European Commission logo
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS

SecUre iNFormation SHaring in federated heterogeneous private clouds

Risultati finali

D8.5.2: Dissemination Report

Update documents reporting on dissemination actions carried out according to dissemination plan

D8.5.3: Dissemination Report

Update documents reporting on dissemination actions carried out according to dissemination plan

D8.5.1: Dissemination Report

Update documents reporting on dissemination actions carried out according to dissemination plan

D8.8: Exploitation and Standardization Report

A document reporting against the expected exploitation actions detailed in D7.6

D8.7: Final Conference

An event during which project results will be presented to senior stakeholders.

D8.3: Project website

A website highlighting the achievements of the SUNFISH project.

Pubblicazioni

Structuring the Scope: Enabling Adaptive and Multilateral Authorization Management

Autori: Suzic, Bojan; Reiter, Andreas; Marsalek, Alexander
Pubblicato in: 2017
Editore: 2017 IEEE Conference on Communications and Network Security (CNS)
DOI: 10.5281/zenodo.1095647

FedUp! Cloud Federation as a Service

Autori: Paolo Bottoni, Emanuele Gabrielli, Gabriele Gualandi, Luigi Vincenzo Mancini, Franco Stolfi
Pubblicato in: 2016, Pagina/e 168-182
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-44482-6_11

Best of Two Worlds: Secure Cloud Federations meet eIDAS

Autori: Zefferer, Thomas; Ziegler, Dominik; Reiter, Andreas
Pubblicato in: 2017
Editore: Academic Centre of Excellence, University of Southampton
DOI: 10.5281/zenodo.1116684

Secure policy-based device-to-device offloading for mobile applications

Autori: Andreas Reiter
Pubblicato in: Proceedings of the Symposium on Applied Computing - SAC '17, 2017, Pagina/e 516-521, ISBN 9781-450344869
Editore: ACM Press
DOI: 10.1145/3019612.3019719

Balancing Utility and Security: Securing Cloud Federations of Public Entities

Autori: Suzic, Bojan
Pubblicato in: Numero 10, 2016
Editore: Spinger
DOI: 10.1007/978-3-319-48472-3_60

On The Structure and Authorization Management of RESTful Web Services

Autori: Suzic, Bojan; Prünster, Bernd; Ziegler, Dominik
Pubblicato in: 2018
Editore: Proceedings of SAC 2018
DOI: 10.5281/zenodo.1095641

Towards Secure Collaboration in Federated Cloud Environments

Autori: Bojan Suzic, Andreas Reiter
Pubblicato in: 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Pagina/e 750-759, ISBN 978-1-5090-0990-9
Editore: IEEE
DOI: 10.1109/ARES.2016.46

Blockchain-based Database to Ensure Data Integrity in Cloud Computing Environment

Autori: E. Gaetani, L. Aniello, R. Baldoni, F. Lombardi, A. Margheri, V. Sassone
Pubblicato in: 2017
Editore: CEUR-WS.org

A Prototype Evaluation of a Tamper-Resistant High Performance Blockchain-Based Transaction Log for a Distributed Database

Autori: Leonardo Aniello, Roberto Baldoni, Edoardo Gaetani, Federico Lombardi, Andrea Margheri, Vladimiro Sassone
Pubblicato in: 2017 13th European Dependable Computing Conference (EDCC), 2017, Pagina/e 151-154, ISBN 978-1-5386-0602-5
Editore: IEEE
DOI: 10.1109/EDCC.2017.31

Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations

Autori: Md Sadek Ferdous, Andrea Margheri, Federica Paci, Mu Yang, Vladimiro Sassone
Pubblicato in: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 2017, Pagina/e 2632-2633, ISBN 978-1-5386-1792-2
Editore: IEEE
DOI: 10.1109/ICDCS.2017.178

A Distributed Infrastructure for Democratic Cloud Federations

Autori: Andrea Margheri, Md Sadek Ferdous, Mu Yang, Vladimiro Sassone
Pubblicato in: 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017, Pagina/e 688-691, ISBN 978-1-5386-1993-3
Editore: IEEE
DOI: 10.1109/CLOUD.2017.93

Bridging Policy, Regulation and Practice? A techno-legal Analysis of Three Types of Data in the GDPR

Autori: Hu, Runshan; Stalla-Bourdillon, Sophie; Yang, Mu; Schiavo, Valeria; Sassone, Vladimiro
Pubblicato in: 2017
Editore: Hart Publishing
DOI: 10.5281/zenodo.1116275

PBFT vs proof-of-authority: applying the CAP theorem to permissioned blockchain

Autori: De Angelis, Stefano, Aniello, Leonardo, Baldoni, Roberto, Lombardi, Federico, Margheri, Andrea and Sassone, Vladimiro
Pubblicato in: 2017
Editore: University of Southampton

Cross-cloud management of sensitive data via Blockchain: a payslip calculation use case

Autori: Nicoletti, Luca, Margheri, Andrea, Lombardi, Federico, Sassone, Vladimiro and Schiavo, Francesco Paolo
Pubblicato in: 2017
Editore: Research Center of Cyber Intelligence and Information Security

Subversion-Resilient Signature Schemes

Autori: Giuseppe Ateniese, Bernardo Magri, Daniele Venturi
Pubblicato in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15, 2015, Pagina/e 364-375, ISBN 9781-450338325
Editore: ACM Press
DOI: 10.1145/2810103.2813635

Preventing Information Inference in Access Control

Autori: Federica Paci, Nicola Zannone
Pubblicato in: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies - SACMAT '15, 2015, Pagina/e 87-97, ISBN 9781-450335560
Editore: ACM Press
DOI: 10.1145/2752952.2752971

Entangled Encodings and Data Entanglement

Autori: Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgård, Daniele Venturi
Pubblicato in: Proceedings of the 3rd International Workshop on Security in Cloud Computing - SCC '15, 2015, Pagina/e 3-12, ISBN 9781-450334471
Editore: ACM Press
DOI: 10.1145/2732516.2732524

Boten ELISA: A novel approach for botnet C&C in Online Social Networks

Autori: Alberto Compagno, Mauro Conti, Daniele Lain, Giulio Lovisotto, Luigi Vincenzo Mancini
Pubblicato in: 2015 IEEE Conference on Communications and Network Security (CNS), 2015, Pagina/e 74-82, ISBN 978-1-4673-7876-5
Editore: IEEE
DOI: 10.1109/CNS.2015.7346813

Securing integration of cloud services in cross-domain distributed environments

Autori: Bojan Suzic
Pubblicato in: Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC '16, 2016, Pagina/e 398-405, ISBN 9781-450337397
Editore: ACM Press
DOI: 10.1145/2851613.2851622

User-centered security management of API-based data integration workflows

Autori: Bojan Suzic
Pubblicato in: NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, 2016, Pagina/e 1233-1238, ISBN 978-1-5090-0223-8
Editore: IEEE
DOI: 10.1109/NOMS.2016.7502993

Applying Secure Multi-party Computation in Practice

Autori: Talviste, Riivo
Pubblicato in: 2016
Editore: University of Tartu Press
DOI: 10.5281/zenodo.1116316

Hybrid Edge Computing - Enable Processing of Sensitive Data in Mobile Edge Computing Scenarios

Autori: Andreas Reiter
Pubblicato in: 2017
Editore: Graz University of Technology

Integrated Authorisation Management of Web APIs

Autori: Bojan Suzic
Pubblicato in: 2018
Editore: Graz University of Technology

Challenges for trustworthy (multi-)Cloud based services in the Digital Single Market

Autori: A. Pasic, B. Gallego, B. Zwattendorfer, B. Suzic, E. Prieto et. al.
Pubblicato in: 2017
Editore: EU DPSP Cluster
DOI: 10.5281/zenodo.1116267

Cloud Technology options towards free flow of data

Autori: E. Rios, B. Prunster, B. Suzic, E. Prieto, et. al.
Pubblicato in: 2016
Editore: EU DPSP Cluster
DOI: 10.5281/zenodo.1116269

FaaS: Federation-as-a-Service

Autori: Schiavo, Francesco Paolo; Sassone, Vladimiro; Nicoletti, Luca; Margheri, Andrea
Pubblicato in: 2016
Editore: Cornel University Library
DOI: 10.5281/zenodo.204811

Secure Data Sharing and Processing in Heterogeneous Clouds

Autori: Bojan Suzic, Andreas Reiter, Florian Reimair, Daniele Venturi, Baldur Kubo
Pubblicato in: Procedia Computer Science, Numero 68, 2015, Pagina/e 116-126, ISSN 1877-0509
Editore: Elsevier B.V.
DOI: 10.1016/j.procs.2015.09.228

Analyzing Android Encrypted Network Traffic to Identify User Actions

Autori: Mauro Conti, Luigi Vincenzo Mancini, Riccardo Spolaor, Nino Vincenzo Verde
Pubblicato in: IEEE Transactions on Information Forensics and Security, Numero 11/1, 2016, Pagina/e 114-125, ISSN 1556-6013
Editore: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TIFS.2015.2478741

A descriptive type foundation for RDF Schema

Autori: Gabriel Ciobanu, Ross Horne, Vladimiro Sassone
Pubblicato in: Journal of Logical and Algebraic Methods in Programming, 2016, ISSN 2352-2208
Editore:  Journal of Nanoscience and Nanotechnology
DOI: 10.1016/j.jlamp.2016.02.006

Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation

Autori: Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi
Pubblicato in: Automata, Languages, and Programming, 2015, Pagina/e 456-468, ISBN 978-3-662-47672-7
Editore: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-47672-7_37

No Place to Hide that Bytes Won’t Reveal: Sniffing Location-Based Encrypted Traffic to Track a User’s Position

Autori: Giuseppe Ateniese, Briland Hitaj, Luigi Vincenzo Mancini, Nino Vincenzo Verde, Antonio Villani
Pubblicato in: Network and System Security, 2015, Pagina/e 46-59, ISBN 978-3-319-25645-0
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-25645-0_4

(De-)Constructing TLS 1.3

Autori: Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi
Pubblicato in: Progress in Cryptology -- INDOCRYPT 2015, 2015, Pagina/e 85-102, ISBN 978-3-319-26617-6
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-26617-6_5

Non-Malleable Encryption: Simpler, Shorter, Stronger

Autori: Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi
Pubblicato in: Theory of Cryptography, 2016, Pagina/e 306-335, ISBN 978-3-662-49096-9
Editore: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-49096-9_13

Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking

Autori: Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik
Pubblicato in: Applied Cryptography and Network Security, 2015, Pagina/e 243-262, ISBN 978-3-319-28166-7
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-28166-7_12

Chosen-Ciphertext Security from Subset Sum

Autori: Sebastian Faust, Daniel Masny, Daniele Venturi
Pubblicato in: Public-Key Cryptography – PKC 2016, 2016, Pagina/e 35-46, ISBN 978-3-662-49384-7
Editore: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-49384-7_2

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile