Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

ENsuring Secure and Safe CMD Design with Zero TRUST Principles

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Dissemination, Communication & Exploitation Plan (opens in new window)

Documentation on T7.1 and on the planned dissemination, exploitation and communication activities.

ENTRUST Reference Architecture – Initial Release (opens in new window)

Documentation of the background and gaps (T2.1), the functional and non-functional requirements (T2.2) and the first version of the ENTRUST Architecture (T2.3) accompanied with the first version of the ethical analysis (T2.4) on the measures of evidence to be considered and the type of secure elements to be used (T2.5).

Project Handbook (opens in new window)

A handbook describing the project management, quality control and risk assessment procedures adopted in the project.

Impact Maximization Activities Interim Report (opens in new window)

Documentation on the dissemination, communication, clustering, standardization, and exploitation activities. Highlighting open-source contributions and workshop organization activities.

Trust Abstractions & Cryptographic Anchors for CMD Secure Operation (opens in new window)

Report on the progress of Tasks 3.1 – 3.3 on defining the appropriate formal models and theorem proofs capturing all of the cryptographic primitives to be leveraged for safeguarding the device’s operation.

Conceptual Architecture of ENTRUST Customizable TC and Attestation Models Specifications (opens in new window)

Report on the progress of T4.1-2 on blueprinting the architecture of the customisable TC and all envisioned functionalities alongside the methodology for enforcing runtime behavioural attestation.

ENTRUST Risk Assessment & Collective Threat Intelligence Framework – Initial Release (opens in new window)

Early release of ENTRUST Risk Assessment Framework (T3.4) and Attack Validation component (T3.5), including an update on the defined trust models based on any newly identified attack vectors.

Runtime Assurance & Certification Framework – First Release (opens in new window)

Early release of the ENTRUST Runtime Assurance & Certification Framework (T4.3-4).

ENTRUST Blockchain Architecture, Authorization and Secure On- and Off-Chain Data Management – First Release (opens in new window)

Documentation on the Blockchain architecture and services and the role of device-side software agents and their lifecycle management (T5.1-5).

ENTRUST Website design and release (opens in new window)

The release of the ENTRUST Website as well as the created project's design profile.

Publications

A Way Forward for the MDCG 2019-16 Medical Device Security Guidance (opens in new window)

Author(s): Steve Taylor, Martin Gilje Jaatun, Karin Bernsmed, Christos Androutsos, Dietmar Frey, Simone Favrin, João Rodrigues, DušKo Milojević, Dimitrios Karras, Ioannis Siachos, Gregory Epiphaniou, Nabil Moukafih, Sotiris Messinis, Ioannis Rallis, et al.
Published in: PETRA '24: Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive Environments, Issue Pages 593 - 599, 2024, ISBN 979-8-4007-1760-4
Publisher: ACM
DOI: 10.1145/3652037.366389

Towards Community-Driven Generative AI (opens in new window)

Author(s): Rustem Dautov, Erik Johannes Husom, Sagar Sen, Hui Song
Published in: Position Papers of the 18th Conference on Computer Science and Intelligence Systems, 2023, ISSN 2300-5963
Publisher: ACSIS
DOI: 10.5281/zenodo.13384087

Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting (opens in new window)

Author(s): Kwan Yin Chan, Liqun Chen, Yangguang Tian, Tsz Hon Yuen
Published in: ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, Issue Pages 1066 - 1081, 2024, ISBN 979-8-4007-0482-6
Publisher: ACM
DOI: 10.1145/3634737.3656291

FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption (opens in new window)

Author(s): Long Meng and Liqun Chen and Yangguang Tian and Mark Manulis and Suhui Liu
Published in: Preprint, 2024
Publisher: Cryptology ePrint Archive, Paper 2024/986
DOI: 10.5281/zenodo.13383957

Drowsiness Detection Using Federated Learning: Lessons Learnt from Dealing with Non-IID Data (opens in new window)

Author(s): Rustem Dautov and Erik Johannes Husom
Published in: PETRA '24: Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive Environments, 2024, ISBN 979-8-4007-1760-4
Publisher: ACM
DOI: 10.5281/zenodo.13383943

FEASE: Fast and Expressive Asymmetric Searchable Encryption

Author(s): Long Meng and Liqun Chen and Yangguang Tian and Mark Manulis and Suhui Liu
Published in: USENIX Security Symposium 2024, 2024
Publisher: Cryptology ePrint Archive

Raft Protocol for Fault Tolerance and Self-Recovery in Federated Learning (opens in new window)

Author(s): Rustem Dautov, Erik Johannes Husom
Published in: SEAMS '24: Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, 2024, ISBN 979-8-4007-0585-4
Publisher: ACM
DOI: 10.5281/zenodo.13384065

International Journal of Information Security (opens in new window)

Author(s): Aristeidis Farao, Georgios Paparis, Sakshyam Panda, Emmanouil Panaousis, Apostolis Zarras & Christos Xenakis
Published in: International Journal of Information Security, Issue Volume 23, pages 347–371, 2023, ISSN 1615-5262
Publisher: Springer Verlag
DOI: 10.1007/s10207-023-00741-8

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available