Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

Data Usage Control for empowering digital sovereignty for All citizens

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

Initial results of Data Sharing Agreement Management and Enforcement Infrastructures (se abrirá en una nueva ventana)

This deliverable will define the format of DSA and list the main considered operations. It will also describe the preliminary version of both DSA management and enforcement infrastructures.

Initial results of Design, implementation and evaluation of use cases (se abrirá en una nueva ventana)

This deliverable describes the methodology followed for the elicitation of the requirements and needs of each use case together with a report of common and specific requirements, reports about the design of the use cases for each use case and the preparation done for the integration of DUCA, and describes the initial integration of the DUCA approach in each use case, the process followed, and the fulfilment of requirements as described in D5.1

Initial results of requirements, architecture and integration test (se abrirá en una nueva ventana)

This report provides the complete list of requirements for the architectural components, the preliminary version of the DUCA architecture and the first version of the integrated DUCA platform.

Plan for dissemination, exploitation and communication (se abrirá en una nueva ventana)

This deliverable will present DUCAs dissemination exploitation and communications plan which will be used to transfer the knowledge obtained during the project lifecycle

Data Management Plan (DMP) (se abrirá en una nueva ventana)

The DMP describes the data management life cycle for the data collected processed andor generated by the project This deliverable will evolve during the project lifetime

Initial results of security and privacy enhancing technologies (se abrirá en una nueva ventana)

This deliverable reports on the requirements for all the components developed in tasks 4.1-4.6 and the preliminary maturation cycle of all the components ready to be integrated in WP2.

Publicaciones

A SLAHP in the Face of DLL Search Order Hijacking (se abrirá en una nueva ventana)

Autores: Antonin Verdier, Romain Laborde, Mohamed Ali Kandi, Abdelmalek Benzekri
Publicado en: Communications in Computer and Information Science, Ubiquitous Security, 2024
Editor: Springer
DOI: 10.1007/978-981-97-1274-8_12

Static and Dynamic Analysis of a Usage Control System (se abrirá en una nueva ventana)

Autores: Ulrich Schöpp, Fathiyeh Faghih, Subhajit Bandopadhyay, Hussein Joumaa, Amjad Ibrahim, Chuangjie Xu, Xin Ye, Theo Dimitrakos
Publicado en: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Editor: ACM
DOI: 10.1145/3649158.3657038

Security Policy Generation and Verification through Large Language Models: A Proposal (se abrirá en una nueva ventana)

Autores: Fabio Martinelli, Francesco Mercaldo, Luca Petrillo, Antonella Santone
Publicado en: Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024, ISBN 979-8-4007-0421-5
Editor: ACM
DOI: 10.1145/3626232.3658635

Obligation Management Framework for Usage Control (se abrirá en una nueva ventana)

Autores: Hussein Joumaa, Ali Hariri, Ana Petrovska, Oleksii Osliak, Theo Dimitrakos, Bruno Crispo
Publicado en: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Editor: ACM
DOI: 10.1145/3649158.3657048

On Subjective Logic Trust Discount for Referral Paths (se abrirá en una nueva ventana)

Autores: Koffi Ismael Ouattara, Ana Petrovska, Artur Hermann, Nataša Trkulja, Theo Dimitrakos, Frank Kargl
Publicado en: 2024 27th International Conference on Information Fusion (FUSION), 2024
Editor: IEEE
DOI: 10.23919/FUSION59988.2024.10706345

DroidDefender: An Image-based Android Antimalware Proof-of-Concept (se abrirá en una nueva ventana)

Autores: Giovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Publicado en: Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024, ISBN 979-8-4007-0421-5
Editor: ACM
DOI: 10.1145/3626232.3658634

Specifying a Usage Control System (se abrirá en una nueva ventana)

Autores: Ulrich Schöpp, Chuangjie Xu, Amjad Ibrahim, Fathiyeh Faghih, Theo Dimitrakos
Publicado en: Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2024
Editor: ACM
DOI: 10.1145/3589608.3593843

SecPol: Enabling Security Policy Control in Vehicle Networks using Intrusion Detection and Hardware Trust (se abrirá en una nueva ventana)

Autores: Florian Fenzl, Jonathan Stancke, Christian Plappert, Roland Rieke, Felix Gail, Theo Dimitrakos, Hussein Joumaa
Publicado en: Proceedings of the 2024 Cyber Security in CarS Workshop, 2024
Editor: ACM
DOI: 10.1145/3689936.3694697

RETRACT: Expressive Designated Verifier Anonymous Credentials (se abrirá en una nueva ventana)

Autores: Heini Bergsson Debes, Thanassis Giannetsos
Publicado en: Proceedings of the 18th International Conference on Availability, Reliability and Security, 2024
Editor: ACM
DOI: 10.1145/3600160.3600191

Towards Reliable Collaborative Data Processing Ecosystems: Survey on Data Quality Criteria (se abrirá en una nueva ventana)

Autores: Sahi, Louis; Laborde, Romain; Kandi, Mohamed, Ali; Sibilla, Michele; Ferreira, Afonso; Macilotti, Giorgia; Benzekri, Abdelmalek
Publicado en: TrustCom: Conference on Trust, Security and Privacy in Computing and Communications, 2023
Editor: IEEE
DOI: 10.1109/trustcom60117.2023.00345

StegWare: A Novel Malware Model Exploiting Payload Steganography and Dynamic Compilation (se abrirá en una nueva ventana)

Autores: Daniele Albanese, Rosangela Casolare, Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Marco Russodivito, Antonella Santone
Publicado en: Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Editor: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0011859000003405

On the Privacy and Security for E-Education Metaverse (se abrirá en una nueva ventana)

Autores: Sofia Sakka, Vasiliki Liagkou, Chrysostomos Stylios, Afonso Ferreira
Publicado en: 2024 IEEE Global Engineering Education Conference (EDUCON), 2024
Editor: IEEE
DOI: 10.1109/EDUCON60312.2024.10578660

ID-based Self-Encryption via Hyperledger Fabirc-based Smart Contract (se abrirá en una nueva ventana)

Autores: I. Grishkov, R. Kromes, T. Giannetsos, K. Liang
Publicado en: International Conference on Blockchain Technology and Emerging Applications, 2023, 2023
Editor: International Conference on Blockchain Technology and Emerging Applications, 2023
DOI: 10.1007/978-3-031-31420-9_1

Towards Robust Trust Frameworks for Data Exchange: A Multidisciplinary Inquiry (se abrirá en una nueva ventana)

Autores: Badirova, Aytaj and Alangot, Bithin and Dimitrakos, Theo and Yahyapour, Ramin
Publicado en: Open Identity Summit 2024, 2024
Editor: Gesellschaft für Informatik e.V.
DOI: 10.18420/OID2024_01

Achieving Higher Level of Assurance in Privacy-Preserving Identity Wallets (se abrirá en una nueva ventana)

Autores: B. Larsen, N. El Kassem, T. Giannetsos, I. Krontiris, S. Vasileiadis, L. Chen
Publicado en: TrustCom 2023, 2023
Editor: TrustCom 2023
DOI: 10.1109/TrustCom60117.2023.00146

Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning (se abrirá en una nueva ventana)

Autores: Giovanni Ciaramella, Stefano Fagnano, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Publicado en: 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA), 2024
Editor: IEEE
DOI: 10.1109/ICMLA55696.2022.00274

Exploring Quantum Machine Learning for Explainable Malware Detection (se abrirá en una nueva ventana)

Autores: Giovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Publicado en: 2023 International Joint Conference on Neural Networks (IJCNN), 2024
Editor: IEEE
DOI: 10.1109/IJCNN54540.2023.10191964

Game of Zones: An Automated Intent-Based Network Micro-segmentation Methodology

Autores: Daniele Canavese; Romain Laborde; Abir Laraba; Afonso Ferreira; Abdelmalek Benzekri
Publicado en: NOMS: Network Operations and Management Symposium, 2025
Editor: IEEE

An Approach for Privacy-Preserving Mobile Malware Detection Through Federated Machine Learning (se abrirá en una nueva ventana)

Autores: Giovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo, Christian Peluso, Antonella Santone
Publicado en: Proceedings of the 26th International Conference on Enterprise Information Systems, 2024, ISBN 978-989-758-692-7
Editor: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0012730600003690

A Model For Assessing The Adherence of E-Identity Solutions To Self-Sovereign Identity (se abrirá en una nueva ventana)

Autores: Lepore, Cristian; Laborde, Romain; Eynard, Jessica; Kandi, Mohamed, Ali; Macilotti, Giorgia; Ferreira, Afonso; Sibilla, Michelle
Publicado en: World Conference on Information Systems and Technologies, 2024
Editor: Springer
DOI: 10.1007/978-3-031-60215-3_15

The Interplay Between Policy and Technology in Metaverses: Towards Seamless Avatar Interoperability Using Self-Sovereign Identity (se abrirá en una nueva ventana)

Autores: Romain Laborde, Afonso Ferreira, Cristian Lepore, Mohamed-Ali Kandi, Michelle Sibilla, Abdelmalek Benzekri
Publicado en: 2023 IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom), 2023
Editor: IEEE
DOI: 10.1109/MetaCom57706.2023.00080

Identity management in cross-cloud environments: Towards self-sovereign identities using current solutions

Autores: Mohamed-Amine Ben Haj Salah; Romain Laborde; Abdelmalek Benzekri; Mohamed Ali Kandi; Afonso Ferreira
Publicado en: CRiSIS: Conference on Risks and Security of Internet and Systems, 2024
Editor: Springer

ZEKRA: Zero-Knowledge Control-Flow Attestation (se abrirá en una nueva ventana)

Autores: Heini Bergsson Debes, Edlira Dushku, Thanassis Giannetsos, Ali Marandi
Publicado en: Proceedings of the ACM Asia Conference on Computer and Communications Security, 2023
Editor: ACM
DOI: 10.1145/3579856.3582833

Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning: A Proposal (se abrirá en una nueva ventana)

Autores: Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Publicado en: 2022 IEEE International Conference on Big Data (Big Data), 2023
Editor: IEEE
DOI: 10.1109/BigData55660.2022.10020235

Obfuscated Mobile Malware Detection by Means of Dynamic Analysis and Explainable Deep Learning (se abrirá en una nueva ventana)

Autores: Francesco Mercaldo, Giovanni Ciaramella, Antonella Santone, Fabio Martinelli
Publicado en: Proceedings of the 18th International Conference on Availability, Reliability and Security, 2024
Editor: ACM
DOI: 10.1145/3600160.3605037

A shared responsibility model to support cross border and cross organizational federation on top of decentralized and self-sovereign identity: Architecture and first PoC (se abrirá en una nueva ventana)

Autores: Kubach, Michael; Henderson, Isaac; Bithin, Alangot; Dimitrakos, Theo; Vargas, Juan; Winterstetter, Matthias; Krontiris, Ioannis
Publicado en: Open Identity Summit 2023, 2023
Editor: Gesellschaft für Informatik e.V.
DOI: 10.18420/OID2023_08

Comparative Evaluation of PKI and DAA-based Architectures for V2X Communication Security (se abrirá en una nueva ventana)

Autores: Anna Angelogianni, Ioannis Krontiris, Thanassis Giannetsos
Publicado en: 2023 IEEE Vehicular Networking Conference (VNC), 2023
Editor: IEEE
DOI: 10.1109/VNC57357.2023.10136316

Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets (se abrirá en una nueva ventana)

Autores: Benjamin Larsen, Nada El Kassem, Thanassis Giannetsos, Ioannis Krontiris, Stefanos Vasileiadis, Liqun Chen
Publicado en: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2024
Editor: IEEE
DOI: 10.1109/TrustCom60117.2023.00146

Explainable Ransomware Detection with Deep Learning Techniques (se abrirá en una nueva ventana)

Autores: Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Publicado en: Journal of Computer Virology and Hacking Techniques, Edición 20, 2024, ISSN 2263-8733
Editor: Springer Science and Business Media LLC
DOI: 10.1007/s11416-023-00501-1

FLAShadow: A Flash-based Shadow Stack for Low-end Embedded Systems (se abrirá en una nueva ventana)

Autores: Michele Grisafi, Mahmoud Ammar, Marco Roveri, Bruno Crispo
Publicado en: ACM Transactions on Internet of Things, Edición 5, 2024, ISSN 2691-1914
Editor: Association for Computing Machinery (ACM)
DOI: 10.1145/3670413

Digital twin communities: an approach for secure DT data sharing (se abrirá en una nueva ventana)

Autores: Cristina Alcaraz, Iman Hasnaouia Meskini, Javier Lopez
Publicado en: International Journal of Information Security, Edición 24, 2025, ISSN 1615-5262
Editor: Springer Science and Business Media LLC
DOI: 10.1007/s10207-024-00912-1

Explainable Security Requirements Classification Through Transformer Models (se abrirá en una nueva ventana)

Autores: Luca Petrillo, Fabio Martinelli, Antonella Santone, Francesco Mercaldo
Publicado en: Future Internet, Edición 17, 2025, ISSN 1999-5903
Editor: MDPI AG
DOI: 10.3390/fi17010015

Digital Twin-assisted anomaly detection for industrial scenarios (se abrirá en una nueva ventana)

Autores: Cristina Alcaraz, Javier Lopez
Publicado en: International Journal of Critical Infrastructure Protection, Edición 47, 2024, ISSN 1874-5482
Editor: Elsevier BV
DOI: 10.1016/j.ijcip.2024.100721

Towards Explainable Quantum Machine Learning for Mobile Malware Detection and Classification (se abrirá en una nueva ventana)

Autores: Francesco Mercaldo, Giovanni Ciaramella, Giacomo Iadarola, Marco Storto, Fabio Martinelli, Antonella Santone
Publicado en: Applied Sciences, Edición 12, 2024, ISSN 2076-3417
Editor: MDPI AG
DOI: 10.3390/app122312025

Trust Level Evaluation Engine for Dynamic Trust Assessment with Reference to Subjective Logic (se abrirá en una nueva ventana)

Autores: Ana Petrovska, Gabriele Gelardi, Hüseyin Demirci, Emre Koçyiğit, Gabriele Lenzini, Artur Hermann, Nataša Trkulja, Frank Kargl, Ioannis Krontiris, Theo Dimitrakos
Publicado en: IFIP Advances in Information and Communication Technology, Trust Management XIV, 2024
Editor: Springer Nature Switzerland
DOI: 10.1007/978-3-031-76714-2_3

Dynamic Analysis for Explainable Fine-Grained Android Malware Detection (se abrirá en una nueva ventana)

Autores: Giovanni Ciaramella, Francesco Mercaldo, Antonella Santone
Publicado en: Lecture Notes in Computer Science, Security and Trust Management, 2024
Editor: Springer Nature Switzerland
DOI: 10.1007/978-3-031-76371-7_8

DrATC: Dynamic Routing Algorithm Based on Trust Characteristics (se abrirá en una nueva ventana)

Autores: Davide Ferraris, Lorenzo Monti
Publicado en: Lecture Notes in Computer Science, Security and Trust Management, 2024
Editor: Springer Nature Switzerland
DOI: 10.1007/978-3-031-76371-7_1

Continuous Authorization Architecture for Dynamic Trust Evaluation (se abrirá en una nueva ventana)

Autores: Hussein Joumaa, Ana Petrovska, Ali Hariri, Theo Dimitrakos, Bruno Crispo
Publicado en: IFIP Advances in Information and Communication Technology, Trust Management XIV, 2024
Editor: Springer Nature Switzerland
DOI: 10.1007/978-3-031-76714-2_1

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0