Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

A Holistic Data Privacy and Security by Design Platform-as-a-Service Framework Introducing Distributed Encrypted Persistence in Cloud-based Applications

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

Context-aware Security Model (se abrirá en una nueva ventana)

This Deliverable will provide a model for semantically describing associations between types of access depending on the data objects and circumstances under which this access should be allowed.

Communication Activities Report (se abrirá en una nueva ventana)

Report documenting the communication activities of the project partners with interim versions Month M12 and M24.

Publishable Final Report (se abrirá en una nueva ventana)

Publishable version of the final report on the achievements of the project.

PaaSword Technical Requirements (se abrirá en una nueva ventana)

Documentation of the clear and basic technical requirements that will guide the development of the IT components of PaaSword.

Scientific Workshops Report (se abrirá en una nueva ventana)

Report documenting the PaaSword scientific workshops activities with interim versions Month M14, M22.

PaaSword Security Requirements (se abrirá en una nueva ventana)

Documentation of the clear and basic security requirements that will guide the definition of the capabilities of the IT components and the conceptualization of the context-aware access and group policy models of PaaSword.

PaaSword Methodology (se abrirá en una nueva ventana)

Results of Task 6.8. This deliverable will document the methodology for the deployment of the PaaSword results in new and existing software solutions in the form of adoption guidelines for practitioners from the European software industry.

Dissemination Activities Report (se abrirá en una nueva ventana)

Report documenting the dissemination, clustering and standardization activities as well as the CS-IFG related activities of the project partners and updates of the Data Management Plan with interim versions Month M12 and M24.

Access Policies Model (se abrirá en una nueva ventana)

This Deliverable will ontologically describe access control policies for defining sensitivity levels of data objects along with the necessary encryption and/or physical distribution that these dictate. This model will also take into account group access issues in a unified way.

Evaluation Framework and Demonstrators Planning (se abrirá en una nueva ventana)

Results of Task 6.1. This document will contain the PaaSword evaluation framework, the validation scenario definitions and the organization of the pilot showcases, highlighting the PaaSword concepts that will be evaluated and included in each one of the involved pilot implementations.

PaaSword Reference Architecture (se abrirá en una nueva ventana)

Documentation of the overall architecture describing the main components and artifacts of PaaSword, the interconnection scheme and the specific interfaces for exchange of information among them will be designed and described in detail.

Data Management Plan (se abrirá en una nueva ventana)

Report documenting how research data will be handled during the project and after its completion.

PaaSword Impact Assessment (se abrirá en una nueva ventana)

Results of Task 6.9. Report on the qualitative and quantitative impact assessment of the project's activities.

Distribution Algorithms and Encryption Schemes (se abrirá en una nueva ventana)

Results of Task 4.1 – 4.3. This document lists all the distribution and encryption algorithms. The algorithms are rated for their ability to satisfy security needs like privacy, integrity and availability. The result is a document with the architecture, algorithms and the explanation of design choices. Finally, the architecture is presented and it is shown how the algorithms are used in the database proxy.

Publicaciones

Sicherer mobiler Zugriff auf Unternehmensdaten

Autores: Gunther Schiefer
Publicado en: 2015, Página(s) 336, ISBN 978-3-7386-1137-3
Editor: Books on Demand

Architektur eines relationalen Datenbanksystems zur verschlüsselten und verteilten Datenspeicherung in der Cloud

Autores: Maximilian Brunner
Publicado en: Edición 31 March 2015, 2015, Página(s) 36
Editor: KIT

Enhancing Privacy and Functionality in a Distributed Secure Database Outsourcing Scheme

Autores: Kateryna Yurchenko
Publicado en: 2016
Editor: KIT

The BXT-Bitmap - An Efficient Searchable Symmetric Encryption Scheme

Autores: Malin Lindström and Christian Nordahl
Publicado en: 2016
Editor: Blekinge Institute of Technology

Kontext-sensitive Berechtigungen für Cloud-Plattformen zur Erhöhung der Datensicherheit

Autores: Schork, Sebastian
Publicado en: 2016
Editor: Hochschule Karlsruhe - University of Applied Sciences

Integration sicherer Datenspeicher in Cloud-Plattformen

Autores: Jens Gierke
Publicado en: 2016
Editor: Hochschule Karlsruhe

Daten verschlüsselt speichern und verarbeiten in der Cloud (se abrirá en una nueva ventana)

Autores: Jörn Müller-Quade, Matthias Huber, Tobias Nilges
Publicado en: Datenschutz und Datensicherheit - DuD, Edición Volume 39, Edición 8, 2015, Página(s) pp 531–535, ISSN 1614-0702
Editor: Springer Fachmedien
DOI: 10.1007/s11623-015-0465-x

A Report on Design and Implementation of Protected Searchable Data in IaaS

Autores: Rafael Dowsley, Antonis Michalas, Matthias Nagel
Publicado en: Technical Report, 2016
Editor: SICS

Challenges for trustworthy (multi-)Cloud-based services in the Digital Single Market

Autores: Aljosa Pasic, Beatriz Gallego, Bernd Zwattendorfer, Bojan Suzic, Elsa Prieto, Erkuden Rios, Josep Domingo-Ferrer, Julia Vuong, Massimiliano Rak, Nicholas Ferguson, Nuria Rodríguez, Peter H. Deussen, Pierangela Samarati, Roberto Cascella, Sabrina de Capitani, Simone Braun, Stephan Krenn, Stephanie Parker, Thomas Länger, Thomas Lorünser, Zhiming Zhao
Publicado en: Edición 28 January 2016, 2016
Editor: DPSP Cluster

Research and Innovation Challenges in Data Protection, Security and Privacy in the Cloud: Map of synergies of the clustered projects – Version 2.0

Autores: Beatriz Gallego-Nicasio Crespo, Elsa Prieto, Erkuden Rios, Massimiliano Rak, Peter Deussen, Pierangela Samarati, Roberto Cascella, Simone Braun, Stephan Krenn, Thomas Lörunser
Publicado en: Edición 15 January 2016, 2016
Editor: DPSP Cluster

Towards Trusted eHealth Services in the Cloud

Autores: Antonis Michalas, Rafael Dowsley
Publicado en: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), 2015, Página(s) 618-623
Editor: IEEE

Context-aware Security Models for PaaS-enabled Access Control (se abrirá en una nueva ventana)

Autores: Simeon Veloudis, Yiannis Verginadis, Ioannis Patiniotakis, Iraklis Paraskakis, Gregoris Mentzas
Publicado en: Proceedings of the 6th International Conference on Cloud Computing and Services Science, 2016, Página(s) 202-212, ISBN 978-989-758-182-3
Editor: SCITEPRESS - Science and and Technology Publications
DOI: 10.5220/0005918602020212

A Survey on Context Security Policies (se abrirá en una nueva ventana)

Autores: Yiannis Verginadis, Gregoris Mentzas, Simeon Veloudis, Iraklis Paraskakis
Publicado en: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Edición December 7-10, 2015, 2015, Página(s) 589 - 594
Editor: IEEE
DOI: 10.1109/UCC.2015.103

Towards Secure Multi-tenant Virtualized Networks (se abrirá en una nueva ventana)

Autores: Nicolae Paladi, Christian Gehrmann
Publicado en: 2015 IEEE Trustcom/BigDataSE/ISPA, Edición The 13th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2015, Página(s) 1180-1185, ISBN 978-1-4673-7952-6
Editor: IEEE
DOI: 10.1109/Trustcom.2015.502

Towards Secure SDN Policy Management (se abrirá en una nueva ventana)

Autores: Nicolae Paladi
Publicado en: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), 2015, Página(s) 607 - 611
Editor: IEEE
DOI: 10.1109/UCC.2015.106

Data Distribution and Encryption Modelling for PaaS-enabled Cloud Security (se abrirá en una nueva ventana)

Autores: Yiannis Verginadis, Ioannis Patiniotakis, Gregoris Mentzas, Simeon Veloudis, Iraklis Paraskakis
Publicado en: 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2016, Página(s) 497-502, ISBN 978-1-5090-1445-3
Editor: IEEE
DOI: 10.1109/CloudCom.2016.0087

Searchable Encrypted Relational Databases: Risks and Countermeasures (se abrirá en una nueva ventana)

Autores: Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann
Publicado en: 2017, Página(s) 70-85
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-67816-0_5

Performance and Security Evaluation of SDN Networks in OMNeT++/INET

Autores: Marco Tiloca, Alexandra Stagkopoulou, Gianluca Dini
Publicado en: OMNeT++ Community Summit 2016, 2016
Editor: CoRR

IoT Protection through Device to Cloud Synchronization (se abrirá en una nueva ventana)

Autores: Christian Gehrmann, Mohamed Ahmed Abdelraheem
Publicado en: 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2016, Página(s) 527-532, ISBN 978-1-5090-1445-3
Editor: IEEE
DOI: 10.1109/CloudCom.2016.0092

TruSDN: Bootstrapping Trust in Cloud Network Infrastructure (se abrirá en una nueva ventana)

Autores: Nicolae Paladi, Christian Gehrmann
Publicado en: 2017, Página(s) 104-124
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-59608-2_6

Executing Boolean Queries on an Encrypted Bitmap Index (se abrirá en una nueva ventana)

Autores: Mohamed Ahmed Abdelraheem, Christian Gehrmann, Malin Lindström, Christian Nordahl
Publicado en: Proceedings of the 2016 ACM on Cloud Computing Security Workshop - CCSW '16, 2016, Página(s) 11-22, ISBN 9781-450345729
Editor: ACM Press
DOI: 10.1145/2996429.2996436

Application of the holistic Data Privacy and Security Framework PaaSword - A focus on the integration in industrial Pilots (se abrirá en una nueva ventana)

Autores: Sebastian Thomas Schork, Antonia Schwichtenberg, Spiros Alexakis, George Moldovan
Publicado en: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, 2017, Página(s) 1-10, ISBN 9781-450352574
Editor: ACM Press
DOI: 10.1145/3098954.3104060

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services (se abrirá en una nueva ventana)

Autores: Yiannis Verginadis, Antonis Michalas, Panagiotis Gouvas, Gunther Schiefer, Gerald Hübsch, Iraklis Paraskakis
Publicado en: Proceedings of the 5th International Conference on Cloud Computing and Services Science, 2015, Página(s) 206-213, ISBN 978-989-758-104-5
Editor: SCITEPRESS - Science and and Technology Publications
DOI: 10.5220/0005489302060213

Security in a Distributed Key Management Approach (se abrirá en una nueva ventana)

Autores: Gunther Schiefer, Matthias Gabel, Jeremias Mechler, Andreas Schoknecht, Murat Citak
Publicado en: 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS), 2017, Página(s) 816-821, ISBN 978-1-5386-1710-6
Editor: IEEE
DOI: 10.1109/CBMS.2017.151

A Distributed Key Management Approach (se abrirá en una nueva ventana)

Autores: Rafael Dowsley, Matthias Gabel, Gerald Hubsch, Gunther Schiefer, Antonia Schwichtenberg
Publicado en: 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2016, Página(s) 509-514, ISBN 978-1-5090-1445-3
Editor: IEEE
DOI: 10.1109/CloudCom.2016.0089

Secure Database Outsourcing to the Cloud: Side-Channels, Counter-Measures and Trusted Execution (se abrirá en una nueva ventana)

Autores: Matthias Gabel, Jeremias Mechler
Publicado en: 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS), 2017, Página(s) 799-804, ISBN 978-1-5386-1710-6
Editor: IEEE
DOI: 10.1109/CBMS.2017.141

Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Solutions (se abrirá en una nueva ventana)

Autores: Julia Vuong, Simone Braun
Publicado en: 1st International Workshop on Cloud Security and Data Privacy by Design (CloudSPD'15), 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Edición 10 December 2015, 2015, Página(s) 612 - 617
Editor: IEEE
DOI: 10.1109/UCC.2015.107

ASArP: Automated Security Assessment & Audit of Remote Platforms using TCG-SCAP synergies (se abrirá en una nueva ventana)

Autores: Mudassar Aslam, Christian Gehrmann, Mats Björkman
Publicado en: Journal of Information Security and Applications, Edición 22, 2015, Página(s) 28-39, ISSN 2214-2126
Editor: Elsevier
DOI: 10.1016/j.jisa.2014.09.001

Providing User Security Guarantees in Public Infrastructure Clouds (se abrirá en una nueva ventana)

Autores: Nicolae Paladi, Christian Gehrmann, Antonis Michalas
Publicado en: IEEE Transactions on Cloud Computing, Edición 5/3, 2017, Página(s) 405-419, ISSN 2168-7161
Editor: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/TCC.2016.2525991

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services (se abrirá en una nueva ventana)

Autores: Yiannis Verginadis, Antonis Michalas, Panagiotis Gouvas, Gunther Schiefer, Gerald Hübsch, Iraklis Paraskakis
Publicado en: Journal of Grid Computing, Edición 15/2, 2017, Página(s) 219-234, ISSN 1570-7873
Editor: Kluwer Academic Publishers
DOI: 10.1007/s10723-017-9394-2

Security-by-Design in der Cloud-Anwendungsentwicklung (se abrirá en una nueva ventana)

Autores: Andreas Schoknecht, Gunther Schiefer, Murat Citak, Andreas Oberweis
Publicado en: HMD Praxis der Wirtschaftsinformatik, Edición 53/5, 2016, Página(s) 688-697, ISSN 1436-3011
Editor: Springer Fachmedien
DOI: 10.1365/s40702-016-0258-1

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0