Investigation areas

Critical infrastructures

Data processing

Evaluation of systems and cyber risk

Identity management

Metrics

Promotion and awareness of safety

Reliable and upgradeable systems

Lines of investigation

Access control and authentication

Access control based on behaviour

Audits of security systems

Big data security

Cloud and web application architecture

Cloud Computing

Compliance&Certification

Confidence and reliable big data

CPSs

Cyber risks

Data mining

Data protection (confidentiality)

Data-driven policies

Design of security requirements

Development of applications

Development of specific languages for data treatment

Development of tool protection

Dynamic evaluation and management of risks

Economic value of personal and business data

Implementation of security and privacy metrics in ICT

Improved security in technological standards

Improvement of security protocols and standards

Integrated risk metrics and indicators

Internet of Things

Large-scale data analysis

Legal risk assurance and management

Methodology for the adoption of best practice and reduction of barriers in relation to risks

Methods and development of protection tools

Metrics

Protección de datos (integridad y disponibilidad)

Regulatory security compliance

Risk evaluation and prevention

Risk management and analysis

Risk quantification

Role-based access control

Secure development languages and frameworks

Secure validation methods

Security in critical systems (aeronautics, rail, automotive)

Statistical and predictive risk analysis

Study of patterns

System modelling and system attacks