Skip to main content
Go to the home page of the European Commission (opens in new window)
English en
CORDIS - EU research results
CORDIS

Digital Technologies ActiNg as a Gatekeeper to information and data flOws

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Distributed Trust Management Framework Final Version (opens in new window)

This deliverable reports on the final results of all WP4 tasks. This includes an update of the description of the development activities of the distributed identity solution based on a Self-Sovereign approach, the seamless onboarding for users and devices, the user and device continuous behavioural authentication, and the code hardened against side-channel attacks.

AI-based Framework for Green & Trustworthy Operations Final Version (opens in new window)

This deliverable reports on the final results of all WP5 tasks. This includes the update on the work on data analysis techniques, feature selection and engineering; the steps towards achieving energy-efficient AI model training and execution; the dynamic intelligent execution on heterogeneous systems; the privacy threat modelling and identification for trustworthy AI; and finally the explainable AI and the trustworthiness concept for the TANGO framework.

Distributed Trust Management Framework Intermediate Version (opens in new window)

This deliverable reports on the intermediate results of all WP4 tasks. This includes the description of the development activities of the distributed identity solution based on a Self-Sovereign approach, the seamless onboarding for users with highest level of assurance based eIDAS and eID, as well as seamless onboarding for devices based on SmartAccess360. It details the user and device continuous behavioural authentication based on 18 independent behavioural traits including interactions, movement, device sage and transactional patterns and on sensor, network and device info patterns. It also includes the code hardened against side-channel attacks.

AI-based Framework for Green & Trustworthy Operations Intermediate Version (opens in new window)

This deliverable reports on the intermediate results of all WP5 tasks. It describes the different data analysis carried out to discover relevant data correlations oriented to T2D, including the results from feature selection and engineering; the steps towards achieving energy-efficient AI model training and execution; the dynamic intelligent execution on heterogeneous systems; the privacy threat modelling and identification for trustworthy AI; and finally the explainable AI and the trustworthiness concept for the TANGO framework to inform citizens and users/operators in an easy-to-understand way regarding the use of AI including what data are used, with what purpose and what it does.

TANGO Integrated System and User Interfaces Final Version (opens in new window)

Final release of the integrated platform including updates of all WP6 tasks. It will include all final components released in the specified artifacts repository; the final test specifications along with the corresponding results per component and for the integrated TANGO system, including the unit, integration, and functional testing; the final release of the TANGO web and mobile applications, fully deployed and submitted on the respective stores; and the final data analytics, visualisation and reporting techniques

Distributed Privacy-preserving Data Management and Storage Intermediate Version (opens in new window)

This report on the intermediate results of all WP3 tasks, including the proposed protocol that ensures a standardised level of security for all users; the trustworthy data sharing techniques; the confidentiality and privacy by design; and the encryption/decryption techniques along with the multi-factor recovery mechanisms that leverages circles of trust to ensure the recoverability of personal and identity data.

Distributed Privacy-preserving Data Management and Storage Final Version (opens in new window)

This deliverable reports on the final results of all WP3 tasks, including the proposed protocol that ensures a standardised level of security for all users; the trustworthy data sharing techniques; the confidentiality and privacy by design; and the encryption/decryption techniques along with the multi-factor recovery mechanisms that leverages circles of trust to ensure the recoverability of personal and identity data.

Project Management Handbook (opens in new window)

Report describing the project management plan setting the guidelines for quality assurance of the project’s research and development activities, management and deliverables.

Validation Report and Lessons Learnt (opens in new window)

All members of the consortium will evaluate the platform’s final version after the execution of both phases of the pilots, along with the TRL justification of the tools and the overall framework and the results from the user acceptance assessment.

Data Management Plan and Research Ethics_final version (opens in new window)

Detailed report for the data management policy of the project along with the protocol that TANGO will adhere to during the project lifecycle, incl. letters of intent to comply with all legal obligations & requirements.

State-of-the-Art & GAP analysis Distributed Data Management, Processing and Storage (opens in new window)

Report on the state-of-the-art in Distributed Data Management, Processing and Storage, Smart Contracts and AI in Trust Management, including a report of best practices and a GAP analysis.

System Requirements and Specifications, Platform Architecture, and Privacy, Ethical, Social and Legal Impact Assessment (opens in new window)

Report on system’s design specifications (non-functional and functional requirements) and documentation of the platform’s technical architecture and the TANGO Open APIs and connectors. Details on privacy, ethical, social and legal issues of the TANGO framework as a whole and its components.

User Needs and Requirements & Use Case Scenarios (opens in new window)

Report on the methodology and the techniques that will be used for gathering the user requirements, along with the results for understanding the needs and problems of the users and a complete list of the high-level functional requirements. Description of the use case scenarios, along with specific KPIs for the demonstration, validation and evaluation of the project’s pilots.

System Requirements and Specifications, Platform Architecture, and Privacy, Ethical, Social and Legal Impact Assessment Final version (opens in new window)

Report and update on final user and system’s design specifications and requirements, documentation of the platform’s technical architecture and the TANGO Open APIs and connectors. Details on privacy, ethical, social and legal issues of the TANGO framework as a whole and its components.

TANGO Pilot evaluation report (opens in new window)

This report details the first and final phase of the pilots including users’ feedback, improvements for the TANGO framework and its individual modules.

Dissemination, Communication, Exploitation and Stakeholders Engagement Report Final Version (opens in new window)

Final description of all the activities and actions carried out for scientific dissemination, communication and community building. It also reports on the IPR generated through the project, SWOT/PEST analysis and opportunities for exploitation. Details the strategy for sustainability of the project outcomes, the activities, certification scheme proposals and targeted contributions to standards including a landscape report and white papers.

Dissemination, Communication and Project Branding (opens in new window)

Description of the plans and the activities carried out for scientific dissemination, communication and Project Branding.

Data Management Plan and Research Ethics_version1 (opens in new window)

Detailed report for the data management policy of the project along with the protocol that TANGO will adhere to during the project lifecycle, incl. letters of intent to comply with all legal obligations & requirements.

Dissemination, Communication, Exploitation and Stakeholders Engagement Report Intermediate Version (opens in new window)

Intermediate description of all the activities and actions carried out for scientific dissemination, communication and community building.

Publications

LADDER: Multi-Objective Backdoor Attack via Evolutionary Algorithm

Author(s): Dazhuang Liu, Yanqi Qiao, Rui Wang, Kaitai Liang, Georgios, Smaragdakis
Published in: 2025
Publisher: Network and Distributed System Security (NDSS) Symposium

Enhancing Cyber Threat Intelligence Sharing through Data Spaces in Critical Infrastructures (opens in new window)

Author(s): Mehdi Akbari Gurabi, Ömer Sen, Navid Rahimidanesh, Andreas Ulbig, Stefan Decker
Published in: 2025 IEEE International Conference on Cyber Security and Resilience (CSR), 2025
Publisher: IEEE
DOI: 10.1109/CSR64739.2025.11130001

Beehive SPIR-V Toolkit: A Composable and Functional API for Runtime SPIR-V Code Generation (opens in new window)

Author(s): Fumero, Juan; Rethy, György; Stratikopoulos, Athanasios; Foutris, Nikos; Kotselidis, Christos
Published in: VMIL 2023: Proceedings of the 15th ACM SIGPLAN International Workshop on Virtual Machines and Intermediate Languages, 2023, ISBN 9798400704017
Publisher: Association for Computing Machinery. New York, NY, United States
DOI: 10.3929/ETHZ-B-000645027

Scaling Up Performance of Managed Applications on NUMA Systems (opens in new window)

Author(s): Orion Papadakis; Andreas Andronikakis; Nikos Foutris; Michail Papadimitriou; Athanasios Stratikopoulos; Foivos Zakkak; Polychronis Xekalakis; Christos Kotselidis
Published in: Proceedings of the 2023 ACM SIGPLAN International Symposium on Memory Management, 2023, ISBN 9798400701795
Publisher: Association for Computing Machinery, New York, NY, United States
DOI: 10.1145/3591195.3595270

Evaluation of the TANGO platform: Insights from the smart hospitality pilot

Author(s): Ioannis Katsanakis, Asterios Stroumpoulis, Evangelia Kopanaki
Published in: 2024
Publisher: International Conference on Tourism (ICOT2025) – IATOUR

Learning from the COVID-19 Pandemic to Improve Critical Infrastructure Resilience using Temporal Fusion Transformers (opens in new window)

Author(s): Jakob Jenko, Joao Pita Costa, Daniel Vladušič, Urban Bavčar, Radoš Čabarkapa
Published in: Annals of Computer Science and Information Systems, Proceedings of the 19th Conference on Computer Science and Intelligence Systems (FedCSIS), Issue 39, 2025
Publisher: Polish Information Processing Society
DOI: 10.15439/2024F2959

A Multifaceted Memory Analysis of Java Benchmarks (opens in new window)

Author(s): Papadakis, Orion; Andronikakis, Andreas; Foutris, Nikos; Papadimitriou, Michail; Stratikopoulos, Athanasios; Zakkak, Foivos S.; Xekalakis, Polychronis; Kotselidis, Christos
Published in: Proceedings of the 20th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes, 2023, ISBN 9798400703805
Publisher: Association for Computing Machinery, New York, NY, United States
DOI: 10.1145/3617651.3622978

Dynamic and Static Code Analysis for Java Programs on Heterogeneous Hardware (opens in new window)

Author(s): Athanasios Stratikopoulos, Tianyu Zuo, Umut Sarp Harbalioglu, Juan Fumero, Michail Papadimitriou, Orion Papadakis, Maria Xekalaki, Christos Kotselidis
Published in: Proceedings of the 22nd ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes, 2025
Publisher: ACM
DOI: 10.1145/3759426.3760984

The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption

Author(s): Tianyang Chen, Peng Xu , Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang
Published in: Proceedings 2023 Network and Distributed System Security Symposium, 2023, ISBN 1-891562-83-5
Publisher: Network and Distributed System Security (NDSS) Symposium 2023

Towards Privacy-Preserving Machine Learning in Sovereign Data Spaces: Opportunities and Challenges (opens in new window)

Author(s): Mehdi Akbari Gurabi, Felix Hermsen, Avikarsha Mandal, Stefan Decker
Published in: IFIP Advances in Information and Communication Technology, Privacy and Identity Management. Sharing in a Digital World, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-57978-3_11

Using Temporal Fusion Transformer Predictions to Maximise Use of Renewable Energy Sources (opens in new window)

Author(s): Jakob Jenko, Joao Pita Costa
Published in: 2024 International Workshop on Artificial Intelligence and Machine Learning for Energy Transformation (AIE), 2024
Publisher: IEEE
DOI: 10.1109/AIE61866.2024.10561261

On Data Spaces for Retrieval Augmented Generation (opens in new window)

Author(s): Felix Hermsen, Lasse Nitz, Mehdi Akbari Gurabi, Roman Matzutt and Avikarsha Mandal
Publisher: Europe meets Japan: Intercultural Workshop on Data Sovereignty and Generative AI: Applications, Design, Social, Ethical and Technological Impact
DOI: 10.18420/INF2024_57

Exploring Digital Technology and Sustainable Development Integration in a Shared Data Environment: A Conceptual Framework on the Retail Sector

Author(s): Ioannis Katsanakis, Asterios Stroumpoulis, Evangelia Kopanaki
Published in: 2023
Publisher: HSSS 2023 CONFERENCE

Improved Wordpcfg for Passwords with Maximum Probability Segmentation (opens in new window)

Author(s): Wenting Li, Jiahong Yang, Haibo Cheng, Ping Wang, Kaitai Liang
Published in: ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2024
Publisher: IEEE
DOI: 10.1109/ICASSP49357.2023.10096535

Toward Establishing a Tourism Data Space: Innovative Geo-Dashboard Development for Tourism Research and Management (opens in new window)

Author(s): Dolores Ordóñez-Martínez, Maurici Ruiz-Pérez
Published in: 2024
Publisher: MDPI
DOI: 10.3390/SMARTCITIES7010026

Privacy Impact Assessment of Cyber Attacks on Connected and Autonomous Vehicles (opens in new window)

Author(s): Sakshyam Panda, Emmanouil Panaousis, George Loukas, Konstantinos Kentrotis
Published in: ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023, ISBN 9798400707728
Publisher: Association for Computing Machinery, New York, NY, United States
DOI: 10.1145/3600160

The Use of Digital Technologies in a Common Data Space and Sustainable development Context: A Conceptual Framework Focus on Smart Hospitality

Author(s): Asterios Stroumpoulis, Ioannis Katsanakis, Evangelia Kopanaki
Published in: ICOT 2023: International Conference on Tourism, 2023
Publisher: European University Cyprus

TornadoViz: Visualizing Heterogeneous Execution Patterns in Modern Managed Runtime Systems (opens in new window)

Author(s): Michail Papadimitriou, Maria Xekalaki, Athanasios Stratikopoulos, Orion Papadakis, Juan Fumero, Christos Kotselidis
Published in: Proceedings of the 22nd ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes, 2025
Publisher: ACM
DOI: 10.1145/3759426.3760978

A theoretical framework for validating and evaluating the TANGO platform in smart hospitality

Author(s): Ioannis Katsanakis, Asterios Stroumpoulis, Evangelia Kopanaki
Published in: 2024
Publisher: International Conference on Tourism (ICOT2024) - IATOUR

High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption

Author(s): Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, Kaitai Liang
Published in: Proceedings of the 32nd USENIX Security Symposium., 2023, ISBN 978-1-939133-37-3
Publisher: USENIX Association

CCA-1 Secure Updatable Encryption with Adaptive Security

Author(s): Huanhuan Chen, Yao Jiang Galteland & Kaitai Liang
Publisher: ASIACRYPT 2023

MeetSafe: Enhancing Robustness Against White-Box Adversarial Examples (opens in new window)

Author(s): Ruben Stenhuis, Dazhuang Liu, Yanqi Qiao, Mauro Conti, Manos Panayotakis, and Kaitai Liang
Published in: 2025
Publisher: Frontiers in Computer Science
DOI: 10.3389/FCOMP.2025.1631561/FULL

Cross-Language Interoperability of Heterogeneous Code (opens in new window)

Author(s): Athanasios Stratikopoulos; Florin Blanaru; Juan Fumero; Maria Xekalaki; Orion Papadakis; Christos Kotselidis
Published in: Programming '23: Companion Proceedings of the 7th International Conference on the Art, Science, and Engineering of Programming, 2023, ISBN 9798400707551
Publisher: Association for Computing Machinery, New York, NY, United States
DOI: 10.5281/ZENODO.7845384

A Conceptual Framework to Leverage Heuristics for Effective Human-Machine Collaboration in Incident Handling (opens in new window)

Author(s): Mehdi Akbari Gurabi, Muhammad Usman Mansoor, Roman Matzutt, Avikarsha Mandal, and Stefan Decker
Published in: Innovative Security Solutions for Information Technology and Communications. SecITC 2024, 2024
Publisher: Innovative Security Solutions for Information Technology and Communications. SecITC 2024
DOI: 10.1007/978-3-031-87760-5_3

White Paper on the Definition of Data Intermediation Services (opens in new window)

Author(s): Tervel Bobev, Vilte Kristina Dessers, Charlotte Ducuing, Michiel Fierens, Andrea Palumbo, Bert Peeters, Leander Stähler
Published in: CiTiP Working Paper Series, 2023, ISSN 1556-5068
Publisher: SSRN Electronic Journal
DOI: 10.2139/4589987

Enabling Transparent Acceleration of Big Data Frameworks Using Heterogeneous Hardware (opens in new window)

Author(s): Maria Xekalaki, Juan Fumero, Athanasios Stratikopoulos, Katerina Doka, Christos Katsakioris, Constantinos Bitsakos, Nectarios Koziris, Christos Kotselidis
Published in: Proceedings of the VLDB Endowment, Issue 15, 2023, ISSN 2150-8097
Publisher: Association for Computing Machinery (ACM)
DOI: 10.14778/3565838.3565842

Conceptual Framework and Prospective Analysis of EU Tourism Data Spaces (opens in new window)

Author(s): Dolores Ordóñez-Martínez, Joana M. Seguí-Pons, Maurici Ruiz-Pérez
Published in: Sustainability, Issue 16, 2025, ISSN 2071-1050
Publisher: MDPI AG
DOI: 10.3390/SU16010371

Genelle et al. Revisited: Masking an AES Round With Only Four Secure ANDs (opens in new window)

Author(s): Nicolas Belleville
Published in: IEEE Embedded Systems Letters, Issue 17, 2025, ISSN 1943-0663
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/LES.2024.3516853

Stealthy Backdoor Attack against Federated Learning through Frequency Domain by Backdoor Neuron Constraint and Model Camouflage (opens in new window)

Author(s): Yanqi Qiao, Dazhuang Liu, Rui Wang, Kaitai Liang
Published in: IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 2024, ISSN 2156-3357
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/JETCAS.2024.3450527

Combining Loop Shuffling and Code PolyMorphism for Enhanced AES Side-Channel Security (opens in new window)

Author(s): Nicolas Belleville, Loïc Masure
Published in: Lecture Notes in Computer Science, Constructive Side-Channel Analysis and Secure Design, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-57543-3_14

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0