European Roadmap for Research on Web Security

The Web platform is a hotbed of innovation that will affect deployment of technologies and applications for the next decade, and will influence the security and privacy that European users and service providers can achieve. The STREWS project will link European security and trust related research and development with ongoing standards and development work for the Web in IETF and W3C.

The project will develop a technical state of practice document for Web Security as a basis for case studies on selected Web security topics. A roadmap for future research and standardization in the Web security field will provide guidance for ongoing and future research. Over the course of the project, STREWS will reach out to European industry and projects, and organize a series of workshops to collect broad input into its roadmapping and case study work, and to create a European Web security community across academia and practice

Feeds from partners

From STREWS: Citizenfour (the film) – when pervasive monitoring became public

25 March 2015, 2:11 pm

When the STREWS project started, in October 2012, the plan included a workshop for early 2014 about WebRTC. The workshop would be a complement to the project's first case study. But in June 2013, something happened. Edward Snowden, an NSA employee at the time, talked to the Guardian newspaper and revealed details of the secret electronic...

>> Read more...

From W3C: W3C Invites Implementations of Mixed Content

17 March 2015, 6:44 pm

W3C and the Web Application Security Working Group invite implementation of “Mixed Content,” a specification that aims to improve web security by describing how a user agent should handle fetching of content loaded in a mixed security context. Specifically, it provides recommendations for the handling of content fetched over...

>> Read more...

From STREWS: New Internet Draft about effects of encryption on the Internet

11 March 2015, 10:58 pm

A new Internet Draft called Effect of Ubiquitous Encryption by Kathleen Moriarty and Al Morton describes the hurdles on the way to ubiquitous use of encryption for all Internet traffic.

>> Read more...

From STREWS: Crypto-currency forum proposed

2 March 2015, 6:12 pm

A new group has been proposed on the Community Groups site of W3C called the Cryptoledgers Community Group. It aims to create a network of researchers studying Bitcoin, Ethereum and other cryptoledger-based applications.

>> Read more...

From W3C: Two Security First Public Working Drafts Published

26 February 2015, 8:27 pm

The Web Application Security Working Group has published a Working Draft of Content Security Policy Pinning. This document defines a new HTTP header that allows authors to instruct user agents to remember (“pin”) and enforce a Content Security Policy for a set of hosts for a period of time. Learn more about the Security Activity....

>> Read more...

From Nessos: FOSAD 2015

18 February 2015, 7:37 pm

==================================================== 15TH INTERNATIONAL SCHOOL ON FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN FOSAD 2015 ==================================================== http://www.sti.uniurb.it/events/fosad15 31 August - 5 September 2015, Bertinoro, Italy In cooperation with NESSoS and CryptoForma *** Application...

>> Read more...

From STREWS: W3C TAG statement on securing the Web

28 January 2015, 5:14 pm

The W3C Technical Architecture Group (TAG) issued a set of guidelines for W3C's standardisation efforts in a statement called Securing the Web. The statement is partly in response to the STRINT workshop by STREWS, which it explicitly mentions as a source in the acknowledgements. The IAB issued a similar statement in November, called the IAB...

>> Read more...

From STREWS: Reports available from the W3C Workshop on Privacy and User–Centric Controls

11 December 2014, 12:56 pm

The minutes from the W3C Workshop on Privacy and User–Centric Controls were published at the end of November. This workshop was organised by W3C, with support from STREWS. The organisation was led by Rigo Wenning. The workshop was held November 20–21 in Berlin. The workshop attracted a good mix of implementers, content providers and...

>> Read more...

From OWASP: OWASP August 19 Connector

19 August 2014, 10:32 pm

August 19, 2014 | | www.owasp.org | Contact Us | Brought to you by the OWASP Foundation Featured OWASP ProjectOWASP Web Spa Project The OWASP WebSpa Project is a Java web knocking tool for sending a single HTTP/S request to your web server in order to authorize the execution of a premeditated Operating System (O/S)...

>> Read more...

From OWASP: OWASP ASVS 2.0 (Application Security Verification Standard)

18 August 2014, 10:32 pm

(From Daniel Cuthbert) OWASP Community, It gives me immense pleasure to finally release version 2 of the OWASP Application Security Verification Standard for all to enjoy. The community feedback on this has been overwhelming and it's great to see so many of you investing time and effort into what Sahba and I feel is an incredibly...

>> Read more...

From OWASP:

15 August 2014, 5:57 pm

OWASP AppSec USA 2014 Adds Leading Global Experts to List of Speakers Are you registered for the upcoming OWASP conference? We are excited to be getting closer to the OWASP AppSec USA event and we have now announced our roster of keynote speakers.  The premier software security conference for developers, auditors, risk managers,...

>> Read more...

From OWASP: Call for Speakers: OWASP Ghana Cybersecurity Conference

13 August 2014, 7:40 pm

Maa chi, maa ha, maa jo, OWASP Community, eti sen? The OWASP Ghana Cybersecurity Conference will take place in Accra, Ghana this December for the second year in a row! The event dates are December 10 - 11, 2014. It amazes me that there are so many places on planet earth where OWASP is active in some way. If you are interested in speaking at this...

>> Read more...

From OWASP: THIS FRIDAY is the DEADLINE to SUBMIT your CANDIDACY for the 2014 OWASP BOARD OF DIRECTORS

13 August 2014, 5:02 pm

Just a reminder that this FRIDAY, AUGUST 15 is the DEADLINE to submit your candidacy for the 2014 OWASP Global Board Of Directors.  For Information including eligibility requirements, primary responsibilities, election timeline and other important information, please visit our election page.  ...

>> Read more...

From Nessos: QASA 2014 - Program Available

24 June 2014, 9:44 am

3rd International Workshop on Quantitative Aspects in Security Assurance Affiliated workshop with ESORICS 2014 Wroclaw, Poland, September 11, 2014 www.iit.cnr.it/qasa2014 *** Invited Speakers: Elisa Bertino and  Audun Josang *** *Overview* There is an increasing demand for techniques to deal with quantitative aspects of...

>> Read more...

From Nessos: The 14th edition of the summer school on Foundations of Security Analysis and Design (FOSAD)

21 May 2014, 4:46 pm

14  Edition of the summer school on Foundations of Security Analysis and Design (FOSAD 2014)http://www.sti.uniurb.it/events/fosad14/ The 14th edition of the summer school on Foundations of Security Analysis and Design will be held in in the fascinating Rock of Bertinoro, Italy. This year edition is co-sponsored by NESSoS and...

>> Read more...

From Nessos: The Final version of the NESSoS research roadmap is available

2 February 2014, 9:45 pm

The final version of the NESSoS research roadmap is available at the URL:  http://www.nessos-project.eu/media/deliverables/y3/NESSoS-D4.3-PartII-Roadmap.pdf

>> Read more...

From Nessos: Project description

12 November 2010, 1:39 pm

The Network of Excellence on Engineering Secure Future Internet Software Services and Systems (NESSoS) aims at constituting and integrating a long lasting research community on engineering secure software-based services and systems.

>> Read more...

From Recent RFCs: RFC 7495: Enumeration Reference Format for the Incident Object Description Exchange Format (IODEF)

The Incident Object Description Exchange Format (IODEF) is an XML data representation framework for sharing information about computer security incidents. In IODEF, the Reference class provides references to externally specified information such as a vulnerability, Intrusion Detection System (IDS) alert, malware sample, advisory, or attack...

>> Read more...