blog_opt_3
Partner Official Legal Name:    Cadzow Communications Consulting Ltd
City, Country:    Sawbridgeworth, UK
Internet address:    http://www.cadzow.com    and    http://www.tvra-tools.eu

 

Partner description
Cadzow Communications Consulting Ltd (www.cadzow.com) is a privately owned consulting company with specialism in standards development to address privaccy protection and security protocols and algrorithms in communications networks and distributed systems.
Experience in related projects
FP7 i-Tour: Within the i-Tour project Scott has been responsible for the development of the TVRA and PIA analyses and from these development of the policy based protection measures. This is ongoing work that is developing extensions of SAML and XACML like languages for implementation of Consent Based Access Control (CBAC) and Trust Based Access Control (TBAC) models as part of a privacy by design model bounded by and secured using digital signature approaches.
FP7 i-SCOPE: As per the i-Tour project Scott has responsibility in this project for the PIA and TVRA analyses and will develop models stressing temporal and locational privacy on large geoNet databases and the applications built on them (developing extensions in this case to GityGML).
ENISA Resilience: This project was directed through ENISA (the European Network Information Security Agency) to EU Member States on achieving resilience in critical infrastructures (i.e. telecommunications, transport, utilities, power). It was further developed in 2010 to develop an ontology and taxonomy for resilience modeling in Member States.
ENISA SCI: This project was directed to EU Member States to direct policy on achieving integrity and resilience of Supply Chains. The project was completed in Autumn 2012 with future work expected on development of metrics and methods of Supply Chain assurance.
FP7 SUNSHINE: As per the i-Tour project and i-SCOPE project Scott has responsibility in this project for the PIA and TVRA analyses and will develop models stressing temporal and locational privacy on large geoNet databases and the applications built on them. In this case building PKI structures and pushing the cryptographic models to support broad based access control.
Brief description of the role within the project
C3L will be responsible for coordination of activities with any impact on privacy and security leading T.1.3 – Privacy Threat Vulnerability and Risk Analysis and T.3.5 – Security and privacy layer. The standards effort will be achieved through key teams in ETSI (European Telecommunications Standards Institute) and shall undertake the PIA (Privacy Impact Assessment) and TVRA (Threat, Vulnerability, and Risk Analysis) for use of data and privacy in i-locate leading to the development of a security process and architecture model