Resultado final
Output of Task 2.3 – revised version of D2.3 after intermediate evaluation
Output of Task 1.3 - ANASTACIA overall reference architecture
Output of Task 3.1 –The operational Security Enforcement Manager.
Output of Task 4.3 – Software agents deployed both in local and remote systems
Output of Task 3.2 – revised version of D3.2 after intermediate evaluation
Output of Task 5.1 – A clearly specified Dynamic Security and Privacy Seal Model
Output of Task 4.2 – revised version of D4.2 after intermediate evaluation
Output of Task 7.1 and 7.2 – Reports on activities in the second period an overall assessment of communication activities in the project.
Output of Task 2.4 – revised version of D2.4 after intermediate evaluation
Output of Task 1.2 - Prioritized specifications and a set of UML diagrams to guide the software design and development cycles. Set of Use Case scenarios to be taken as reference scenarios.
Output of Task 6.2 – revised version of D6.2 after intermediate evaluation
Output of Task 1.1 - A holistic security context analysis report with a clear overall view of ANASTACIA approach from the four perspectives, reaching a common understanding and shared vision of ANASTACIA mission.
Output of Task 2.4 – the secure software development guidelines and procedures o be followed during all the software lifecycle in order to help developers to take into consideration the security from the design phase.
Output of Task 1.3 - revised version of D1.3 after first prototype validation
Output of Task 6.1 - Integrated ANASTACIA Platform
Output of Task 4.3 – revised version of D4.3 after intermediate evaluation
Output of Task 3.2 – The operational security orchestrator along suitable interfaces to SDN controllers and MANO NFV.
Output of Task 3.1 – revised version of D3.1 after intermediate evaluation
Output of Task 7.1 and 7.2 – Reports on activities in the first period and updated plan for the second period.
Output of Task 2.3 - Report defining a clear risk modelling, including measurement points and mitigation measures.
Output of Task 2.1 – revised version of D2.1 after intermediate evaluation
Output of Task 6.1 – revised version of D6.1 after intermediate evaluation
Output of Task 2.1 - policy models definitions for security and orchestration. Authorization system tailored for holistic scenarios based on SDNs-NFVs and IoT.
Output of Task 6.2 - Implementation and test of the use cases
Output of Task 4.1 – revised version of D4.1 after intermediate evaluation
Output of Task 6.2 - ANASTACIA performance evaluation framework. ANASTACIA use cases validation and evaluation results.
Output of Task 3.3 – revised version of D3.3 after intermediate evaluation
Output of Task 7.1 and 7.2 – The initial dissemination, standardisation and outreach plan comprising the identification of target audience, strategy, actions and verification indicators.
Output of Task 3.3 – Collaborative security enforcement enablers in the form of security-aware SDN controller and security-aware NFV MANO.
Output of Task 1.2 – revised version of D1.2 after first prototype validation
Output of Task 5.3 - A working service and demonstration of the Dynamic Security and Privacy User Interface.
Output of Task 5.2 - A working service and demonstration of the Dynamic Security and Privacy Seal Monitoring Service
Publicaciones
Autores: Shankar Lal, Tarik Taleb, Ashutosh Dutta
Publicado en: IEEE Communications Magazine, 55/8, 2017, Page(s) 211-217, ISSN 0163-6804
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/MCOM.2017.1600899
Autores: Hichem Sedjelmaci, Sidi Mohamed Senouci, Tarik Taleb
Publicado en: IEEE Transactions on Vehicular Technology, 66/10, 2017, Page(s) 9381-9393, ISSN 0018-9545
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TVT.2017.2701551
Autores: Ivan Vaccari, Enrico Cambiaso, Maurizio Aiello
Publicado en: Security and Communication Networks, 2017, 2017, Page(s) 1-9, ISSN 1939-0122
Editor: John Wiley & Sons Ltd.
DOI: 10.1155/2017/1723658
Autores: Enrico Cambiaso, Gianluca Papaleo, Maurizio Aiello
Publicado en: Journal of Information Security and Applications, 35, 2017, Page(s) 23-31, ISSN 2214-2126
Editor: Elsevier
DOI: 10.1016/j.jisa.2017.05.005
Autores: S. Ziegler, A. Skarmeta, J. Bernal, E. E. Kim, S. Bianchi
Publicado en: IEEE Xplore / The Global Internet of Things Summit (GIoTS 2017), 2017
Editor: IEEE
Autores: S. Lal, I. Oliver, S. Ravidas, and T. Taleb
Publicado en: IEEE ICC 2017, 2017
Editor: IEEE
Autores: M. Bouet and V. Conan
Publicado en: Workshop on Mobile Edge Communications (MECOMM’2017), co-located with ACM SIGCOMM, 2017
Editor: ACM
Autores: I. Farris, J. B. Bernabe, N. Toumi, D. Garcia-Carrillo, T. Taleb, A. Skarmeta, and B. Sahlin
Publicado en: IEEE CSCN 2017, 2017
Editor: IEEE
Autores: S. Lal, A. Kalliola, K. Ahola, and T. Taleb
Publicado en: IEEE CSCN 2017, 2017
Editor: IEEE
Autores: Y. Khettab, Mi. Bagaa, D.L.C Dutra, T. Taleb and N. Toumi
Publicado en: WCNC 2018, 2017
Editor: IEEE
Autores: Alejandro Molina, Dan Garcia, Jorge Bernal, Jordi Ortiz, Rafael Marin-Perez, Antonio Skarmeta
Publicado en: The Global Internet of Things Summit (GIoTS 2018), 2018
Editor: IEEE
Autores: D. Mehta, A. Mady, M. Boubekeur, D. M. Shila
Publicado en: CENICS 2017, 2017
Editor: CENICS
Autores: A. Mady, R. Trapero, A. Skarmeta, S. Bianchi
Publicado en: 2017
Editor: N.A.