update of D3.2, D3.3 and D3.4
This deliverable will include the description of the approach that will be followed for assessing the technology readiness of the EU-SEC solutions
This deliverable will be a report that includes security and privacy requirements
This deliverable will analyse principles, rules and mechanism for multiparty recognition framework and consolidate and summarise the results of pilot conducted in T4.1, 4.2, 4.3 and 4.4
The deliverable will be a document, which will be updated on an annual to report on the assessment of the activities related to dissemination, standardisation and exploitation.
This deliverable will report the results of task 5.1.
This deliverable will refine the content of D2.4 based on the input and feedback collected during the pilot phase.
This deliverable will integrate the components of the governance structure defined in D2.1, D2.2 and D2.3
This deliverable includes the training and awareness plan that will support the market uptake of the results of the EU-SEC project. The plan will include trainings, educational activities (e.g. workshops, webinars, booklet, events) and education material (e.g. guidelines, white papers, etc.) addressed to the target audience.
This deliverable describes the design of and implements trustworthy storage and management of evidence.
This deliverable will include the governance structure of the EU-SEC Framework, including the governance bodies, their roles and responsibilities, the rules and mechanisms for the establishment of a multiparty recognition schema.
This deliverable will describe the activities conducted in the context of task 5.2
This deliverable will be a report that defines the principles, criteria and requirements for a multipart recognition scheme and continuous auditing based certification.
This deliverable will include the governance of the Privacy Code of Conduct.
This deliverable will include the certification scheme and governance structure for the continuous monitoring / auditing-based certification.
This deliverable consists of documentation and description of methods and tools to manage security controls for cloud services
In this deliverable, the approach to unified configuration of existing security audit tools will be described and implemented.
This deliverable will be a report that includes auditing requirements
In this deliverable, the approach how to determine the maturity of existing security audit tools for cloud services will be described and implemented. Furthermore, a methodology to seamlessly integrate existing tools into cloud services certification systems will be detailed and demonstrated.
This deliverable will consolidate and summarise the results of the pilot as described in T5.3.
This deliverables is an update of D6.3 and D6.4
This deliverable includes the project’s website and the dissemination plan guiding WP6’s communication activities for maximizing the value proposition and market uptake by spreading the project’s results with relevant target audiences. The first version of the standardization strategy (including a survey of related standards/best practices) will be also documented in this report.
This deliverable presents the first exploitation plan guiding WP6’s activities in terms long-term sustainability of the certification framework and its components that shall enable auditors and ICT companies to exploit the project’s results for their business.
Author(s): Großmann, Jürgen; Knoblauch, Dorian
Published in: Fraunhofer FOKUS, Issue 3, 2019
Author(s): Anton Ujčič, Bojan Pohar
Published in: IJU 2018 Informatics in Public Administration, 2018
Author(s): Dorian Knoblauch, Jim de Haas
Published in: ISSA Journal Oct 2019, Issue Volume 17 Issue 10, 2019
Author(s): Immanuel Kunz, Philipp Stephanow
Published in: 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), 2017, Page(s) 986-993
Author(s): Philipp Stephanow, Koosha Khajehmoogahi
Published in: 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), 2017, Page(s) 931-938
Author(s): Philipp Stephanow, Mohammad Moein, Christian Banse
Published in: 2017 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2017, Page(s) 255-262
Author(s): Dorian Knoblauch, Christian Banse
Published in: 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2019, Page(s) 88-92
Author(s): Philipp Stephanow, Christian Banse
Published in: 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), 2017, Page(s) 1117-1126
Author(s): Anton Ujčič, Bojan Pohar
Published in: DSI 2018 Days of Slovenian Informatics, 2018
Author(s): Anton Ujčič, Darja Lihteneger
Published in: IJU 2017 Informatics in Public administration, 2017
Author(s): Dorian Knoblauch, Jürgen Großmann, Linda Strick, Alain Pannetrat
Published in: IT-Sicherheit als Voraussetzung für eine erfolgreiche Digitalisierung, 2019
Author(s): André Koot
Published in: de IT-Auditor, Issue IT Auditor 2-2019, 2019
Author(s): Martin Labaj, Karol Rástočný, Daniela Chudá
Published in: SOFSEM 2019: Theory and Practice of Computer Science - 45th International Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 27-30, 2019, Proceedings, Issue 11376, 2019, Page(s) 298-309