Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Data Usage Control for empowering digital sovereignty for All citizens

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Initial results of Data Sharing Agreement Management and Enforcement Infrastructures (opens in new window)

This deliverable will define the format of DSA and list the main considered operations. It will also describe the preliminary version of both DSA management and enforcement infrastructures.

Initial results of Design, implementation and evaluation of use cases (opens in new window)

This deliverable describes the methodology followed for the elicitation of the requirements and needs of each use case together with a report of common and specific requirements, reports about the design of the use cases for each use case and the preparation done for the integration of DUCA, and describes the initial integration of the DUCA approach in each use case, the process followed, and the fulfilment of requirements as described in D5.1

Initial results of requirements, architecture and integration test (opens in new window)

This report provides the complete list of requirements for the architectural components, the preliminary version of the DUCA architecture and the first version of the integrated DUCA platform.

Plan for dissemination, exploitation and communication (opens in new window)

This deliverable will present DUCAs dissemination exploitation and communications plan which will be used to transfer the knowledge obtained during the project lifecycle

Data Management Plan (DMP) (opens in new window)

The DMP describes the data management life cycle for the data collected processed andor generated by the project This deliverable will evolve during the project lifetime

Initial results of security and privacy enhancing technologies (opens in new window)

This deliverable reports on the requirements for all the components developed in tasks 4.1-4.6 and the preliminary maturation cycle of all the components ready to be integrated in WP2.

Publications

A SLAHP in the Face of DLL Search Order Hijacking (opens in new window)

Author(s): Antonin Verdier, Romain Laborde, Mohamed Ali Kandi, Abdelmalek Benzekri
Published in: Communications in Computer and Information Science, Ubiquitous Security, 2024
Publisher: Springer
DOI: 10.1007/978-981-97-1274-8_12

Static and Dynamic Analysis of a Usage Control System (opens in new window)

Author(s): Ulrich Schöpp, Fathiyeh Faghih, Subhajit Bandopadhyay, Hussein Joumaa, Amjad Ibrahim, Chuangjie Xu, Xin Ye, Theo Dimitrakos
Published in: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Publisher: ACM
DOI: 10.1145/3649158.3657038

Security Policy Generation and Verification through Large Language Models: A Proposal (opens in new window)

Author(s): Fabio Martinelli, Francesco Mercaldo, Luca Petrillo, Antonella Santone
Published in: Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024, ISBN 979-8-4007-0421-5
Publisher: ACM
DOI: 10.1145/3626232.3658635

Obligation Management Framework for Usage Control (opens in new window)

Author(s): Hussein Joumaa, Ali Hariri, Ana Petrovska, Oleksii Osliak, Theo Dimitrakos, Bruno Crispo
Published in: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Publisher: ACM
DOI: 10.1145/3649158.3657048

On Subjective Logic Trust Discount for Referral Paths (opens in new window)

Author(s): Koffi Ismael Ouattara, Ana Petrovska, Artur Hermann, Nataša Trkulja, Theo Dimitrakos, Frank Kargl
Published in: 2024 27th International Conference on Information Fusion (FUSION), 2024
Publisher: IEEE
DOI: 10.23919/FUSION59988.2024.10706345

DroidDefender: An Image-based Android Antimalware Proof-of-Concept (opens in new window)

Author(s): Giovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024, ISBN 979-8-4007-0421-5
Publisher: ACM
DOI: 10.1145/3626232.3658634

Specifying a Usage Control System (opens in new window)

Author(s): Ulrich Schöpp, Chuangjie Xu, Amjad Ibrahim, Fathiyeh Faghih, Theo Dimitrakos
Published in: Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2024
Publisher: ACM
DOI: 10.1145/3589608.3593843

SecPol: Enabling Security Policy Control in Vehicle Networks using Intrusion Detection and Hardware Trust (opens in new window)

Author(s): Florian Fenzl, Jonathan Stancke, Christian Plappert, Roland Rieke, Felix Gail, Theo Dimitrakos, Hussein Joumaa
Published in: Proceedings of the 2024 Cyber Security in CarS Workshop, 2024
Publisher: ACM
DOI: 10.1145/3689936.3694697

RETRACT: Expressive Designated Verifier Anonymous Credentials (opens in new window)

Author(s): Heini Bergsson Debes, Thanassis Giannetsos
Published in: Proceedings of the 18th International Conference on Availability, Reliability and Security, 2024
Publisher: ACM
DOI: 10.1145/3600160.3600191

Towards Reliable Collaborative Data Processing Ecosystems: Survey on Data Quality Criteria (opens in new window)

Author(s): Sahi, Louis; Laborde, Romain; Kandi, Mohamed, Ali; Sibilla, Michele; Ferreira, Afonso; Macilotti, Giorgia; Benzekri, Abdelmalek
Published in: TrustCom: Conference on Trust, Security and Privacy in Computing and Communications, 2023
Publisher: IEEE
DOI: 10.1109/trustcom60117.2023.00345

StegWare: A Novel Malware Model Exploiting Payload Steganography and Dynamic Compilation (opens in new window)

Author(s): Daniele Albanese, Rosangela Casolare, Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Marco Russodivito, Antonella Santone
Published in: Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Publisher: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0011859000003405

On the Privacy and Security for E-Education Metaverse (opens in new window)

Author(s): Sofia Sakka, Vasiliki Liagkou, Chrysostomos Stylios, Afonso Ferreira
Published in: 2024 IEEE Global Engineering Education Conference (EDUCON), 2024
Publisher: IEEE
DOI: 10.1109/EDUCON60312.2024.10578660

ID-based Self-Encryption via Hyperledger Fabirc-based Smart Contract (opens in new window)

Author(s): I. Grishkov, R. Kromes, T. Giannetsos, K. Liang
Published in: International Conference on Blockchain Technology and Emerging Applications, 2023, 2023
Publisher: International Conference on Blockchain Technology and Emerging Applications, 2023
DOI: 10.1007/978-3-031-31420-9_1

Towards Robust Trust Frameworks for Data Exchange: A Multidisciplinary Inquiry (opens in new window)

Author(s): Badirova, Aytaj and Alangot, Bithin and Dimitrakos, Theo and Yahyapour, Ramin
Published in: Open Identity Summit 2024, 2024
Publisher: Gesellschaft für Informatik e.V.
DOI: 10.18420/OID2024_01

Achieving Higher Level of Assurance in Privacy-Preserving Identity Wallets (opens in new window)

Author(s): B. Larsen, N. El Kassem, T. Giannetsos, I. Krontiris, S. Vasileiadis, L. Chen
Published in: TrustCom 2023, 2023
Publisher: TrustCom 2023
DOI: 10.1109/TrustCom60117.2023.00146

Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning (opens in new window)

Author(s): Giovanni Ciaramella, Stefano Fagnano, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA), 2024
Publisher: IEEE
DOI: 10.1109/ICMLA55696.2022.00274

Exploring Quantum Machine Learning for Explainable Malware Detection (opens in new window)

Author(s): Giovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: 2023 International Joint Conference on Neural Networks (IJCNN), 2024
Publisher: IEEE
DOI: 10.1109/IJCNN54540.2023.10191964

Game of Zones: An Automated Intent-Based Network Micro-segmentation Methodology

Author(s): Daniele Canavese; Romain Laborde; Abir Laraba; Afonso Ferreira; Abdelmalek Benzekri
Published in: NOMS: Network Operations and Management Symposium, 2025
Publisher: IEEE

An Approach for Privacy-Preserving Mobile Malware Detection Through Federated Machine Learning (opens in new window)

Author(s): Giovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo, Christian Peluso, Antonella Santone
Published in: Proceedings of the 26th International Conference on Enterprise Information Systems, 2024, ISBN 978-989-758-692-7
Publisher: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0012730600003690

A Model For Assessing The Adherence of E-Identity Solutions To Self-Sovereign Identity (opens in new window)

Author(s): Lepore, Cristian; Laborde, Romain; Eynard, Jessica; Kandi, Mohamed, Ali; Macilotti, Giorgia; Ferreira, Afonso; Sibilla, Michelle
Published in: World Conference on Information Systems and Technologies, 2024
Publisher: Springer
DOI: 10.1007/978-3-031-60215-3_15

The Interplay Between Policy and Technology in Metaverses: Towards Seamless Avatar Interoperability Using Self-Sovereign Identity (opens in new window)

Author(s): Romain Laborde, Afonso Ferreira, Cristian Lepore, Mohamed-Ali Kandi, Michelle Sibilla, Abdelmalek Benzekri
Published in: 2023 IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom), 2023
Publisher: IEEE
DOI: 10.1109/MetaCom57706.2023.00080

Identity management in cross-cloud environments: Towards self-sovereign identities using current solutions

Author(s): Mohamed-Amine Ben Haj Salah; Romain Laborde; Abdelmalek Benzekri; Mohamed Ali Kandi; Afonso Ferreira
Published in: CRiSIS: Conference on Risks and Security of Internet and Systems, 2024
Publisher: Springer

ZEKRA: Zero-Knowledge Control-Flow Attestation (opens in new window)

Author(s): Heini Bergsson Debes, Edlira Dushku, Thanassis Giannetsos, Ali Marandi
Published in: Proceedings of the ACM Asia Conference on Computer and Communications Security, 2023
Publisher: ACM
DOI: 10.1145/3579856.3582833

Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning: A Proposal (opens in new window)

Author(s): Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: 2022 IEEE International Conference on Big Data (Big Data), 2023
Publisher: IEEE
DOI: 10.1109/BigData55660.2022.10020235

Obfuscated Mobile Malware Detection by Means of Dynamic Analysis and Explainable Deep Learning (opens in new window)

Author(s): Francesco Mercaldo, Giovanni Ciaramella, Antonella Santone, Fabio Martinelli
Published in: Proceedings of the 18th International Conference on Availability, Reliability and Security, 2024
Publisher: ACM
DOI: 10.1145/3600160.3605037

A shared responsibility model to support cross border and cross organizational federation on top of decentralized and self-sovereign identity: Architecture and first PoC (opens in new window)

Author(s): Kubach, Michael; Henderson, Isaac; Bithin, Alangot; Dimitrakos, Theo; Vargas, Juan; Winterstetter, Matthias; Krontiris, Ioannis
Published in: Open Identity Summit 2023, 2023
Publisher: Gesellschaft für Informatik e.V.
DOI: 10.18420/OID2023_08

Comparative Evaluation of PKI and DAA-based Architectures for V2X Communication Security (opens in new window)

Author(s): Anna Angelogianni, Ioannis Krontiris, Thanassis Giannetsos
Published in: 2023 IEEE Vehicular Networking Conference (VNC), 2023
Publisher: IEEE
DOI: 10.1109/VNC57357.2023.10136316

Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets (opens in new window)

Author(s): Benjamin Larsen, Nada El Kassem, Thanassis Giannetsos, Ioannis Krontiris, Stefanos Vasileiadis, Liqun Chen
Published in: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2024
Publisher: IEEE
DOI: 10.1109/TrustCom60117.2023.00146

Explainable Ransomware Detection with Deep Learning Techniques (opens in new window)

Author(s): Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: Journal of Computer Virology and Hacking Techniques, Issue 20, 2024, ISSN 2263-8733
Publisher: Springer Science and Business Media LLC
DOI: 10.1007/s11416-023-00501-1

FLAShadow: A Flash-based Shadow Stack for Low-end Embedded Systems (opens in new window)

Author(s): Michele Grisafi, Mahmoud Ammar, Marco Roveri, Bruno Crispo
Published in: ACM Transactions on Internet of Things, Issue 5, 2024, ISSN 2691-1914
Publisher: Association for Computing Machinery (ACM)
DOI: 10.1145/3670413

Digital twin communities: an approach for secure DT data sharing (opens in new window)

Author(s): Cristina Alcaraz, Iman Hasnaouia Meskini, Javier Lopez
Published in: International Journal of Information Security, Issue 24, 2025, ISSN 1615-5262
Publisher: Springer Science and Business Media LLC
DOI: 10.1007/s10207-024-00912-1

Explainable Security Requirements Classification Through Transformer Models (opens in new window)

Author(s): Luca Petrillo, Fabio Martinelli, Antonella Santone, Francesco Mercaldo
Published in: Future Internet, Issue 17, 2025, ISSN 1999-5903
Publisher: MDPI AG
DOI: 10.3390/fi17010015

Digital Twin-assisted anomaly detection for industrial scenarios (opens in new window)

Author(s): Cristina Alcaraz, Javier Lopez
Published in: International Journal of Critical Infrastructure Protection, Issue 47, 2024, ISSN 1874-5482
Publisher: Elsevier BV
DOI: 10.1016/j.ijcip.2024.100721

Towards Explainable Quantum Machine Learning for Mobile Malware Detection and Classification (opens in new window)

Author(s): Francesco Mercaldo, Giovanni Ciaramella, Giacomo Iadarola, Marco Storto, Fabio Martinelli, Antonella Santone
Published in: Applied Sciences, Issue 12, 2024, ISSN 2076-3417
Publisher: MDPI AG
DOI: 10.3390/app122312025

Trust Level Evaluation Engine for Dynamic Trust Assessment with Reference to Subjective Logic (opens in new window)

Author(s): Ana Petrovska, Gabriele Gelardi, Hüseyin Demirci, Emre Koçyiğit, Gabriele Lenzini, Artur Hermann, Nataša Trkulja, Frank Kargl, Ioannis Krontiris, Theo Dimitrakos
Published in: IFIP Advances in Information and Communication Technology, Trust Management XIV, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-76714-2_3

Dynamic Analysis for Explainable Fine-Grained Android Malware Detection (opens in new window)

Author(s): Giovanni Ciaramella, Francesco Mercaldo, Antonella Santone
Published in: Lecture Notes in Computer Science, Security and Trust Management, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-76371-7_8

DrATC: Dynamic Routing Algorithm Based on Trust Characteristics (opens in new window)

Author(s): Davide Ferraris, Lorenzo Monti
Published in: Lecture Notes in Computer Science, Security and Trust Management, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-76371-7_1

Continuous Authorization Architecture for Dynamic Trust Evaluation (opens in new window)

Author(s): Hussein Joumaa, Ana Petrovska, Ali Hariri, Theo Dimitrakos, Bruno Crispo
Published in: IFIP Advances in Information and Communication Technology, Trust Management XIV, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-76714-2_1

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0