Resultado final
This deliverable is the output of Task 3.5 and it will also be iterative. The deliverable will be composed of a software prototype and a technical design document. This outcome will present the IDE resulting from the integration of KR1, KR3 - KR8. The software will be accompanied by a Technical Specification Report
PIACERE IDE - v2This deliverable is the output of Task 3.5 and it will also be iterative. The deliverable will be composed of a software prototype and a technical design document. This outcome will present the IDE resulting from the integration of KR1, KR3 - KR8. The software will be accompanied by a Technical Specification Report
IaC Code Security and components security Inspection - v1These deliverables will present the outcome of Task T42 and Task T43 Each deliverable will comprise both a software prototype KR6KR7 and a Technical Specification Report The document will include the Security Inspector technical design and implementation aspects The document will also include the Security Inspector technical design and implementation aspects
Canary environment prototype - v3The main outcomes of T5.2 from M1 to M30 will be presented in these deliverables. Each deliverable will have a Technical Specification Report and a software prototype [KR8]. These deliverables will also contain a scientific report on behaviour verification and anti-pattern detection methodologies.
IaC execution platform prototype - v2These deliverables will contain the main outcomes from M1 to M30 of T5.1. It will be an iterative process. Each deliverable will comprise a Technical Specification Report related to the PIACERE IEP as well as a software prototype [KR10]. Details about partial reconfiguration and orchestration mechanisms will also be included.
IaC execution platform prototype - v1These deliverables will contain the main outcomes from M1 to M30 of T5.1. It will be an iterative process. Each deliverable will comprise a Technical Specification Report related to the PIACERE IEP as well as a software prototype [KR10]. Details about partial reconfiguration and orchestration mechanisms will also be included.
IaC execution platform prototype - v3These deliverables will contain the main outcomes from M1 to M30 of T5.1. It will be an iterative process. Each deliverable will comprise a Technical Specification Report related to the PIACERE IEP as well as a software prototype [KR10]. Details about partial reconfiguration and orchestration mechanisms will also be included.
PIACERE run-time monitoring and self-learning, self-healing platform - v2These deliverables will contain the main outcomes from M1 to M30 of T6.1-T6.4 due to the high dependency of all the different tasks. It will include the monitoring stack coming from task 6.1 with all the time series data collected as well as the monitoring from the security policies from task 6.4, the set of machine learning algorithms (task 6.2) that comprise the self-learning mechanisms and the self-healing strategies (task 6.3) that trigger an optimized redeployment (see WP5). It will be an iterative process. Each deliverable will comprise a Technical Specification Report.
PIACERE DevSecOps Framework - v1This deliverable will integrate all the components developed by the other technical WPs in the PIACERE DevSecOps Framework Different versions of the PIACERE DevSecOps Framework will be provided following an incremental approach The first version will be an initial prototype with the core functionalities implemented the second version will augment these functionalities taking into consideration the feedback coming for the use cases and the final version will include corrections and feedback coming from the implementation of the use cases The software will be accompanied by a Technical Specification Report When appropriate the architecture definition of the DevSecOps framework will be updated
PIACERE run-time monitoring and self-learning, self-healing platform - v1These deliverables will contain the main outcomes from M1 to M30 of T6.1-T6.4 due to the high dependency of all the different tasks. It will include the monitoring stack coming from task 6.1 with all the time series data collected as well as the monitoring from the security policies from task 6.4, the set of machine learning algorithms (task 6.2) that comprise the self-learning mechanisms and the self-healing strategies (task 6.3) that trigger an optimized redeployment (see WP5). It will be an iterative process. Each deliverable will comprise a Technical Specification Report.
PIACERE DevSecOps Framework - v3This deliverable will integrate all the components developed by the other technical WPs in the PIACERE DevSecOps Framework. Different versions of the PIACERE DevSecOps Framework will be provided following an incremental approach. The first version will be an initial prototype with the core functionalities implemented; the second version will augment these functionalities taking into consideration the feedback coming for the use cases and the final version will include corrections and feedback coming from the implementation of the use cases. The software will be accompanied by a Technical Specification Report. When appropriate, the architecture definition of the DevSecOps framework will be updated
IaC Code Security and components security Inspection - v3These deliverables will present the outcome of Task T4.2 and Task T4.3 Each deliverable will comprise both a software prototype [KR6-KR7] and a Technical Specification Report. The document will include the Security Inspector technical design and implementation aspects. The document will also include the Security Inspector technical design and implementation aspects.
Infrastructural code generation - v1These deliverables will present the outcome of Task T34 Each deliverable will comprise both a software prototype KR3 and a Technical Specification Report The document will include the ICG technical design and will report related research results
PIACERE Abstractions, DOML and DOML-E - v3This deliverable is the output of tasks 3.1, 3.2 and 3.3. It will contain the metamodel and the corresponding semantic and machine-readable descriptions of the aspects that are relevant to the main phases of the IaC lifecycle seamlessly integrated with the design and development of the IaC lifecycle. This metamodel will be then presented as an end-user language enabling the modelling of the different elements needed for the infrastructure provisioning, configuration management and deployment, the deployable infrastructural components, constraints and so on. The various iterations will seek and take into consideration the feedback from PIACERE’s end users and, possibly, other users outside the project to ensure that the language is sufficiently powerful and simple to use.
IOP prototype - v2The main outcome of T5.3 from M1 to M30 will be presented in this deliverable. Each deliverable will have a Technical Specification Report and a software prototype [KR9], including the explanation of the algorithms.
IOP prototype - v3The main outcome of T5.3 from M1 to M30 will be presented in this deliverable. Each deliverable will have a Technical Specification Report and a software prototype [KR9], including the explanation of the algorithms.
PIACERE run-time monitoring and self-learning, self-healing platform - v3These deliverables will contain the main outcomes from M1 to M30 of T6.1-T6.4 due to the high dependency of all the different tasks. It will include the monitoring stack coming from task 6.1 with all the time series data collected as well as the monitoring from the security policies from task 6.4, the set of machine learning algorithms (task 6.2) that comprise the self-learning mechanisms and the self-healing strategies (task 6.3) that trigger an optimized redeployment (see WP5). It will be an iterative process. Each deliverable will comprise a Technical Specification Report.
Infrastructural model and code verification - v3These deliverables will present the outcome of Task T4.1. Each deliverable will comprise both a software prototype [KR5] and a Technical Specification Report. The document will include the VT technical design and will report related research results.
PIACERE Abstractions, DOML and DOML-E - v1This deliverable is the output of tasks 3.1, 3.2 and 3.3. It will contain the metamodel and the corresponding semantic and machine-readable descriptions of the aspects that are relevant to the main phases of the IaC lifecycle seamlessly integrated with the design and development of the IaC lifecycle. This metamodel will be then presented as an end-user language enabling the modelling of the different elements needed for the infrastructure provisioning, configuration management and deployment, the deployable infrastructural components, constraints and so on. The various iterations will seek and take into consideration the feedback from PIACERE’s end users and, possibly, other users outside the project to ensure that the language is sufficiently powerful and simple to use.
Canary environment prototype - v2The main outcomes of T5.2 from M1 to M30 will be presented in these deliverables. Each deliverable will have a Technical Specification Report and a software prototype [KR8]. These deliverables will also contain a scientific report on behaviour verification and anti-pattern detection methodologies.
PIACERE IDE - v1This deliverable is the output of Task 3.5 and it will also be iterative. The deliverable will be composed of a software prototype and a technical design document. This outcome will present the IDE resulting from the integration of KR1, KR3 - KR8. The software will be accompanied by a Technical Specification Report
IaC Code Security and components security Inspection - v2These deliverables will present the outcome of Task T4.2 and Task T4.3 Each deliverable will comprise both a software prototype [KR6-KR7] and a Technical Specification Report. The document will include the Security Inspector technical design and implementation aspects. The document will also include the Security Inspector technical design and implementation aspects.
Infrastructural model and code verification - v1These deliverables will present the outcome of Task T41 Each deliverable will comprise both a software prototype KR5 and a Technical Specification Report The document will include the VT technical design and will report related research results
PIACERE Abstractions, DOML and DOML-E - v2This deliverable is the output of tasks 3.1, 3.2 and 3.3. It will contain the metamodel and the corresponding semantic and machine-readable descriptions of the aspects that are relevant to the main phases of the IaC lifecycle seamlessly integrated with the design and development of the IaC lifecycle. This metamodel will be then presented as an end-user language enabling the modelling of the different elements needed for the infrastructure provisioning, configuration management and deployment, the deployable infrastructural components, constraints and so on. The various iterations will seek and take into consideration the feedback from PIACERE’s end users and, possibly, other users outside the project to ensure that the language is sufficiently powerful and simple to use.
IOP prototype - v1The main outcome of T5.3 from M1 to M30 will be presented in this deliverable. Each deliverable will have a Technical Specification Report and a software prototype [KR9], including the explanation of the algorithms.
PIACERE DevSecOps Framework - v2This deliverable will integrate all the components developed by the other technical WPs in the PIACERE DevSecOps Framework. Different versions of the PIACERE DevSecOps Framework will be provided following an incremental approach. The first version will be an initial prototype with the core functionalities implemented; the second version will augment these functionalities taking into consideration the feedback coming for the use cases and the final version will include corrections and feedback coming from the implementation of the use cases. The software will be accompanied by a Technical Specification Report. When appropriate, the architecture definition of the DevSecOps framework will be updated
Infrastructural code generation - v2These deliverables will present the outcome of Task T3.4. Each deliverable will comprise both a software prototype [KR3] and a Technical Specification Report. The document will include the ICG technical design and will report related research results.
Canary environment prototype - v1The main outcomes of T52 from M1 to M30 will be presented in these deliverables Each deliverable will have a Technical Specification Report and a software prototype KR8 These deliverables will also contain a scientific report on behaviour verification and antipattern detection methodologies
Infrastructural model and code verification - v2These deliverables will present the outcome of Task T4.1. Each deliverable will comprise both a software prototype [KR5] and a Technical Specification Report. The document will include the VT technical design and will report related research results.
Infrastructural code generation - v3These deliverables will present the outcome of Task T3.4. Each deliverable will comprise both a software prototype [KR3] and a Technical Specification Report. The document will include the ICG technical design and will report related research results.
This deliverable will explain the dissemination and communication activities followed during the reporting periods as well as the results from these activities and will update projects dissemination and communication plan respectively This report will also contain the relevant activities executed to foster a close collaboration with projects related to PIACERE as well as future networking plans
PIACERE DevSecOps Framework Requirements specification, architecture and integration strategy - v2This deliverable is the result of Task 2.1, Task 2.2. and Task 2.3. This document will contain 1) all the functional, non-functional and technical requirements of the PIACERE DevSecOps Framework and of all the components to be developed in the context of the technical WPs (WP3, WP4, WP5 and WP6). This deliverable is tightly related to the corresponding use cases requirements deliverable in WP7 (D7.1). 2) the architecture of the DevSecOps framework [KR13] and the workflow, 3) the requirements of the DevOps infrastructure to be used in the development of PIACERE as well as the definition of the strategy and steps to be followed for the continuous integration of the PIACERE solution. This deliverable is the result of Task 2.1 and Task 2.3.
Communication, Networking Plan and Dissemination StrategyThis deliverable has a threefold goal Firstly it will define the way in which the different communities scientific commercial general public will be targeted as well as the social media will be used Secondly it will detail the specific plan for networking activities with external entities including the specific working group this project will participate Finally it will describe the project dissemination strategy to be adopted throughout the project lifetime The release of the respective report is considered one of the key milestones of the project
Dissemination, communication and networking report - Report - v2This deliverable will explain the dissemination and communication activities followed during the reporting periods as well as the results from these activities and will update project’s dissemination and communication plan respectively. This report will also contain the relevant activities executed to foster a close collaboration with projects related to PIACERE, as well as future networking plans.
PIACERE DevSecOps Framework Requirements specification, architecture and integration strategy - v1This deliverable is the result of Task 21 Task 22 and Task 23 This document will contain 1 all the functional nonfunctional and technical requirements of the PIACERE DevSecOps Framework and of all the components to be developed in the context of the technical WPs WP3 WP4 WP5 and WP6 This deliverable is tightly related to the corresponding use cases requirements deliverable in WP7 D71 2 the architecture of the DevSecOps framework KR13 and the workflow 3 the requirements of the DevOps infrastructure to be used in the development of PIACERE as well as the definition of the strategy and steps to be followed for the continuous integration of the PIACERE solution This deliverable is the result of Task 21 and Task 23
The initial version of the brochure and project website will include at least project objectives and contact details PIACERE website will be setup by the Project Leader TECNALIA and continuously enhanced by all partners to include public downloadable results and links to related news and initiatives
Publicaciones
Autores:
Juncal Alonso, Maider Huarte, Leire Orue-Echevarria
Publicado en:
International Journal of Computational Science and Engineering (IJCSE), 2020, ISSN 1742-7185
Editor:
Inderscience Enterprises
Autores:
Alonso, Juncal; Huarte, Maider; Orue-Echevarria, Leire
Publicado en:
MDPI Applied Sciences, Edición 1, 2022, ISSN 2076-3417
Editor:
MDPI
DOI:
10.3390/app12094347
Autores:
Bin Xiang, Jocelyne Elias, Fabio Martignon, Elisabetta Di Nitto
Publicado en:
Data in Brief, Edición 39, 2021, ISSN 2352-3409
Editor:
Elsevier BV
Autores:
Juncal Alonso; Leire Orue-Echevarria; Valentina Casola; Ana Isabel Torre; Maider Huarte; Eneko Osaba; Jesus L. Lobo
Publicado en:
Journal of Cloud Computing, Edición 12, 2023, ISSN 2192-113X
Editor:
Springer Science + Business Media
DOI:
10.1186/s13677-022-00367-6
Autores:
Bin Xiang; Jocelyne Elias; Fabio Martignon; Elisabetta Di Nitto
Publicado en:
IEEE Transactions on Cloud Computing, Edición 11, 2021, Página(s) 620-638, ISSN 2168-7161
Editor:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/tcc.2021.3107022
Autores:
Xiang, Bin; Elias, Jocelyne; Martignon, Fabio; Di Nitto, Elisabetta
Publicado en:
IEEE Transactions on Cloud Computing, Edición 3, 2021, ISSN 2168-7161
Editor:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.5281/zenodo.5495727
Autores:
Juncal Alonso; Leire Orue-Echevarria; Eneko Osaba; Jesus L. Lobo; Iñigo Martinez; Josu Diaz de Arcaya; Iñaki Etxaniz
Publicado en:
Information 12(8), Edición 1, 2021, ISSN 2078-2489
Editor:
Multidisciplinary Digital Publishing Institute (MDPI)
DOI:
10.3390/info12080308
Autores:
Juncal Alonso; Radoslaw Piliszek; Matija Cankar
Publicado en:
Special Edición on Infrastructure-as-Code Unleashed, 2021, ISSN 0740-7459
Editor:
Institute of Electrical and Electronics Engineers
Autores:
Michele Chiari; Dino Mandrioli; Francesco Pontiggia; Matteo Pradella
Publicado en:
ACM Transactions on Programming Languages and Systems, 2023, ISSN 0164-0925
Editor:
Association for Computing Machinary, Inc.
DOI:
10.1145/3608443
Autores:
Bin Xiang; Jocelyne Elias; Fabio Martignon; Elisabetta Di Nitto
Publicado en:
Computer Networks, Edición 2, 2021, ISSN 1389-1286
Editor:
Elsevier BV
DOI:
10.5281/zenodo.5495557
Autores:
Nedeltcheva, Galia Novakova, Bin Xiang, Laurentiu Niculut, and Debora Benedetto
Publicado en:
FASTContinuum 2023 workshop co-located at ICPE 2023, International Conference on Performance Engineering (ICPE 2023), 2023, Página(s) 189-193
Editor:
ACM Digital Library
DOI:
10.1145/3578245.3584937
Autores:
Antić, Jan, Joao Pita Costa, Aleš Černivec, Matija Cankar, Tomaž Martinčič, Aljaž Potočnik, Gorka Benguria Elguezabal, Nelly Leligou, and Ismael Torres Boigues.
Publicado en:
4th International Workshop on Information and Operational Technology Security (IOSEC 2023), 2023
Editor:
IEEE Xplore Digital Library
DOI:
10.1109/drcn57075.2023.10108105
Autores:
Josu Diaz-de-Arcaya, Eneko Osaba, Gorka Benguria, Iñaki Etxaniz, Jesus L. Lobo, Juncal Alonso, Ana I. Torre-Bastida, Aitor Almeida
Publicado en:
FASTContinuum 2023 workshop co-located at ICPE 2023, International Conference on Performance Engineering (ICPE 2023), 2023, Página(s) 195-197
Editor:
ACM Digital Library
DOI:
10.1145/3578245.3584938
Autores:
López Lobo, Jesus; Laña, Ibai; Osaba, Eneko; Del Ser, Javier
Publicado en:
IEEE Conference on Artificial Intelligence (IEEE CAI 2023), 2023
Editor:
IEEE
DOI:
10.1109/cai54212.2023.00081
Autores:
Osaba, E., Diaz-de-Arcaya, J., Orue-Echavarria, L., Alonso, J., López Lobo, J., Benguría G., & Etxaniz I.
Publicado en:
Proceedings of the the Genetic and Evolutionary Computation Conference (GECCO 2022), 2022, Página(s) 71-72
Editor:
ACM Digital Library
DOI:
10.1145/3520304.3533938
Autores:
Chiari, Michele; Di Nitto, Elisabetta; Noguero Mucientes, Adrián; Xiang, Bin
Publicado en:
European Conference On Service-Oriented And Cloud Computing, Edición 1, 2022
Editor:
ESOCC
DOI:
10.5281/zenodo.6697369
Autores:
Chiari, Michele; De Pascalis, Michele; Pradella, Matteo
Publicado en:
2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C 2022). First International Workshop on the Foundations of Infrastructure Specification and Testing (FIST 2022), 2022
Editor:
IEEE
DOI:
10.1109/icsa-c54293.2022.00049
Autores:
Juncal Alonso, Christophe Joubert, Leire Orue-Echevarria, Matteo Pradella and Daniel Vladušič
Publicado en:
European Conference On Service-Oriented And Cloud Computing, 2021
Editor:
CEUR
Autores:
Eliseo Villanueva, Ismael Torres, Eneko Osaba, Sergio Canzoneri, Andrea Franchini, Lorenzo Blasi
Publicado en:
Proceedings of the 3rd Eclipse Security, AI, Architecture and Modelling Conference on Cloud to Edge Continuum (eSAAM), 2023, Página(s) 62-66
Editor:
ACM Digital Library
DOI:
10.1145/3624486.3624507
Autores:
Eneko Osaba, Gorka Benguria, Jesus L. Lobo, Josu Diaz-de-Arcaya, Juncal Alonso, Iñaki Etxaniz
Publicado en:
The 6th International Conference on Computational Intelligence and Intelligent Systems (CIIS 2023), 2023
Editor:
ACM
Autores:
Galia Nedeltcheva, Alfonso De La Fuente Ruiz, Leire Orue-Echevarria Arrieta, Nejc Bat, Lorenzo Blasi
Publicado en:
IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 2022
Editor:
IEEE
DOI:
10.1109/icsa-c54293.2022.00048
Autores:
Alfonso de la Fuente Ruiz, Galia Novakova Nedeltcheva
Publicado en:
IEEE 20th International Conference on Software Architecture Companion (ICSA-C 2023). Second International Workshop on the Foundations of Infrastructure Specification and Testing (FIST 2023), 2023
Editor:
IEEE Xplore Digital Library
DOI:
10.1109/icsa-c57050.2023.00075
Autores:
Eneko Osaba; Josu Diaz-De-Arcaya; Juncal Alonso; Jesus L. Lobo; Gorka Benguria; Iñaki Etxaniz
Publicado en:
Proceedings of the 1st International Conference on Computer and Communications Management (ICCCM 2023), 2023
Editor:
ACM
DOI:
10.1145/3617733.3617777
Autores:
M. Cankar, N. Petrovic, J. Pita Costa, A. Cernivec, J. Antic, T. Martincic, D. Stepec. Security in DevSecOps
Publicado en:
FASTContinuum 2023 workshop, co-located with the International Conference on Performance Engineering (ICPE 2023), 2023, Página(s) 201-205
Editor:
ACM Digital Library
DOI:
10.1145/3578245.3584943
Autores:
Eneko Osaba, Josu Diaz-de-Arcaya, Juncal Alonso, Jesus L. Lobo, Gorka Benguria, Iñaki Etxaniz
Publicado en:
Proceedings of the Eighth International Congress on Information and Communication Technology (ICICT 2023), 2023
Editor:
SpringerLink
DOI:
10.1007/978-981-99-3043-2_25
Autores:
Michele Chiari, Bin Xiang, Galia Nedeltcheva, Elisabetta Di Nitto, Lorenzo Blasi, Debora Benedetto, Laurentiu Niculut
Publicado en:
Proceedings of the 35th International Conference on Advanced Information Systems Engineering (CAiSE 2023), 2023
Editor:
Springer
DOI:
10.1007/978-3-031-34560-9_18
Autores:
Nenad Petrovic; Matija Cankar; Anze Luzar
Publicado en:
Crossref, Edición 1, 2022
Editor:
IEEEXplore
DOI:
10.1109/telfor56187.2022.9983681
Autores:
Michele Chiari; Elisabetta Di Nitto; Adrián Noguero Mucientes; Bin Xiang
Publicado en:
Proceedings of the European Conference on Service-Oriented and Cloud Computing (ESOCC 2022), 2022
Editor:
SpringerLink
DOI:
10.1007/978-3-031-23298-5_8
Buscando datos de OpenAIRE...
Se ha producido un error en la búsqueda de datos de OpenAIRE
No hay resultados disponibles