Skip to main content
Vai all'homepage della Commissione europea (si apre in una nuova finestra)
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS

Data Usage Control for empowering digital sovereignty for All citizens

CORDIS fornisce collegamenti ai risultati finali pubblici e alle pubblicazioni dei progetti ORIZZONTE.

I link ai risultati e alle pubblicazioni dei progetti del 7° PQ, così come i link ad alcuni tipi di risultati specifici come dataset e software, sono recuperati dinamicamente da .OpenAIRE .

Risultati finali

Initial results of Data Sharing Agreement Management and Enforcement Infrastructures (si apre in una nuova finestra)

This deliverable will define the format of DSA and list the main considered operations. It will also describe the preliminary version of both DSA management and enforcement infrastructures.

Initial results of Design, implementation and evaluation of use cases (si apre in una nuova finestra)

This deliverable describes the methodology followed for the elicitation of the requirements and needs of each use case together with a report of common and specific requirements, reports about the design of the use cases for each use case and the preparation done for the integration of DUCA, and describes the initial integration of the DUCA approach in each use case, the process followed, and the fulfilment of requirements as described in D5.1

Initial results of requirements, architecture and integration test (si apre in una nuova finestra)

This report provides the complete list of requirements for the architectural components, the preliminary version of the DUCA architecture and the first version of the integrated DUCA platform.

Plan for dissemination, exploitation and communication (si apre in una nuova finestra)

This deliverable will present DUCAs dissemination exploitation and communications plan which will be used to transfer the knowledge obtained during the project lifecycle

Data Management Plan (DMP) (si apre in una nuova finestra)

The DMP describes the data management life cycle for the data collected processed andor generated by the project This deliverable will evolve during the project lifetime

Initial results of security and privacy enhancing technologies (si apre in una nuova finestra)

This deliverable reports on the requirements for all the components developed in tasks 4.1-4.6 and the preliminary maturation cycle of all the components ready to be integrated in WP2.

Pubblicazioni

A SLAHP in the Face of DLL Search Order Hijacking (si apre in una nuova finestra)

Autori: Antonin Verdier, Romain Laborde, Mohamed Ali Kandi, Abdelmalek Benzekri
Pubblicato in: Communications in Computer and Information Science, Ubiquitous Security, 2024
Editore: Springer
DOI: 10.1007/978-981-97-1274-8_12

Static and Dynamic Analysis of a Usage Control System (si apre in una nuova finestra)

Autori: Ulrich Schöpp, Fathiyeh Faghih, Subhajit Bandopadhyay, Hussein Joumaa, Amjad Ibrahim, Chuangjie Xu, Xin Ye, Theo Dimitrakos
Pubblicato in: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Editore: ACM
DOI: 10.1145/3649158.3657038

Security Policy Generation and Verification through Large Language Models: A Proposal (si apre in una nuova finestra)

Autori: Fabio Martinelli, Francesco Mercaldo, Luca Petrillo, Antonella Santone
Pubblicato in: Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024, ISBN 979-8-4007-0421-5
Editore: ACM
DOI: 10.1145/3626232.3658635

Obligation Management Framework for Usage Control (si apre in una nuova finestra)

Autori: Hussein Joumaa, Ali Hariri, Ana Petrovska, Oleksii Osliak, Theo Dimitrakos, Bruno Crispo
Pubblicato in: Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Editore: ACM
DOI: 10.1145/3649158.3657048

On Subjective Logic Trust Discount for Referral Paths (si apre in una nuova finestra)

Autori: Koffi Ismael Ouattara, Ana Petrovska, Artur Hermann, Nataša Trkulja, Theo Dimitrakos, Frank Kargl
Pubblicato in: 2024 27th International Conference on Information Fusion (FUSION), 2024
Editore: IEEE
DOI: 10.23919/FUSION59988.2024.10706345

DroidDefender: An Image-based Android Antimalware Proof-of-Concept (si apre in una nuova finestra)

Autori: Giovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024, ISBN 979-8-4007-0421-5
Editore: ACM
DOI: 10.1145/3626232.3658634

Specifying a Usage Control System (si apre in una nuova finestra)

Autori: Ulrich Schöpp, Chuangjie Xu, Amjad Ibrahim, Fathiyeh Faghih, Theo Dimitrakos
Pubblicato in: Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2024
Editore: ACM
DOI: 10.1145/3589608.3593843

SecPol: Enabling Security Policy Control in Vehicle Networks using Intrusion Detection and Hardware Trust (si apre in una nuova finestra)

Autori: Florian Fenzl, Jonathan Stancke, Christian Plappert, Roland Rieke, Felix Gail, Theo Dimitrakos, Hussein Joumaa
Pubblicato in: Proceedings of the 2024 Cyber Security in CarS Workshop, 2024
Editore: ACM
DOI: 10.1145/3689936.3694697

RETRACT: Expressive Designated Verifier Anonymous Credentials (si apre in una nuova finestra)

Autori: Heini Bergsson Debes, Thanassis Giannetsos
Pubblicato in: Proceedings of the 18th International Conference on Availability, Reliability and Security, 2024
Editore: ACM
DOI: 10.1145/3600160.3600191

Towards Reliable Collaborative Data Processing Ecosystems: Survey on Data Quality Criteria (si apre in una nuova finestra)

Autori: Sahi, Louis; Laborde, Romain; Kandi, Mohamed, Ali; Sibilla, Michele; Ferreira, Afonso; Macilotti, Giorgia; Benzekri, Abdelmalek
Pubblicato in: TrustCom: Conference on Trust, Security and Privacy in Computing and Communications, 2023
Editore: IEEE
DOI: 10.1109/trustcom60117.2023.00345

StegWare: A Novel Malware Model Exploiting Payload Steganography and Dynamic Compilation (si apre in una nuova finestra)

Autori: Daniele Albanese, Rosangela Casolare, Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Marco Russodivito, Antonella Santone
Pubblicato in: Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0011859000003405

On the Privacy and Security for E-Education Metaverse (si apre in una nuova finestra)

Autori: Sofia Sakka, Vasiliki Liagkou, Chrysostomos Stylios, Afonso Ferreira
Pubblicato in: 2024 IEEE Global Engineering Education Conference (EDUCON), 2024
Editore: IEEE
DOI: 10.1109/EDUCON60312.2024.10578660

ID-based Self-Encryption via Hyperledger Fabirc-based Smart Contract (si apre in una nuova finestra)

Autori: I. Grishkov, R. Kromes, T. Giannetsos, K. Liang
Pubblicato in: International Conference on Blockchain Technology and Emerging Applications, 2023, 2023
Editore: International Conference on Blockchain Technology and Emerging Applications, 2023
DOI: 10.1007/978-3-031-31420-9_1

Towards Robust Trust Frameworks for Data Exchange: A Multidisciplinary Inquiry (si apre in una nuova finestra)

Autori: Badirova, Aytaj and Alangot, Bithin and Dimitrakos, Theo and Yahyapour, Ramin
Pubblicato in: Open Identity Summit 2024, 2024
Editore: Gesellschaft für Informatik e.V.
DOI: 10.18420/OID2024_01

Achieving Higher Level of Assurance in Privacy-Preserving Identity Wallets (si apre in una nuova finestra)

Autori: B. Larsen, N. El Kassem, T. Giannetsos, I. Krontiris, S. Vasileiadis, L. Chen
Pubblicato in: TrustCom 2023, 2023
Editore: TrustCom 2023
DOI: 10.1109/TrustCom60117.2023.00146

Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning (si apre in una nuova finestra)

Autori: Giovanni Ciaramella, Stefano Fagnano, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA), 2024
Editore: IEEE
DOI: 10.1109/ICMLA55696.2022.00274

Exploring Quantum Machine Learning for Explainable Malware Detection (si apre in una nuova finestra)

Autori: Giovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: 2023 International Joint Conference on Neural Networks (IJCNN), 2024
Editore: IEEE
DOI: 10.1109/IJCNN54540.2023.10191964

Game of Zones: An Automated Intent-Based Network Micro-segmentation Methodology

Autori: Daniele Canavese; Romain Laborde; Abir Laraba; Afonso Ferreira; Abdelmalek Benzekri
Pubblicato in: NOMS: Network Operations and Management Symposium, 2025
Editore: IEEE

An Approach for Privacy-Preserving Mobile Malware Detection Through Federated Machine Learning (si apre in una nuova finestra)

Autori: Giovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo, Christian Peluso, Antonella Santone
Pubblicato in: Proceedings of the 26th International Conference on Enterprise Information Systems, 2024, ISBN 978-989-758-692-7
Editore: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0012730600003690

A Model For Assessing The Adherence of E-Identity Solutions To Self-Sovereign Identity (si apre in una nuova finestra)

Autori: Lepore, Cristian; Laborde, Romain; Eynard, Jessica; Kandi, Mohamed, Ali; Macilotti, Giorgia; Ferreira, Afonso; Sibilla, Michelle
Pubblicato in: World Conference on Information Systems and Technologies, 2024
Editore: Springer
DOI: 10.1007/978-3-031-60215-3_15

The Interplay Between Policy and Technology in Metaverses: Towards Seamless Avatar Interoperability Using Self-Sovereign Identity (si apre in una nuova finestra)

Autori: Romain Laborde, Afonso Ferreira, Cristian Lepore, Mohamed-Ali Kandi, Michelle Sibilla, Abdelmalek Benzekri
Pubblicato in: 2023 IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom), 2023
Editore: IEEE
DOI: 10.1109/MetaCom57706.2023.00080

Identity management in cross-cloud environments: Towards self-sovereign identities using current solutions

Autori: Mohamed-Amine Ben Haj Salah; Romain Laborde; Abdelmalek Benzekri; Mohamed Ali Kandi; Afonso Ferreira
Pubblicato in: CRiSIS: Conference on Risks and Security of Internet and Systems, 2024
Editore: Springer

ZEKRA: Zero-Knowledge Control-Flow Attestation (si apre in una nuova finestra)

Autori: Heini Bergsson Debes, Edlira Dushku, Thanassis Giannetsos, Ali Marandi
Pubblicato in: Proceedings of the ACM Asia Conference on Computer and Communications Security, 2023
Editore: ACM
DOI: 10.1145/3579856.3582833

Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning: A Proposal (si apre in una nuova finestra)

Autori: Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: 2022 IEEE International Conference on Big Data (Big Data), 2023
Editore: IEEE
DOI: 10.1109/BigData55660.2022.10020235

Obfuscated Mobile Malware Detection by Means of Dynamic Analysis and Explainable Deep Learning (si apre in una nuova finestra)

Autori: Francesco Mercaldo, Giovanni Ciaramella, Antonella Santone, Fabio Martinelli
Pubblicato in: Proceedings of the 18th International Conference on Availability, Reliability and Security, 2024
Editore: ACM
DOI: 10.1145/3600160.3605037

A shared responsibility model to support cross border and cross organizational federation on top of decentralized and self-sovereign identity: Architecture and first PoC (si apre in una nuova finestra)

Autori: Kubach, Michael; Henderson, Isaac; Bithin, Alangot; Dimitrakos, Theo; Vargas, Juan; Winterstetter, Matthias; Krontiris, Ioannis
Pubblicato in: Open Identity Summit 2023, 2023
Editore: Gesellschaft für Informatik e.V.
DOI: 10.18420/OID2023_08

Comparative Evaluation of PKI and DAA-based Architectures for V2X Communication Security (si apre in una nuova finestra)

Autori: Anna Angelogianni, Ioannis Krontiris, Thanassis Giannetsos
Pubblicato in: 2023 IEEE Vehicular Networking Conference (VNC), 2023
Editore: IEEE
DOI: 10.1109/VNC57357.2023.10136316

Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets (si apre in una nuova finestra)

Autori: Benjamin Larsen, Nada El Kassem, Thanassis Giannetsos, Ioannis Krontiris, Stefanos Vasileiadis, Liqun Chen
Pubblicato in: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2024
Editore: IEEE
DOI: 10.1109/TrustCom60117.2023.00146

Explainable Ransomware Detection with Deep Learning Techniques (si apre in una nuova finestra)

Autori: Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Pubblicato in: Journal of Computer Virology and Hacking Techniques, Numero 20, 2024, ISSN 2263-8733
Editore: Springer Science and Business Media LLC
DOI: 10.1007/s11416-023-00501-1

FLAShadow: A Flash-based Shadow Stack for Low-end Embedded Systems (si apre in una nuova finestra)

Autori: Michele Grisafi, Mahmoud Ammar, Marco Roveri, Bruno Crispo
Pubblicato in: ACM Transactions on Internet of Things, Numero 5, 2024, ISSN 2691-1914
Editore: Association for Computing Machinery (ACM)
DOI: 10.1145/3670413

Digital twin communities: an approach for secure DT data sharing (si apre in una nuova finestra)

Autori: Cristina Alcaraz, Iman Hasnaouia Meskini, Javier Lopez
Pubblicato in: International Journal of Information Security, Numero 24, 2025, ISSN 1615-5262
Editore: Springer Science and Business Media LLC
DOI: 10.1007/s10207-024-00912-1

Explainable Security Requirements Classification Through Transformer Models (si apre in una nuova finestra)

Autori: Luca Petrillo, Fabio Martinelli, Antonella Santone, Francesco Mercaldo
Pubblicato in: Future Internet, Numero 17, 2025, ISSN 1999-5903
Editore: MDPI AG
DOI: 10.3390/fi17010015

Digital Twin-assisted anomaly detection for industrial scenarios (si apre in una nuova finestra)

Autori: Cristina Alcaraz, Javier Lopez
Pubblicato in: International Journal of Critical Infrastructure Protection, Numero 47, 2024, ISSN 1874-5482
Editore: Elsevier BV
DOI: 10.1016/j.ijcip.2024.100721

Towards Explainable Quantum Machine Learning for Mobile Malware Detection and Classification (si apre in una nuova finestra)

Autori: Francesco Mercaldo, Giovanni Ciaramella, Giacomo Iadarola, Marco Storto, Fabio Martinelli, Antonella Santone
Pubblicato in: Applied Sciences, Numero 12, 2024, ISSN 2076-3417
Editore: MDPI AG
DOI: 10.3390/app122312025

Trust Level Evaluation Engine for Dynamic Trust Assessment with Reference to Subjective Logic (si apre in una nuova finestra)

Autori: Ana Petrovska, Gabriele Gelardi, Hüseyin Demirci, Emre Koçyiğit, Gabriele Lenzini, Artur Hermann, Nataša Trkulja, Frank Kargl, Ioannis Krontiris, Theo Dimitrakos
Pubblicato in: IFIP Advances in Information and Communication Technology, Trust Management XIV, 2024
Editore: Springer Nature Switzerland
DOI: 10.1007/978-3-031-76714-2_3

Dynamic Analysis for Explainable Fine-Grained Android Malware Detection (si apre in una nuova finestra)

Autori: Giovanni Ciaramella, Francesco Mercaldo, Antonella Santone
Pubblicato in: Lecture Notes in Computer Science, Security and Trust Management, 2024
Editore: Springer Nature Switzerland
DOI: 10.1007/978-3-031-76371-7_8

DrATC: Dynamic Routing Algorithm Based on Trust Characteristics (si apre in una nuova finestra)

Autori: Davide Ferraris, Lorenzo Monti
Pubblicato in: Lecture Notes in Computer Science, Security and Trust Management, 2024
Editore: Springer Nature Switzerland
DOI: 10.1007/978-3-031-76371-7_1

Continuous Authorization Architecture for Dynamic Trust Evaluation (si apre in una nuova finestra)

Autori: Hussein Joumaa, Ana Petrovska, Ali Hariri, Theo Dimitrakos, Bruno Crispo
Pubblicato in: IFIP Advances in Information and Communication Technology, Trust Management XIV, 2024
Editore: Springer Nature Switzerland
DOI: 10.1007/978-3-031-76714-2_1

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile

Il mio fascicolo 0 0