Skip to main content
European Commission logo
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

5th GeneratiOn Security for Telecom Services

CORDIS fornisce collegamenti ai risultati finali pubblici e alle pubblicazioni dei progetti ORIZZONTE.

I link ai risultati e alle pubblicazioni dei progetti del 7° PQ, così come i link ad alcuni tipi di risultati specifici come dataset e software, sono recuperati dinamicamente da .OpenAIRE .

Risultati finali

Report on local and network activities II

Final update of D4.4: Report on the local and network activities, incl. participation at external conferences.

Potential inputs for policy feedback

Potential inputs for policy feedback.

Report on local and network activities I

Report on the local and network activities incl participation at external conferences

Communication and dissemination activities I

Midterm report on communication and dissemination activities.

Supervisory Board of the network

Report on assignment of members and responsibilities of the supervisory board.

"Joint publication on ""Secure and Privacy Preserving Virtualization Techniques for 5G Telecom Networks"""

Joint publication on “Secure and Privacy Preserving Virtualization Techniques for 5G Telecom Networks” to be submitted to a peer-reviewed journal or conference.

Communication and dissemination activities II

Final report on communication and dissemination activities

Privacy requirements for 5G Telecom Systems running virtualized multi-component services

A study of the privacy requirements for 5G Telecom Systems running virtualized multicomponent services including a state of the art overview of the relevant legal requirements under the sectorneutral GDPR which enters into force on 25 May 2018 and the upcoming sectorspecific ePrivacy Regulation which is a lex specialis intended to particularise and complement the rules of the GDPR for the electronic communications sector and offering a comprehensive analysis of the impact of implementing regulationcompliant privacy in an NVF execution environments

Recruitment report

Recruitment report incl copy of vacancy notices selection and recruitment procedures

The trust model for multi-tenant 5G telecom systems running virtualized multi-component services

A Study of the trust model for multitenant 5G Telecom systems running virtualized multicomponent services including a an extensive comparison of the mainstream secure development distribution initiation and update mechanisms for 5G virtualized service components on a trusted computing base b the Definition of security properties and security model for container orchestration in 5G NFV systems a comparison of the mainstream orchestration frameworks with respect to the security and performance requirements for flexible mobile edge deployments c an evaluation of the existing approaches for extending orchestration frameworks with NFV features with respect to their performance overhead and ease of extending orchestration frameworks Other factors such as timetomarket community support and reuse of existing NFV components in the container image life cycle are also considered

Communication, Dissemination and Exploitation Plan

Communication, Dissemination & Exploitation Plan (CDEP).

State-of-the-art of cryptographic credential management and design of a secure development and operations framework

State-of-the-art study of cryptographic credential management and design of a secure development and operations framework for multi-component 5G Telecom Services, in the context of NFV and with a formalised model of the system and the required security properties in the context of secure inter-container communication.

Collaboration Platform and Quality Handbook

Collaboration Platform and Quality Handbook.

Initial setup of communication channels

Setup of mailing lists and a basic collaboration platform for the project's bodies.

Pubblicazioni

A Survey of Security and Privacy Issues in V2X Communication Systems

Autori: Yoshizawa, Takahito; Singelée, Dave; Muehlberg, Jan Tobias; Delbruel, Stéphane; Taherkordi, Amir; Hughes, Danny; Preneel, Bart
Pubblicato in: ACM Computing Surveys, Numero 11, 2023, ISSN 0360-0300
Editore: Association for Computing Machinary, Inc.
DOI: 10.1145/3558052

End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs

Autori: Gianluca Scopelliti; Sepideh Pouyanrad; Job Noorman; Fritz Alder; Christoph Baumann; Frank Piessens; Jan Tobias Mühlberg
Pubblicato in: ACM Trans. Priv. Secur., Numero 2, 2023, ISSN 2471-2566
Editore: ACM
DOI: 10.1145/3592607

About Time: On the Challenges of Temporal Guarantees in Untrusted Environments

Autori: Fritz Alder; Gianluca Scopelliti; Jo Van Bulck; Jan Tobias Mühlberg
Pubblicato in: SysTEX '23: Proceedings of the 6th Workshop on System Software for Trusted Execution, Numero 1, 2023
Editore: ACM
DOI: 10.1145/3578359.3593038

Rewind & Discard: Improving Software Resilience using Isolated Domains pdf

Autori: Merve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg
Pubblicato in: Proceedings of 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
Editore: IEEE Computer Society
DOI: 10.1109/dsn58367.2023.00046

Efficient and Timely Revocation of V2X Credentials

Autori: Scopelliti, Gianluca; Baumann, Christoph; Alder, Fritz; Truyen, Eddy; Mühlberg, Jan Tobias
Pubblicato in: Proceedings of the 2024 Network and Distributed System Security Symposium (NDSS’24), Numero 1, 2024
Editore: Internet Society
DOI: 10.14722/ndss.2024.24017

Zero-Cost In-Depth Enforcement of Network Policies for Low-Latency Cloud-Native Systems

Autori: Budigiri, Gerald; Baumann, Christoph; Truyen, Eddy; Muhlberg, Jan Tobias; Joosen, Wouter
Pubblicato in: 2023 IEEE 16th International Conference on Cloud Computing (CLOUD), Numero 2, 2023
Editore: IEEE
DOI: 10.1109/cloud60044.2023.00036

POSTER: An Open-Source Framework for Developing Heterogeneous Distributed Enclave Applications

Autori: Scopelliti, Gianluca; Pouyanrad, Sepideh; Noorman, Job; Alder, Fritz; Piessens, Frank; Mühlberg, Jan Tobias
Pubblicato in: CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, Numero 15-19 November 2021, annually, 2021, Pagina/e 2393 - 2395, ISBN 9781450384544
Editore: ACM
DOI: 10.1145/3460120.3485341

Secure and Scalable Policy Management in Cloud Native Networking

Autori: Gerald Budigiri
Pubblicato in: Middleware '23: Proceedings of the 24th International Middleware Conference: Demos, Posters and Doctoral Symposium, 2023
Editore: ACM
DOI: 10.1145/3626564.3629092

Exploring the Environmental Benefits of In-Process Isolation for Software Resilience

Autori: Gülmez, Merve; Nyman, Thomas; Baumann, Christoph; Mühlberg, Jan Tobias
Pubblicato in: 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DNS-S), Numero 9, 2023
Editore: IEEE
DOI: 10.1109/dsn-s58398.2023.00056

Network Policies in Kubernetes: Performance Evaluation and Security Analysis

Autori: Gerald Budigiri; Christoph Baumann; Jan Tobias Muhlberg; Eddy Truyen; Wouter Joosen
Pubblicato in: 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), Numero 8-11 June 2021, anually, 2021, Pagina/e 1-6, ISBN 978-1-6654-1526-2
Editore: IEEE
DOI: 10.1109/eucnc/6gsummit51104.2021.9482526

The Climate Crisis is a Digital Rights Crisis: Exploring the Civil-Society Framing of Two Intersecting Disasters

Autori: Fieke Jansen; Merve Gulmez; Becky Kazansky; Narmine Abou Bakari; Claire Fernandez; Harriet Kingaby; Jan Tobias Mühlberg
Pubblicato in: Ninth Computing within Limits 2023, Numero 1, 2023
Editore: PubPub
DOI: 10.21428/bf6fb269.b4704652

Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust

Autori: Gülmez, Merve; Nyman, Thomas; Baumann, Christoph; Mühlberg, Jan Tobias
Pubblicato in: 2023 IEEE Secure Development Conference (SecDev), Numero 8, 2023
Editore: IEEE
DOI: 10.1109/secdev56634.2023.00020

An Open-Source Framework for Developing Heterogeneous Distributed Enclave Applications

Autori: Scopellitti, Gianluca; Pouyanrad, Sepideh; Noorman, Job; Alder, Fritz; Piessens, Frank; Mühlberg, Jan Tobias
Pubblicato in: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, Numero 1, 2021
Editore: KU Leuven

AI in 5G: High-Speed Dilution of the Right to Privacy and Reducing the Role of Consent

Autori: Mykyta Petik
Pubblicato in: Intelligent and Autonomous: Transforming Values in the Face of Technology, 2023
Editore: Brill
DOI: 10.1163/9789004547261_007

Diritti di proprietà intellettuale

SECURE ROLLBACK OF SOFTWARE FAULT ISOLATION DOMAINS

Numero candidatura/pubblicazione: 20 22050417
Data: 2022-04-29
Candidato/i: ERICSSON AB

FIRST NODE, SECOND NODE, THIRD NODE, COMPUTING SYSTEM AND METHODS PERFORMED THEREBY FOR HANDLING INFORMATION INDICATING ONE OR MORE FEATURES SUPPORTED BY A PROCESSOR

Numero candidatura/pubblicazione: 20 21050986
Data: 2021-10-07
Candidato/i: ERICSSON AB

SELF-REVOCATION OF A TRUSTED COMPONENT NODE

Numero candidatura/pubblicazione: 20 22050624
Data: 2022-06-22
Candidato/i: ERICSSON AB

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile