Skip to main content
European Commission logo
English English
CORDIS - EU research results
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

5th GeneratiOn Security for Telecom Services

Deliverables

Report on local and network activities II

Final update of D4.4: Report on the local and network activities, incl. participation at external conferences.

Potential inputs for policy feedback

Potential inputs for policy feedback.

Report on local and network activities I

Report on the local and network activities incl participation at external conferences

Communication and dissemination activities I

Midterm report on communication and dissemination activities.

Supervisory Board of the network

Report on assignment of members and responsibilities of the supervisory board.

"Joint publication on ""Secure and Privacy Preserving Virtualization Techniques for 5G Telecom Networks"""

Joint publication on “Secure and Privacy Preserving Virtualization Techniques for 5G Telecom Networks” to be submitted to a peer-reviewed journal or conference.

Communication and dissemination activities II

Final report on communication and dissemination activities

Privacy requirements for 5G Telecom Systems running virtualized multi-component services

A study of the privacy requirements for 5G Telecom Systems running virtualized multicomponent services including a state of the art overview of the relevant legal requirements under the sectorneutral GDPR which enters into force on 25 May 2018 and the upcoming sectorspecific ePrivacy Regulation which is a lex specialis intended to particularise and complement the rules of the GDPR for the electronic communications sector and offering a comprehensive analysis of the impact of implementing regulationcompliant privacy in an NVF execution environments

Recruitment report

Recruitment report incl copy of vacancy notices selection and recruitment procedures

The trust model for multi-tenant 5G telecom systems running virtualized multi-component services

A Study of the trust model for multitenant 5G Telecom systems running virtualized multicomponent services including a an extensive comparison of the mainstream secure development distribution initiation and update mechanisms for 5G virtualized service components on a trusted computing base b the Definition of security properties and security model for container orchestration in 5G NFV systems a comparison of the mainstream orchestration frameworks with respect to the security and performance requirements for flexible mobile edge deployments c an evaluation of the existing approaches for extending orchestration frameworks with NFV features with respect to their performance overhead and ease of extending orchestration frameworks Other factors such as timetomarket community support and reuse of existing NFV components in the container image life cycle are also considered

Communication, Dissemination and Exploitation Plan

Communication, Dissemination & Exploitation Plan (CDEP).

State-of-the-art of cryptographic credential management and design of a secure development and operations framework

State-of-the-art study of cryptographic credential management and design of a secure development and operations framework for multi-component 5G Telecom Services, in the context of NFV and with a formalised model of the system and the required security properties in the context of secure inter-container communication.

Collaboration Platform and Quality Handbook

Collaboration Platform and Quality Handbook.

Initial setup of communication channels

Setup of mailing lists and a basic collaboration platform for the project's bodies.

Publications

A Survey of Security and Privacy Issues in V2X Communication Systems

Author(s): Yoshizawa, Takahito; Singelée, Dave; Muehlberg, Jan Tobias; Delbruel, Stéphane; Taherkordi, Amir; Hughes, Danny; Preneel, Bart
Published in: ACM Computing Surveys, Issue 11, 2023, ISSN 0360-0300
Publisher: Association for Computing Machinary, Inc.
DOI: 10.1145/3558052

End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs

Author(s): Gianluca Scopelliti; Sepideh Pouyanrad; Job Noorman; Fritz Alder; Christoph Baumann; Frank Piessens; Jan Tobias Mühlberg
Published in: ACM Trans. Priv. Secur., Issue 2, 2023, ISSN 2471-2566
Publisher: ACM
DOI: 10.1145/3592607

About Time: On the Challenges of Temporal Guarantees in Untrusted Environments

Author(s): Fritz Alder; Gianluca Scopelliti; Jo Van Bulck; Jan Tobias Mühlberg
Published in: SysTEX '23: Proceedings of the 6th Workshop on System Software for Trusted Execution, Issue 1, 2023
Publisher: ACM
DOI: 10.1145/3578359.3593038

Rewind & Discard: Improving Software Resilience using Isolated Domains pdf

Author(s): Merve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg
Published in: Proceedings of 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
Publisher: IEEE Computer Society
DOI: 10.1109/dsn58367.2023.00046

Efficient and Timely Revocation of V2X Credentials

Author(s): Scopelliti, Gianluca; Baumann, Christoph; Alder, Fritz; Truyen, Eddy; Mühlberg, Jan Tobias
Published in: Proceedings of the 2024 Network and Distributed System Security Symposium (NDSS’24), Issue 1, 2024
Publisher: Internet Society
DOI: 10.14722/ndss.2024.24017

Zero-Cost In-Depth Enforcement of Network Policies for Low-Latency Cloud-Native Systems

Author(s): Budigiri, Gerald; Baumann, Christoph; Truyen, Eddy; Muhlberg, Jan Tobias; Joosen, Wouter
Published in: 2023 IEEE 16th International Conference on Cloud Computing (CLOUD), Issue 2, 2023
Publisher: IEEE
DOI: 10.1109/cloud60044.2023.00036

POSTER: An Open-Source Framework for Developing Heterogeneous Distributed Enclave Applications

Author(s): Scopelliti, Gianluca; Pouyanrad, Sepideh; Noorman, Job; Alder, Fritz; Piessens, Frank; Mühlberg, Jan Tobias
Published in: CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, Issue 15-19 November 2021, annually, 2021, Page(s) 2393 - 2395, ISBN 9781450384544
Publisher: ACM
DOI: 10.1145/3460120.3485341

Secure and Scalable Policy Management in Cloud Native Networking

Author(s): Gerald Budigiri
Published in: Middleware '23: Proceedings of the 24th International Middleware Conference: Demos, Posters and Doctoral Symposium, 2023
Publisher: ACM
DOI: 10.1145/3626564.3629092

Exploring the Environmental Benefits of In-Process Isolation for Software Resilience

Author(s): Gülmez, Merve; Nyman, Thomas; Baumann, Christoph; Mühlberg, Jan Tobias
Published in: 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DNS-S), Issue 9, 2023
Publisher: IEEE
DOI: 10.1109/dsn-s58398.2023.00056

Network Policies in Kubernetes: Performance Evaluation and Security Analysis

Author(s): Gerald Budigiri; Christoph Baumann; Jan Tobias Muhlberg; Eddy Truyen; Wouter Joosen
Published in: 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), Issue 8-11 June 2021, anually, 2021, Page(s) 1-6, ISBN 978-1-6654-1526-2
Publisher: IEEE
DOI: 10.1109/eucnc/6gsummit51104.2021.9482526

The Climate Crisis is a Digital Rights Crisis: Exploring the Civil-Society Framing of Two Intersecting Disasters

Author(s): Fieke Jansen; Merve Gulmez; Becky Kazansky; Narmine Abou Bakari; Claire Fernandez; Harriet Kingaby; Jan Tobias Mühlberg
Published in: Ninth Computing within Limits 2023, Issue 1, 2023
Publisher: PubPub
DOI: 10.21428/bf6fb269.b4704652

Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust

Author(s): Gülmez, Merve; Nyman, Thomas; Baumann, Christoph; Mühlberg, Jan Tobias
Published in: 2023 IEEE Secure Development Conference (SecDev), Issue 8, 2023
Publisher: IEEE
DOI: 10.1109/secdev56634.2023.00020

An Open-Source Framework for Developing Heterogeneous Distributed Enclave Applications

Author(s): Scopellitti, Gianluca; Pouyanrad, Sepideh; Noorman, Job; Alder, Fritz; Piessens, Frank; Mühlberg, Jan Tobias
Published in: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, Issue 1, 2021
Publisher: KU Leuven

AI in 5G: High-Speed Dilution of the Right to Privacy and Reducing the Role of Consent

Author(s): Mykyta Petik
Published in: Intelligent and Autonomous: Transforming Values in the Face of Technology, 2023
Publisher: Brill
DOI: 10.1163/9789004547261_007

Intellectual Property Rights

SECURE ROLLBACK OF SOFTWARE FAULT ISOLATION DOMAINS

Application/Publication number: 20 22050417
Date: 2022-04-29
Applicant(s): ERICSSON AB

FIRST NODE, SECOND NODE, THIRD NODE, COMPUTING SYSTEM AND METHODS PERFORMED THEREBY FOR HANDLING INFORMATION INDICATING ONE OR MORE FEATURES SUPPORTED BY A PROCESSOR

Application/Publication number: 20 21050986
Date: 2021-10-07
Applicant(s): ERICSSON AB

SELF-REVOCATION OF A TRUSTED COMPONENT NODE

Application/Publication number: 20 22050624
Date: 2022-06-22
Applicant(s): ERICSSON AB

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available