Tag Archives: Marlon Dumas

Cyber Security master’s theses defense in TalTech/UT (August 2020)

Defences of master theses of Cyber Security curriculum on August 17th 2020. The defences will take place online.

Time: 9:30
Student: Tarmo Oja
Title: X-ROAD TRUST MODEL AND TECHNOLOGY THREAT ANALYSIS
Supervisor: Ahto Buldas, Mari Seeba
Reviewer: Aleksandr Lenin

Time: 10:10
Student: Nikita Snetkov
Title: PRACTICAL IMPLEMENTABILITY OF TWO-PARTY ECDSA SIGNATURE SCHEMES
Supervisor: Ahto Buldas
Reviewer: Aleksandr Lenin

Time: 10:50
Student: Liubomyr Kushnir
Title: BENCHMARKING OF POST-HOC LOCAL INTERPRETABILITY METHODS FOR CLASSIFYING MALICIOUS TRAFFIC
Supervisor: Hayretdin Bahsi, Sven Nõmm
Reviewer: Pavel Tšikul

Time: 12:00
Student: Timm Jeff E Luyten
Title: RAISING CYBER AWARENESS WITH NON-IT PROFESSIONALS WORKING IN A HOME OFFICE ENVIRONMENT USING A PILOT VIDEO GAME CONCEPT
Supervisor: Birgy Lorenz
Reviewer: Sten Mäses

Time: 12:40
Student: Andrew J Roberts
Title: Development of a cybersecurity evaluation test bed for autonomous self-driving vehicles
Supervisor: Olaf Maennel
Reviewer: Tobias Eggendorfer

Time: 13:20
Student: Ilkin Huseynov
Title: THE ANALYSIS OF THE CURRENT CYBER SECURITY ACTIONS TAKEN IN THE E-GOVERNMENT OF AZERBAIJAN AND PROPOSAL OF THE IMPROVEMENT PLAN
Supervisor: Mika Kerttunen
Reviewer: Adrian Venables

Time: 14:15
Student: Andres Pihlak
Title: CONTINUOUS DOCKER IMAGE ANALYSIS AND INTRUSION DETECTION BASED ON OPEN-SOURCE TOOLS
Supervisor: Mauno Pihelgas
Reviewer: Kristian Kivimägi

Time: 14:55
Student: Eduard Iltšuk
Title: Two-Party ECDSA Protocol for Smart-ID
Supervisor: Arnis Paršovs
Reviewer: Jan Villemson

Time: 15:35
Student: Aivo Toots
Title: Zero-Knowledge Proofs for Business Processes
Supervisor: Peeter Laud
Reviewer: Marlon Dumas, Janno Siim

Computational Law & Blockchain Festival 2018

The first annual Computational Law & Blockchain Festival (#clbfest2018) is a three-day global event bringing together coders, designers, lawyers, policymakers, researchers, and students to co-create the future of law, legal practice, and policy. In the spirit of decentralization, the Festival will be hosted at independent, self-organized nodes in cities around the world.

DETAILED SCHEDULE (amended):

16 March 2018 @ Näituse 13a-201, Tartu

COFFEE OFFERED

10:15-11:45 TRACK LEARN
Electronic signature and enforceability of electronic contracts in civil law countries
Presentor: attorney Liisi Jürgen, NJORD Law Firm, lecturer of the IT Law Master´s programme

COFFEE BREAK

12:00-13:30 TRACK LEARN
Digital identities, e-residency and e-wallets – identity and digital footprint
Presentors: attorney Anne Veerpalu and attorney Liisi Jürgen, NJORD Law Firm, lecturers of the IT Law Master´s programme

13:30-15:00 TIME FOR A BREAK
(no lunch is offered by Legal Hackers)

15:00-15:45 TRACK LEARN
Decentralization and innovation ecology – what type of ecology is needed for legaltech to accelerate it innovation? Introducing many technologies which in themselves are not going to revolutionize everything.
Presentor: Michael Gallagher

COFFEE BREAK

16:00-17:30 SESSION 3: COMPUTERIZED LAW
Visualisation of law: An Automated Legal Content Capture and Visualisation Method (Automaatne meetod õigusteabe hankimiseks ja visualiseerimiseks)
Presentor: Ermo Täks, PhD (Computer Science, TTÜ)

17:30- 18:15 SESSION 3: INTRO TO SMART CONTRACTS (pre-recorded)
TBA
Presentor: Dr. Martin Ploom, who has worked for the last years for Man Investments, Credit Suisse and UBS in In-house Consulting / Project Management roles. He is an MBA, Dipl. Inf., Ms. Ec. and finished CFA Level III in 2010. He has been a crypto currencies enthusiast since Autumn 2012.

17 March 2018 @ Näituse 13a- 201, Tartu

COFFEE OFFERED

10:15-11:45 TRACK LEARN
Virtual currencies: legal and tax issues
Presentor: attorney Priit Lätt, PWC Legal, lecturer of the IT Law Master´s programme

11:45-13:00 TIME FOR A BREAK
(no lunch is offered by Legal Hackers)

13.00 – 13:30 INTRO TO HACK TRACK WILL TAKE PLACE @ Näituse 13A, TARTU

24h Hackaton – participants are welcomed to either listen to the next LEARN TRACK SESSION 3 or go to a separate location to work with their team
Hackaton location: J. Liivi 2 – 111, Institute of Computer Science, University of Tartu
Open from 1 pm on 17th March
Coffee break at 3 pm- 3.30 pm
Moderator: Stanislav Degtjarjov, Agrello.io

GLOBAL HACKATON registration available here:
https://docs.google.com/forms/d/e/1FAIpQLScQPaWitG8GKZ0xTdipHptwZlBeH9atPGjScI5768pRl5mC0w/viewform

LOCAL HACKATONS introduced at SESSION 2 and 1 pm on 17th March @ Näituse 13a, Tartu

13:30-16:00 TRACK LEARN/DISCUSS

SESSION 3: Blockchain Computing & Its Security Challenges

* Miao ZhiCheng, from decentral.ee, ex Skyper, ex. Twilion – “Blockchain computing vs. traditional computing – an overview”
* Dr. Marlon Dumas “Automating Business Processes With Smart Contracts”
* Agrello team : “Smart contracts technical standards”
* (recorded video) Dan Selman, from claus.io, “Accord Project – The Techno-Legal Standards”
* Risto Alas from Guardtime – “the DAO and the vulnerabilities discovered in Ethereum smart contracts”
* Taimo Peelo, “Ethereum Honeypots”
PANEL led by Miao ZhiCheng

16:15-16:45 TRACK LEARN
Tax issues at ICO and post-ICO
Presentor: attorney Elvira Tulvik, MAGNUSSON

Links:
https://www.meetup.com/Estonia-Legal-Hackers/events/247447020/

PhD thesis: “Deriving Security Requirements from Business Process Models”

ahmed_naved_PhD_thesis

Naved Ahmed PhD thesis: “Deriving Security Requirements from Business Process Models”
Defense date: 16.12.2014 – 16:15 to 17:45 (J. Liivi 2-404, Tartu, Estonia)

Thesis supervisors:
Assoc. Prof. PhD. Raimundas Matulevicius, University of Tartu
Prof. PhD. Marlon Dumas, University of Tartu

Opponents:
Prof. PhD. Andreas L. Opdahl, University of Bergen, Norway
Assoc. Prof. PhD. Rafael Accorsi, University of Freiburg, Germany

Summary:
To consider this need, the approach taken in this thesis is to analyse the business process models from a security perspective to derive security objectives and requirements. The thesis has proposed three complementary contributions: Firstly, security risk-oriented patterns that integrate the security risk analysis into business process models. These patterns supports security risk concepts in business process models that business analyst can understand easily. Secondly, the taxonomy for assessing security in business processes. This taxonomy is used to classify the security risk-oriented patterns and helps analysts to apply these patterns in business process models. Finally, these contributions form a foundation for a method, security requirements elicitation from business processes (SREBP) that performs a systematic elicitation of security requirements for their business processes.

Links:
http://www.ut.ee/en/events/naved-ahmed-deriving-security-requirements-business-process-models
http://dspace.utlib.ee/dspace/bitstream/handle/10062/44267/ahmed_naved.pdf