Skip to main content

Building Trust in Ecosystems and Ecosystem Components

Deliverables

Report on the identified security and privacy metrics and security claims to evaluate the security of a system

Identification of the metrics and claims to assess the security of an ICT system in an objective and measurable way

Dissemination Strategy - Initial Version

Plan and Dissemination activities including a plan for frequent updates

Blockly4SoS model and simulator

This deliverable includes the Blockly4SoS model including the attack graphs and the Blockly4SoS simulator that is used to test the attack paths

Project Quality Manual

The project quality will be based on a set of rules defined in the guidelines

Report on the state of the art of vulnerability management

This deliverable reports on the current state of the art and forms the basis for further development

Project Requirements

This deliverable describes the requirements of the project in terms of delivered artefacts

Overall framework architecture design (1st Draft)

This document includes all the major aspects of the BIECO architecture as defined in T23

Report of the tools for vulnerability detection and forecasting

This deliverable provides the description of the prototypes developed for detecting and forecasting vulnerabilities

Dissemination Strategy - Updated Version

Plan and Dissemination activities including a plan for frequent updates

Blockly4SoS user guide.

This deliverable represents the user guide of the Blockly4SoS at the light of the new features added

Security certification methodology definition

Definition and description of the security certification methodology and its different phases and interconnections

BIECO verification and testing strategy

Definition of a testing and integration strategy for the individual components as well as the unified BIECO platform

Overall system architecture Update (Final)

This deliverable presents the final version of the envisioned framework architecture

Mitigations identification and their design

This deliverable details and architect the approach to define mitigations

Data Management Plan

The Data Management Plan DMP will be set up according to the special needs of the project and will act as a monitoring system to keep track of IP issues and open research data for the H2020 pilot

Searching for OpenAIRE data...

Publications

BIECO, un approccio olistico alla cybersecurity (BIECO and holistic approach for the cybersecurity)

Author(s): Eda Marchetti
Published in: Italian newspaper “il sole 24 ore” special insert “SCENARI”, daily (published 28th of February 2022), 2022, Page(s) 9
Publisher: Gruppo 24 ORE

Basic Aspects in Redundancy-Based Intrusion Tolerance

Author(s): Felicita Di Giandomenico, Giulio Masetti
Published in: 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021). CISIS - ICEUTE 2021. Advances in Intelligent Systems and Computing, vol 1400., 23 September 2021, 2021, ISBN 978-3-030-87872-6
Publisher: Springer, Cham
DOI: 10.1007/978-3-030-87872-6_19

A Comparative Study of the Most Important Methods for Forecasting the ICT Systems Vulnerabilities

Author(s): O. Cosma, M. Macelaru, P. C. Pop, C. Sabo, I. Zelina
Published in: 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), 1400, 2022, Page(s) 224-233, ISBN 978-3-030-87871-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-87872-6_22

A Survey on the State of the Art of Vulnerability Assessment Techniques

Author(s): Eva Sotos Martínez, Nora M. Villanueva and Lilian Adkinson Orellana
Published in: 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021). CISIS - ICEUTE 2021. Advances in Intelligent Systems and Computing, vol 1400., 22 September 2021, 2021, Page(s) 203-2013, ISSN 978-3-030-87871-9978-3-030-87872-6
Publisher: Springer, Cham
DOI: 10.1007/978-3-030-87872-6_20

Out-of-sync Schedule Robustness for Time-sensitive Networks

Author(s): Silviu S. Craciunas, Ramon Serna Oliver
Published in: 17th IEEE International Conference on Factory Communication Systems (WFCS), 1905, 2021, Page(s) 8, ISBN 978-1-6654-2478-3
Publisher: IEEE
DOI: 10.1109/wfcs46889.2021.9483602

Goals within Trust-based Digital Ecosystems

Author(s): Emilia Cioroaica, Akanksha Purohit, Barbora Buhnova, and Daniel Schneider
Published in: 2021 IEEE/ACM Joint 9th International Workshop on Software Engineering for Systems-of-Systems and 15th Workshop on Distributed Software Development, Software Ecosystems and Systems-of-Systems (SESoS/WDES), 3rd of June 2021, 2021, Page(s) 1-7, ISBN 978-1-6654-4561-0
Publisher: IEEE
DOI: 10.1109/sesos-wdes52566.2021.00006

GRADUATION: A GDPR-based Mutation Methodology

Author(s): Said Daoudagh, Eda Marchetti
Published in: Quality of Information and Communications Technology. QUATIC 2021. Communications in Computer and Information Science, vol 1439, 08 September 2021, 2021, Page(s) 311-324, ISBN 978-3-030-85347-1
Publisher: Springer, Cham
DOI: 10.1007/978-3-030-85347-1_23

BIECO Runtime Auditing Framework

Author(s): Antonello Calabrò, Emilia Cioroaica, Said Daoudagh, Eda Marchetti
Published in: 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021). CISIS - ICEUTE 2021. Advances in Intelligent Systems and Computing, vol 1400, 22 September 2021, 2021, Page(s) 181-191, ISSN 978-3-030-87871-9978-3-030-87872-6
Publisher: Springer, Cham
DOI: 10.1007/978-3-030-87872-6_18

Comparison of Safety and Security Analysis Techniques

Author(s): Emilia Cioroaica, Smruti Ranjan Kar, and Ioannis Sorokos
Published in: 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021). CISIS - ICEUTE 2021. Advances in Intelligent Systems and Computing, vol 1400, 22 September 2021, 2021, Page(s) 234-242, ISBN 978-3-030-87872-6
Publisher: Springer, Cham
DOI: 10.1007/978-3-030-87872-6_23

MENTORS - Monitoring Environment for System of Systems

Author(s): Antonello Calabrò, Said Daoudagh, Eda Marchetti
Published in: Proceedings of the 17th International Conference on Web Information Systems and Technologies (WEBIST 2021), 26 October 2021, 2021, Page(s) 291-298, ISBN 978-989-758-536-4
Publisher: SciTePress
DOI: 10.5220/0010658900003058

The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities

Author(s): Said Daoudagh, Eda Marchetti
Published in: Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP, 09 February 2022, 2022, Page(s) 571-578, ISBN 978-989-758-553-1
Publisher: SciTePress
DOI: 10.5220/0010912300003120

Bridging Trust in Runtime Open Evaluation Scenarios

Author(s): Emilia Cioroaica, Barbora Buhnova, Eda Marchetti, Daniel Schneider, Thomas Kuhn
Published in: Model and Data Engineering in the Digitalization Era. MEDI 2021. Communications in Computer and Information Science, vol 1481, LNCS, volume 12732, 2021, Page(s) 112-120, ISBN 978-3-030-87657-9
Publisher: Springer, Cham
DOI: 10.1007/978-3-030-87657-9_9

A MDE Tool for Security RiskAssessment of Enterprises

Author(s): Enrico Schiavone, Nicola Nostro, Francesco Brancati
Published in: INDUSTRY TRACK - LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 10. , 2021, Florianópolis., 22 November 2021, 2021
Publisher: SBC
DOI: 10.5753/ladc.2021.18530

The BIECO Conceptual Framework Towards Security and Trust in ICT Ecosystems

Author(s): Ricardo Peres, Lilian Adkinson, Emilia Cioroaica, Eda Marchetti, Enrico Schiavone, Sara Matheu, Ovidiu Cosma, Radoslaw Piliszek, Jose Barata.
Published in: The 33rd IFIP International Conference on Testing Software and Systems (IFIP-ICTSS), 10-11 November 2021, 2021
Publisher: Springer, Cham

LPWAN and Embedded Machine Learning as Enablers for the Next Generation of Wearable Devices

Author(s): Ramon Sanchez-Iborra
Published in: Sensors, Vol 21 Issue 15, 2021, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s21155218

On Autonomous Dynamic Software Ecosystems

Author(s): Rafael Capilla,Emilia Cioroaica, Barbora Buhnova, and Jan Bosch
Published in: IEEE Transactions on Engineering Management, 27 October 2021, 2021, Page(s) 1-15, ISSN 1558-0040
Publisher: IEEE
DOI: 10.1109/tem.2021.3116873

The Challenges of Software Cybersecurity Certification

Author(s): José Luis Hernández-Ramos, Sara Nieves Matheu-García, Antonio Skarmeta
Published in: IEEE Security & Privacy, Vol. 19, Issue 1, 2021, Page(s) 99-102, ISSN 1558-4046
Publisher: IEEE
DOI: 10.1109/msec.2020.3037845

Defining the Behavior of IoT Devices Through the MUD Standard: Review, Challenges, and Research Directions

Author(s): José Luis Hernández-Ramos, Sara Nieves Matheu-García, Angelo Feraudo, Gianmarco Baldini, Jorge Bernal-Bernabe, Poonam Yadav, Antonio Skarmet Paolo Bellavista
Published in: IEEE Access, Vol 9, 2021, Page(s) 126265 - 126285, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2021.3111477

Data Based Message Validation as a Security Cornerstone in Loose Coupling Software Architecture

Author(s): Oliviu Matei, Rudolf Erdei, Daniela Delinschi, Laura Andreica
Published in: 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), 1400, 2022, Page(s) 214-223, ISBN 978-3-030-87871-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-87872-6_21

The GDPR Compliance Through Access Control Systems

Author(s): Said Daoudagh
Published in: ETD Archivio digitale delle tesi discusse presso l'Università di Pisa, 20 July 2021, 2021
Publisher: University of Pisa