This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Netherlands May 27, 2014"

From OWASP
Jump to: navigation, search
m (added abstract Jaap-Henk Hoepman)
m (added slids IRMA)
 
Line 24: Line 24:
 
===IRMA / Attribute Based Credentials===
 
===IRMA / Attribute Based Credentials===
 
Attribute based credentials allow people to prove some attribute (like age, gender, subscription to a service, etc.) without leaving any other trace. The IRMA project (www.irmacard.org) has fully implemented this very privacy friendly authentication technology on a smart card. In this presentation I will talk about the technology behind IRMA, it's concepts, and our plans for the future.
 
Attribute based credentials allow people to prove some attribute (like age, gender, subscription to a service, etc.) without leaving any other trace. The IRMA project (www.irmacard.org) has fully implemented this very privacy friendly authentication technology on a smart card. In this presentation I will talk about the technology behind IRMA, it's concepts, and our plans for the future.
 +
*[[Media:The Small Gospel of IRMA - OWASP - 27-05-2014.pdf | Download the presentation as PDF]]
 
===How data-protection can be improved===
 
===How data-protection can be improved===
 
Tools are important to both hackers and security testers, but they are not 'the silver bullit'. You need to understand the limitations of tools in order to get the most efficiency out of them. In this presentation some tips and tricks for well-known tools will be shown to get you started getting the right mind-set in using them.
 
Tools are important to both hackers and security testers, but they are not 'the silver bullit'. You need to understand the limitations of tools in order to get the most efficiency out of them. In this presentation some tips and tricks for well-known tools will be shown to get you started getting the right mind-set in using them.

Latest revision as of 10:55, 11 June 2014

OWASP Netherland Wiki
All OWASP NL Events 2014

May 27th, 2014

Quality assurance and tools

Link to the registration!

Venue

Vrije Universiteit van Amsterdam
Room WN F123
De Boelelaan 1081
1081 HV Amsterdam

Click here for directions, VU Amsterdam Room WN F123

Programme:

18:30 - 19:00 Registration & Sandwiches
19:00 - 19:15 OWASP Netherland and Foundation Updates
19:15 - 20:00 IRMA / Attribute Based Credentials - Jaap-Henk Hoepman
20:00 - 20:15 Break
20:15 - 21:00 How data-protection can be improved - Brenno de Winter
20:45 - 21:30 Networking

Presentations

OWASP Update

New about what’s going on locally and globally within OWASP

IRMA / Attribute Based Credentials

Attribute based credentials allow people to prove some attribute (like age, gender, subscription to a service, etc.) without leaving any other trace. The IRMA project (www.irmacard.org) has fully implemented this very privacy friendly authentication technology on a smart card. In this presentation I will talk about the technology behind IRMA, it's concepts, and our plans for the future.

How data-protection can be improved

Tools are important to both hackers and security testers, but they are not 'the silver bullit'. You need to understand the limitations of tools in order to get the most efficiency out of them. In this presentation some tips and tricks for well-known tools will be shown to get you started getting the right mind-set in using them.

Speakers

Jaap-Henk Hoepman

Jaap-Henk is, among others, co-founder of the Privacy & Identity Lab, member of The Internet of People, former member of the Executive Board of Trust in Digital Life, former chair of the IFIP working group 11.2 on "Pervasive System Security", and former coordinator and co-founder of the Kerckhoffs Institute offering a master programme in Computer Security.

Brenno de WInter

Brenno de Winter is a research journalist specialist in privacy-protecting and safety.He did research about various abuses of data protecting by goverments and companies