This page provides information on research projects.

The page is currently under construction.


Scalable Measures for Automated Recognition Technologies

Automated recognition of individuals and/or pre-determined traits or risk factors/criteria lies at the basis of smart surveillance systems. Yet new EU regulations and specifically those on information sharing between police and security forces explicitly prohibit automated decision-taking regarding individuals unless “authorised by a law which also lays down measures to safeguard the data subject’s legitimate interests” (Art 7, CFD 2008/977/JHA). Which laws are applicable in this context? What measures are envisioned? What else should the law contain? Can the laws be technology-neutral but sector specific, thus permitting a measured approach to the appropriateness of smart surveillance technologies in key security applications? Can they be extended to all security applications of smart surveillance, even those not covered by CFD 2008/977/JHA?

The SMART project addresses these and other questions through a comprehensive approach which combines a technical review of key application areas by sector with a review of existing pertinent legislation to then produce a set of guidelines and a model law compliant with CFD 2008/977/JHA and EU Directive 46/95



Rules, Expectations & Security through Privacy-Enhanced Convenient Technologies


Convenience and cost-effectiveness are the two key considerations for both citizens and security forces when deciding which technologies to embrace or avoid in the Information Society. State actors and private corporations adopt information communication technologies (ICTs) because they are cost-effective. The motivation for adoption may be different in the private and public sectors but once adopted these ICTs are then capable of being bridged in multiple ways permitting police/security forces to go beyond the data they gather directly but also increasingly tap into data gathered and stored by private corporations. These ICTs, which have to date gone through a period of largely organic growth, will be deemed to be “in balance” if they are implemented in a way which respects individual privacy while still maximising convenience, profitability, public safety and security. RESPECT seeks to investigate if the current and foreseeable implementation of ICTs in surveillance is indeed “in balance” and, where a lack of balance may exist or is perceived by citizens not to exist, the project explores options for redressing the balance through a combination of Privacy-Enhancing Technologies and operational approaches. Investigating at least five key sectors not yet tackled by other recent projects researching surveillance (CCTV, database mining and interconnection, on-line social network analysis, RFID & geo-location/sensor devices, financial tracking), RESPECT will also carry out quantitative and qualitative research on citizens’ awareness and attitudes to surveillance. RESPECT will produce tools that would enable policy makers to understand the socio-cultural as well as the operational and economic impact of surveillance systems. The project will also produce operational guidelines incorporating privacy by design approaches which would enable law enforcement agencies to deploy surveillance systems with lowest privacy risk possible and maximum security gain to citizens.




Enterprise- and User-oriented Strategy for Trust and Identity in Cyberspace

The formation of identity management federations has been slower than expected. Despite their potential business benefits, numerous issues have impeded their take up such as: validating the trustworthiness of the various providers, the use of appropriate business models, and legal redress and liabilities.

The objective of EUSTIC is to facilitate the creation of profitable Trust and Identity Federations as well as the joining together of existing federations on a pan-European and global basis. It will do this through the creation of a free to use Trust and Identity Federation Toolkit and Reference Library comprising: a methodology for the successful creation of profitable identity and trust federation management infrastructures, various business models, a business federation score card, a risk management methodology, a trust framework meta model with supporting tools, an open source reference implementation, model contracts and legal agreements, and support for the (partial) automatic negotiation of agreements and the construction of federations. All of this will be made readily available via the EU Joinup web site.

In order to validate the utility of the Federation Toolkit and Reference Library EUSTIC will spawn the creation of new identity management federations, as well as interconnecting existing federations from different EC countries in a new pan-European federation. This will be achieved through the EUSTIC Partner Alliance that is supporting the business development of federations through a representative coverage of use cases in multiple sectors (finance, transport, utility, housing, health, trade and services) across Europe. By the end of 2011 the Alliance already has the support of more than 60 organizations, including 15 large enterprises.