Leistungen
This report will summarize the work done in the work package over the first reporting period. The results of the work package for this period will be demonstrated in the first review.
Secure Data Container Final Technical ReportThis report will summarize the work done in the work package over the second reporting period The results of the work package for this period will be demonstrated in the final project review
Initial FogProtect HandbookFirst release of the project’s Handbook including the project’s methodology and relevant information to ensure the outcomes adoption by innovators.
Final FogProtect HandbookFinal release of the projects Handbook including all relevant outcomes that FogProtect partners have previously agreed to disclose
Initial High-Level ArchitectureThis report will describe the initial technical architecture of FogProtect, providing a blueprint for WP4-WP7.
Dynamic Risk Management Tools: Integrated Prototypes and Final Technical ReportThis report will summarize the work done in the work package over the second reporting period The results of the work package for this period will be demonstrated in the final review This will include threat diagnosis using a combination of machine learning and knowledgebased machine reasoning techniques to achieve fast diagnosis and recommendations for managing risks through adaptation
Impact Maximization PlanThis report includes a detailed dissemination, communication and exploitation plan addressing how the results will be disseminated among targeted communities of interest, how awareness around the project vision will be raised and how exploitation activities will be addressed during the project to ensure its results sustainability. It will include a detailed calendar of activities for the whole project duration and monitoring and assessment strategy.
Final Impact ReportFinal release of all impact activities and results achieved Besides all communication and dissemination activities it will include all partners complete plans to exploit allinnovations developed in the project and a sustainability strategy targeting open source communities
State of the Art Analysis and Initial Validation PlanThis report will document the relevant requirements that the FogProtect solutions will have to satisfy. It will also include an initial validation plan to document the assessment of the integration of the data protection concepts and mechanisms developed by WP4 thru WP7 in trials.
Dynamic Risk Management Tools: First Prototypes and Technical ReportThis report will summarize the work done in the work package over the first reporting period. The results of the work package for this period will be demonstrated in the first review. This will include separate tools for risk assessment using knowledge based machine reasoning or machine learning approaches, along with mathematical models for combining the approaches, but not at this stage, a combined implementation.
Validation Results of the 2nd IterationThis report will document the validation results of the final implementation phase of the use cases
Intermediate Validation Results of the 2nd IterationThis report will document the intermediate status of the validation results of the 2nd implementation phase of the use cases at M27
Initial Data Protection Policy Management FrameworkThis report will describe a framework that formalizes and manages data protection policies as well as an initial solution for end to end data protection orchestration and enforcement.
Concept for Service Management and AdaptationThis report will document the FogProtect approach to data-protection-aware service management and adaptation, including adaptations on application and infrastructure levels.
Validation Results of the 1st IterationThis report will document the validation results of the 1st implementation phase of the use cases.
Project HandbookThis deliverable will gather the project common general procedures, including also the quality assurance and risk management plan to guarantee a successful project implementation.
Final Data Protection Policy Management FrameworkThis report will describe a final version of the end to end data protection policy and orchestration and an enforcement solution for novel fog components and constrained environments
Integrated Approach for Service Management and AdaptationThis report will document the finalized FogProtect approach to dataprotectionaware service management and adaptation in which adaptations on application and infrastructure levels are integrated to optimally balance data protection withperformance cost and energy consumption goals
First High-Level ArchitectureThis report will describe the overall composition of the FogProtect components of the first release at a functional level, and the interactions between the components, including the conceptual description of their APIs.
First Impact Report and Plan UpdateThis report compiles all dissemination and communication activities during the reporting period including also the results of the monitoring and assessment strategy. Any update in strategy and planned activities will also be provided as appropriate. An early map of the cloud and fog computing ecosystem and business modelling considerations will be provided together with early adopters, revenue streams, income model, key distribution channels, approach to open source communities and the most efficient route for research and business development.
Final High-Level ArchitectureThis report will describe the final overall composition of the FogProtect components at a functional level and the interactions between the components including the conceptual description of their APIs
Provide the implemented tested and integrated FogProtect solution suite in its 1st release
Integration of the 2nd ReleaseProvide the implemented, tested, and integrated FogProtect solution suite in its 2nd (final) release
First release of the project website.
This report provides the data management policies and strategies to be adopted by FogProtect during the course of the project.
Veröffentlichungen
Autoren:
Theresa Wettig, Zoltan Adam Mann
Veröffentlicht in:
2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), 2021, Seite(n) 736-741, ISBN 978-1-6654-0424-2
Herausgeber:
IEEE
DOI:
10.1109/percomworkshops51409.2021.9431073
Autoren:
Clemens Lachner, Thomas Rausch, Schahram Dustdar
Veröffentlicht in:
2021 IEEE 5th International Conference on Fog and Edge Computing (ICFEC), 2021, Seite(n) 74-78, ISBN 978-1-6654-0291-0
Herausgeber:
IEEE
DOI:
10.1109/icfec51620.2021.00018
Autoren:
Christian Kunde, Zoltán Ádám Mann
Veröffentlicht in:
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 2020, Seite(n) 1792-1795, ISBN 9781450368667
Herausgeber:
ACM
DOI:
10.1145/3341105.3375771
Autoren:
Dhouha Ayed, Eva Jaho, Clemens Lachner, Zoltán Ádám Mann, Robert Seidl, Mike Surridge
Veröffentlicht in:
Advances in Service-Oriented and Cloud Computing - International Workshops of ESOCC 2020, Heraklion, Crete, Greece, September 28–30, 2020, Revised Selected Papers, Ausgabe 1360, 2021, Seite(n) 179-184, ISBN 978-3-030-71905-0
Herausgeber:
Springer International Publishing
DOI:
10.1007/978-3-030-71906-7_17
Autoren:
Ehsan Ahvar, Shohreh Ahvar, Zoltan Adam Mann, Noel Crespi, Roch Glitho, Joaquin Garcia-Alfaro
Veröffentlicht in:
IEEE Access, Ausgabe 9, 2021, Seite(n) 70192-70213, ISSN 2169-3536
Herausgeber:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/access.2021.3075973
Autoren:
Zoltan Adam Mann, Florian Kunz, Jan Laufer, Julian Bellendorf, Andreas Metzger, Klaus Pohl
Veröffentlicht in:
IEEE Access, Ausgabe 9, 2021, Seite(n) 70816-70842, ISSN 2169-3536
Herausgeber:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/access.2021.3078059
Suche nach OpenAIRE-Daten ...
Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten
Es liegen keine Ergebnisse vor