Skip to main content
European Commission logo
English English
CORDIS - EU research results
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Data Usage Control for empowering digital sovereignty for All citizens

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Initial results of Data Sharing Agreement Management and Enforcement Infrastructures

This deliverable will define the format of DSA and list the main considered operations. It will also describe the preliminary version of both DSA management and enforcement infrastructures.

Initial results of Design, implementation and evaluation of use cases

This deliverable describes the methodology followed for the elicitation of the requirements and needs of each use case together with a report of common and specific requirements, reports about the design of the use cases for each use case and the preparation done for the integration of DUCA, and describes the initial integration of the DUCA approach in each use case, the process followed, and the fulfilment of requirements as described in D5.1

Initial results of requirements, architecture and integration test

This report provides the complete list of requirements for the architectural components, the preliminary version of the DUCA architecture and the first version of the integrated DUCA platform.

Plan for dissemination, exploitation and communication

This deliverable will present DUCAs dissemination exploitation and communications plan which will be used to transfer the knowledge obtained during the project lifecycle

Data Management Plan (DMP)

The DMP describes the data management life cycle for the data collected processed andor generated by the project This deliverable will evolve during the project lifetime

Initial results of security and privacy enhancing technologies

This deliverable reports on the requirements for all the components developed in tasks 4.1-4.6 and the preliminary maturation cycle of all the components ready to be integrated in WP2.

Publications

A SLAHP intheFace ofDLL Search Order Hijacking

Author(s): Antonin Verdier, Romain Laborde, Mohamed Ali Kandi, Abdelmalek Benzekri
Published in: Communications in Computer and Information Science, Ubiquitous Security, 2024
Publisher: Springer
DOI: 10.1007/978-981-97-1274-8_12

Static and Dynamic Analysis of a Usage Control System

Author(s): Ulrich Schpp, Fathiyeh Faghih, Subhajit Bandopadhyay, Hussein Joumaa, Amjad Ibrahim, Chuangjie Xu, Xin Ye, Theo Dimitrakos
Published in: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Publisher: ACM
DOI: 10.1145/3649158.3657038

Security Policy Generation and Verification through Large Language Models: A Proposal

Author(s): Fabio Martinelli, Francesco Mercaldo, Luca Petrillo, Antonella Santone
Published in: Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024, ISBN 979-8-4007-0421-5
Publisher: ACM
DOI: 10.1145/3626232.3658635

Obligation Management Framework for Usage Control

Author(s): Hussein Joumaa, Ali Hariri, Ana Petrovska, Oleksii Osliak, Theo Dimitrakos, Bruno Crispo
Published in: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Publisher: ACM
DOI: 10.1145/3649158.3657048

On Subjective Logic Trust Discount for Referral Paths

Author(s): Koffi Ismael Ouattara, Ana Petrovska, Artur Hermann, Nataa Trkulja, Theo Dimitrakos, Frank Kargl
Published in: 2024 27th International Conference on Information Fusion (FUSION), 2024
Publisher: IEEE
DOI: 10.23919/FUSION59988.2024.10706345

DroidDefender: An Image-based Android Antimalware Proof-of-Concept

Author(s): Giovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024, ISBN 979-8-4007-0421-5
Publisher: ACM
DOI: 10.1145/3626232.3658634

Specifying a Usage Control System

Author(s): Ulrich Schpp, Chuangjie Xu, Amjad Ibrahim, Fathiyeh Faghih, Theo Dimitrakos
Published in: Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2024
Publisher: ACM
DOI: 10.1145/3589608.3593843

SecPol: Enabling Security Policy Control in Vehicle Networks using Intrusion Detection and Hardware Trust

Author(s): Florian Fenzl, Jonathan Stancke, Christian Plappert, Roland Rieke, Felix Gail, Theo Dimitrakos, Hussein Joumaa
Published in: Proceedings of the 2024 Cyber Security in CarS Workshop, 2024
Publisher: ACM
DOI: 10.1145/3689936.3694697

RETRACT: Expressive Designated Verifier Anonymous Credentials

Author(s): Heini Bergsson Debes, Thanassis Giannetsos
Published in: Proceedings of the 18th International Conference on Availability, Reliability and Security, 2024
Publisher: ACM
DOI: 10.1145/3600160.3600191

Towards Reliable Collaborative Data Processing Ecosystems: Survey on Data Quality Criteria

Author(s): Sahi, Louis; Laborde, Romain; Kandi, Mohamed, Ali; Sibilla, Michele; Ferreira, Afonso; Macilotti, Giorgia; Benzekri, Abdelmalek
Published in: TrustCom: Conference on Trust, Security and Privacy in Computing and Communications, 2023
Publisher: IEEE
DOI: 10.1109/trustcom60117.2023.00345

StegWare: A Novel Malware Model Exploiting Payload Steganography and Dynamic Compilation

Author(s): Daniele Albanese, Rosangela Casolare, Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Marco Russodivito, Antonella Santone
Published in: Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Publisher: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0011859000003405

On the Privacy and Security for E-Education Metaverse

Author(s): Sofia Sakka, Vasiliki Liagkou, Chrysostomos Stylios, Afonso Ferreira
Published in: 2024 IEEE Global Engineering Education Conference (EDUCON), 2024
Publisher: IEEE
DOI: 10.1109/EDUCON60312.2024.10578660

ID-based Self-Encryption via Hyperledger Fabirc-based Smart Contract

Author(s): I. Grishkov, R. Kromes, T. Giannetsos, K. Liang
Published in: International Conference on Blockchain Technology and Emerging Applications, 2023, 2023
Publisher: International Conference on Blockchain Technology and Emerging Applications, 2023
DOI: 10.1007/978-3-031-31420-9_1

Towards Robust Trust Frameworks for Data Exchange: A Multidisciplinary Inquiry

Author(s): Badirova, Aytaj and Alangot, Bithin and Dimitrakos, Theo and Yahyapour, Ramin
Published in: Open Identity Summit 2024, 2024
Publisher: Gesellschaft für Informatik e.V.
DOI: 10.18420/OID2024_01

Achieving Higher Level of Assurance in Privacy-Preserving Identity Wallets

Author(s): B. Larsen, N. El Kassem, T. Giannetsos, I. Krontiris, S. Vasileiadis, L. Chen
Published in: TrustCom 2023, 2023
Publisher: TrustCom 2023
DOI: 10.1109/TrustCom60117.2023.00146

Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning

Author(s): Giovanni Ciaramella, Stefano Fagnano, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA), 2024
Publisher: IEEE
DOI: 10.1109/ICMLA55696.2022.00274

Exploring Quantum Machine Learning for Explainable Malware Detection

Author(s): Giovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: 2023 International Joint Conference on Neural Networks (IJCNN), 2024
Publisher: IEEE
DOI: 10.1109/IJCNN54540.2023.10191964

Game of Zones: An Automated Intent-Based Network Micro-segmentation Methodology

Author(s): Daniele Canavese; Romain Laborde; Abir Laraba; Afonso Ferreira; Abdelmalek Benzekri
Published in: NOMS: Network Operations and Management Symposium, 2025
Publisher: IEEE

An Approach for Privacy-Preserving Mobile Malware Detection Through Federated Machine Learning

Author(s): Giovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo, Christian Peluso, Antonella Santone
Published in: Proceedings of the 26th International Conference on Enterprise Information Systems, 2024, ISBN 978-989-758-692-7
Publisher: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0012730600003690

A Model For Assessing The Adherence of E-Identity Solutions To Self-Sovereign Identity

Author(s): Lepore, Cristian; Laborde, Romain; Eynard, Jessica; Kandi, Mohamed, Ali; Macilotti, Giorgia; Ferreira, Afonso; Sibilla, Michelle
Published in: World Conference on Information Systems and Technologies, 2024
Publisher: Springer
DOI: 10.1007/978-3-031-60215-3_15

The Interplay Between Policy and Technology in Metaverses: Towards Seamless Avatar Interoperability Using Self-Sovereign Identity

Author(s): Romain Laborde, Afonso Ferreira, Cristian Lepore, Mohamed-Ali Kandi, Michelle Sibilla, Abdelmalek Benzekri
Published in: 2023 IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom), 2023
Publisher: IEEE
DOI: 10.1109/MetaCom57706.2023.00080

Identity management in cross-cloud environments: Towards self-sovereign identities using current solutions

Author(s): Mohamed-Amine Ben Haj Salah; Romain Laborde; Abdelmalek Benzekri; Mohamed Ali Kandi; Afonso Ferreira
Published in: CRiSIS: Conference on Risks and Security of Internet and Systems, 2024
Publisher: Springer

ZEKRA: Zero-Knowledge Control-Flow Attestation

Author(s): Heini Bergsson Debes, Edlira Dushku, Thanassis Giannetsos, Ali Marandi
Published in: Proceedings of the ACM Asia Conference on Computer and Communications Security, 2023
Publisher: ACM
DOI: 10.1145/3579856.3582833

Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning: A Proposal

Author(s): Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: 2022 IEEE International Conference on Big Data (Big Data), 2023
Publisher: IEEE
DOI: 10.1109/BigData55660.2022.10020235

Obfuscated Mobile Malware Detection by Means of Dynamic Analysis and Explainable Deep Learning

Author(s): Francesco Mercaldo, Giovanni Ciaramella, Antonella Santone, Fabio Martinelli
Published in: Proceedings of the 18th International Conference on Availability, Reliability and Security, 2024
Publisher: ACM
DOI: 10.1145/3600160.3605037

A shared responsibility model to support cross border and cross organizational federation on top of decentralized and self-sovereign identity: Architecture and first PoC

Author(s): Kubach, Michael; Henderson, Isaac; Bithin, Alangot; Dimitrakos, Theo; Vargas, Juan; Winterstetter, Matthias; Krontiris, Ioannis
Published in: Open Identity Summit 2023, 2023
Publisher: Gesellschaft für Informatik e.V.
DOI: 10.18420/OID2023_08

Comparative Evaluation of PKI and DAA-based Architectures for V2X Communication Security

Author(s): Anna Angelogianni, Ioannis Krontiris, Thanassis Giannetsos
Published in: 2023 IEEE Vehicular Networking Conference (VNC), 2023
Publisher: IEEE
DOI: 10.1109/VNC57357.2023.10136316

Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets

Author(s): Benjamin Larsen, Nada El Kassem, Thanassis Giannetsos, Ioannis Krontiris, Stefanos Vasileiadis, Liqun Chen
Published in: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2024
Publisher: IEEE
DOI: 10.1109/TrustCom60117.2023.00146

Explainable Ransomware Detection with Deep Learning Techniques

Author(s): Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: Journal of Computer Virology and Hacking Techniques, Issue 20, 2024, ISSN 2263-8733
Publisher: Springer Science and Business Media LLC
DOI: 10.1007/s11416-023-00501-1

FLAShadow: A Flash-based Shadow Stack for Low-end Embedded Systems

Author(s): Michele Grisafi, Mahmoud Ammar, Marco Roveri, Bruno Crispo
Published in: ACM Transactions on Internet of Things, Issue 5, 2024, ISSN 2691-1914
Publisher: Association for Computing Machinery (ACM)
DOI: 10.1145/3670413

Digital twin communities: an approach for secure DT data sharing

Author(s): Cristina Alcaraz, Iman Hasnaouia Meskini, Javier Lopez
Published in: International Journal of Information Security, Issue 24, 2025, ISSN 1615-5262
Publisher: Springer Science and Business Media LLC
DOI: 10.1007/s10207-024-00912-1

Explainable Security Requirements Classification Through Transformer Models

Author(s): Luca Petrillo, Fabio Martinelli, Antonella Santone, Francesco Mercaldo
Published in: Future Internet, Issue 17, 2025, ISSN 1999-5903
Publisher: MDPI AG
DOI: 10.3390/fi17010015

Digital Twin-assisted anomaly detection for industrial scenarios

Author(s): Cristina Alcaraz, Javier Lopez
Published in: International Journal of Critical Infrastructure Protection, Issue 47, 2024, ISSN 1874-5482
Publisher: Elsevier BV
DOI: 10.1016/j.ijcip.2024.100721

Towards Explainable Quantum Machine Learning for Mobile Malware Detection and Classification

Author(s): Francesco Mercaldo, Giovanni Ciaramella, Giacomo Iadarola, Marco Storto, Fabio Martinelli, Antonella Santone
Published in: Applied Sciences, Issue 12, 2024, ISSN 2076-3417
Publisher: MDPI AG
DOI: 10.3390/app122312025

Trust Level Evaluation Engine forDynamic Trust Assessment withReference toSubjective Logic

Author(s): Ana Petrovska, Gabriele Gelardi, Hseyin Demirci, Emre Koyiit, Gabriele Lenzini, Artur Hermann, Nataa Trkulja, Frank Kargl, Ioannis Krontiris, Theo Dimitrakos
Published in: IFIP Advances in Information and Communication Technology, Trust Management XIV, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-76714-2_3

Dynamic Analysis forExplainable Fine-Grained Android Malware Detection

Author(s): Giovanni Ciaramella, Francesco Mercaldo, Antonella Santone
Published in: Lecture Notes in Computer Science, Security and Trust Management, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-76371-7_8

DrATC: Dynamic Routing Algorithm Based onTrust Characteristics

Author(s): Davide Ferraris, Lorenzo Monti
Published in: Lecture Notes in Computer Science, Security and Trust Management, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-76371-7_1

Continuous Authorization Architecture forDynamic Trust Evaluation

Author(s): Hussein Joumaa, Ana Petrovska, Ali Hariri, Theo Dimitrakos, Bruno Crispo
Published in: IFIP Advances in Information and Communication Technology, Trust Management XIV, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-76714-2_1

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available