Skip to main content
Aller à la page d’accueil de la Commission européenne (s’ouvre dans une nouvelle fenêtre)
français français
CORDIS - Résultats de la recherche de l’UE
CORDIS

Protecting Sensitive Data in the Computing Continuum

CORDIS fournit des liens vers les livrables publics et les publications des projets HORIZON.

Les liens vers les livrables et les publications des projets du 7e PC, ainsi que les liens vers certains types de résultats spécifiques tels que les jeux de données et les logiciels, sont récupérés dynamiquement sur OpenAIRE .

Livrables

Secure Data Container First Technical Report (s’ouvre dans une nouvelle fenêtre)

This report will summarize the work done in the work package over the first reporting period. The results of the work package for this period will be demonstrated in the first review.

Secure Data Container Final Technical Report (s’ouvre dans une nouvelle fenêtre)

This report will summarize the work done in the work package over the second reporting period The results of the work package for this period will be demonstrated in the final project review

Initial FogProtect Handbook (s’ouvre dans une nouvelle fenêtre)

First release of the project’s Handbook including the project’s methodology and relevant information to ensure the outcomes adoption by innovators.

Final FogProtect Handbook (s’ouvre dans une nouvelle fenêtre)

Final release of the projects Handbook including all relevant outcomes that FogProtect partners have previously agreed to disclose

Initial High-Level Architecture (s’ouvre dans une nouvelle fenêtre)

This report will describe the initial technical architecture of FogProtect, providing a blueprint for WP4-WP7.

Dynamic Risk Management Tools: Integrated Prototypes and Final Technical Report (s’ouvre dans une nouvelle fenêtre)

This report will summarize the work done in the work package over the second reporting period The results of the work package for this period will be demonstrated in the final review This will include threat diagnosis using a combination of machine learning and knowledgebased machine reasoning techniques to achieve fast diagnosis and recommendations for managing risks through adaptation

Impact Maximization Plan (s’ouvre dans une nouvelle fenêtre)

This report includes a detailed dissemination, communication and exploitation plan addressing how the results will be disseminated among targeted communities of interest, how awareness around the project vision will be raised and how exploitation activities will be addressed during the project to ensure its results sustainability. It will include a detailed calendar of activities for the whole project duration and monitoring and assessment strategy.

Final Impact Report (s’ouvre dans une nouvelle fenêtre)

Final release of all impact activities and results achieved Besides all communication and dissemination activities it will include all partners complete plans to exploit allinnovations developed in the project and a sustainability strategy targeting open source communities

State of the Art Analysis and Initial Validation Plan (s’ouvre dans une nouvelle fenêtre)

This report will document the relevant requirements that the FogProtect solutions will have to satisfy. It will also include an initial validation plan to document the assessment of the integration of the data protection concepts and mechanisms developed by WP4 thru WP7 in trials.

Dynamic Risk Management Tools: First Prototypes and Technical Report (s’ouvre dans une nouvelle fenêtre)

This report will summarize the work done in the work package over the first reporting period. The results of the work package for this period will be demonstrated in the first review. This will include separate tools for risk assessment using knowledge based machine reasoning or machine learning approaches, along with mathematical models for combining the approaches, but not at this stage, a combined implementation.

Validation Results of the 2nd Iteration (s’ouvre dans une nouvelle fenêtre)

This report will document the validation results of the final implementation phase of the use cases

Intermediate Validation Results of the 2nd Iteration (s’ouvre dans une nouvelle fenêtre)

This report will document the intermediate status of the validation results of the 2nd implementation phase of the use cases at M27

Initial Data Protection Policy Management Framework (s’ouvre dans une nouvelle fenêtre)

This report will describe a framework that formalizes and manages data protection policies as well as an initial solution for end to end data protection orchestration and enforcement.

Concept for Service Management and Adaptation (s’ouvre dans une nouvelle fenêtre)

This report will document the FogProtect approach to data-protection-aware service management and adaptation, including adaptations on application and infrastructure levels.

Validation Results of the 1st Iteration (s’ouvre dans une nouvelle fenêtre)

This report will document the validation results of the 1st implementation phase of the use cases.

Project Handbook (s’ouvre dans une nouvelle fenêtre)

This deliverable will gather the project common general procedures, including also the quality assurance and risk management plan to guarantee a successful project implementation.

Final Data Protection Policy Management Framework (s’ouvre dans une nouvelle fenêtre)

This report will describe a final version of the end to end data protection policy and orchestration and an enforcement solution for novel fog components and constrained environments

Integrated Approach for Service Management and Adaptation (s’ouvre dans une nouvelle fenêtre)

This report will document the finalized FogProtect approach to dataprotectionaware service management and adaptation in which adaptations on application and infrastructure levels are integrated to optimally balance data protection withperformance cost and energy consumption goals

First High-Level Architecture (s’ouvre dans une nouvelle fenêtre)

This report will describe the overall composition of the FogProtect components of the first release at a functional level, and the interactions between the components, including the conceptual description of their APIs.

First Impact Report and Plan Update (s’ouvre dans une nouvelle fenêtre)

This report compiles all dissemination and communication activities during the reporting period including also the results of the monitoring and assessment strategy. Any update in strategy and planned activities will also be provided as appropriate. An early map of the cloud and fog computing ecosystem and business modelling considerations will be provided together with early adopters, revenue streams, income model, key distribution channels, approach to open source communities and the most efficient route for research and business development.

Final High-Level Architecture (s’ouvre dans une nouvelle fenêtre)

This report will describe the final overall composition of the FogProtect components at a functional level and the interactions between the components including the conceptual description of their APIs

Integration of the 1st Release (s’ouvre dans une nouvelle fenêtre)

Provide the implemented tested and integrated FogProtect solution suite in its 1st release

Integration of the 2nd Release (s’ouvre dans une nouvelle fenêtre)

Provide the implemented, tested, and integrated FogProtect solution suite in its 2nd (final) release

Data Management Plan (s’ouvre dans une nouvelle fenêtre)

This report provides the data management policies and strategies to be adopted by FogProtect during the course of the project.

Publications

Simulation-based analysis of threats to location privacy in fog computing (s’ouvre dans une nouvelle fenêtre)

Auteurs: Theresa Wettig, Zoltan Adam Mann
Publié dans: 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), 2021, Page(s) 736-741, ISBN 978-1-6654-0424-2
Éditeur: IEEE
DOI: 10.1109/percomworkshops51409.2021.9431073

A Privacy Preserving System for AI-assisted Video Analytics (s’ouvre dans une nouvelle fenêtre)

Auteurs: Clemens Lachner, Thomas Rausch, Schahram Dustdar
Publié dans: 2021 IEEE 5th International Conference on Fog and Edge Computing (ICFEC), 2021, Page(s) 74-78, ISBN 978-1-6654-0291-0
Éditeur: IEEE
DOI: 10.1109/icfec51620.2021.00018

Comparison of simulators for fog computing (s’ouvre dans une nouvelle fenêtre)

Auteurs: Christian Kunde, Zoltán Ádám Mann
Publié dans: Proceedings of the 35th Annual ACM Symposium on Applied Computing, 2020, Page(s) 1792-1795, ISBN 9781450368667
Éditeur: ACM
DOI: 10.1145/3341105.3375771

FogProtect: Protecting Sensitive Data in the Computing Continuum (s’ouvre dans une nouvelle fenêtre)

Auteurs: Dhouha Ayed, Eva Jaho, Clemens Lachner, Zoltán Ádám Mann, Robert Seidl, Mike Surridge
Publié dans: Advances in Service-Oriented and Cloud Computing - International Workshops of ESOCC 2020, Heraklion, Crete, Greece, September 28–30, 2020, Revised Selected Papers, Numéro 1360, 2021, Page(s) 179-184, ISBN 978-3-030-71905-0
Éditeur: Springer International Publishing
DOI: 10.1007/978-3-030-71906-7_17

DECA: A Dynamic Energy Cost and Carbon Emission-Efficient Application Placement Method for Edge Clouds (s’ouvre dans une nouvelle fenêtre)

Auteurs: Ehsan Ahvar, Shohreh Ahvar, Zoltan Adam Mann, Noel Crespi, Roch Glitho, Joaquin Garcia-Alfaro
Publié dans: IEEE Access, Numéro 9, 2021, Page(s) 70192-70213, ISSN 2169-3536
Éditeur: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2021.3075973

RADAR: Data Protection in Cloud-Based Computer Systems at Run Time (s’ouvre dans une nouvelle fenêtre)

Auteurs: Zoltan Adam Mann, Florian Kunz, Jan Laufer, Julian Bellendorf, Andreas Metzger, Klaus Pohl
Publié dans: IEEE Access, Numéro 9, 2021, Page(s) 70816-70842, ISSN 2169-3536
Éditeur: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2021.3078059

Recherche de données OpenAIRE...

Une erreur s’est produite lors de la recherche de données OpenAIRE

Aucun résultat disponible

Mon livret 0 0