Skip to main content
Go to the home page of the European Commission (opens in new window)
English en
CORDIS - EU research results
CORDIS

Data Usage Control for empowering digital sovereignty for All citizens

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Initial results of Data Sharing Agreement Management and Enforcement Infrastructures (opens in new window)

This deliverable will define the format of DSA and list the main considered operations. It will also describe the preliminary version of both DSA management and enforcement infrastructures.

Initial results of Design, implementation and evaluation of use cases (opens in new window)

This deliverable describes the methodology followed for the elicitation of the requirements and needs of each use case together with a report of common and specific requirements, reports about the design of the use cases for each use case and the preparation done for the integration of DUCA, and describes the initial integration of the DUCA approach in each use case, the process followed, and the fulfilment of requirements as described in D5.1

Initial results of requirements, architecture and integration test (opens in new window)

This report provides the complete list of requirements for the architectural components, the preliminary version of the DUCA architecture and the first version of the integrated DUCA platform.

Plan for dissemination, exploitation and communication (opens in new window)

This deliverable will present DUCAs dissemination exploitation and communications plan which will be used to transfer the knowledge obtained during the project lifecycle

Data Management Plan (DMP) (opens in new window)

The DMP describes the data management life cycle for the data collected processed andor generated by the project This deliverable will evolve during the project lifetime

Initial results of security and privacy enhancing technologies (opens in new window)

This deliverable reports on the requirements for all the components developed in tasks 4.1-4.6 and the preliminary maturation cycle of all the components ready to be integrated in WP2.

Publications

A SLAHP in the Face of DLL Search Order Hijacking (opens in new window)

Author(s): Antonin Verdier, Romain Laborde, Mohamed Ali Kandi, Abdelmalek Benzekri
Published in: Communications in Computer and Information Science, Ubiquitous Security, 2024
Publisher: Springer
DOI: 10.1007/978-981-97-1274-8_12

A Model For Assessing The Adherence of E-Identity Solutions To Self-Sovereign Identity (opens in new window)

Author(s): Lepore, Cristian; Laborde, Romain; Eynard, Jessica; Kandi, Mohamed, Ali; Macilotti, Giorgia; Ferreira, Afonso; Sibilla, Michelle
Published in: World Conference on Information Systems and Technologies, 2024
Publisher: Springer
DOI: 10.1007/978-3-031-60215-3_15

Explainable Ransomware Detection with Deep Learning Techniques (opens in new window)

Author(s): Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Published in: Journal of Computer Virology and Hacking Techniques, Issue 20, 2024, ISSN 2263-8733
Publisher: Springer Science and Business Media LLC
DOI: 10.1007/s11416-023-00501-1

FLAShadow: A Flash-based Shadow Stack for Low-end Embedded Systems (opens in new window)

Author(s): Michele Grisafi, Mahmoud Ammar, Marco Roveri, Bruno Crispo
Published in: ACM Transactions on Internet of Things, Issue 5, 2024, ISSN 2691-1914
Publisher: Association for Computing Machinery (ACM)
DOI: 10.1145/3670413

Digital twin communities: an approach for secure DT data sharing (opens in new window)

Author(s): Cristina Alcaraz, Iman Hasnaouia Meskini, Javier Lopez
Published in: International Journal of Information Security, Issue 24, 2025, ISSN 1615-5262
Publisher: Springer Science and Business Media LLC
DOI: 10.1007/s10207-024-00912-1

A method for real-world privacy-preserving Android malware detection through Federated Machine Learning (opens in new window)

Author(s): Giovanni Ciaramella, Fabio Martinelli, Christian Peluso, Antonella Santone, Francesco Mercaldo
Published in: Information and Software Technology, Issue 189, 2025, ISSN 0950-5849
Publisher: Elsevier BV
DOI: 10.1016/J.INFSOF.2025.107892

Explainable Security Requirements Classification Through Transformer Models (opens in new window)

Author(s): Luca Petrillo, Fabio Martinelli, Antonella Santone, Francesco Mercaldo
Published in: Future Internet, Issue 17, 2025, ISSN 1999-5903
Publisher: MDPI AG
DOI: 10.3390/fi17010015

Digital Twin-assisted anomaly detection for industrial scenarios (opens in new window)

Author(s): Cristina Alcaraz, Javier Lopez
Published in: International Journal of Critical Infrastructure Protection, Issue 47, 2024, ISSN 1874-5482
Publisher: Elsevier BV
DOI: 10.1016/j.ijcip.2024.100721

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0