European Commission logo
polski polski
CORDIS - Wyniki badań wspieranych przez UE
CORDIS

SecUre iNFormation SHaring in federated heterogeneous private clouds

Rezultaty

D8.5.2: Dissemination Report

Update documents reporting on dissemination actions carried out according to dissemination plan

D8.5.3: Dissemination Report

Update documents reporting on dissemination actions carried out according to dissemination plan

D8.5.1: Dissemination Report

Update documents reporting on dissemination actions carried out according to dissemination plan

D8.8: Exploitation and Standardization Report

A document reporting against the expected exploitation actions detailed in D7.6

D8.7: Final Conference

An event during which project results will be presented to senior stakeholders.

D8.3: Project website

A website highlighting the achievements of the SUNFISH project.

Publikacje

Structuring the Scope: Enabling Adaptive and Multilateral Authorization Management

Autorzy: Suzic, Bojan; Reiter, Andreas; Marsalek, Alexander
Opublikowane w: 2017
Wydawca: 2017 IEEE Conference on Communications and Network Security (CNS)
DOI: 10.5281/zenodo.1095647

FedUp! Cloud Federation as a Service

Autorzy: Paolo Bottoni, Emanuele Gabrielli, Gabriele Gualandi, Luigi Vincenzo Mancini, Franco Stolfi
Opublikowane w: 2016, Strona(/y) 168-182
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-319-44482-6_11

Best of Two Worlds: Secure Cloud Federations meet eIDAS

Autorzy: Zefferer, Thomas; Ziegler, Dominik; Reiter, Andreas
Opublikowane w: 2017
Wydawca: Academic Centre of Excellence, University of Southampton
DOI: 10.5281/zenodo.1116684

Secure policy-based device-to-device offloading for mobile applications

Autorzy: Andreas Reiter
Opublikowane w: Proceedings of the Symposium on Applied Computing - SAC '17, 2017, Strona(/y) 516-521, ISBN 9781-450344869
Wydawca: ACM Press
DOI: 10.1145/3019612.3019719

Balancing Utility and Security: Securing Cloud Federations of Public Entities

Autorzy: Suzic, Bojan
Opublikowane w: Numer 10, 2016
Wydawca: Spinger
DOI: 10.1007/978-3-319-48472-3_60

On The Structure and Authorization Management of RESTful Web Services

Autorzy: Suzic, Bojan; Prünster, Bernd; Ziegler, Dominik
Opublikowane w: 2018
Wydawca: Proceedings of SAC 2018
DOI: 10.5281/zenodo.1095641

Towards Secure Collaboration in Federated Cloud Environments

Autorzy: Bojan Suzic, Andreas Reiter
Opublikowane w: 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Strona(/y) 750-759, ISBN 978-1-5090-0990-9
Wydawca: IEEE
DOI: 10.1109/ARES.2016.46

Blockchain-based Database to Ensure Data Integrity in Cloud Computing Environment

Autorzy: E. Gaetani, L. Aniello, R. Baldoni, F. Lombardi, A. Margheri, V. Sassone
Opublikowane w: 2017
Wydawca: CEUR-WS.org

A Prototype Evaluation of a Tamper-Resistant High Performance Blockchain-Based Transaction Log for a Distributed Database

Autorzy: Leonardo Aniello, Roberto Baldoni, Edoardo Gaetani, Federico Lombardi, Andrea Margheri, Vladimiro Sassone
Opublikowane w: 2017 13th European Dependable Computing Conference (EDCC), 2017, Strona(/y) 151-154, ISBN 978-1-5386-0602-5
Wydawca: IEEE
DOI: 10.1109/EDCC.2017.31

Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations

Autorzy: Md Sadek Ferdous, Andrea Margheri, Federica Paci, Mu Yang, Vladimiro Sassone
Opublikowane w: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 2017, Strona(/y) 2632-2633, ISBN 978-1-5386-1792-2
Wydawca: IEEE
DOI: 10.1109/ICDCS.2017.178

A Distributed Infrastructure for Democratic Cloud Federations

Autorzy: Andrea Margheri, Md Sadek Ferdous, Mu Yang, Vladimiro Sassone
Opublikowane w: 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017, Strona(/y) 688-691, ISBN 978-1-5386-1993-3
Wydawca: IEEE
DOI: 10.1109/CLOUD.2017.93

Bridging Policy, Regulation and Practice? A techno-legal Analysis of Three Types of Data in the GDPR

Autorzy: Hu, Runshan; Stalla-Bourdillon, Sophie; Yang, Mu; Schiavo, Valeria; Sassone, Vladimiro
Opublikowane w: 2017
Wydawca: Hart Publishing
DOI: 10.5281/zenodo.1116275

PBFT vs proof-of-authority: applying the CAP theorem to permissioned blockchain

Autorzy: De Angelis, Stefano, Aniello, Leonardo, Baldoni, Roberto, Lombardi, Federico, Margheri, Andrea and Sassone, Vladimiro
Opublikowane w: 2017
Wydawca: University of Southampton

Cross-cloud management of sensitive data via Blockchain: a payslip calculation use case

Autorzy: Nicoletti, Luca, Margheri, Andrea, Lombardi, Federico, Sassone, Vladimiro and Schiavo, Francesco Paolo
Opublikowane w: 2017
Wydawca: Research Center of Cyber Intelligence and Information Security

Subversion-Resilient Signature Schemes

Autorzy: Giuseppe Ateniese, Bernardo Magri, Daniele Venturi
Opublikowane w: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15, 2015, Strona(/y) 364-375, ISBN 9781-450338325
Wydawca: ACM Press
DOI: 10.1145/2810103.2813635

Preventing Information Inference in Access Control

Autorzy: Federica Paci, Nicola Zannone
Opublikowane w: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies - SACMAT '15, 2015, Strona(/y) 87-97, ISBN 9781-450335560
Wydawca: ACM Press
DOI: 10.1145/2752952.2752971

Entangled Encodings and Data Entanglement

Autorzy: Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgård, Daniele Venturi
Opublikowane w: Proceedings of the 3rd International Workshop on Security in Cloud Computing - SCC '15, 2015, Strona(/y) 3-12, ISBN 9781-450334471
Wydawca: ACM Press
DOI: 10.1145/2732516.2732524

Boten ELISA: A novel approach for botnet C&C in Online Social Networks

Autorzy: Alberto Compagno, Mauro Conti, Daniele Lain, Giulio Lovisotto, Luigi Vincenzo Mancini
Opublikowane w: 2015 IEEE Conference on Communications and Network Security (CNS), 2015, Strona(/y) 74-82, ISBN 978-1-4673-7876-5
Wydawca: IEEE
DOI: 10.1109/CNS.2015.7346813

Securing integration of cloud services in cross-domain distributed environments

Autorzy: Bojan Suzic
Opublikowane w: Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC '16, 2016, Strona(/y) 398-405, ISBN 9781-450337397
Wydawca: ACM Press
DOI: 10.1145/2851613.2851622

User-centered security management of API-based data integration workflows

Autorzy: Bojan Suzic
Opublikowane w: NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, 2016, Strona(/y) 1233-1238, ISBN 978-1-5090-0223-8
Wydawca: IEEE
DOI: 10.1109/NOMS.2016.7502993

Applying Secure Multi-party Computation in Practice

Autorzy: Talviste, Riivo
Opublikowane w: 2016
Wydawca: University of Tartu Press
DOI: 10.5281/zenodo.1116316

Hybrid Edge Computing - Enable Processing of Sensitive Data in Mobile Edge Computing Scenarios

Autorzy: Andreas Reiter
Opublikowane w: 2017
Wydawca: Graz University of Technology

Integrated Authorisation Management of Web APIs

Autorzy: Bojan Suzic
Opublikowane w: 2018
Wydawca: Graz University of Technology

Challenges for trustworthy (multi-)Cloud based services in the Digital Single Market

Autorzy: A. Pasic, B. Gallego, B. Zwattendorfer, B. Suzic, E. Prieto et. al.
Opublikowane w: 2017
Wydawca: EU DPSP Cluster
DOI: 10.5281/zenodo.1116267

Cloud Technology options towards free flow of data

Autorzy: E. Rios, B. Prunster, B. Suzic, E. Prieto, et. al.
Opublikowane w: 2016
Wydawca: EU DPSP Cluster
DOI: 10.5281/zenodo.1116269

FaaS: Federation-as-a-Service

Autorzy: Schiavo, Francesco Paolo; Sassone, Vladimiro; Nicoletti, Luca; Margheri, Andrea
Opublikowane w: 2016
Wydawca: Cornel University Library
DOI: 10.5281/zenodo.204811

Secure Data Sharing and Processing in Heterogeneous Clouds

Autorzy: Bojan Suzic, Andreas Reiter, Florian Reimair, Daniele Venturi, Baldur Kubo
Opublikowane w: Procedia Computer Science, Numer 68, 2015, Strona(/y) 116-126, ISSN 1877-0509
Wydawca: Elsevier B.V.
DOI: 10.1016/j.procs.2015.09.228

Analyzing Android Encrypted Network Traffic to Identify User Actions

Autorzy: Mauro Conti, Luigi Vincenzo Mancini, Riccardo Spolaor, Nino Vincenzo Verde
Opublikowane w: IEEE Transactions on Information Forensics and Security, Numer 11/1, 2016, Strona(/y) 114-125, ISSN 1556-6013
Wydawca: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TIFS.2015.2478741

A descriptive type foundation for RDF Schema

Autorzy: Gabriel Ciobanu, Ross Horne, Vladimiro Sassone
Opublikowane w: Journal of Logical and Algebraic Methods in Programming, 2016, ISSN 2352-2208
Wydawca:  Journal of Nanoscience and Nanotechnology
DOI: 10.1016/j.jlamp.2016.02.006

Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation

Autorzy: Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi
Opublikowane w: Automata, Languages, and Programming, 2015, Strona(/y) 456-468, ISBN 978-3-662-47672-7
Wydawca: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-47672-7_37

No Place to Hide that Bytes Won’t Reveal: Sniffing Location-Based Encrypted Traffic to Track a User’s Position

Autorzy: Giuseppe Ateniese, Briland Hitaj, Luigi Vincenzo Mancini, Nino Vincenzo Verde, Antonio Villani
Opublikowane w: Network and System Security, 2015, Strona(/y) 46-59, ISBN 978-3-319-25645-0
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-319-25645-0_4

(De-)Constructing TLS 1.3

Autorzy: Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi
Opublikowane w: Progress in Cryptology -- INDOCRYPT 2015, 2015, Strona(/y) 85-102, ISBN 978-3-319-26617-6
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-319-26617-6_5

Non-Malleable Encryption: Simpler, Shorter, Stronger

Autorzy: Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi
Opublikowane w: Theory of Cryptography, 2016, Strona(/y) 306-335, ISBN 978-3-662-49096-9
Wydawca: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-49096-9_13

Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking

Autorzy: Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik
Opublikowane w: Applied Cryptography and Network Security, 2015, Strona(/y) 243-262, ISBN 978-3-319-28166-7
Wydawca: Springer International Publishing
DOI: 10.1007/978-3-319-28166-7_12

Chosen-Ciphertext Security from Subset Sum

Autorzy: Sebastian Faust, Daniel Masny, Daniele Venturi
Opublikowane w: Public-Key Cryptography – PKC 2016, 2016, Strona(/y) 35-46, ISBN 978-3-662-49384-7
Wydawca: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-49384-7_2

Wyszukiwanie danych OpenAIRE...

Podczas wyszukiwania danych OpenAIRE wystąpił błąd

Brak wyników