{"id":638,"date":"2018-03-04T17:33:02","date_gmt":"2018-03-04T17:33:02","guid":{"rendered":"https:\/\/cybersecurity.bournemouth.ac.uk\/?p=638"},"modified":"2018-03-04T17:33:02","modified_gmt":"2018-03-04T17:33:02","slug":"innovate-uk-funding-for-commercialising-cairis","status":"publish","type":"post","link":"https:\/\/cybersecurity.bournemouth.ac.uk\/?p=638","title":{"rendered":"Innovate UK funding for commercialising CAIRIS"},"content":{"rendered":"<div id=\"attachment_639\" style=\"width: 560px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2018\/03\/samuel-zeller-4138-unsplash.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-639\" class=\"size-large wp-image-639\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2018\/03\/samuel-zeller-4138-unsplash-1024x676.jpg\" alt=\"\" width=\"550\" height=\"363\" srcset=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2018\/03\/samuel-zeller-4138-unsplash-1024x676.jpg 1024w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2018\/03\/samuel-zeller-4138-unsplash-300x198.jpg 300w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2018\/03\/samuel-zeller-4138-unsplash-768x507.jpg 768w\" sizes=\"(max-width: 550px) 100vw, 550px\" \/><\/a><p id=\"caption-attachment-639\" class=\"wp-caption-text\">Photo by Samuel Zeller on Unsplash<\/p><\/div>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/staffprofiles.bournemouth.ac.uk\/display\/sfaily\">Shamal Faily<\/a> has recently been awarded funding through Innovate UK&#8217;s <a href=\"https:\/\/www.gov.uk\/government\/news\/commercial-ideas-in-cyber-security-apply-for-academic-funding\">Cybersecurity Academic Startup Programme<\/a>\u00a0to develop value propositions around a commercial derivative of the open-source <a href=\"https:\/\/cybersecurity.bournemouth.ac.uk\/?page_id=62\">CAIRIS<\/a>\u00a0called HuaHana: a productivity platform for usable and secure software design.<\/p>\n<p>HuaHana will provide tools that usability specialists, security engineers, and software architects can use for contributing design data, and visualising not just\u00a0the software being designed, but its broader context of use. Because the tools fit the practices of security, usability, and software designers, HuaHana will make it\u00a0possible to evaluate a software product&#8217;s threat model, or identify potential usability issues leading to human error or misuse early in a product&#8217;s life.<br class=\"\" \/>HuaHana will also close the gap between design and development &amp; testing. HuaHana models will be easy to create using common development tools, and\u00a0HuaHana will provide an API that developers can use to build extensions for their own productivity tools. This will make it possible to derive test cases for HuaHana\u00a0models, and exchange information with development productivity tools like GitHub and JIRA.<br class=\"\" \/><br class=\"\" \/>HuaHana pushes the current &#8216;DevSecOps&#8217; paradigm to &#8216;DesignSecOps&#8217; because design models are not simply forgotten when\u00a0development commences, but integrated into development and testing activities. This makes it possible to use continuous integration testing to evaluate the\u00a0impact of changes to usability expectations or contexts of use.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Shamal Faily has recently been awarded funding through Innovate UK&#8217;s Cybersecurity Academic Startup Programme\u00a0to develop value propositions around a commercial derivative of the open-source CAIRIS\u00a0called HuaHana: a productivity platform for usable and secure software design. HuaHana will provide tools that usability specialists, security engineers, and software architects can use for contributing design data, and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[],"_links":{"self":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/638"}],"collection":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=638"}],"version-history":[{"count":1,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/638\/revisions"}],"predecessor-version":[{"id":640,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/posts\/638\/revisions\/640"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}