Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Digital Technologies ActiNg as a Gatekeeper to information and data flOws

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Project Management Handbook (opens in new window)

Report describing the project management plan setting the guidelines for quality assurance of the project’s research and development activities, management and deliverables.

State-of-the-Art & GAP analysis Distributed Data Management, Processing and Storage (opens in new window)

Report on the state-of-the-art in Distributed Data Management, Processing and Storage, Smart Contracts and AI in Trust Management, including a report of best practices and a GAP analysis.

System Requirements and Specifications, Platform Architecture, and Privacy, Ethical, Social and Legal Impact Assessment (opens in new window)

Report on system’s design specifications (non-functional and functional requirements) and documentation of the platform’s technical architecture and the TANGO Open APIs and connectors. Details on privacy, ethical, social and legal issues of the TANGO framework as a whole and its components.

User Needs and Requirements & Use Case Scenarios (opens in new window)

Report on the methodology and the techniques that will be used for gathering the user requirements, along with the results for understanding the needs and problems of the users and a complete list of the high-level functional requirements. Description of the use case scenarios, along with specific KPIs for the demonstration, validation and evaluation of the project’s pilots.

Dissemination, Communication and Project Branding (opens in new window)

Description of the plans and the activities carried out for scientific dissemination, communication and Project Branding.

Data Management Plan and Research Ethics_version1 (opens in new window)

Detailed report for the data management policy of the project along with the protocol that TANGO will adhere to during the project lifecycle, incl. letters of intent to comply with all legal obligations & requirements.

Dissemination, Communication, Exploitation and Stakeholders Engagement Report Intermediate Version (opens in new window)

Intermediate description of all the activities and actions carried out for scientific dissemination, communication and community building.

Distributed Trust Management Framework Intermediate Version (opens in new window)

This deliverable reports on the intermediate results of all WP4 tasks. This includes the description of the development activities of the distributed identity solution based on a Self-Sovereign approach, the seamless onboarding for users with highest level of assurance based eIDAS and eID, as well as seamless onboarding for devices based on SmartAccess360. It details the user and device continuous behavioural authentication based on 18 independent behavioural traits including interactions, movement, device sage and transactional patterns and on sensor, network and device info patterns. It also includes the code hardened against side-channel attacks.

AI-based Framework for Green & Trustworthy Operations Intermediate Version (opens in new window)

This deliverable reports on the intermediate results of all WP5 tasks. It describes the different data analysis carried out to discover relevant data correlations oriented to T2D, including the results from feature selection and engineering; the steps towards achieving energy-efficient AI model training and execution; the dynamic intelligent execution on heterogeneous systems; the privacy threat modelling and identification for trustworthy AI; and finally the explainable AI and the trustworthiness concept for the TANGO framework to inform citizens and users/operators in an easy-to-understand way regarding the use of AI including what data are used, with what purpose and what it does.

Distributed Privacy-preserving Data Management and Storage Intermediate Version (opens in new window)

This report on the intermediate results of all WP3 tasks, including the proposed protocol that ensures a standardised level of security for all users; the trustworthy data sharing techniques; the confidentiality and privacy by design; and the encryption/decryption techniques along with the multi-factor recovery mechanisms that leverages circles of trust to ensure the recoverability of personal and identity data.

Publications

LADDER: Multi-Objective Backdoor Attack via Evolutionary Algorithm

Author(s): Dazhuang Liu, Yanqi Qiao, Rui Wang, Kaitai Liang, Georgios, Smaragdakis
Published in: 2025
Publisher: Network and Distributed System Security (NDSS) Symposium

Enhancing Cyber Threat Intelligence Sharing through Data Spaces in Critical Infrastructures (opens in new window)

Author(s): Mehdi Akbari Gurabi, Ömer Sen, Navid Rahimidanesh, Andreas Ulbig, Stefan Decker
Published in: 2025 IEEE International Conference on Cyber Security and Resilience (CSR), 2025
Publisher: IEEE
DOI: 10.1109/CSR64739.2025.11130001

Unified Shared Memory: Friend or Foe? Understanding the Implications of Unified Memory on Managed Heaps (opens in new window)

Author(s): Fumero, Juan; Blanaru, Florin; Stratikopoulos, Athanasios; Dohrmann, Steve; Viswanathan, Sandhya; Kotselidis, Christos
Published in: Fumero Alfonso , J , Blanaru , F-G , Stratikopoulos , A , Dohrmann , S , Viswanathan , S & Kotselidis , C-E 2023 , ' Unified Shared Memory: Friend or Foe? Understanding the Implications of Unified Memory on Managed Heaps ' ., 2023, ISBN 9798400703805
Publisher: Association for Computing Machinery, New York, NY, United States
DOI: 10.1145/3617651.3622984

Beehive SPIR-V Toolkit: A Composable and Functional API for Runtime SPIR-V Code Generation (opens in new window)

Author(s): Fumero, Juan; Rethy, György; Stratikopoulos, Athanasios; Foutris, Nikos; Kotselidis, Christos
Published in: VMIL 2023: Proceedings of the 15th ACM SIGPLAN International Workshop on Virtual Machines and Intermediate Languages, 2023, ISBN 9798400704017
Publisher: Association for Computing Machinery. New York, NY, United States
DOI: 10.3929/ETHZ-B-000645027

Scaling Up Performance of Managed Applications on NUMA Systems (opens in new window)

Author(s): Orion Papadakis; Andreas Andronikakis; Nikos Foutris; Michail Papadimitriou; Athanasios Stratikopoulos; Foivos Zakkak; Polychronis Xekalakis; Christos Kotselidis
Published in: Proceedings of the 2023 ACM SIGPLAN International Symposium on Memory Management, 2023, ISBN 9798400701795
Publisher: Association for Computing Machinery, New York, NY, United States
DOI: 10.1145/3591195.3595270

Evaluation of the TANGO platform: Insights from the smart hospitality pilot

Author(s): Ioannis Katsanakis, Asterios Stroumpoulis, Evangelia Kopanaki
Published in: 2024
Publisher: International Conference on Tourism (ICOT2025) – IATOUR

Learning from the COVID-19 Pandemic to Improve Critical Infrastructure Resilience using Temporal Fusion Transformers (opens in new window)

Author(s): Jakob Jenko, Joao Pita Costa, Daniel Vladušič, Urban Bavčar, Radoš Čabarkapa
Published in: Annals of Computer Science and Information Systems, Proceedings of the 19th Conference on Computer Science and Intelligence Systems (FedCSIS), Issue 39, 2025
Publisher: Polish Information Processing Society
DOI: 10.15439/2024F2959

A Multifaceted Memory Analysis of Java Benchmarks (opens in new window)

Author(s): Papadakis, Orion; Andronikakis, Andreas; Foutris, Nikos; Papadimitriou, Michail; Stratikopoulos, Athanasios; Zakkak, Foivos S.; Xekalakis, Polychronis; Kotselidis, Christos
Published in: Proceedings of the 20th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes, 2023, ISBN 9798400703805
Publisher: Association for Computing Machinery, New York, NY, United States
DOI: 10.1145/3617651.3622978

Dynamic and Static Code Analysis for Java Programs on Heterogeneous Hardware (opens in new window)

Author(s): Athanasios Stratikopoulos, Tianyu Zuo, Umut Sarp Harbalioglu, Juan Fumero, Michail Papadimitriou, Orion Papadakis, Maria Xekalaki, Christos Kotselidis
Published in: Proceedings of the 22nd ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes, 2025
Publisher: ACM
DOI: 10.1145/3759426.3760984

Towards Privacy-Preserving Machine Learning in Sovereign Data Spaces: Opportunities and Challenges (opens in new window)

Author(s): Mehdi Akbari Gurabi, Felix Hermsen, Avikarsha Mandal, Stefan Decker
Published in: IFIP Advances in Information and Communication Technology, Privacy and Identity Management. Sharing in a Digital World, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-57978-3_11

Using Temporal Fusion Transformer Predictions to Maximise Use of Renewable Energy Sources (opens in new window)

Author(s): Jakob Jenko, Joao Pita Costa
Published in: 2024 International Workshop on Artificial Intelligence and Machine Learning for Energy Transformation (AIE), 2024
Publisher: IEEE
DOI: 10.1109/AIE61866.2024.10561261

Exploring Digital Technology and Sustainable Development Integration in a Shared Data Environment: A Conceptual Framework on the Retail Sector

Author(s): Ioannis Katsanakis, Asterios Stroumpoulis, Evangelia Kopanaki
Published in: 2023
Publisher: HSSS 2023 CONFERENCE

Improved Wordpcfg for Passwords with Maximum Probability Segmentation (opens in new window)

Author(s): Wenting Li, Jiahong Yang, Haibo Cheng, Ping Wang, Kaitai Liang
Published in: ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2024
Publisher: IEEE
DOI: 10.1109/ICASSP49357.2023.10096535

Toward Establishing a Tourism Data Space: Innovative Geo-Dashboard Development for Tourism Research and Management (opens in new window)

Author(s): Dolores Ordóñez-Martínez, Maurici Ruiz-Pérez
Published in: 2024
Publisher: MDPI
DOI: 10.3390/SMARTCITIES7010026

Privacy Impact Assessment of Cyber Attacks on Connected and Autonomous Vehicles (opens in new window)

Author(s): Sakshyam Panda, Emmanouil Panaousis, George Loukas, Konstantinos Kentrotis
Published in: ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023, ISBN 9798400707728
Publisher: Association for Computing Machinery, New York, NY, United States
DOI: 10.1145/3600160

The Use of Digital Technologies in a Common Data Space and Sustainable development Context: A Conceptual Framework Focus on Smart Hospitality

Author(s): Asterios Stroumpoulis, Ioannis Katsanakis, Evangelia Kopanaki
Published in: ICOT 2023: International Conference on Tourism, 2023
Publisher: European University Cyprus

TornadoViz: Visualizing Heterogeneous Execution Patterns in Modern Managed Runtime Systems (opens in new window)

Author(s): Michail Papadimitriou, Maria Xekalaki, Athanasios Stratikopoulos, Orion Papadakis, Juan Fumero, Christos Kotselidis
Published in: Proceedings of the 22nd ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes, 2025
Publisher: ACM
DOI: 10.1145/3759426.3760978

A theoretical framework for validating and evaluating the TANGO platform in smart hospitality

Author(s): Ioannis Katsanakis, Asterios Stroumpoulis, Evangelia Kopanaki
Published in: 2024
Publisher: International Conference on Tourism (ICOT2024) - IATOUR

High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption

Author(s): Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, Kaitai Liang
Published in: Proceedings of the 32nd USENIX Security Symposium., 2023, ISBN 978-1-939133-37-3
Publisher: USENIX Association

MeetSafe: Enhancing Robustness Against White-Box Adversarial Examples (opens in new window)

Author(s): Ruben Stenhuis, Dazhuang Liu, Yanqi Qiao, Mauro Conti, Manos Panayotakis, and Kaitai Liang
Published in: 2025
Publisher: Frontiers in Computer Science
DOI: 10.3389/FCOMP.2025.1631561/FULL

Cross-Language Interoperability of Heterogeneous Code (opens in new window)

Author(s): Athanasios Stratikopoulos; Florin Blanaru; Juan Fumero; Maria Xekalaki; Orion Papadakis; Christos Kotselidis
Published in: Programming '23: Companion Proceedings of the 7th International Conference on the Art, Science, and Engineering of Programming, 2023, ISBN 9798400707551
Publisher: Association for Computing Machinery, New York, NY, United States
DOI: 10.5281/ZENODO.7845384

A Conceptual Framework to Leverage Heuristics for Effective Human-Machine Collaboration in Incident Handling (opens in new window)

Author(s): Mehdi Akbari Gurabi, Muhammad Usman Mansoor, Roman Matzutt, Avikarsha Mandal, and Stefan Decker
Published in: Innovative Security Solutions for Information Technology and Communications. SecITC 2024, 2024
Publisher: Innovative Security Solutions for Information Technology and Communications. SecITC 2024
DOI: 10.1007/978-3-031-87760-5_3

White Paper on the Definition of Data Intermediation Services (opens in new window)

Author(s): Tervel Bobev, Vilte Kristina Dessers, Charlotte Ducuing, Michiel Fierens, Andrea Palumbo, Bert Peeters, Leander Stähler
Published in: CiTiP Working Paper Series, 2023, ISSN 1556-5068
Publisher: SSRN Electronic Journal
DOI: 10.2139/4589987

Enabling Transparent Acceleration of Big Data Frameworks Using Heterogeneous Hardware (opens in new window)

Author(s): Maria Xekalaki, Juan Fumero, Athanasios Stratikopoulos, Katerina Doka, Christos Katsakioris, Constantinos Bitsakos, Nectarios Koziris, Christos Kotselidis
Published in: Proceedings of the VLDB Endowment, Issue 15, 2023, ISSN 2150-8097
Publisher: Association for Computing Machinery (ACM)
DOI: 10.14778/3565838.3565842

Conceptual Framework and Prospective Analysis of EU Tourism Data Spaces (opens in new window)

Author(s): Dolores Ordóñez-Martínez, Joana M. Seguí-Pons, Maurici Ruiz-Pérez
Published in: Sustainability, Issue 16, 2025, ISSN 2071-1050
Publisher: MDPI AG
DOI: 10.3390/SU16010371

Genelle et al. Revisited: Masking an AES Round With Only Four Secure ANDs (opens in new window)

Author(s): Nicolas Belleville
Published in: IEEE Embedded Systems Letters, Issue 17, 2025, ISSN 1943-0663
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/LES.2024.3516853

Stealthy Backdoor Attack against Federated Learning through Frequency Domain by Backdoor Neuron Constraint and Model Camouflage (opens in new window)

Author(s): Yanqi Qiao, Dazhuang Liu, Rui Wang, Kaitai Liang
Published in: IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 2024, ISSN 2156-3357
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/JETCAS.2024.3450527

Combining Loop Shuffling and Code PolyMorphism for Enhanced AES Side-Channel Security (opens in new window)

Author(s): Nicolas Belleville, Loïc Masure
Published in: Lecture Notes in Computer Science, Constructive Side-Channel Analysis and Secure Design, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-57543-3_14

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0