Skip to main content
European Commission logo
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Programming trustworthy Infrastructure As Code in a sEcuRE framework

Resultado final

PIACERE IDE - v3

This deliverable is the output of Task 3.5 and it will also be iterative. The deliverable will be composed of a software prototype and a technical design document. This outcome will present the IDE resulting from the integration of KR1, KR3 - KR8. The software will be accompanied by a Technical Specification Report

PIACERE IDE - v2

This deliverable is the output of Task 3.5 and it will also be iterative. The deliverable will be composed of a software prototype and a technical design document. This outcome will present the IDE resulting from the integration of KR1, KR3 - KR8. The software will be accompanied by a Technical Specification Report

IaC Code Security and components security Inspection - v1

These deliverables will present the outcome of Task T42 and Task T43 Each deliverable will comprise both a software prototype KR6KR7 and a Technical Specification Report The document will include the Security Inspector technical design and implementation aspects The document will also include the Security Inspector technical design and implementation aspects

Canary environment prototype - v3

The main outcomes of T5.2 from M1 to M30 will be presented in these deliverables. Each deliverable will have a Technical Specification Report and a software prototype [KR8]. These deliverables will also contain a scientific report on behaviour verification and anti-pattern detection methodologies.

IaC execution platform prototype - v2

These deliverables will contain the main outcomes from M1 to M30 of T5.1. It will be an iterative process. Each deliverable will comprise a Technical Specification Report related to the PIACERE IEP as well as a software prototype [KR10]. Details about partial reconfiguration and orchestration mechanisms will also be included.

IaC execution platform prototype - v1

These deliverables will contain the main outcomes from M1 to M30 of T5.1. It will be an iterative process. Each deliverable will comprise a Technical Specification Report related to the PIACERE IEP as well as a software prototype [KR10]. Details about partial reconfiguration and orchestration mechanisms will also be included.

IaC execution platform prototype - v3

These deliverables will contain the main outcomes from M1 to M30 of T5.1. It will be an iterative process. Each deliverable will comprise a Technical Specification Report related to the PIACERE IEP as well as a software prototype [KR10]. Details about partial reconfiguration and orchestration mechanisms will also be included.

PIACERE run-time monitoring and self-learning, self-healing platform - v2

These deliverables will contain the main outcomes from M1 to M30 of T6.1-T6.4 due to the high dependency of all the different tasks. It will include the monitoring stack coming from task 6.1 with all the time series data collected as well as the monitoring from the security policies from task 6.4, the set of machine learning algorithms (task 6.2) that comprise the self-learning mechanisms and the self-healing strategies (task 6.3) that trigger an optimized redeployment (see WP5). It will be an iterative process. Each deliverable will comprise a Technical Specification Report.

PIACERE DevSecOps Framework - v1

This deliverable will integrate all the components developed by the other technical WPs in the PIACERE DevSecOps Framework Different versions of the PIACERE DevSecOps Framework will be provided following an incremental approach The first version will be an initial prototype with the core functionalities implemented the second version will augment these functionalities taking into consideration the feedback coming for the use cases and the final version will include corrections and feedback coming from the implementation of the use cases The software will be accompanied by a Technical Specification Report When appropriate the architecture definition of the DevSecOps framework will be updated

PIACERE run-time monitoring and self-learning, self-healing platform - v1

These deliverables will contain the main outcomes from M1 to M30 of T6.1-T6.4 due to the high dependency of all the different tasks. It will include the monitoring stack coming from task 6.1 with all the time series data collected as well as the monitoring from the security policies from task 6.4, the set of machine learning algorithms (task 6.2) that comprise the self-learning mechanisms and the self-healing strategies (task 6.3) that trigger an optimized redeployment (see WP5). It will be an iterative process. Each deliverable will comprise a Technical Specification Report.

PIACERE DevSecOps Framework - v3

This deliverable will integrate all the components developed by the other technical WPs in the PIACERE DevSecOps Framework. Different versions of the PIACERE DevSecOps Framework will be provided following an incremental approach. The first version will be an initial prototype with the core functionalities implemented; the second version will augment these functionalities taking into consideration the feedback coming for the use cases and the final version will include corrections and feedback coming from the implementation of the use cases. The software will be accompanied by a Technical Specification Report. When appropriate, the architecture definition of the DevSecOps framework will be updated

IaC Code Security and components security Inspection - v3

These deliverables will present the outcome of Task T4.2 and Task T4.3 Each deliverable will comprise both a software prototype [KR6-KR7] and a Technical Specification Report. The document will include the Security Inspector technical design and implementation aspects. The document will also include the Security Inspector technical design and implementation aspects.

Infrastructural code generation - v1

These deliverables will present the outcome of Task T34 Each deliverable will comprise both a software prototype KR3 and a Technical Specification Report The document will include the ICG technical design and will report related research results

PIACERE Abstractions, DOML and DOML-E - v3

This deliverable is the output of tasks 3.1, 3.2 and 3.3. It will contain the metamodel and the corresponding semantic and machine-readable descriptions of the aspects that are relevant to the main phases of the IaC lifecycle seamlessly integrated with the design and development of the IaC lifecycle. This metamodel will be then presented as an end-user language enabling the modelling of the different elements needed for the infrastructure provisioning, configuration management and deployment, the deployable infrastructural components, constraints and so on. The various iterations will seek and take into consideration the feedback from PIACERE’s end users and, possibly, other users outside the project to ensure that the language is sufficiently powerful and simple to use.

IOP prototype - v2

The main outcome of T5.3 from M1 to M30 will be presented in this deliverable. Each deliverable will have a Technical Specification Report and a software prototype [KR9], including the explanation of the algorithms.

IOP prototype - v3

The main outcome of T5.3 from M1 to M30 will be presented in this deliverable. Each deliverable will have a Technical Specification Report and a software prototype [KR9], including the explanation of the algorithms.

PIACERE run-time monitoring and self-learning, self-healing platform - v3

These deliverables will contain the main outcomes from M1 to M30 of T6.1-T6.4 due to the high dependency of all the different tasks. It will include the monitoring stack coming from task 6.1 with all the time series data collected as well as the monitoring from the security policies from task 6.4, the set of machine learning algorithms (task 6.2) that comprise the self-learning mechanisms and the self-healing strategies (task 6.3) that trigger an optimized redeployment (see WP5). It will be an iterative process. Each deliverable will comprise a Technical Specification Report.

Infrastructural model and code verification - v3

These deliverables will present the outcome of Task T4.1. Each deliverable will comprise both a software prototype [KR5] and a Technical Specification Report. The document will include the VT technical design and will report related research results.

PIACERE Abstractions, DOML and DOML-E - v1

This deliverable is the output of tasks 3.1, 3.2 and 3.3. It will contain the metamodel and the corresponding semantic and machine-readable descriptions of the aspects that are relevant to the main phases of the IaC lifecycle seamlessly integrated with the design and development of the IaC lifecycle. This metamodel will be then presented as an end-user language enabling the modelling of the different elements needed for the infrastructure provisioning, configuration management and deployment, the deployable infrastructural components, constraints and so on. The various iterations will seek and take into consideration the feedback from PIACERE’s end users and, possibly, other users outside the project to ensure that the language is sufficiently powerful and simple to use.

Canary environment prototype - v2

The main outcomes of T5.2 from M1 to M30 will be presented in these deliverables. Each deliverable will have a Technical Specification Report and a software prototype [KR8]. These deliverables will also contain a scientific report on behaviour verification and anti-pattern detection methodologies.

PIACERE IDE - v1

This deliverable is the output of Task 3.5 and it will also be iterative. The deliverable will be composed of a software prototype and a technical design document. This outcome will present the IDE resulting from the integration of KR1, KR3 - KR8. The software will be accompanied by a Technical Specification Report

IaC Code Security and components security Inspection - v2

These deliverables will present the outcome of Task T4.2 and Task T4.3 Each deliverable will comprise both a software prototype [KR6-KR7] and a Technical Specification Report. The document will include the Security Inspector technical design and implementation aspects. The document will also include the Security Inspector technical design and implementation aspects.

Infrastructural model and code verification - v1

These deliverables will present the outcome of Task T41 Each deliverable will comprise both a software prototype KR5 and a Technical Specification Report The document will include the VT technical design and will report related research results

PIACERE Abstractions, DOML and DOML-E - v2

This deliverable is the output of tasks 3.1, 3.2 and 3.3. It will contain the metamodel and the corresponding semantic and machine-readable descriptions of the aspects that are relevant to the main phases of the IaC lifecycle seamlessly integrated with the design and development of the IaC lifecycle. This metamodel will be then presented as an end-user language enabling the modelling of the different elements needed for the infrastructure provisioning, configuration management and deployment, the deployable infrastructural components, constraints and so on. The various iterations will seek and take into consideration the feedback from PIACERE’s end users and, possibly, other users outside the project to ensure that the language is sufficiently powerful and simple to use.

IOP prototype - v1

The main outcome of T5.3 from M1 to M30 will be presented in this deliverable. Each deliverable will have a Technical Specification Report and a software prototype [KR9], including the explanation of the algorithms.

PIACERE DevSecOps Framework - v2

This deliverable will integrate all the components developed by the other technical WPs in the PIACERE DevSecOps Framework. Different versions of the PIACERE DevSecOps Framework will be provided following an incremental approach. The first version will be an initial prototype with the core functionalities implemented; the second version will augment these functionalities taking into consideration the feedback coming for the use cases and the final version will include corrections and feedback coming from the implementation of the use cases. The software will be accompanied by a Technical Specification Report. When appropriate, the architecture definition of the DevSecOps framework will be updated

Infrastructural code generation - v2

These deliverables will present the outcome of Task T3.4. Each deliverable will comprise both a software prototype [KR3] and a Technical Specification Report. The document will include the ICG technical design and will report related research results.

Canary environment prototype - v1

The main outcomes of T52 from M1 to M30 will be presented in these deliverables Each deliverable will have a Technical Specification Report and a software prototype KR8 These deliverables will also contain a scientific report on behaviour verification and antipattern detection methodologies

Infrastructural model and code verification - v2

These deliverables will present the outcome of Task T4.1. Each deliverable will comprise both a software prototype [KR5] and a Technical Specification Report. The document will include the VT technical design and will report related research results.

Infrastructural code generation - v3

These deliverables will present the outcome of Task T3.4. Each deliverable will comprise both a software prototype [KR3] and a Technical Specification Report. The document will include the ICG technical design and will report related research results.

Dissemination, communication and networking report - Report - v1

This deliverable will explain the dissemination and communication activities followed during the reporting periods as well as the results from these activities and will update projects dissemination and communication plan respectively This report will also contain the relevant activities executed to foster a close collaboration with projects related to PIACERE as well as future networking plans

PIACERE DevSecOps Framework Requirements specification, architecture and integration strategy - v2

This deliverable is the result of Task 2.1, Task 2.2. and Task 2.3. This document will contain 1) all the functional, non-functional and technical requirements of the PIACERE DevSecOps Framework and of all the components to be developed in the context of the technical WPs (WP3, WP4, WP5 and WP6). This deliverable is tightly related to the corresponding use cases requirements deliverable in WP7 (D7.1). 2) the architecture of the DevSecOps framework [KR13] and the workflow, 3) the requirements of the DevOps infrastructure to be used in the development of PIACERE as well as the definition of the strategy and steps to be followed for the continuous integration of the PIACERE solution. This deliverable is the result of Task 2.1 and Task 2.3.

Communication, Networking Plan and Dissemination Strategy

This deliverable has a threefold goal Firstly it will define the way in which the different communities scientific commercial general public will be targeted as well as the social media will be used Secondly it will detail the specific plan for networking activities with external entities including the specific working group this project will participate Finally it will describe the project dissemination strategy to be adopted throughout the project lifetime The release of the respective report is considered one of the key milestones of the project

Dissemination, communication and networking report - Report - v2

This deliverable will explain the dissemination and communication activities followed during the reporting periods as well as the results from these activities and will update project’s dissemination and communication plan respectively. This report will also contain the relevant activities executed to foster a close collaboration with projects related to PIACERE, as well as future networking plans.

PIACERE DevSecOps Framework Requirements specification, architecture and integration strategy - v1

This deliverable is the result of Task 21 Task 22 and Task 23 This document will contain 1 all the functional nonfunctional and technical requirements of the PIACERE DevSecOps Framework and of all the components to be developed in the context of the technical WPs WP3 WP4 WP5 and WP6 This deliverable is tightly related to the corresponding use cases requirements deliverable in WP7 D71 2 the architecture of the DevSecOps framework KR13 and the workflow 3 the requirements of the DevOps infrastructure to be used in the development of PIACERE as well as the definition of the strategy and steps to be followed for the continuous integration of the PIACERE solution This deliverable is the result of Task 21 and Task 23

PIACERE brochure and public website

The initial version of the brochure and project website will include at least project objectives and contact details PIACERE website will be setup by the Project Leader TECNALIA and continuously enhanced by all partners to include public downloadable results and links to related news and initiatives

Publicaciones

ACSmI: A solution to address the challenges of Cloud services federation and monitoring towards the Cloud Continuum

Autores: Juncal Alonso, Maider Huarte, Leire Orue-Echevarria
Publicado en: International Journal of Computational Science and Engineering (IJCSE), 2020, ISSN 1742-7185
Editor: Inderscience Enterprises

CloudOps: Towards the Operationalization of the Cloud Continuum: Concepts, Challenges and a Reference Framework

Autores: Alonso, Juncal; Huarte, Maider; Orue-Echevarria, Leire
Publicado en: MDPI Applied Sciences, Edición 1, 2022, ISSN 2076-3417
Editor: MDPI
DOI: 10.3390/app12094347

A dataset for mobile edge computing network topologies

Autores: Bin Xiang, Jocelyne Elias, Fabio Martignon, Elisabetta Di Nitto
Publicado en: Data in Brief, Edición 39, 2021, ISSN 2352-3409
Editor: Elsevier BV

Understanding the challenges and novel architectural models of multi-cloud native applications – a systematic literature review

Autores: Juncal Alonso; Leire Orue-Echevarria; Valentina Casola; Ana Isabel Torre; Maider Huarte; Eneko Osaba; Jesus L. Lobo
Publicado en: Journal of Cloud Computing, Edición 12, 2023, ISSN 2192-113X
Editor: Springer Science + Business Media
DOI: 10.1186/s13677-022-00367-6

Joint Planning of Network Slicing and Mobile Edge Computing: Models and Algorithms.

Autores: Bin Xiang; Jocelyne Elias; Fabio Martignon; Elisabetta Di Nitto
Publicado en: IEEE Transactions on Cloud Computing, Edición 11, 2021, Página(s) 620-638, ISSN 2168-7161
Editor: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/tcc.2021.3107022

Joint Planning of Network Slicing and Mobile Edge Computing: Models and Algorithms

Autores: Xiang, Bin; Elias, Jocelyne; Martignon, Fabio; Di Nitto, Elisabetta
Publicado en: IEEE Transactions on Cloud Computing, Edición 3, 2021, ISSN 2168-7161
Editor: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.5281/zenodo.5495727

Optimization and Prediction Techniques for Self-Healing and Self-Learning Applications in a Trustworthy Cloud Continuum

Autores: Juncal Alonso; Leire Orue-Echevarria; Eneko Osaba; Jesus L. Lobo; Iñigo Martinez; Josu Diaz de Arcaya; Iñaki Etxaniz
Publicado en: Information 12(8), Edición 1, 2021, ISSN 2078-2489
Editor: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/info12080308

Embracing IaC Through the DevSecOps Philosophy: Concepts, Challenges, and a Reference Framework

Autores: Juncal Alonso; Radoslaw Piliszek; Matija Cankar
Publicado en: Special Edición on Infrastructure-as-Code Unleashed, 2021, ISSN 0740-7459
Editor: Institute of Electrical and Electronics Engineers

A Model Checker for Operator Precedence Languages

Autores: Michele Chiari; Dino Mandrioli; Francesco Pontiggia; Matteo Pradella
Publicado en: ACM Transactions on Programming Languages and Systems, 2023, ISSN 0164-0925
Editor: Association for Computing Machinary, Inc.
DOI: 10.1145/3608443

Resource calendaring for Mobile Edge Computing: Centralized and decentralized optimization approaches

Autores: Bin Xiang; Jocelyne Elias; Fabio Martignon; Elisabetta Di Nitto
Publicado en: Computer Networks, Edición 2, 2021, ISSN 1389-1286
Editor: Elsevier BV
DOI: 10.5281/zenodo.5495557

Challenges Towards Modeling and Generating Infrastructure-as-Code

Autores: Nedeltcheva, Galia Novakova, Bin Xiang, Laurentiu Niculut, and Debora Benedetto
Publicado en: FASTContinuum 2023 workshop co-located at ICPE 2023, International Conference on Performance Engineering (ICPE 2023), 2023, Página(s) 189-193
Editor: ACM Digital Library
DOI: 10.1145/3578245.3584937

Runtime security monitoring by an interplay between rule matching and deep learning-based anomaly detection on logs

Autores: Antić, Jan, Joao Pita Costa, Aleš Černivec, Matija Cankar, Tomaž Martinčič, Aljaž Potočnik, Gorka Benguria Elguezabal, Nelly Leligou, and Ismael Torres Boigues.
Publicado en: 4th International Workshop on Information and Operational Technology Security (IOSEC 2023), 2023
Editor: IEEE Xplore Digital Library
DOI: 10.1109/drcn57075.2023.10108105

IEM: A Unified Lifecycle Orchestrator for Multilingual IaC Deployments

Autores: Josu Diaz-de-Arcaya, Eneko Osaba, Gorka Benguria, Iñaki Etxaniz, Jesus L. Lobo, Juncal Alonso, Ana I. Torre-Bastida, Aitor Almeida
Publicado en: FASTContinuum 2023 workshop co-located at ICPE 2023, International Conference on Performance Engineering (ICPE 2023), 2023, Página(s) 195-197
Editor: ACM Digital Library
DOI: 10.1145/3578245.3584938

On the Connection between Concept Drift and Uncertainty in Industrial Artificial Intelligence

Autores: López Lobo, Jesus; Laña, Ibai; Osaba, Eneko; Del Ser, Javier
Publicado en: IEEE Conference on Artificial Intelligence (IEEE CAI 2023), 2023
Editor: IEEE
DOI: 10.1109/cai54212.2023.00081

PIACERE Project: Description and Prototype for Optimizing Infrastructure as Code Deployment Configurations

Autores: Osaba, E., Diaz-de-Arcaya, J., Orue-Echavarria, L., Alonso, J., López Lobo, J., Benguría G., & Etxaniz I.
Publicado en: Proceedings of the the Genetic and Evolutionary Computation Conference (GECCO 2022), 2022, Página(s) 71-72
Editor: ACM Digital Library
DOI: 10.1145/3520304.3533938

Developing a New DevOps Modelling Language to Support the Creation of Infrastructure as Code

Autores: Chiari, Michele; Di Nitto, Elisabetta; Noguero Mucientes, Adrián; Xiang, Bin
Publicado en: European Conference On Service-Oriented And Cloud Computing, Edición 1, 2022
Editor: ESOCC
DOI: 10.5281/zenodo.6697369

Static Analysis of Infrastructure as Code: a Survey

Autores: Chiari, Michele; De Pascalis, Michele; Pradella, Matteo
Publicado en: 2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C 2022). First International Workshop on the Foundations of Infrastructure Specification and Testing (FIST 2022), 2022
Editor: IEEE
DOI: 10.1109/icsa-c54293.2022.00049

PIACERE: Programming trustworthy Infrastructure as Code in a Secure Framework

Autores: Juncal Alonso, Christophe Joubert, Leire Orue-Echevarria, Matteo Pradella and Daniel Vladušič
Publicado en: European Conference On Service-Oriented And Cloud Computing, 2021
Editor: CEUR

PIACERE Integrated Development Environment

Autores: Eliseo Villanueva, Ismael Torres, Eneko Osaba, Sergio Canzoneri, Andrea Franchini, Lorenzo Blasi
Publicado en: Proceedings of the 3rd Eclipse Security, AI, Architecture and Modelling Conference on Cloud to Edge Continuum (eSAAM), 2023, Página(s) 62-66
Editor: ACM Digital Library
DOI: 10.1145/3624486.3624507

Optimizing IaC Configurations: a Case Study Using Nature-inspired Computing

Autores: Eneko Osaba, Gorka Benguria, Jesus L. Lobo, Josu Diaz-de-Arcaya, Juncal Alonso, Iñaki Etxaniz
Publicado en: The 6th International Conference on Computational Intelligence and Intelligent Systems (CIIS 2023), 2023
Editor: ACM

Towards Supporting the Generation of Infrastructure as Code Through Modelling Approaches – Systematic Literature Review

Autores: Galia Nedeltcheva, Alfonso De La Fuente Ruiz, Leire Orue-Echevarria Arrieta, Nejc Bat, Lorenzo Blasi
Publicado en: IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 2022
Editor: IEEE
DOI: 10.1109/icsa-c54293.2022.00048

Game theory strategies for Open-Source Infrastructure-as-Code

Autores: Alfonso de la Fuente Ruiz, Galia Novakova Nedeltcheva
Publicado en: IEEE 20th International Conference on Software Architecture Companion (ICSA-C 2023). Second International Workshop on the Foundations of Infrastructure Specification and Testing (FIST 2023), 2023
Editor: IEEE Xplore Digital Library
DOI: 10.1109/icsa-c57050.2023.00075

Multiobjective Optimization Analysis for Finding Infrastructure-as-Code Deployment Configurations

Autores: Eneko Osaba; Josu Diaz-De-Arcaya; Juncal Alonso; Jesus L. Lobo; Gorka Benguria; Iñaki Etxaniz
Publicado en: Proceedings of the 1st International Conference on Computer and Communications Management (ICCCM 2023), 2023
Editor: ACM
DOI: 10.1145/3617733.3617777

Security in DevSecOps: Applying tools and machine learning to verifications and monitoring steps

Autores: M. Cankar, N. Petrovic, J. Pita Costa, A. Cernivec, J. Antic, T. Martincic, D. Stepec. Security in DevSecOps
Publicado en: FASTContinuum 2023 workshop, co-located with the International Conference on Performance Engineering (ICPE 2023), 2023, Página(s) 201-205
Editor: ACM Digital Library
DOI: 10.1145/3578245.3584943

An Evolutionary Computation based Platform for Optimizing Infrastructure-As-Code Deployment Configurations

Autores: Eneko Osaba, Josu Diaz-de-Arcaya, Juncal Alonso, Jesus L. Lobo, Gorka Benguria, Iñaki Etxaniz
Publicado en: Proceedings of the Eighth International Congress on Information and Communication Technology (ICICT 2023), 2023
Editor: SpringerLink
DOI: 10.1007/978-981-99-3043-2_25

DOML - A New Modelling Approach To Infrastructure-as-Code

Autores: Michele Chiari, Bin Xiang, Galia Nedeltcheva, Elisabetta Di Nitto, Lorenzo Blasi, Debora Benedetto, Laurentiu Niculut
Publicado en: Proceedings of the 35th International Conference on Advanced Information Systems Engineering (CAiSE 2023), 2023
Editor: Springer
DOI: 10.1007/978-3-031-34560-9_18

Automated Approach to IaC Code Inspection Using Python-Based DevSecOps Tool

Autores: Nenad Petrovic; Matija Cankar; Anze Luzar
Publicado en: Crossref, Edición 1, 2022
Editor: IEEEXplore
DOI: 10.1109/telfor56187.2022.9983681

Developing a New DevOps Modelling Language to Support the Creation of Infrastructure as Code

Autores: Michele Chiari; Elisabetta Di Nitto; Adrián Noguero Mucientes; Bin Xiang
Publicado en: Proceedings of the European Conference on Service-Oriented and Cloud Computing (ESOCC 2022), 2022
Editor: SpringerLink
DOI: 10.1007/978-3-031-23298-5_8

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles