Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

TITAN: Trusted envIronments for confidenTiAl computiNg and secure data sharing

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Report on communication, dissemination, and exploitation activitie (opens in new window)

Report on communication, dissemination, and exploitation activities (F6S) (M18): This will be a report summarising all activities related to dissemination, communication, ecosystem building, during the first half of the project. Preliminary business models will be made available in this report. It will also provide preliminary business model.

Confidential AI Platform Architecture (opens in new window)

Confidential AI Platform Architecture (CAB) (M12): Report describing the Confidential EOSC platform, along with an executable Ansible script for scalable deployment of TEEs supporting the Confidential AI platform.

Plan for dissemination and exploitation including communication activities (opens in new window)

Plan for dissemination and exploitation including communication activities (F6S) (M6): Describe the detailed dissemination, communication and exploitation plan of the project (including project website, social media channels and branding).

Specification of the use-cases (opens in new window)

Specification of the use-cases (CAB) (M15): Report specifying the use-cases compliant with EOSC framework for testing and validation.

Infrastructure and Cloud Computing Testbed (opens in new window)

Infrastructure and Cloud Computing Testbed (UVC) (M18): Setup of Cloud Computing Testbed.

Legal, Regulative and Ethical Requirements for EOSC Secure Data Sharing and Processing (opens in new window)

Legal, Regulative and Ethical Requirements for EOSC Secure Data Sharing and Processing (TRI) (M9, M18): Report summarising and explaining all collected legal and ethical requirements.

Policy briefing Phase1 (opens in new window)

Information on the project results and outcomes to the EU policy makers and to report on links with the other Research Infrastructures/and with the EOSC family.

Technical requirements for EOSC secure data sharing and processing (opens in new window)

(FRA) (M9, M18): Report summarising, prioritising and clarifying collected technical requirements.Technical requirements for EOSC secure data sharing and processing (FRA) (M9, M18): Report summarising, prioritising and clarifying collected technical requirements.

TITAN Project Management Handbook, Quality Assurance and Risk Management Plan (opens in new window)

TITAN Project Management Handbook, Quality Assurance and Risk Management Plan (UMU) (M3): Provides guidelines to be followed by all TITAN partners in different managerial aspects. This report will also describe how risk management and quality assurance will be structured, implemented, and performed throughout the project duration.

Data Anonymization Tools and Techniques for Secure Data Sharing and Processing (opens in new window)

Data Anonymization Tools and Techniques for Secure Data Sharing and Processing (FUJ) (M18): Report summarising and explaining data anonymisation process and tools for secure data sharing within the EOSC ecosystem.

Secure EOSC Data Sharing Architecture and Infrastructure (opens in new window)

Secure EOSC Data Sharing Architecture and Infrastructure (UMU) (M18): Report defining architecture blueprints for EOSC data sharing platform and data sharing hardware and software infrastructure configuration.

Confidential Computing and Secure Multi-party Execution Platform (opens in new window)

Confidential Computing and Secure Multi-party Execution Platform (UVC) (M18): Open-source implementation of the platform for collaborative AI based on Confidential Computing TEEs.

Publications

Understanding the performance overhead of Confidential Computing on High-Performance Computing: Profiling and benchmarking of HPC workloads on systems secured by AMD SEV-SNP

Author(s): Anton Iacobaeus
Published in: 2025
Publisher: Linköping University

Data Privacy Vocabulary (DPV) – Version 2.0 (opens in new window)

Author(s): Harshvardhan J. Pandit; Beatriz Esteves; Georg P. Krog; Paul Ryan; Delaram Golpayegani; Julian Flake
Published in: Lecture Notes in Computer Science ISBN: 9783031778469, 2024, ISBN 9783031778469
Publisher: SpringerLink
DOI: 10.1007/978-3-031-77847-6_10

Privacy Preserving Enablers for Data Space Ecosystems (opens in new window)

Author(s): Natalia Borgoñós García, María Hernández Padilla, Antonio Fernando Skarmeta Gómez
Published in: Communications in Computer and Information Science, Global Internet of Things and Edge Computing Summit, 2025, ISBN 978-3-031-78572-6
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-78572-6_5

SLEEP–WAKE: A Comprehensive Mnemonic for Systematic Screening of Sleep‐Related Issues (opens in new window)

Author(s): Karen Spruyt
Published in: Pediatric Discovery, 2025, ISSN 2835-5598
Publisher: Wiley Online
DOI: 10.1002/PDI3.70010

Data Privacy Vocabulary (DPV) - Version 2 (opens in new window)

Author(s): Harshvardhan J. Pandit; Beatriz Esteves; Georg P Krog; Paul Ryan; Delaram Golpayegani; Julian Flake
Published in: Crossref, 2024, ISSN 2331-8422
Publisher: Arxiv
DOI: 10.31219/OSF.IO/MA9UE

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0