Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

SecUre iNFormation SHaring in federated heterogeneous private clouds

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

D8.5.2: Dissemination Report (opens in new window)

Update documents reporting on dissemination actions carried out according to dissemination plan

D8.5.3: Dissemination Report (opens in new window)

Update documents reporting on dissemination actions carried out according to dissemination plan

D8.5.1: Dissemination Report (opens in new window)

Update documents reporting on dissemination actions carried out according to dissemination plan

D8.8: Exploitation and Standardization Report (opens in new window)

A document reporting against the expected exploitation actions detailed in D7.6

D8.7: Final Conference (opens in new window)

An event during which project results will be presented to senior stakeholders.

D8.3: Project website (opens in new window)

A website highlighting the achievements of the SUNFISH project.

Publications

Structuring the Scope: Enabling Adaptive and Multilateral Authorization Management (opens in new window)

Author(s): Suzic, Bojan; Reiter, Andreas; Marsalek, Alexander
Published in: 2017
Publisher: 2017 IEEE Conference on Communications and Network Security (CNS)
DOI: 10.5281/zenodo.1095647

FedUp! Cloud Federation as a Service (opens in new window)

Author(s): Paolo Bottoni, Emanuele Gabrielli, Gabriele Gualandi, Luigi Vincenzo Mancini, Franco Stolfi
Published in: 2016, Page(s) 168-182
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-44482-6_11

Best of Two Worlds: Secure Cloud Federations meet eIDAS (opens in new window)

Author(s): Zefferer, Thomas; Ziegler, Dominik; Reiter, Andreas
Published in: 2017
Publisher: Academic Centre of Excellence, University of Southampton
DOI: 10.5281/zenodo.1116684

Secure policy-based device-to-device offloading for mobile applications (opens in new window)

Author(s): Andreas Reiter
Published in: Proceedings of the Symposium on Applied Computing - SAC '17, 2017, Page(s) 516-521, ISBN 9781-450344869
Publisher: ACM Press
DOI: 10.1145/3019612.3019719

Balancing Utility and Security: Securing Cloud Federations of Public Entities (opens in new window)

Author(s): Suzic, Bojan
Published in: Issue 10, 2016
Publisher: Spinger
DOI: 10.1007/978-3-319-48472-3_60

On The Structure and Authorization Management of RESTful Web Services (opens in new window)

Author(s): Suzic, Bojan; Prünster, Bernd; Ziegler, Dominik
Published in: 2018
Publisher: Proceedings of SAC 2018
DOI: 10.5281/zenodo.1095641

Towards Secure Collaboration in Federated Cloud Environments (opens in new window)

Author(s): Bojan Suzic, Andreas Reiter
Published in: 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Page(s) 750-759, ISBN 978-1-5090-0990-9
Publisher: IEEE
DOI: 10.1109/ARES.2016.46

Blockchain-based Database to Ensure Data Integrity in Cloud Computing Environment

Author(s): E. Gaetani, L. Aniello, R. Baldoni, F. Lombardi, A. Margheri, V. Sassone
Published in: 2017
Publisher: CEUR-WS.org

A Prototype Evaluation of a Tamper-Resistant High Performance Blockchain-Based Transaction Log for a Distributed Database (opens in new window)

Author(s): Leonardo Aniello, Roberto Baldoni, Edoardo Gaetani, Federico Lombardi, Andrea Margheri, Vladimiro Sassone
Published in: 2017 13th European Dependable Computing Conference (EDCC), 2017, Page(s) 151-154, ISBN 978-1-5386-0602-5
Publisher: IEEE
DOI: 10.1109/EDCC.2017.31

Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations (opens in new window)

Author(s): Md Sadek Ferdous, Andrea Margheri, Federica Paci, Mu Yang, Vladimiro Sassone
Published in: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 2017, Page(s) 2632-2633, ISBN 978-1-5386-1792-2
Publisher: IEEE
DOI: 10.1109/ICDCS.2017.178

A Distributed Infrastructure for Democratic Cloud Federations (opens in new window)

Author(s): Andrea Margheri, Md Sadek Ferdous, Mu Yang, Vladimiro Sassone
Published in: 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017, Page(s) 688-691, ISBN 978-1-5386-1993-3
Publisher: IEEE
DOI: 10.1109/CLOUD.2017.93

Bridging Policy, Regulation and Practice? A techno-legal Analysis of Three Types of Data in the GDPR (opens in new window)

Author(s): Hu, Runshan; Stalla-Bourdillon, Sophie; Yang, Mu; Schiavo, Valeria; Sassone, Vladimiro
Published in: 2017
Publisher: Hart Publishing
DOI: 10.5281/zenodo.1116275

PBFT vs proof-of-authority: applying the CAP theorem to permissioned blockchain

Author(s): De Angelis, Stefano, Aniello, Leonardo, Baldoni, Roberto, Lombardi, Federico, Margheri, Andrea and Sassone, Vladimiro
Published in: 2017
Publisher: University of Southampton

Cross-cloud management of sensitive data via Blockchain: a payslip calculation use case

Author(s): Nicoletti, Luca, Margheri, Andrea, Lombardi, Federico, Sassone, Vladimiro and Schiavo, Francesco Paolo
Published in: 2017
Publisher: Research Center of Cyber Intelligence and Information Security

Subversion-Resilient Signature Schemes (opens in new window)

Author(s): Giuseppe Ateniese, Bernardo Magri, Daniele Venturi
Published in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15, 2015, Page(s) 364-375, ISBN 9781-450338325
Publisher: ACM Press
DOI: 10.1145/2810103.2813635

Preventing Information Inference in Access Control (opens in new window)

Author(s): Federica Paci, Nicola Zannone
Published in: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies - SACMAT '15, 2015, Page(s) 87-97, ISBN 9781-450335560
Publisher: ACM Press
DOI: 10.1145/2752952.2752971

Entangled Encodings and Data Entanglement (opens in new window)

Author(s): Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgård, Daniele Venturi
Published in: Proceedings of the 3rd International Workshop on Security in Cloud Computing - SCC '15, 2015, Page(s) 3-12, ISBN 9781-450334471
Publisher: ACM Press
DOI: 10.1145/2732516.2732524

Boten ELISA: A novel approach for botnet C&C in Online Social Networks (opens in new window)

Author(s): Alberto Compagno, Mauro Conti, Daniele Lain, Giulio Lovisotto, Luigi Vincenzo Mancini
Published in: 2015 IEEE Conference on Communications and Network Security (CNS), 2015, Page(s) 74-82, ISBN 978-1-4673-7876-5
Publisher: IEEE
DOI: 10.1109/CNS.2015.7346813

Securing integration of cloud services in cross-domain distributed environments (opens in new window)

Author(s): Bojan Suzic
Published in: Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC '16, 2016, Page(s) 398-405, ISBN 9781-450337397
Publisher: ACM Press
DOI: 10.1145/2851613.2851622

User-centered security management of API-based data integration workflows (opens in new window)

Author(s): Bojan Suzic
Published in: NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, 2016, Page(s) 1233-1238, ISBN 978-1-5090-0223-8
Publisher: IEEE
DOI: 10.1109/NOMS.2016.7502993

Applying Secure Multi-party Computation in Practice (opens in new window)

Author(s): Talviste, Riivo
Published in: 2016
Publisher: University of Tartu Press
DOI: 10.5281/zenodo.1116316

Hybrid Edge Computing - Enable Processing of Sensitive Data in Mobile Edge Computing Scenarios

Author(s): Andreas Reiter
Published in: 2017
Publisher: Graz University of Technology

Integrated Authorisation Management of Web APIs

Author(s): Bojan Suzic
Published in: 2018
Publisher: Graz University of Technology

Challenges for trustworthy (multi-)Cloud based services in the Digital Single Market (opens in new window)

Author(s): A. Pasic, B. Gallego, B. Zwattendorfer, B. Suzic, E. Prieto et. al.
Published in: 2017
Publisher: EU DPSP Cluster
DOI: 10.5281/zenodo.1116267

Cloud Technology options towards free flow of data (opens in new window)

Author(s): E. Rios, B. Prunster, B. Suzic, E. Prieto, et. al.
Published in: 2016
Publisher: EU DPSP Cluster
DOI: 10.5281/zenodo.1116269

FaaS: Federation-as-a-Service (opens in new window)

Author(s): Schiavo, Francesco Paolo; Sassone, Vladimiro; Nicoletti, Luca; Margheri, Andrea
Published in: 2016
Publisher: Cornel University Library
DOI: 10.5281/zenodo.204811

Secure Data Sharing and Processing in Heterogeneous Clouds (opens in new window)

Author(s): Bojan Suzic, Andreas Reiter, Florian Reimair, Daniele Venturi, Baldur Kubo
Published in: Procedia Computer Science, Issue 68, 2015, Page(s) 116-126, ISSN 1877-0509
Publisher: Elsevier B.V.
DOI: 10.1016/j.procs.2015.09.228

Analyzing Android Encrypted Network Traffic to Identify User Actions (opens in new window)

Author(s): Mauro Conti, Luigi Vincenzo Mancini, Riccardo Spolaor, Nino Vincenzo Verde
Published in: IEEE Transactions on Information Forensics and Security, Issue 11/1, 2016, Page(s) 114-125, ISSN 1556-6013
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TIFS.2015.2478741

A descriptive type foundation for RDF Schema (opens in new window)

Author(s): Gabriel Ciobanu, Ross Horne, Vladimiro Sassone
Published in: Journal of Logical and Algebraic Methods in Programming, 2016, ISSN 2352-2208
Publisher:  Journal of Nanoscience and Nanotechnology
DOI: 10.1016/j.jlamp.2016.02.006

Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation (opens in new window)

Author(s): Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi
Published in: Automata, Languages, and Programming, 2015, Page(s) 456-468, ISBN 978-3-662-47672-7
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-47672-7_37

No Place to Hide that Bytes Won’t Reveal: Sniffing Location-Based Encrypted Traffic to Track a User’s Position (opens in new window)

Author(s): Giuseppe Ateniese, Briland Hitaj, Luigi Vincenzo Mancini, Nino Vincenzo Verde, Antonio Villani
Published in: Network and System Security, 2015, Page(s) 46-59, ISBN 978-3-319-25645-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-25645-0_4

(De-)Constructing TLS 1.3 (opens in new window)

Author(s): Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi
Published in: Progress in Cryptology -- INDOCRYPT 2015, 2015, Page(s) 85-102, ISBN 978-3-319-26617-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-26617-6_5

Non-Malleable Encryption: Simpler, Shorter, Stronger (opens in new window)

Author(s): Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi
Published in: Theory of Cryptography, 2016, Page(s) 306-335, ISBN 978-3-662-49096-9
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-49096-9_13

Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking (opens in new window)

Author(s): Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik
Published in: Applied Cryptography and Network Security, 2015, Page(s) 243-262, ISBN 978-3-319-28166-7
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-28166-7_12

Chosen-Ciphertext Security from Subset Sum (opens in new window)

Author(s): Sebastian Faust, Daniel Masny, Daniele Venturi
Published in: Public-Key Cryptography – PKC 2016, 2016, Page(s) 35-46, ISBN 978-3-662-49384-7
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-49384-7_2

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0