Skip to main content
Vai all'homepage della Commissione europea (si apre in una nuova finestra)
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS

A Holistic Data Privacy and Security by Design Platform-as-a-Service Framework Introducing Distributed Encrypted Persistence in Cloud-based Applications

CORDIS fornisce collegamenti ai risultati finali pubblici e alle pubblicazioni dei progetti ORIZZONTE.

I link ai risultati e alle pubblicazioni dei progetti del 7° PQ, così come i link ad alcuni tipi di risultati specifici come dataset e software, sono recuperati dinamicamente da .OpenAIRE .

Risultati finali

Context-aware Security Model (si apre in una nuova finestra)

This Deliverable will provide a model for semantically describing associations between types of access depending on the data objects and circumstances under which this access should be allowed.

Communication Activities Report (si apre in una nuova finestra)

Report documenting the communication activities of the project partners with interim versions Month M12 and M24.

Publishable Final Report (si apre in una nuova finestra)

Publishable version of the final report on the achievements of the project.

PaaSword Technical Requirements (si apre in una nuova finestra)

Documentation of the clear and basic technical requirements that will guide the development of the IT components of PaaSword.

Scientific Workshops Report (si apre in una nuova finestra)

Report documenting the PaaSword scientific workshops activities with interim versions Month M14, M22.

PaaSword Security Requirements (si apre in una nuova finestra)

Documentation of the clear and basic security requirements that will guide the definition of the capabilities of the IT components and the conceptualization of the context-aware access and group policy models of PaaSword.

PaaSword Methodology (si apre in una nuova finestra)

Results of Task 6.8. This deliverable will document the methodology for the deployment of the PaaSword results in new and existing software solutions in the form of adoption guidelines for practitioners from the European software industry.

Dissemination Activities Report (si apre in una nuova finestra)

Report documenting the dissemination, clustering and standardization activities as well as the CS-IFG related activities of the project partners and updates of the Data Management Plan with interim versions Month M12 and M24.

Access Policies Model (si apre in una nuova finestra)

This Deliverable will ontologically describe access control policies for defining sensitivity levels of data objects along with the necessary encryption and/or physical distribution that these dictate. This model will also take into account group access issues in a unified way.

Evaluation Framework and Demonstrators Planning (si apre in una nuova finestra)

Results of Task 6.1. This document will contain the PaaSword evaluation framework, the validation scenario definitions and the organization of the pilot showcases, highlighting the PaaSword concepts that will be evaluated and included in each one of the involved pilot implementations.

PaaSword Reference Architecture (si apre in una nuova finestra)

Documentation of the overall architecture describing the main components and artifacts of PaaSword, the interconnection scheme and the specific interfaces for exchange of information among them will be designed and described in detail.

Data Management Plan (si apre in una nuova finestra)

Report documenting how research data will be handled during the project and after its completion.

PaaSword Impact Assessment (si apre in una nuova finestra)

Results of Task 6.9. Report on the qualitative and quantitative impact assessment of the project's activities.

Distribution Algorithms and Encryption Schemes (si apre in una nuova finestra)

Results of Task 4.1 – 4.3. This document lists all the distribution and encryption algorithms. The algorithms are rated for their ability to satisfy security needs like privacy, integrity and availability. The result is a document with the architecture, algorithms and the explanation of design choices. Finally, the architecture is presented and it is shown how the algorithms are used in the database proxy.

Pubblicazioni

Sicherer mobiler Zugriff auf Unternehmensdaten

Autori: Gunther Schiefer
Pubblicato in: 2015, Pagina/e 336, ISBN 978-3-7386-1137-3
Editore: Books on Demand

Architektur eines relationalen Datenbanksystems zur verschlüsselten und verteilten Datenspeicherung in der Cloud

Autori: Maximilian Brunner
Pubblicato in: Numero 31 March 2015, 2015, Pagina/e 36
Editore: KIT

Enhancing Privacy and Functionality in a Distributed Secure Database Outsourcing Scheme

Autori: Kateryna Yurchenko
Pubblicato in: 2016
Editore: KIT

The BXT-Bitmap - An Efficient Searchable Symmetric Encryption Scheme

Autori: Malin Lindström and Christian Nordahl
Pubblicato in: 2016
Editore: Blekinge Institute of Technology

Kontext-sensitive Berechtigungen für Cloud-Plattformen zur Erhöhung der Datensicherheit

Autori: Schork, Sebastian
Pubblicato in: 2016
Editore: Hochschule Karlsruhe - University of Applied Sciences

Integration sicherer Datenspeicher in Cloud-Plattformen

Autori: Jens Gierke
Pubblicato in: 2016
Editore: Hochschule Karlsruhe

Daten verschlüsselt speichern und verarbeiten in der Cloud (si apre in una nuova finestra)

Autori: Jörn Müller-Quade, Matthias Huber, Tobias Nilges
Pubblicato in: Datenschutz und Datensicherheit - DuD, Numero Volume 39, Numero 8, 2015, Pagina/e pp 531–535, ISSN 1614-0702
Editore: Springer Fachmedien
DOI: 10.1007/s11623-015-0465-x

A Report on Design and Implementation of Protected Searchable Data in IaaS

Autori: Rafael Dowsley, Antonis Michalas, Matthias Nagel
Pubblicato in: Technical Report, 2016
Editore: SICS

Challenges for trustworthy (multi-)Cloud-based services in the Digital Single Market

Autori: Aljosa Pasic, Beatriz Gallego, Bernd Zwattendorfer, Bojan Suzic, Elsa Prieto, Erkuden Rios, Josep Domingo-Ferrer, Julia Vuong, Massimiliano Rak, Nicholas Ferguson, Nuria Rodríguez, Peter H. Deussen, Pierangela Samarati, Roberto Cascella, Sabrina de Capitani, Simone Braun, Stephan Krenn, Stephanie Parker, Thomas Länger, Thomas Lorünser, Zhiming Zhao
Pubblicato in: Numero 28 January 2016, 2016
Editore: DPSP Cluster

Research and Innovation Challenges in Data Protection, Security and Privacy in the Cloud: Map of synergies of the clustered projects – Version 2.0

Autori: Beatriz Gallego-Nicasio Crespo, Elsa Prieto, Erkuden Rios, Massimiliano Rak, Peter Deussen, Pierangela Samarati, Roberto Cascella, Simone Braun, Stephan Krenn, Thomas Lörunser
Pubblicato in: Numero 15 January 2016, 2016
Editore: DPSP Cluster

Towards Trusted eHealth Services in the Cloud

Autori: Antonis Michalas, Rafael Dowsley
Pubblicato in: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), 2015, Pagina/e 618-623
Editore: IEEE

Context-aware Security Models for PaaS-enabled Access Control (si apre in una nuova finestra)

Autori: Simeon Veloudis, Yiannis Verginadis, Ioannis Patiniotakis, Iraklis Paraskakis, Gregoris Mentzas
Pubblicato in: Proceedings of the 6th International Conference on Cloud Computing and Services Science, 2016, Pagina/e 202-212, ISBN 978-989-758-182-3
Editore: SCITEPRESS - Science and and Technology Publications
DOI: 10.5220/0005918602020212

A Survey on Context Security Policies (si apre in una nuova finestra)

Autori: Yiannis Verginadis, Gregoris Mentzas, Simeon Veloudis, Iraklis Paraskakis
Pubblicato in: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Numero December 7-10, 2015, 2015, Pagina/e 589 - 594
Editore: IEEE
DOI: 10.1109/UCC.2015.103

Towards Secure Multi-tenant Virtualized Networks (si apre in una nuova finestra)

Autori: Nicolae Paladi, Christian Gehrmann
Pubblicato in: 2015 IEEE Trustcom/BigDataSE/ISPA, Numero The 13th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2015, Pagina/e 1180-1185, ISBN 978-1-4673-7952-6
Editore: IEEE
DOI: 10.1109/Trustcom.2015.502

Towards Secure SDN Policy Management (si apre in una nuova finestra)

Autori: Nicolae Paladi
Pubblicato in: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), 2015, Pagina/e 607 - 611
Editore: IEEE
DOI: 10.1109/UCC.2015.106

Data Distribution and Encryption Modelling for PaaS-enabled Cloud Security (si apre in una nuova finestra)

Autori: Yiannis Verginadis, Ioannis Patiniotakis, Gregoris Mentzas, Simeon Veloudis, Iraklis Paraskakis
Pubblicato in: 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2016, Pagina/e 497-502, ISBN 978-1-5090-1445-3
Editore: IEEE
DOI: 10.1109/CloudCom.2016.0087

Searchable Encrypted Relational Databases: Risks and Countermeasures (si apre in una nuova finestra)

Autori: Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann
Pubblicato in: 2017, Pagina/e 70-85
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-67816-0_5

Performance and Security Evaluation of SDN Networks in OMNeT++/INET

Autori: Marco Tiloca, Alexandra Stagkopoulou, Gianluca Dini
Pubblicato in: OMNeT++ Community Summit 2016, 2016
Editore: CoRR

IoT Protection through Device to Cloud Synchronization (si apre in una nuova finestra)

Autori: Christian Gehrmann, Mohamed Ahmed Abdelraheem
Pubblicato in: 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2016, Pagina/e 527-532, ISBN 978-1-5090-1445-3
Editore: IEEE
DOI: 10.1109/CloudCom.2016.0092

TruSDN: Bootstrapping Trust in Cloud Network Infrastructure (si apre in una nuova finestra)

Autori: Nicolae Paladi, Christian Gehrmann
Pubblicato in: 2017, Pagina/e 104-124
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-59608-2_6

Executing Boolean Queries on an Encrypted Bitmap Index (si apre in una nuova finestra)

Autori: Mohamed Ahmed Abdelraheem, Christian Gehrmann, Malin Lindström, Christian Nordahl
Pubblicato in: Proceedings of the 2016 ACM on Cloud Computing Security Workshop - CCSW '16, 2016, Pagina/e 11-22, ISBN 9781-450345729
Editore: ACM Press
DOI: 10.1145/2996429.2996436

Application of the holistic Data Privacy and Security Framework PaaSword - A focus on the integration in industrial Pilots (si apre in una nuova finestra)

Autori: Sebastian Thomas Schork, Antonia Schwichtenberg, Spiros Alexakis, George Moldovan
Pubblicato in: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, 2017, Pagina/e 1-10, ISBN 9781-450352574
Editore: ACM Press
DOI: 10.1145/3098954.3104060

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services (si apre in una nuova finestra)

Autori: Yiannis Verginadis, Antonis Michalas, Panagiotis Gouvas, Gunther Schiefer, Gerald Hübsch, Iraklis Paraskakis
Pubblicato in: Proceedings of the 5th International Conference on Cloud Computing and Services Science, 2015, Pagina/e 206-213, ISBN 978-989-758-104-5
Editore: SCITEPRESS - Science and and Technology Publications
DOI: 10.5220/0005489302060213

Security in a Distributed Key Management Approach (si apre in una nuova finestra)

Autori: Gunther Schiefer, Matthias Gabel, Jeremias Mechler, Andreas Schoknecht, Murat Citak
Pubblicato in: 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS), 2017, Pagina/e 816-821, ISBN 978-1-5386-1710-6
Editore: IEEE
DOI: 10.1109/CBMS.2017.151

A Distributed Key Management Approach (si apre in una nuova finestra)

Autori: Rafael Dowsley, Matthias Gabel, Gerald Hubsch, Gunther Schiefer, Antonia Schwichtenberg
Pubblicato in: 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2016, Pagina/e 509-514, ISBN 978-1-5090-1445-3
Editore: IEEE
DOI: 10.1109/CloudCom.2016.0089

Secure Database Outsourcing to the Cloud: Side-Channels, Counter-Measures and Trusted Execution (si apre in una nuova finestra)

Autori: Matthias Gabel, Jeremias Mechler
Pubblicato in: 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS), 2017, Pagina/e 799-804, ISBN 978-1-5386-1710-6
Editore: IEEE
DOI: 10.1109/CBMS.2017.141

Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Solutions (si apre in una nuova finestra)

Autori: Julia Vuong, Simone Braun
Pubblicato in: 1st International Workshop on Cloud Security and Data Privacy by Design (CloudSPD'15), 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Numero 10 December 2015, 2015, Pagina/e 612 - 617
Editore: IEEE
DOI: 10.1109/UCC.2015.107

ASArP: Automated Security Assessment & Audit of Remote Platforms using TCG-SCAP synergies (si apre in una nuova finestra)

Autori: Mudassar Aslam, Christian Gehrmann, Mats Björkman
Pubblicato in: Journal of Information Security and Applications, Numero 22, 2015, Pagina/e 28-39, ISSN 2214-2126
Editore: Elsevier
DOI: 10.1016/j.jisa.2014.09.001

Providing User Security Guarantees in Public Infrastructure Clouds (si apre in una nuova finestra)

Autori: Nicolae Paladi, Christian Gehrmann, Antonis Michalas
Pubblicato in: IEEE Transactions on Cloud Computing, Numero 5/3, 2017, Pagina/e 405-419, ISSN 2168-7161
Editore: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/TCC.2016.2525991

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services (si apre in una nuova finestra)

Autori: Yiannis Verginadis, Antonis Michalas, Panagiotis Gouvas, Gunther Schiefer, Gerald Hübsch, Iraklis Paraskakis
Pubblicato in: Journal of Grid Computing, Numero 15/2, 2017, Pagina/e 219-234, ISSN 1570-7873
Editore: Kluwer Academic Publishers
DOI: 10.1007/s10723-017-9394-2

Security-by-Design in der Cloud-Anwendungsentwicklung (si apre in una nuova finestra)

Autori: Andreas Schoknecht, Gunther Schiefer, Murat Citak, Andreas Oberweis
Pubblicato in: HMD Praxis der Wirtschaftsinformatik, Numero 53/5, 2016, Pagina/e 688-697, ISSN 1436-3011
Editore: Springer Fachmedien
DOI: 10.1365/s40702-016-0258-1

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile

Il mio fascicolo 0 0