<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="et">
	<id>http://courses.cs.taltech.ee/w/index.php?action=history&amp;feed=atom&amp;title=Public_Lecture_Jensen_2013</id>
	<title>Public Lecture Jensen 2013 - Redigeerimiste ajalugu</title>
	<link rel="self" type="application/atom+xml" href="http://courses.cs.taltech.ee/w/index.php?action=history&amp;feed=atom&amp;title=Public_Lecture_Jensen_2013"/>
	<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Public_Lecture_Jensen_2013&amp;action=history"/>
	<updated>2026-04-06T23:25:09Z</updated>
	<subtitle>Selle lehekülje redigeerimiste ajalugu</subtitle>
	<generator>MediaWiki 1.35.9</generator>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Public_Lecture_Jensen_2013&amp;diff=56&amp;oldid=prev</id>
		<title>Rain – 4. november 2013, kell 12:55</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Public_Lecture_Jensen_2013&amp;diff=56&amp;oldid=prev"/>
		<updated>2013-11-04T12:55:13Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;et&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;←Vanem redaktsioon&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Redaktsioon: 4. november 2013, kell 12:55&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;1. rida:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;1. rida:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The next public cyber security lecture at Tallinn University of Technology will take place at 1400-1530 on Tuesday the &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;11th &lt;/del&gt;of November. This event is part of a lecture series supported by the IT Academy and within the framework of the European Cyber Security Month. Please feel free to forward the lecture information to any interested parties.  &lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The next public cyber security lecture at Tallinn University of Technology will take place at 1400-1530 on Tuesday the &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;12th &lt;/ins&gt;of November. This event is part of a lecture series supported by the IT Academy and within the framework of the European Cyber Security Month. Please feel free to forward the lecture information to any interested parties.  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Title: Security in Pervasive Computing Systems&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Title: Security in Pervasive Computing Systems&amp;#039;&amp;#039;&amp;#039;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l7&quot; &gt;7. rida:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;7. rida:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Location: X-213 (TUT social sciences building, Akadeemia 3, right next to the library)&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Location: X-213 (TUT social sciences building, Akadeemia 3, right next to the library)&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Time: 1400-1530, &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;11th &lt;/del&gt;of November&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Time: 1400-1530, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;12th &lt;/ins&gt;of November&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Abstract:&amp;#039;&amp;#039;&amp;#039;  &lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Abstract:&amp;#039;&amp;#039;&amp;#039;  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Rain</name></author>
	</entry>
	<entry>
		<id>http://courses.cs.taltech.ee/w/index.php?title=Public_Lecture_Jensen_2013&amp;diff=55&amp;oldid=prev</id>
		<title>Rain: Uus lehekülg: &#039;The next public cyber security lecture at Tallinn University of Technology will take place at 1400-1530 on Tuesday the 11th of November. This event is part of a lecture series su...&#039;</title>
		<link rel="alternate" type="text/html" href="http://courses.cs.taltech.ee/w/index.php?title=Public_Lecture_Jensen_2013&amp;diff=55&amp;oldid=prev"/>
		<updated>2013-11-04T12:53:09Z</updated>

		<summary type="html">&lt;p&gt;Uus lehekülg: &amp;#039;The next public cyber security lecture at Tallinn University of Technology will take place at 1400-1530 on Tuesday the 11th of November. This event is part of a lecture series su...&amp;#039;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Uus lehekülg&lt;/b&gt;&lt;/p&gt;&lt;div&gt;The next public cyber security lecture at Tallinn University of Technology will take place at 1400-1530 on Tuesday the 11th of November. This event is part of a lecture series supported by the IT Academy and within the framework of the European Cyber Security Month. Please feel free to forward the lecture information to any interested parties. &lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Title: Security in Pervasive Computing Systems&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Speaker: Dr Christian Jensen, Technical University of Denmark&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Location: X-213 (TUT social sciences building, Akadeemia 3, right next to the library)&lt;br /&gt;
&lt;br /&gt;
Time: 1400-1530, 11th of November&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Abstract:&amp;#039;&amp;#039;&amp;#039; &lt;br /&gt;
&lt;br /&gt;
The proliferation of mobile computing and communication equipment over the past decade, means that the computing context is changing from a predominantly stationary environment, to an environment where users are provided access to the organisation&amp;#039;s computing resources from a number of mobile devices, where some of them may even be privately owned by the user (this paradigm is known as Bring Your Own Device or BYOD). This means that he organisation&amp;#039;s security perimeter is extended into environments where the organisation has little or no physical or operational control. Moreover, users may encounter and interact with other users outside the context of their own environment, which means that neither of the user&amp;#039;s security infrastructures will be available to mediate their secure interactions.  As the organisation&amp;#039;s security perimeter has to be penetrated on a regular basis to accommodate this pervasive computing behaviour, the traditional security paradigm based on strong perimeter security has to be reconsidered.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Bio:&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Dr.Jensen holds a Ph.D. in computer science from Université Joseph Fourier (Grenoble, France), an M.Sc. in computer science from the University of Copenhagen (Denmark) and an M.A. (jure officii) from Trinity College Dublin (Ireland). He is an associate professor at the Department of Applied Mathematics &amp;amp; Computer Science at the Technical University of Denmark, where he teaches and conducts research in the area of security in open distributed systems. For the past 15 years, he has focused on trust-based methods and technologies to secure collaboration among entities in open distributed system. This work addresses all 3 As in AAA: Authentication technologies and entity recognition; Access control policies and mechanisms; and Accountability through reputation and recommendation systems.&lt;br /&gt;
&lt;br /&gt;
More information about the public lectures: [http://courses.cs.ttu.ee/pages/Public_Lectures http://courses.cs.ttu.ee/pages/Public_Lectures]&lt;/div&gt;</summary>
		<author><name>Rain</name></author>
	</entry>
</feed>