CORDIS fournit des liens vers les livrables publics et les publications des projets HORIZON.
Les liens vers les livrables et les publications des projets du 7e PC, ainsi que les liens vers certains types de résultats spécifiques tels que les jeux de données et les logiciels, sont récupérés dynamiquement sur OpenAIRE .
Livrables
This deliverable is the output of Task 3.5 and it will also be iterative. The deliverable will be composed of a software prototype and a technical design document. This outcome will present the IDE resulting from the integration of KR1, KR3 - KR8. The software will be accompanied by a Technical Specification Report
PIACERE IDE - v2 (s’ouvre dans une nouvelle fenêtre)This deliverable is the output of Task 3.5 and it will also be iterative. The deliverable will be composed of a software prototype and a technical design document. This outcome will present the IDE resulting from the integration of KR1, KR3 - KR8. The software will be accompanied by a Technical Specification Report
IaC Code Security and components security Inspection - v1 (s’ouvre dans une nouvelle fenêtre)These deliverables will present the outcome of Task T42 and Task T43 Each deliverable will comprise both a software prototype KR6KR7 and a Technical Specification Report The document will include the Security Inspector technical design and implementation aspects The document will also include the Security Inspector technical design and implementation aspects
Canary environment prototype - v3 (s’ouvre dans une nouvelle fenêtre)The main outcomes of T5.2 from M1 to M30 will be presented in these deliverables. Each deliverable will have a Technical Specification Report and a software prototype [KR8]. These deliverables will also contain a scientific report on behaviour verification and anti-pattern detection methodologies.
IaC execution platform prototype - v2 (s’ouvre dans une nouvelle fenêtre)These deliverables will contain the main outcomes from M1 to M30 of T5.1. It will be an iterative process. Each deliverable will comprise a Technical Specification Report related to the PIACERE IEP as well as a software prototype [KR10]. Details about partial reconfiguration and orchestration mechanisms will also be included.
IaC execution platform prototype - v1 (s’ouvre dans une nouvelle fenêtre)These deliverables will contain the main outcomes from M1 to M30 of T5.1. It will be an iterative process. Each deliverable will comprise a Technical Specification Report related to the PIACERE IEP as well as a software prototype [KR10]. Details about partial reconfiguration and orchestration mechanisms will also be included.
IaC execution platform prototype - v3 (s’ouvre dans une nouvelle fenêtre)These deliverables will contain the main outcomes from M1 to M30 of T5.1. It will be an iterative process. Each deliverable will comprise a Technical Specification Report related to the PIACERE IEP as well as a software prototype [KR10]. Details about partial reconfiguration and orchestration mechanisms will also be included.
PIACERE run-time monitoring and self-learning, self-healing platform - v2 (s’ouvre dans une nouvelle fenêtre)These deliverables will contain the main outcomes from M1 to M30 of T6.1-T6.4 due to the high dependency of all the different tasks. It will include the monitoring stack coming from task 6.1 with all the time series data collected as well as the monitoring from the security policies from task 6.4, the set of machine learning algorithms (task 6.2) that comprise the self-learning mechanisms and the self-healing strategies (task 6.3) that trigger an optimized redeployment (see WP5). It will be an iterative process. Each deliverable will comprise a Technical Specification Report.
PIACERE DevSecOps Framework - v1 (s’ouvre dans une nouvelle fenêtre)This deliverable will integrate all the components developed by the other technical WPs in the PIACERE DevSecOps Framework Different versions of the PIACERE DevSecOps Framework will be provided following an incremental approach The first version will be an initial prototype with the core functionalities implemented the second version will augment these functionalities taking into consideration the feedback coming for the use cases and the final version will include corrections and feedback coming from the implementation of the use cases The software will be accompanied by a Technical Specification Report When appropriate the architecture definition of the DevSecOps framework will be updated
PIACERE run-time monitoring and self-learning, self-healing platform - v1 (s’ouvre dans une nouvelle fenêtre)These deliverables will contain the main outcomes from M1 to M30 of T6.1-T6.4 due to the high dependency of all the different tasks. It will include the monitoring stack coming from task 6.1 with all the time series data collected as well as the monitoring from the security policies from task 6.4, the set of machine learning algorithms (task 6.2) that comprise the self-learning mechanisms and the self-healing strategies (task 6.3) that trigger an optimized redeployment (see WP5). It will be an iterative process. Each deliverable will comprise a Technical Specification Report.
PIACERE DevSecOps Framework - v3 (s’ouvre dans une nouvelle fenêtre)This deliverable will integrate all the components developed by the other technical WPs in the PIACERE DevSecOps Framework. Different versions of the PIACERE DevSecOps Framework will be provided following an incremental approach. The first version will be an initial prototype with the core functionalities implemented; the second version will augment these functionalities taking into consideration the feedback coming for the use cases and the final version will include corrections and feedback coming from the implementation of the use cases. The software will be accompanied by a Technical Specification Report. When appropriate, the architecture definition of the DevSecOps framework will be updated
IaC Code Security and components security Inspection - v3 (s’ouvre dans une nouvelle fenêtre)These deliverables will present the outcome of Task T4.2 and Task T4.3 Each deliverable will comprise both a software prototype [KR6-KR7] and a Technical Specification Report. The document will include the Security Inspector technical design and implementation aspects. The document will also include the Security Inspector technical design and implementation aspects.
Infrastructural code generation - v1 (s’ouvre dans une nouvelle fenêtre)These deliverables will present the outcome of Task T34 Each deliverable will comprise both a software prototype KR3 and a Technical Specification Report The document will include the ICG technical design and will report related research results
PIACERE Abstractions, DOML and DOML-E - v3 (s’ouvre dans une nouvelle fenêtre)This deliverable is the output of tasks 3.1, 3.2 and 3.3. It will contain the metamodel and the corresponding semantic and machine-readable descriptions of the aspects that are relevant to the main phases of the IaC lifecycle seamlessly integrated with the design and development of the IaC lifecycle. This metamodel will be then presented as an end-user language enabling the modelling of the different elements needed for the infrastructure provisioning, configuration management and deployment, the deployable infrastructural components, constraints and so on. The various iterations will seek and take into consideration the feedback from PIACERE’s end users and, possibly, other users outside the project to ensure that the language is sufficiently powerful and simple to use.
IOP prototype - v2 (s’ouvre dans une nouvelle fenêtre)The main outcome of T5.3 from M1 to M30 will be presented in this deliverable. Each deliverable will have a Technical Specification Report and a software prototype [KR9], including the explanation of the algorithms.
IOP prototype - v3 (s’ouvre dans une nouvelle fenêtre)The main outcome of T5.3 from M1 to M30 will be presented in this deliverable. Each deliverable will have a Technical Specification Report and a software prototype [KR9], including the explanation of the algorithms.
PIACERE run-time monitoring and self-learning, self-healing platform - v3 (s’ouvre dans une nouvelle fenêtre)These deliverables will contain the main outcomes from M1 to M30 of T6.1-T6.4 due to the high dependency of all the different tasks. It will include the monitoring stack coming from task 6.1 with all the time series data collected as well as the monitoring from the security policies from task 6.4, the set of machine learning algorithms (task 6.2) that comprise the self-learning mechanisms and the self-healing strategies (task 6.3) that trigger an optimized redeployment (see WP5). It will be an iterative process. Each deliverable will comprise a Technical Specification Report.
Infrastructural model and code verification - v3 (s’ouvre dans une nouvelle fenêtre)These deliverables will present the outcome of Task T4.1. Each deliverable will comprise both a software prototype [KR5] and a Technical Specification Report. The document will include the VT technical design and will report related research results.
PIACERE Abstractions, DOML and DOML-E - v1 (s’ouvre dans une nouvelle fenêtre)This deliverable is the output of tasks 3.1, 3.2 and 3.3. It will contain the metamodel and the corresponding semantic and machine-readable descriptions of the aspects that are relevant to the main phases of the IaC lifecycle seamlessly integrated with the design and development of the IaC lifecycle. This metamodel will be then presented as an end-user language enabling the modelling of the different elements needed for the infrastructure provisioning, configuration management and deployment, the deployable infrastructural components, constraints and so on. The various iterations will seek and take into consideration the feedback from PIACERE’s end users and, possibly, other users outside the project to ensure that the language is sufficiently powerful and simple to use.
Canary environment prototype - v2 (s’ouvre dans une nouvelle fenêtre)The main outcomes of T5.2 from M1 to M30 will be presented in these deliverables. Each deliverable will have a Technical Specification Report and a software prototype [KR8]. These deliverables will also contain a scientific report on behaviour verification and anti-pattern detection methodologies.
PIACERE IDE - v1 (s’ouvre dans une nouvelle fenêtre)This deliverable is the output of Task 3.5 and it will also be iterative. The deliverable will be composed of a software prototype and a technical design document. This outcome will present the IDE resulting from the integration of KR1, KR3 - KR8. The software will be accompanied by a Technical Specification Report
IaC Code Security and components security Inspection - v2 (s’ouvre dans une nouvelle fenêtre)These deliverables will present the outcome of Task T4.2 and Task T4.3 Each deliverable will comprise both a software prototype [KR6-KR7] and a Technical Specification Report. The document will include the Security Inspector technical design and implementation aspects. The document will also include the Security Inspector technical design and implementation aspects.
Infrastructural model and code verification - v1 (s’ouvre dans une nouvelle fenêtre)These deliverables will present the outcome of Task T41 Each deliverable will comprise both a software prototype KR5 and a Technical Specification Report The document will include the VT technical design and will report related research results
PIACERE Abstractions, DOML and DOML-E - v2 (s’ouvre dans une nouvelle fenêtre)This deliverable is the output of tasks 3.1, 3.2 and 3.3. It will contain the metamodel and the corresponding semantic and machine-readable descriptions of the aspects that are relevant to the main phases of the IaC lifecycle seamlessly integrated with the design and development of the IaC lifecycle. This metamodel will be then presented as an end-user language enabling the modelling of the different elements needed for the infrastructure provisioning, configuration management and deployment, the deployable infrastructural components, constraints and so on. The various iterations will seek and take into consideration the feedback from PIACERE’s end users and, possibly, other users outside the project to ensure that the language is sufficiently powerful and simple to use.
IOP prototype - v1 (s’ouvre dans une nouvelle fenêtre)The main outcome of T5.3 from M1 to M30 will be presented in this deliverable. Each deliverable will have a Technical Specification Report and a software prototype [KR9], including the explanation of the algorithms.
PIACERE DevSecOps Framework - v2 (s’ouvre dans une nouvelle fenêtre)This deliverable will integrate all the components developed by the other technical WPs in the PIACERE DevSecOps Framework. Different versions of the PIACERE DevSecOps Framework will be provided following an incremental approach. The first version will be an initial prototype with the core functionalities implemented; the second version will augment these functionalities taking into consideration the feedback coming for the use cases and the final version will include corrections and feedback coming from the implementation of the use cases. The software will be accompanied by a Technical Specification Report. When appropriate, the architecture definition of the DevSecOps framework will be updated
Infrastructural code generation - v2 (s’ouvre dans une nouvelle fenêtre)These deliverables will present the outcome of Task T3.4. Each deliverable will comprise both a software prototype [KR3] and a Technical Specification Report. The document will include the ICG technical design and will report related research results.
Canary environment prototype - v1 (s’ouvre dans une nouvelle fenêtre)The main outcomes of T52 from M1 to M30 will be presented in these deliverables Each deliverable will have a Technical Specification Report and a software prototype KR8 These deliverables will also contain a scientific report on behaviour verification and antipattern detection methodologies
Infrastructural model and code verification - v2 (s’ouvre dans une nouvelle fenêtre)These deliverables will present the outcome of Task T4.1. Each deliverable will comprise both a software prototype [KR5] and a Technical Specification Report. The document will include the VT technical design and will report related research results.
Infrastructural code generation - v3 (s’ouvre dans une nouvelle fenêtre)These deliverables will present the outcome of Task T3.4. Each deliverable will comprise both a software prototype [KR3] and a Technical Specification Report. The document will include the ICG technical design and will report related research results.
This deliverable will explain the dissemination and communication activities followed during the reporting periods as well as the results from these activities and will update projects dissemination and communication plan respectively This report will also contain the relevant activities executed to foster a close collaboration with projects related to PIACERE as well as future networking plans
PIACERE DevSecOps Framework Requirements specification, architecture and integration strategy - v2 (s’ouvre dans une nouvelle fenêtre)This deliverable is the result of Task 2.1, Task 2.2. and Task 2.3. This document will contain 1) all the functional, non-functional and technical requirements of the PIACERE DevSecOps Framework and of all the components to be developed in the context of the technical WPs (WP3, WP4, WP5 and WP6). This deliverable is tightly related to the corresponding use cases requirements deliverable in WP7 (D7.1). 2) the architecture of the DevSecOps framework [KR13] and the workflow, 3) the requirements of the DevOps infrastructure to be used in the development of PIACERE as well as the definition of the strategy and steps to be followed for the continuous integration of the PIACERE solution. This deliverable is the result of Task 2.1 and Task 2.3.
Communication, Networking Plan and Dissemination Strategy (s’ouvre dans une nouvelle fenêtre)This deliverable has a threefold goal Firstly it will define the way in which the different communities scientific commercial general public will be targeted as well as the social media will be used Secondly it will detail the specific plan for networking activities with external entities including the specific working group this project will participate Finally it will describe the project dissemination strategy to be adopted throughout the project lifetime The release of the respective report is considered one of the key milestones of the project
Dissemination, communication and networking report - Report - v2 (s’ouvre dans une nouvelle fenêtre)This deliverable will explain the dissemination and communication activities followed during the reporting periods as well as the results from these activities and will update project’s dissemination and communication plan respectively. This report will also contain the relevant activities executed to foster a close collaboration with projects related to PIACERE, as well as future networking plans.
PIACERE DevSecOps Framework Requirements specification, architecture and integration strategy - v1 (s’ouvre dans une nouvelle fenêtre)This deliverable is the result of Task 21 Task 22 and Task 23 This document will contain 1 all the functional nonfunctional and technical requirements of the PIACERE DevSecOps Framework and of all the components to be developed in the context of the technical WPs WP3 WP4 WP5 and WP6 This deliverable is tightly related to the corresponding use cases requirements deliverable in WP7 D71 2 the architecture of the DevSecOps framework KR13 and the workflow 3 the requirements of the DevOps infrastructure to be used in the development of PIACERE as well as the definition of the strategy and steps to be followed for the continuous integration of the PIACERE solution This deliverable is the result of Task 21 and Task 23
The initial version of the brochure and project website will include at least project objectives and contact details PIACERE website will be setup by the Project Leader TECNALIA and continuously enhanced by all partners to include public downloadable results and links to related news and initiatives
Publications
Auteurs:
Juncal Alonso, Maider Huarte, Leire Orue-Echevarria
Publié dans:
International Journal of Computational Science and Engineering (IJCSE), 2020, ISSN 1742-7185
Éditeur:
Inderscience Enterprises
Auteurs:
Alonso, Juncal; Huarte, Maider; Orue-Echevarria, Leire
Publié dans:
MDPI Applied Sciences, Numéro 1, 2022, ISSN 2076-3417
Éditeur:
MDPI
DOI:
10.3390/app12094347
Auteurs:
Bin Xiang, Jocelyne Elias, Fabio Martignon, Elisabetta Di Nitto
Publié dans:
Data in Brief, Numéro 39, 2021, ISSN 2352-3409
Éditeur:
Elsevier BV
Auteurs:
Juncal Alonso; Leire Orue-Echevarria; Valentina Casola; Ana Isabel Torre; Maider Huarte; Eneko Osaba; Jesus L. Lobo
Publié dans:
Journal of Cloud Computing, Numéro 12, 2023, ISSN 2192-113X
Éditeur:
Springer Science + Business Media
DOI:
10.1186/s13677-022-00367-6
Auteurs:
Bin Xiang; Jocelyne Elias; Fabio Martignon; Elisabetta Di Nitto
Publié dans:
IEEE Transactions on Cloud Computing, Numéro 11, 2021, Page(s) 620-638, ISSN 2168-7161
Éditeur:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/tcc.2021.3107022
Auteurs:
Xiang, Bin; Elias, Jocelyne; Martignon, Fabio; Di Nitto, Elisabetta
Publié dans:
IEEE Transactions on Cloud Computing, Numéro 3, 2021, ISSN 2168-7161
Éditeur:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.5281/zenodo.5495727
Auteurs:
Juncal Alonso; Leire Orue-Echevarria; Eneko Osaba; Jesus L. Lobo; Iñigo Martinez; Josu Diaz de Arcaya; Iñaki Etxaniz
Publié dans:
Information 12(8), Numéro 1, 2021, ISSN 2078-2489
Éditeur:
Multidisciplinary Digital Publishing Institute (MDPI)
DOI:
10.3390/info12080308
Auteurs:
Juncal Alonso; Radoslaw Piliszek; Matija Cankar
Publié dans:
Special Numéro on Infrastructure-as-Code Unleashed, 2021, ISSN 0740-7459
Éditeur:
Institute of Electrical and Electronics Engineers
Auteurs:
Michele Chiari; Dino Mandrioli; Francesco Pontiggia; Matteo Pradella
Publié dans:
ACM Transactions on Programming Languages and Systems, 2023, ISSN 0164-0925
Éditeur:
Association for Computing Machinary, Inc.
DOI:
10.1145/3608443
Auteurs:
Bin Xiang; Jocelyne Elias; Fabio Martignon; Elisabetta Di Nitto
Publié dans:
Computer Networks, Numéro 2, 2021, ISSN 1389-1286
Éditeur:
Elsevier BV
DOI:
10.5281/zenodo.5495557
Auteurs:
Nedeltcheva, Galia Novakova, Bin Xiang, Laurentiu Niculut, and Debora Benedetto
Publié dans:
FASTContinuum 2023 workshop co-located at ICPE 2023, International Conference on Performance Engineering (ICPE 2023), 2023, Page(s) 189-193
Éditeur:
ACM Digital Library
DOI:
10.1145/3578245.3584937
Auteurs:
Antić, Jan, Joao Pita Costa, Aleš Černivec, Matija Cankar, Tomaž Martinčič, Aljaž Potočnik, Gorka Benguria Elguezabal, Nelly Leligou, and Ismael Torres Boigues.
Publié dans:
4th International Workshop on Information and Operational Technology Security (IOSEC 2023), 2023
Éditeur:
IEEE Xplore Digital Library
DOI:
10.1109/drcn57075.2023.10108105
Auteurs:
Josu Diaz-de-Arcaya, Eneko Osaba, Gorka Benguria, Iñaki Etxaniz, Jesus L. Lobo, Juncal Alonso, Ana I. Torre-Bastida, Aitor Almeida
Publié dans:
FASTContinuum 2023 workshop co-located at ICPE 2023, International Conference on Performance Engineering (ICPE 2023), 2023, Page(s) 195-197
Éditeur:
ACM Digital Library
DOI:
10.1145/3578245.3584938
Auteurs:
López Lobo, Jesus; Laña, Ibai; Osaba, Eneko; Del Ser, Javier
Publié dans:
IEEE Conference on Artificial Intelligence (IEEE CAI 2023), 2023
Éditeur:
IEEE
DOI:
10.1109/cai54212.2023.00081
Auteurs:
Osaba, E., Diaz-de-Arcaya, J., Orue-Echavarria, L., Alonso, J., López Lobo, J., Benguría G., & Etxaniz I.
Publié dans:
Proceedings of the the Genetic and Evolutionary Computation Conference (GECCO 2022), 2022, Page(s) 71-72
Éditeur:
ACM Digital Library
DOI:
10.1145/3520304.3533938
Auteurs:
Chiari, Michele; Di Nitto, Elisabetta; Noguero Mucientes, Adrián; Xiang, Bin
Publié dans:
European Conference On Service-Oriented And Cloud Computing, Numéro 1, 2022
Éditeur:
ESOCC
DOI:
10.5281/zenodo.6697369
Auteurs:
Chiari, Michele; De Pascalis, Michele; Pradella, Matteo
Publié dans:
2022 IEEE 19th International Conference on Software Architecture Companion (ICSA-C 2022). First International Workshop on the Foundations of Infrastructure Specification and Testing (FIST 2022), 2022
Éditeur:
IEEE
DOI:
10.1109/icsa-c54293.2022.00049
Auteurs:
Juncal Alonso, Christophe Joubert, Leire Orue-Echevarria, Matteo Pradella and Daniel Vladušič
Publié dans:
European Conference On Service-Oriented And Cloud Computing, 2021
Éditeur:
CEUR
Auteurs:
Eliseo Villanueva, Ismael Torres, Eneko Osaba, Sergio Canzoneri, Andrea Franchini, Lorenzo Blasi
Publié dans:
Proceedings of the 3rd Eclipse Security, AI, Architecture and Modelling Conference on Cloud to Edge Continuum (eSAAM), 2023, Page(s) 62-66
Éditeur:
ACM Digital Library
DOI:
10.1145/3624486.3624507
Auteurs:
Eneko Osaba, Gorka Benguria, Jesus L. Lobo, Josu Diaz-de-Arcaya, Juncal Alonso, Iñaki Etxaniz
Publié dans:
The 6th International Conference on Computational Intelligence and Intelligent Systems (CIIS 2023), 2023
Éditeur:
ACM
Auteurs:
Galia Nedeltcheva, Alfonso De La Fuente Ruiz, Leire Orue-Echevarria Arrieta, Nejc Bat, Lorenzo Blasi
Publié dans:
IEEE 19th International Conference on Software Architecture Companion (ICSA-C), 2022
Éditeur:
IEEE
DOI:
10.1109/icsa-c54293.2022.00048
Auteurs:
Alfonso de la Fuente Ruiz, Galia Novakova Nedeltcheva
Publié dans:
IEEE 20th International Conference on Software Architecture Companion (ICSA-C 2023). Second International Workshop on the Foundations of Infrastructure Specification and Testing (FIST 2023), 2023
Éditeur:
IEEE Xplore Digital Library
DOI:
10.1109/icsa-c57050.2023.00075
Auteurs:
Eneko Osaba; Josu Diaz-De-Arcaya; Juncal Alonso; Jesus L. Lobo; Gorka Benguria; Iñaki Etxaniz
Publié dans:
Proceedings of the 1st International Conference on Computer and Communications Management (ICCCM 2023), 2023
Éditeur:
ACM
DOI:
10.1145/3617733.3617777
Auteurs:
M. Cankar, N. Petrovic, J. Pita Costa, A. Cernivec, J. Antic, T. Martincic, D. Stepec. Security in DevSecOps
Publié dans:
FASTContinuum 2023 workshop, co-located with the International Conference on Performance Engineering (ICPE 2023), 2023, Page(s) 201-205
Éditeur:
ACM Digital Library
DOI:
10.1145/3578245.3584943
Auteurs:
Eneko Osaba, Josu Diaz-de-Arcaya, Juncal Alonso, Jesus L. Lobo, Gorka Benguria, Iñaki Etxaniz
Publié dans:
Proceedings of the Eighth International Congress on Information and Communication Technology (ICICT 2023), 2023
Éditeur:
SpringerLink
DOI:
10.1007/978-981-99-3043-2_25
Auteurs:
Michele Chiari, Bin Xiang, Galia Nedeltcheva, Elisabetta Di Nitto, Lorenzo Blasi, Debora Benedetto, Laurentiu Niculut
Publié dans:
Proceedings of the 35th International Conference on Advanced Information Systems Engineering (CAiSE 2023), 2023
Éditeur:
Springer
DOI:
10.1007/978-3-031-34560-9_18
Auteurs:
Nenad Petrovic; Matija Cankar; Anze Luzar
Publié dans:
Crossref, Numéro 1, 2022
Éditeur:
IEEEXplore
DOI:
10.1109/telfor56187.2022.9983681
Auteurs:
Michele Chiari; Elisabetta Di Nitto; Adrián Noguero Mucientes; Bin Xiang
Publié dans:
Proceedings of the European Conference on Service-Oriented and Cloud Computing (ESOCC 2022), 2022
Éditeur:
SpringerLink
DOI:
10.1007/978-3-031-23298-5_8
Recherche de données OpenAIRE...
Une erreur s’est produite lors de la recherche de données OpenAIRE
Aucun résultat disponible