Skip to main content
European Commission logo
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

5G Enablers for Network and System Security and Resilience

CORDIS fornisce collegamenti ai risultati finali pubblici e alle pubblicazioni dei progetti ORIZZONTE.

I link ai risultati e alle pubblicazioni dei progetti del 7° PQ, così come i link ad alcuni tipi di risultati specifici come dataset e software, sono recuperati dinamicamente da .OpenAIRE .

Risultati finali

Final Market Analysis & Exploitation Report

Introduces a set of impact scenarios as part of the market analysis, socio-technical and economic opportunities. It details partner final exploitation plans.

Testbed extension and operation plan including business model

The conclusions and the possible next steps for the security testbed development.

5G Security testbed architecture

Description of the test architecture.

Project final report

The final technical report is a publishable summary of the entire action (describing the overview of the results and their exploitation and dissemination, the conclusions on the action and its socio-economic impact).

Risk assessment, mitigation and requirements (final)

This is the final report on risk assessment, mitigation and requirements for 5G.

5G-PPP Security Enablers Documentation (v1.0)

Documentation/manuals accompanying the reference implementations (e.g. installation and administration guides, user & programmers’ guides, unit testing plans).

Evaluation of the security enablers

Results and analysis of the testbed runs.

First report on communication, marketing and standardisation

This report covers the results of activities performed and their impact, including joint activities at the programme level, and planning of new actions on a 6-month basis. This report also sets the KPIs.

Security architecture (final)

The final description of high-level logical and functional security architecture for the 5G system.

Test plan (final)

Final description of how to evaluate the selected security enablers.

Trust model (draft)

This report will include the description of the initial trust model

Second report on communication, marketing and standardisation

The report covers the results of activities performed and their impact, including joint activities at the programme level and planning of new actions on a 6-month basis. Impact reporting includes KPI outcomes

5G-PPP security enablers technical roadmap (update)

Updated technical roadmap on development of the 5G security enablers.

5G-PPP security enablers technical roadmap (early vision)

The vision of the security enablers to be developed during the project.

First market analysis & exploitation report

Introduces a set of impact scenarios as part of the market analysis, SME concerns based on recent surveys, and socio-technical and economic opportunities.

5G-PPP security enablers open specifications (v2.0)

The open specifications for the final set of the security enablers.

Risk assessment, mitigation and requirements (draft)

This is a preliminary report on risk assessment, mitigation and requirements for 5G.

Test plan (draft)

Draft descriptions of how to evaluate the selected security enablers

Trust model (final)

This report will include the description of the final trust model.

Security architecture (draft)

The draft description of high-level logical and functional security architecture for the 5G system.

Use cases

Definition of the use cases focusing on security and privacy aspects.

5G-PPP security enablers open specifications (v1.0)

The open specifications for the first set of the security enablers.

5G-PPP security enablers documentation (v2.0)

Documentation/manuals accompanying the reference implementations (e.g. installation and administration guides, user & programmers’ guides, unit testing plans).

5G-PPP security enablers technical roadmap (final)

Final technical roadmap on the 5G security enablers containing the development activities beyond 5G-ENSURE.

Third report on communication, marketing and standardisation

The report covers the results of activities performed and their impact, including joint activities at the programme level and planning of new actions on a 6-month basis. Impact reporting includes KPI outcomes.

5G-PPP security enablers sw release (v1.0)

Reference implementations for the first set of the enablers.

5G-PPP security enablers sw release (v2.0)

Reference implementations for the final set of the enablers.

Pubblicazioni

Runtime Verification of Temporal Properties over Out-of-Order Data Streams

Autori: David Basin, Felix Klaedtke, Eugen Zălinescu
Pubblicato in: Lecture Notes in Computer Science, Numero 10426, 2017, Pagina/e 356-376, ISBN 978-3-319-63386-2
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-63387-9_18

Safeguarding VNF Credentials with Intel SGX

Autori: Nicolae Paladi, Linus Karlsson
Pubblicato in: Proceedings of the SIGCOMM Posters and Demos on - SIGCOMM Posters and Demos '17, 2017, Pagina/e 144-146, ISBN 9781-450350570
Editore: ACM Press
DOI: 10.1145/3123878.3132016

Towards Micro-Segmentation in 5G Network Security

Autori: Olli Mämmelä, Jouni Hiltunen, Jani Suomalainen, Kimmo Ahola, Petteri Mannersalo, Janne Vehkaperä
Pubblicato in: Proc. of the EuCNC 2016 Network Management, QoS and Security workshop, 2016
Editore: EuCNC2016 proceedings

Cases for Including a Reference Monitor to SDN

Autori: Dimitrios Gkounis, Felix Klaedtke, Roberto Bifulco, Ghassan O. Karame
Pubblicato in: Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference - SIGCOMM '16, 2016, Pagina/e 599-600, ISBN 9781-450341936
Editore: ACM Press
DOI: 10.1145/2934872.2959066

TruSDN: Bootstrapping Trust in Cloud Network Infrastructure

Autori: Nicolae Paladi and Christian Gehrmann
Pubblicato in: 12th EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM 2016), OCTOBER 10–12, 2016, Guangzhou, China, 2016
Editore: Springer

Threats to 5G Group-Based Authentication

Autori: Rosario Giustolisi and Christian Gehrmann
Pubblicato in: Proc. of the 13th International Conference on Security and Cryptography (SECRYPT 2016), 2016
Editore: SCITEPRESS

On the Fingerprinting of Software-Defined Networks

Autori: Heng Cui, Ghassan O. Karame, Felix Klaedtke, Roberto Bifulco
Pubblicato in: IEEE Transactions on Information Forensics and Security, Numero 11/10, 2016, Pagina/e 2160-2173, ISSN 1556-6013
Editore: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TIFS.2016.2573756

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile