SlideShare uma empresa Scribd logo
1 de 37
Baixar para ler offline


Methods	and	Tools	for	GDPR	Compliance	through	
Privacy	and	Data	
Protection	4	Engineering




	Privacy	and	data	protection	


for	engineering	


Overall	presentation	
Yod	Samuel	MartĂ­n	


(Universidad	PolitĂŠcnica	de	Madrid)
This	project	has	received	funding	from	the	European	
Union’s	Horizon	2020	research	and	innovation	
programme	under	grant	agreement	No	787034
PDP4E	Forum
About	the	speaker
➢Yod	Samuel	Martín


➢Scientific	and	Technical	Lead	
of	H2020	PDP4E	project


➢Researcher	at	Universidad	
PolitĂŠcnica	de	Madrid	(UPM)	
–	Departmento	de	Ingeniería	
de	Sistemas	TelemĂĄticos	(DIT)
10/03/2020
PDP4E	Forum
Outline
➢Motivation:	problem	–	challenge	–	response


➢PDP4E	overview	and	conceptual	approach


➢Contributions	from	the	different	disciplines


❑Risk	Management


❑Requirements	Engineering


❑Model-Driven	Design


❑Assurance


➢Methodological	approach
10/03/2020
PDP4E	Forum
Privacy	and	data	protection


	are	trendy…
10/03/2020
PDP4E	Forum
Should	GDPR	be	an	engineer’s	job?


(Tip:	It	seems	it	should	indeed)
10/03/2020
PDP4E	Forum
The	privacy	and	data	protection	engineering	gap
10/03/2020
PDP4E	Forum
The	privacy	and	data	protection	engineering	gap
What	engineers	get…
10/03/2020
GDPR PbD
PETs PPM/PEM
PDP4E	Forum
The	privacy	and	data	protection	engineering	gap
What	engineers	get… What	engineers	want…
10/03/2020
GDPR PbD
PETs PPM/PEM
PDP4E	Forum
PDP4E	response:	what	engineers	need


“Endow	engineers	with	privacy	and	data	protection	tools	aligned	to	their	mindset”
10/03/2020
PDP4E	Forum
PDP4E	response:	what	engineers	need


“Endow	engineers	with	privacy	and	data	protection	tools	aligned	to	their	mindset”
Methods Tools Knowledge	bases Demonstrators Community
10/03/2020
PDP4E	Forum
PDP4E	response:	what	engineers	need


“Endow	engineers	with	privacy	and	data	protection	tools	aligned	to	their	mindset”
Metamodels
Knowledge
Bases
Smart grid
demonstrator
Fintech
demonstrator
Requirements
engineering
Risk management
Model-driven
design
Assurance
and
certification
TRL6 TRL7
Byproducts
Connected	
vehicle	
demonstrator
Smart	grid	
demonstrator
Methods Tools Knowledge	bases Demonstrators Community
10/03/2020
PDP4E	Forum
PDP4E	response:	what	engineers	need


“Endow	engineers	with	privacy	and	data	protection	tools	aligned	to	their	mindset”
Metamodels
Knowledge
Bases
Smart grid
demonstrator
Fintech
demonstrator
Requirements
engineering
Risk management
Model-driven
design
Assurance
and
certification
TRL6 TRL7
Byproducts
Connected	
vehicle	
demonstrator
Smart	grid	
demonstrator
Methods Tools Knowledge	bases Demonstrators Community
10/03/2020
PDP4E	Forum
Privacy	and	data	protection…
➢Personal	data	protection	as	subject-matter	of	GDPR


➢Privacy	goals	(ISO	27550)	beyond	security:	


Confidentiality,	Integrity,	Availability,	


Unlinkability,	Transparency,	Intervenability


➢Privacy	strategies	(ISO	27550):


Separate,	Abstract,	Hide,	Inform,	Control,	Enforce,	Demonstrate


➢Privacy	principles	(ISO	29100):	


consent,	choice,	lawfulness/purpose	legitimacy…	accountability


➢Data	subject	rights	(GDPR):	


erasure	(RtbF),	information,	access,	portability,	


rectification,	restriction,	object,	‘human	decision’


➢Controller	and	processor	legal	obligations	under	GDPR
10/03/2020
PDP4E	Forum
…	for	engineers
➢Systematic,	economical,	engineering	methods	and	tools


❑Not	just	regulation,	principles,	craftmanship	or	management!


➢Threat	model:


❑Honest	but	reckless	engineer


❑Risks	to	the	rights	and	freedoms	of	the	data	subject


❑Organization	itself	as	a	potential	attacker


➢Privacy	by	Design	and	“shift-left”
10/03/2020
PDP4E	Forum
Contribution	from	Risk	Management
	
	
Methods	&	tools	
for	PDP


Risk	
Management
Multilateral	Risk	Management
• Data	protection	impact	assessment	risk	trees	
(LINDDUN)


• Risks	to	rights	and	freedoms	of	the	data	
subjects	(+4U)


• Security	impact	analysis	and	security	
measures	(STRIDE)


• Derived	business	risks


• …	beyond	risks	of	non-compliance


• …	but	not	everything	is	a	risk
Support	execution	of	(D)PIAs:
• Identify	personal	data	categories


• Identify	threats


• Estimate	risk	factors


• Evaluate	and	prioritize	risks


• Address	risks:	choice	of	controls,	
countermeasures,	PETs


• Document	risks	and	risk	management
10/03/2020
PDP4E	Forum
Risk	Management	and	GDPR
➢Risk	Management	in	GDPR:


❑Art.	25	Data	protection	impact	assessment


❑Art.	26	Prior	consultation


❑Art.	33	Notification	of	a	personal	data	breach	to	the	supervisory	authority


❑Art.	34	Communication	of	a	personal	data	breach	to	the	data	subject


❑Art.	32	Security	of	processing


❑…
10/03/2020
PDP4E	Forum
Contribution	from	Requirements	Engineering
	
	
Methods	&	tools	
for	PDP


Requirements	
Engineering
Requirements	elicitation	
• Privacy	goals	and	properties


• Regulations	(GDPR):	principles,	
rights,	obligations,	measures


• Standards	(ISO29100)


• …	in	the	context	of	functional	reqs.
Techniques
• Functional	specification	as	
requirements-oriented	DFDs


• Simplified	Problem-frame	based	
method


• Operationalization	process	and	
hyerarchical	taxonomy	of	meta-
requirements
10/03/2020
PDP4E	Forum
Requirements	engineering	and	GDPR
➢Requirements	under	GDPR:


❑Chapter	2:	Principles	relating	to	processing	of	personal	data


❑Chapter	3:	Rights	of	the	data	subject


❑Chapter	4:	Obligations	and	responsibility	of	controllers	and	processors	


❑Art.	24	Responsibility	of	the	controller


➢Scope	of	requirements	instantiation:	


❑Nature,	scope,	context,	purpose,	lawfulness,	and	risks	of	the	data	processing	activities


➢Other	dependencies:	


❑Specific	data	categories	(sensitive)


❑Specific	processing	(profiling)	


❑Specific	purposes	(marketing,	research)


❑Size	of	the	organization


❑Other	regulation:	corporate	policies,	binding	rules,	certifications….
10/03/2020
PDP4E	Forum
Contribution	from	Model-Driven	Design
	
	
Methods	&	tools	
for	PDP


Model-
Driven	
Design
Data	mapping	and	
inventory
Enriched	models


• Structural	


(data	categories	and	properties)


• Behavioural	


(processing	activities	and	data	flows)


• Architectural	(deployment)
Architectural	analysis	and	
strategies	


• Minimization


• Separation


• Aggregation


• …
Model-based	Testing
10/03/2020
PDP4E	Forum
Model-driven	design	and	the	GDPR
GDPR	and	the	design	stage:


➢Data	protection	measures	enforced	on	the	controller


❑Art.	24	Responsibility	of	the	controller


❑Art.	25	Data	protection	by	design	and	by	default


❑E.g.	pseudonymisation,	minimisation...


➢Technical	and	organisational	security	measures	


❑Art.	32	Security	of	processing


❑E.g.	access	control,	encryption...


➢Measures	by	processors	and	secondary	processors


❑Art.	28	Processor
10/03/2020
PDP4E	Forum
Contribution	from	Assurance
	
	
Methods	&	tools	
for	PDP


Assurance
Regulatory	framework	
model
• GDPR,	EDPB	guidance,	
ISO…


• People:	roles


• Processes	and	activities


• Formal	requirements
Reusable	argumentation	
models
• Processing	activities


• Protection	activities
Demonstrate	compliance
• Capture	evidence


• Associate	to	reqs	and	
artefacts


• Trace	to	regulation


• Argument	compliance
10/03/2020
PDP4E	Forum
Assurance	and	the	GDPR
Support	to	GDPR	from	assurance:


➢Transparency	principle	(Art.	5.1.a)


➢Accountability	principle	(Art.	5.2)


➢Related	self-regulation,	co-regulation	
and	quasi-regulation:


❑Codes	of	conduct	(Art.	40,	Art.	41)


❑Certifications	(Art.	42)


❑Binding	corporate	rules	(Art.	47)


➢Involvement	of	multiple	parties:


❑Joint	controllers	(Art.	26)


❑Processors	(Art.	28)


❑Secondary	processors	(Art.	28.4,	Art.	28.5)


❑International	transfers	(Art.	44,	Art.	47)


➢Record	keeping:


❑Processing	activities	(Art.	30)


❑Data	subject's	consent	(Art.	7.1)


➢Data	breaches:


❑Notification	to	data	subject	(Art.	33)


❑Communication		to	authorities	(Art.	34)


➢Intervenability	goal
10/03/2020
PDP4E	Forum
Contribution	from	Method	engineering
	
	
PDP


Method	
engineering
Privacy	Method	Engineering
• Putting	it	all	together


• Dependencies	between	one	
another


• Methodologies	and	method	
fragments:	work	products,	roles,	
tools,	tasks,	activities,	processes


• Activities:	management,	analysis,	
design,	implementation,	testing,	
deployment,	operation,	
maintenance,	and	disposal
Adaptability
• Development	methodologies	or	
SDLC


• Software	engineering	tools


• Regulations	(WP29/EDPB	
guidance,	codes	of	conduct,	
derogations,	non-EU…)
Inherent	toolset	flexibility
• Modularity	and	loose	coupling


• MDE	and	metamodelling


• Evolving	knowledge	base


• Flexible	background	tools


• Open-source	distribution


• Flexible	methodology	
10/03/2020
PDP4E	Forum
Model	engineering	


and	Model-driven	engineering
10/03/2020
Model	engineering	


constructing	proportionally-scaled


miniature	working


representations


of	full-sized	machines
PDP4E	Forum
Model	engineering	


and	Model-driven	engineering
10/03/2020
Model	engineering	


constructing	proportionally-scaled


miniature	working


representations


of	full-sized	machines
Model	driven	engineering	


expressing	specifications


through	processable	models.


Diagram	orientation


(e.g.	UML	diagrams)
PDP4E	Forum
Complementary	modelling	views	and	disciplines
10/03/2020
PDP4E	Forum
Complementary	modelling	views	and	disciplines
• Assets	model


• Threats	model


• Controls	model


❖ Vuln./threat	trees
10/03/2020
Risk	


management
PDP4E	Forum
Complementary	modelling	views	and	disciplines
•Problem	frames	models	(optional)


•Requirements	model


❖ Meta-requirements	taxonomy
• Assets	model


• Threats	model


• Controls	model


❖ Vuln./threat	trees
10/03/2020
Risk	


management
Requirements	
engineering
PDP4E	Forum
Complementary	modelling	views	and	disciplines
•Reference	framework


•Argumentation


•Assurance	case	


and	compliance	model


•Evidence	model


❖ Argumentation	patterns
•Problem	frames	models	(optional)


•Requirements	model


❖ Meta-requirements	taxonomy
• Assets	model


• Threats	model


• Controls	model


❖ Vuln./threat	trees
10/03/2020
Process	assurance	&	
method	engineering
Risk	


management
Requirements	
engineering
PDP4E	Forum
Complementary	modelling	views	and	disciplines
•Structural	(data)	model	e.g.


•which	data	is	personal?


•is	it	sensitive?


•what	is	the	basis	for	collection?


•Procedural	(dataflow)	model	e.g.	


•which	processes	deal	with	personal	data?


•which	processing	operations	it	is	being	subject	to?


•which	data	flows	between	operations?


•for	what	purpose	it	is	being	used?


•who	is	authorized	to	access	that	data?


•Architectural	model


•who	stores	and	processes	data?


•under	which	jurisdiction?


❖ Minimization	strategies	and	patterns
•Reference	framework


•Argumentation


•Assurance	case	


and	compliance	model


•Evidence	model


❖ Argumentation	patterns
•Problem	frames	models	(optional)


•Requirements	model


❖ Meta-requirements	taxonomy
• Assets	model


• Threats	model


• Controls	model


❖ Vuln./threat	trees
10/03/2020
System	analysis	&


iterative	design
Process	assurance	&	
method	engineering
Risk	


management
Requirements	
engineering
PDP4E	Forum
Complementary	modelling	views	and	disciplines
•Structural	(data)	model	e.g.


•which	data	is	personal?


•is	it	sensitive?


•what	is	the	basis	for	collection?


•Procedural	(dataflow)	model	e.g.	


•which	processes	deal	with	personal	data?


•which	processing	operations	it	is	being	subject	to?


•which	data	flows	between	operations?


•for	what	purpose	it	is	being	used?


•who	is	authorized	to	access	that	data?


•Architectural	model


•who	stores	and	processes	data?


•under	which	jurisdiction?


❖ Minimization	strategies	and	patterns
•Reference	framework


•Argumentation


•Assurance	case	


and	compliance	model


•Evidence	model


❖ Argumentation	patterns
•Problem	frames	models	(optional)


•Requirements	model


❖ Meta-requirements	taxonomy
• Assets	model


• Threats	model


• Controls	model


❖ Vuln./threat	trees
10/03/2020
System	analysis	&


iterative	design
Process	assurance	&	
method	engineering
Risk	


management
Requirements	
engineering
PDP4E	Forum
Cross-discipline	abstract	use	cases
10/03/2020
PDP4E	Forum
Mental	Model	for	gap	analysis
➢Needs	for	different	engineering	disciplines	posed	by	GDPR


are	not	covered	by	current	tools	(focused	on	management	and	operation)
10/03/2020
PDP4E	Forum
Method	specification	(SIPOC)
10/03/2020
SUPPLIER INPUT PROCESS OUTPUT CUSTOMER
DEVELOPER
IMPLEMENTATION	
UPDATES
RISK	
MANAGEMENT	
IMPLEMENTATION
ASSESS	RISKS
DEFINE	
CONTROLS
ASSESS	
RESIDUAL	RISKS
CONTINUOUSLY	
MONITOR	RISKS
ARCHITECT
DEVELOPER
DPO
PRODUCT	OWNER
DETERMINE	
NEED	FOR	DPIA
DETERMINE	RISK	
TREATMENT
IDENTIFY	
THREATS
LIST	OF	CONTROLS
RISK	
MANAGEMENT	
PLAN
TECHNICAL	DPIA
ARCHITECT
DEFINITION	OF	
ASSETS
RISK	ANALYST
PRODUCT	
OWNER
THREAT	SOURCES
PROCESSING	
OPERATIONS
PRODUCT	
OWNER
ARCHITECT
RISK	
ANALYST
SYSTEMS	
ASSURANCE	
ENGINEER
PDP4E	Forum
Method	and	functional	integration
10/03/2020
PDP4E	Forum
Method	and	functional	integration
Methods	and	tools	for	PDP


Risk	Management
Methods	and	tools	for	PDP


Model-Driven	Design
System	
Models Evidences
Threats,


Controls…
Methods	and	tools	for	PDP	
Requirements	Engineering
Methods	and	tools	for	PDP


Assurance
Reqs.,


Controls…
Regulation,


Ass.Pattern
s
Privacy	
Controls
Threats,


Controls…
Meta-
requirements
Patterns,	
techniques..
.
Requirements
10/03/2020


Methods	and	Tools	for	GDPR	Compliance	through	
Privacy	and	Data	
Protection	4	Engineering


For	more	information,	visit:


www.pdp4e-project.org




Thank	you	for	your	attention
Questions?

Mais conteĂşdo relacionado

Mais procurados

H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overviewElsa Prieto
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationUlf Mattsson
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...Ulf Mattsson
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project DEFeND Project
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020Ulf Mattsson
 
Knobbe Practice Webinar Series: Strategic Considerations for Non-Disclosure A...
Knobbe Practice Webinar Series: Strategic Considerations for Non-Disclosure A...Knobbe Practice Webinar Series: Strategic Considerations for Non-Disclosure A...
Knobbe Practice Webinar Series: Strategic Considerations for Non-Disclosure A...Knobbe Martens - Intellectual Property Law
 
Open Research Data in H2020 and the Data Management plans requirements (Laser...
Open Research Data in H2020 and the Data Management plans requirements (Laser...Open Research Data in H2020 and the Data Management plans requirements (Laser...
Open Research Data in H2020 and the Data Management plans requirements (Laser...OpenAIRE
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniquesUlf Mattsson
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...Ulf Mattsson
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
 
New enterprise application and data security challenges and solutions apr 2...
New enterprise application and data security challenges and solutions   apr 2...New enterprise application and data security challenges and solutions   apr 2...
New enterprise application and data security challenges and solutions apr 2...Ulf Mattsson
 
Main Innovations of the SerIoT project
Main Innovations of the SerIoT project Main Innovations of the SerIoT project
Main Innovations of the SerIoT project SerIoT project
 

Mais procurados (20)

Dpm presentation
Dpm presentationDpm presentation
Dpm presentation
 
Wp4 ws cea2020
Wp4 ws cea2020Wp4 ws cea2020
Wp4 ws cea2020
 
Wp6 public
Wp6 publicWp6 public
Wp6 public
 
Privacy Data Protection for Engineers - PDP4E
Privacy Data Protection for Engineers - PDP4EPrivacy Data Protection for Engineers - PDP4E
Privacy Data Protection for Engineers - PDP4E
 
Pdp4 e privacy engineering toolkit ipen 2019
Pdp4 e privacy engineering toolkit   ipen 2019Pdp4 e privacy engineering toolkit   ipen 2019
Pdp4 e privacy engineering toolkit ipen 2019
 
Granular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra RuizGranular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra Ruiz
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computation
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
 
Data Privacy and IP Due Diligence
Data Privacy and IP Due Diligence Data Privacy and IP Due Diligence
Data Privacy and IP Due Diligence
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 
Knobbe Practice Webinar Series: Strategic Considerations for Non-Disclosure A...
Knobbe Practice Webinar Series: Strategic Considerations for Non-Disclosure A...Knobbe Practice Webinar Series: Strategic Considerations for Non-Disclosure A...
Knobbe Practice Webinar Series: Strategic Considerations for Non-Disclosure A...
 
Open Research Data in H2020 and the Data Management plans requirements (Laser...
Open Research Data in H2020 and the Data Management plans requirements (Laser...Open Research Data in H2020 and the Data Management plans requirements (Laser...
Open Research Data in H2020 and the Data Management plans requirements (Laser...
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
New enterprise application and data security challenges and solutions apr 2...
New enterprise application and data security challenges and solutions   apr 2...New enterprise application and data security challenges and solutions   apr 2...
New enterprise application and data security challenges and solutions apr 2...
 
Main Innovations of the SerIoT project
Main Innovations of the SerIoT project Main Innovations of the SerIoT project
Main Innovations of the SerIoT project
 

Semelhante a Pdp4 e forum

IEEE Education Society: Reshaping the Future of Technology
IEEE Education Society: Reshaping the Future of Technology IEEE Education Society: Reshaping the Future of Technology
IEEE Education Society: Reshaping the Future of Technology Manuel Castro
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn..."Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn...e-SIDES.eu
 
20161201 witdom bdva summit
20161201 witdom bdva summit20161201 witdom bdva summit
20161201 witdom bdva summitElsa Prieto
 
9th International Conference on Information Theory (IT 2020)
9th International Conference on Information Theory (IT 2020)9th International Conference on Information Theory (IT 2020)
9th International Conference on Information Theory (IT 2020)ijcsity
 
Call for papers - 7th International Conference on Signal, Image Processing an...
Call for papers - 7th International Conference on Signal, Image Processing an...Call for papers - 7th International Conference on Signal, Image Processing an...
Call for papers - 7th International Conference on Signal, Image Processing an...sipij
 
Open Innovation for the Digital Shift - A collection of case studies in the I...
Open Innovation for the Digital Shift - A collection of case studies in the I...Open Innovation for the Digital Shift - A collection of case studies in the I...
Open Innovation for the Digital Shift - A collection of case studies in the I...Alberto Minin
 
I4MS AND SAE: OVERVIEW OF UPCOMING OPEN CALLS AND SERVICES
I4MS AND SAE: OVERVIEW OF UPCOMING OPEN CALLS AND SERVICESI4MS AND SAE: OVERVIEW OF UPCOMING OPEN CALLS AND SERVICES
I4MS AND SAE: OVERVIEW OF UPCOMING OPEN CALLS AND SERVICESI4MS_eu
 
Horizon 2020 : appels 2018
Horizon 2020 : appels 2018Horizon 2020 : appels 2018
Horizon 2020 : appels 2018Cluster TWEED
 
8th International Conference of Managing Information Technology (CMIT 2020)
8th International Conference of Managing Information Technology (CMIT 2020)8th International Conference of Managing Information Technology (CMIT 2020)
8th International Conference of Managing Information Technology (CMIT 2020)IJMIT JOURNAL
 
9th International Conference on Information Theory (IT 2020)
9th International Conference on Information Theory (IT 2020)9th International Conference on Information Theory (IT 2020)
9th International Conference on Information Theory (IT 2020)ijcsity
 
8th International Conference of Managing Information Technology (CMIT 2020)
8th International Conference of Managing Information Technology (CMIT 2020)8th International Conference of Managing Information Technology (CMIT 2020)
8th International Conference of Managing Information Technology (CMIT 2020)Zac Darcy
 
8th International Conference of Managing Information Technology (CMIT 2020)
8th International Conference of Managing Information Technology (CMIT 2020)8th International Conference of Managing Information Technology (CMIT 2020)
8th International Conference of Managing Information Technology (CMIT 2020)ijmvsc
 
8th International Conference of Managing Information Technology (CMIT 2020)
8th International Conference of Managing Information Technology (CMIT 2020)8th International Conference of Managing Information Technology (CMIT 2020)
8th International Conference of Managing Information Technology (CMIT 2020)IJMIT JOURNAL
 
8th International Conference of Managing Information Technology (CMIT 2020)
8th International Conference of Managing Information Technology (CMIT 2020)8th International Conference of Managing Information Technology (CMIT 2020)
8th International Conference of Managing Information Technology (CMIT 2020)ijmvsc
 
9th International Conference on Information Theory (IT 2020)
9th International Conference on Information Theory (IT 2020)9th International Conference on Information Theory (IT 2020)
9th International Conference on Information Theory (IT 2020)ijcsity
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar..."Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...e-SIDES.eu
 
FundingBox webinar: Public and Private Funding Opportunities for Startups and...
FundingBox webinar: Public and Private Funding Opportunities for Startups and...FundingBox webinar: Public and Private Funding Opportunities for Startups and...
FundingBox webinar: Public and Private Funding Opportunities for Startups and...Liliya Pislar
 

Semelhante a Pdp4 e forum (20)

IEEE Education Society: Reshaping the Future of Technology
IEEE Education Society: Reshaping the Future of Technology IEEE Education Society: Reshaping the Future of Technology
IEEE Education Society: Reshaping the Future of Technology
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn..."Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn...
 
RETHINKbig
RETHINKbigRETHINKbig
RETHINKbig
 
20161201 witdom bdva summit
20161201 witdom bdva summit20161201 witdom bdva summit
20161201 witdom bdva summit
 
DAPSI - Open Call #1 - Webinar #4
DAPSI - Open Call #1 - Webinar #4DAPSI - Open Call #1 - Webinar #4
DAPSI - Open Call #1 - Webinar #4
 
9th International Conference on Information Theory (IT 2020)
9th International Conference on Information Theory (IT 2020)9th International Conference on Information Theory (IT 2020)
9th International Conference on Information Theory (IT 2020)
 
Call for papers - 7th International Conference on Signal, Image Processing an...
Call for papers - 7th International Conference on Signal, Image Processing an...Call for papers - 7th International Conference on Signal, Image Processing an...
Call for papers - 7th International Conference on Signal, Image Processing an...
 
Open Innovation for the Digital Shift - A collection of case studies in the I...
Open Innovation for the Digital Shift - A collection of case studies in the I...Open Innovation for the Digital Shift - A collection of case studies in the I...
Open Innovation for the Digital Shift - A collection of case studies in the I...
 
I4MS AND SAE: OVERVIEW OF UPCOMING OPEN CALLS AND SERVICES
I4MS AND SAE: OVERVIEW OF UPCOMING OPEN CALLS AND SERVICESI4MS AND SAE: OVERVIEW OF UPCOMING OPEN CALLS AND SERVICES
I4MS AND SAE: OVERVIEW OF UPCOMING OPEN CALLS AND SERVICES
 
Horizon 2020 : appels 2018
Horizon 2020 : appels 2018Horizon 2020 : appels 2018
Horizon 2020 : appels 2018
 
8th International Conference of Managing Information Technology (CMIT 2020)
8th International Conference of Managing Information Technology (CMIT 2020)8th International Conference of Managing Information Technology (CMIT 2020)
8th International Conference of Managing Information Technology (CMIT 2020)
 
Ipen2018
Ipen2018Ipen2018
Ipen2018
 
9th International Conference on Information Theory (IT 2020)
9th International Conference on Information Theory (IT 2020)9th International Conference on Information Theory (IT 2020)
9th International Conference on Information Theory (IT 2020)
 
8th International Conference of Managing Information Technology (CMIT 2020)
8th International Conference of Managing Information Technology (CMIT 2020)8th International Conference of Managing Information Technology (CMIT 2020)
8th International Conference of Managing Information Technology (CMIT 2020)
 
8th International Conference of Managing Information Technology (CMIT 2020)
8th International Conference of Managing Information Technology (CMIT 2020)8th International Conference of Managing Information Technology (CMIT 2020)
8th International Conference of Managing Information Technology (CMIT 2020)
 
8th International Conference of Managing Information Technology (CMIT 2020)
8th International Conference of Managing Information Technology (CMIT 2020)8th International Conference of Managing Information Technology (CMIT 2020)
8th International Conference of Managing Information Technology (CMIT 2020)
 
8th International Conference of Managing Information Technology (CMIT 2020)
8th International Conference of Managing Information Technology (CMIT 2020)8th International Conference of Managing Information Technology (CMIT 2020)
8th International Conference of Managing Information Technology (CMIT 2020)
 
9th International Conference on Information Theory (IT 2020)
9th International Conference on Information Theory (IT 2020)9th International Conference on Information Theory (IT 2020)
9th International Conference on Information Theory (IT 2020)
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar..."Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
 
FundingBox webinar: Public and Private Funding Opportunities for Startups and...
FundingBox webinar: Public and Private Funding Opportunities for Startups and...FundingBox webinar: Public and Private Funding Opportunities for Startups and...
FundingBox webinar: Public and Private Funding Opportunities for Startups and...
 

Último

Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsArindam Chakraborty, Ph.D., P.E. (CA, TX)
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 

Último (20)

Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 

Pdp4 e forum