Skip to main content

SecUre iNFormation SHaring in federated heterogeneous private clouds


D8.5.2: Dissemination Report

Update documents reporting on dissemination actions carried out according to dissemination plan

D8.5.3: Dissemination Report

Update documents reporting on dissemination actions carried out according to dissemination plan

D8.5.1: Dissemination Report

Update documents reporting on dissemination actions carried out according to dissemination plan

D8.8: Exploitation and Standardization Report

A document reporting against the expected exploitation actions detailed in D7.6

D8.7: Final Conference

An event during which project results will be presented to senior stakeholders.

D8.3: Project website

A website highlighting the achievements of the SUNFISH project.

Searching for OpenAIRE data...


Structuring the Scope: Enabling Adaptive and Multilateral Authorization Management

Author(s): Suzic, Bojan; Reiter, Andreas; Marsalek, Alexander
Published in: 2017
DOI: 10.5281/zenodo.1095647

FedUp! Cloud Federation as a Service

Author(s): Paolo Bottoni, Emanuele Gabrielli, Gabriele Gualandi, Luigi Vincenzo Mancini, Franco Stolfi
Published in: 2016, Page(s) 168-182
DOI: 10.1007/978-3-319-44482-6_11

Best of Two Worlds: Secure Cloud Federations meet eIDAS

Author(s): Zefferer, Thomas; Ziegler, Dominik; Reiter, Andreas
Published in: 2017
DOI: 10.5281/zenodo.1116684

Secure policy-based device-to-device offloading for mobile applications

Author(s): Andreas Reiter
Published in: Proceedings of the Symposium on Applied Computing - SAC '17, 2017, Page(s) 516-521
DOI: 10.1145/3019612.3019719

Balancing Utility and Security: Securing Cloud Federations of Public Entities

Author(s): Suzic, Bojan
Published in: Issue 10, 2016
DOI: 10.1007/978-3-319-48472-3_60

On The Structure and Authorization Management of RESTful Web Services

Author(s): Suzic, Bojan; Prünster, Bernd; Ziegler, Dominik
Published in: 2018
DOI: 10.5281/zenodo.1095641

Towards Secure Collaboration in Federated Cloud Environments

Author(s): Bojan Suzic, Andreas Reiter
Published in: 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Page(s) 750-759
DOI: 10.1109/ARES.2016.46

Blockchain-based Database to Ensure Data Integrity in Cloud Computing Environment

Author(s): E. Gaetani, L. Aniello, R. Baldoni, F. Lombardi, A. Margheri, V. Sassone
Published in: 2017

A Prototype Evaluation of a Tamper-Resistant High Performance Blockchain-Based Transaction Log for a Distributed Database

Author(s): Leonardo Aniello, Roberto Baldoni, Edoardo Gaetani, Federico Lombardi, Andrea Margheri, Vladimiro Sassone
Published in: 2017 13th European Dependable Computing Conference (EDCC), 2017, Page(s) 151-154
DOI: 10.1109/EDCC.2017.31

Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations

Author(s): Md Sadek Ferdous, Andrea Margheri, Federica Paci, Mu Yang, Vladimiro Sassone
Published in: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 2017, Page(s) 2632-2633
DOI: 10.1109/ICDCS.2017.178

A Distributed Infrastructure for Democratic Cloud Federations

Author(s): Andrea Margheri, Md Sadek Ferdous, Mu Yang, Vladimiro Sassone
Published in: 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017, Page(s) 688-691
DOI: 10.1109/CLOUD.2017.93

Bridging Policy, Regulation and Practice? A techno-legal Analysis of Three Types of Data in the GDPR

Author(s): Hu, Runshan; Stalla-Bourdillon, Sophie; Yang, Mu; Schiavo, Valeria; Sassone, Vladimiro
Published in: 2017
DOI: 10.5281/zenodo.1116275

PBFT vs proof-of-authority: applying the CAP theorem to permissioned blockchain

Author(s): De Angelis, Stefano, Aniello, Leonardo, Baldoni, Roberto, Lombardi, Federico, Margheri, Andrea and Sassone, Vladimiro
Published in: 2017

Cross-cloud management of sensitive data via Blockchain: a payslip calculation use case

Author(s): Nicoletti, Luca, Margheri, Andrea, Lombardi, Federico, Sassone, Vladimiro and Schiavo, Francesco Paolo
Published in: 2017

Subversion-Resilient Signature Schemes

Author(s): Giuseppe Ateniese, Bernardo Magri, Daniele Venturi
Published in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15, 2015, Page(s) 364-375
DOI: 10.1145/2810103.2813635

Preventing Information Inference in Access Control

Author(s): Federica Paci, Nicola Zannone
Published in: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies - SACMAT '15, 2015, Page(s) 87-97
DOI: 10.1145/2752952.2752971

Entangled Encodings and Data Entanglement

Author(s): Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgård, Daniele Venturi
Published in: Proceedings of the 3rd International Workshop on Security in Cloud Computing - SCC '15, 2015, Page(s) 3-12
DOI: 10.1145/2732516.2732524

Boten ELISA: A novel approach for botnet C&C in Online Social Networks

Author(s): Alberto Compagno, Mauro Conti, Daniele Lain, Giulio Lovisotto, Luigi Vincenzo Mancini
Published in: 2015 IEEE Conference on Communications and Network Security (CNS), 2015, Page(s) 74-82
DOI: 10.1109/CNS.2015.7346813

Securing integration of cloud services in cross-domain distributed environments

Author(s): Bojan Suzic
Published in: Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC '16, 2016, Page(s) 398-405
DOI: 10.1145/2851613.2851622

User-centered security management of API-based data integration workflows

Author(s): Bojan Suzic
Published in: NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, 2016, Page(s) 1233-1238
DOI: 10.1109/NOMS.2016.7502993

Applying Secure Multi-party Computation in Practice

Author(s): Talviste, Riivo
Published in: 2016
DOI: 10.5281/zenodo.1116316

Hybrid Edge Computing - Enable Processing of Sensitive Data in Mobile Edge Computing Scenarios

Author(s): Andreas Reiter
Published in: 2017

Integrated Authorisation Management of Web APIs

Author(s): Bojan Suzic
Published in: 2018

Challenges for trustworthy (multi-)Cloud based services in the Digital Single Market

Author(s): A. Pasic, B. Gallego, B. Zwattendorfer, B. Suzic, E. Prieto et. al.
Published in: 2017
DOI: 10.5281/zenodo.1116267

Cloud Technology options towards free flow of data

Author(s): E. Rios, B. Prunster, B. Suzic, E. Prieto, et. al.
Published in: 2016
DOI: 10.5281/zenodo.1116269

FaaS: Federation-as-a-Service

Author(s): Schiavo, Francesco Paolo; Sassone, Vladimiro; Nicoletti, Luca; Margheri, Andrea
Published in: 2016
DOI: 10.5281/zenodo.204811

Secure Data Sharing and Processing in Heterogeneous Clouds

Author(s): Bojan Suzic, Andreas Reiter, Florian Reimair, Daniele Venturi, Baldur Kubo
Published in: Procedia Computer Science, Issue 68, 2015, Page(s) 116-126, ISSN 1877-0509
DOI: 10.1016/j.procs.2015.09.228

Analyzing Android Encrypted Network Traffic to Identify User Actions

Author(s): Mauro Conti, Luigi Vincenzo Mancini, Riccardo Spolaor, Nino Vincenzo Verde
Published in: IEEE Transactions on Information Forensics and Security, Issue 11/1, 2016, Page(s) 114-125, ISSN 1556-6013
DOI: 10.1109/TIFS.2015.2478741

A descriptive type foundation for RDF Schema

Author(s): Gabriel Ciobanu, Ross Horne, Vladimiro Sassone
Published in: Journal of Logical and Algebraic Methods in Programming, 2016, ISSN 2352-2208
DOI: 10.1016/j.jlamp.2016.02.006

Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation

Author(s): Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi
Published in: Automata, Languages, and Programming, 2015, Page(s) 456-468
DOI: 10.1007/978-3-662-47672-7_37

No Place to Hide that Bytes Won’t Reveal: Sniffing Location-Based Encrypted Traffic to Track a User’s Position

Author(s): Giuseppe Ateniese, Briland Hitaj, Luigi Vincenzo Mancini, Nino Vincenzo Verde, Antonio Villani
Published in: Network and System Security, 2015, Page(s) 46-59
DOI: 10.1007/978-3-319-25645-0_4

(De-)Constructing TLS 1.3

Author(s): Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi
Published in: Progress in Cryptology -- INDOCRYPT 2015, 2015, Page(s) 85-102
DOI: 10.1007/978-3-319-26617-6_5

Non-Malleable Encryption: Simpler, Shorter, Stronger

Author(s): Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi
Published in: Theory of Cryptography, 2016, Page(s) 306-335
DOI: 10.1007/978-3-662-49096-9_13

Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking

Author(s): Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik
Published in: Applied Cryptography and Network Security, 2015, Page(s) 243-262
DOI: 10.1007/978-3-319-28166-7_12

Chosen-Ciphertext Security from Subset Sum

Author(s): Sebastian Faust, Daniel Masny, Daniele Venturi
Published in: Public-Key Cryptography – PKC 2016, 2016, Page(s) 35-46
DOI: 10.1007/978-3-662-49384-7_2