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/trendsandtransients2019cigdemsengul-200729135147-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is the talk I&#39;ve given in the Trends and Transients session, in XML summer school in 2019.
Trends and transients_2019_cigdem_sengul from Cigdem Sengul
]]>
89 0 https://cdn.slidesharecdn.com/ss_thumbnails/trendsandtransients2019cigdemsengul-200729135147-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Access control iot_mqtt_ace /slideshow/access-control-iotmqttace/177740911 accesscontroliotmqttace-190930131021
Authorization in IoT is an active research topic. The approach followed by the IETF ACE workgroup is to extend Web authorization solutions (i.e., OAuth2) to constrained IoT environments. While the workgroup is mainly focused on CoAP (Constrained Application) as the main IoT protocol, it is also important that MQTT is also enabled with the necessary security extensions. This presentation describes how we propose to do it in https://datatracker.ietf.org/doc/draft-ietf-ace-mqtt-tls-profile/ ]]>

Authorization in IoT is an active research topic. The approach followed by the IETF ACE workgroup is to extend Web authorization solutions (i.e., OAuth2) to constrained IoT environments. While the workgroup is mainly focused on CoAP (Constrained Application) as the main IoT protocol, it is also important that MQTT is also enabled with the necessary security extensions. This presentation describes how we propose to do it in https://datatracker.ietf.org/doc/draft-ietf-ace-mqtt-tls-profile/ ]]>
Mon, 30 Sep 2019 13:10:21 GMT /slideshow/access-control-iotmqttace/177740911 CigdemSengul@slideshare.net(CigdemSengul) Access control iot_mqtt_ace CigdemSengul Authorization in IoT is an active research topic. The approach followed by the IETF ACE workgroup is to extend Web authorization solutions (i.e., OAuth2) to constrained IoT environments. While the workgroup is mainly focused on CoAP (Constrained Application) as the main IoT protocol, it is also important that MQTT is also enabled with the necessary security extensions. This presentation describes how we propose to do it in https://datatracker.ietf.org/doc/draft-ietf-ace-mqtt-tls-profile/ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/accesscontroliotmqttace-190930131021-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Authorization in IoT is an active research topic. The approach followed by the IETF ACE workgroup is to extend Web authorization solutions (i.e., OAuth2) to constrained IoT environments. While the workgroup is mainly focused on CoAP (Constrained Application) as the main IoT protocol, it is also important that MQTT is also enabled with the necessary security extensions. This presentation describes how we propose to do it in https://datatracker.ietf.org/doc/draft-ietf-ace-mqtt-tls-profile/
Access control iot_mqtt_ace from Cigdem Sengul
]]>
68 0 https://cdn.slidesharecdn.com/ss_thumbnails/accesscontroliotmqttace-190930131021-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-CigdemSengul-48x48.jpg?cb=1619094968 I am a Senior Lecturer at Brunel University. Since 2002, I have worked as a researcher in mobile and wireless networks in various research and development environments in different countries. My research focused on security and privacy in Internet of Things. cigdemsengul.com https://cdn.slidesharecdn.com/ss_thumbnails/iotsecurityadaslist-200923162930-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/iot-security-presented-in-adas-list-conference/238623471 IoT security presented... https://cdn.slidesharecdn.com/ss_thumbnails/trendsandtransients2019cigdemsengul-200729135147-thumbnail.jpg?width=320&height=320&fit=bounds CigdemSengul/trends-and-transients2019cigdemsengul Trends and transients_... https://cdn.slidesharecdn.com/ss_thumbnails/accesscontroliotmqttace-190930131021-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/access-control-iotmqttace/177740911 Access control iot_mqt...