CORDIS fournit des liens vers les livrables publics et les publications des projets HORIZON.
Les liens vers les livrables et les publications des projets du 7e PC, ainsi que les liens vers certains types de résultats spécifiques tels que les jeux de données et les logiciels, sont récupérés dynamiquement sur OpenAIRE .
Livrables
Output of Task 2.3 – revised version of D2.3 after intermediate evaluation
Initial Architectural DesignOutput of Task 1.3 - ANASTACIA overall reference architecture
Initial Security Enforcement Manager ReportOutput of Task 3.1 –The operational Security Enforcement Manager.
Initial Agents Development ReportOutput of Task 4.3 – Software agents deployed both in local and remote systems
Final Security Orchestrator ReportOutput of Task 3.2 – revised version of D3.2 after intermediate evaluation
Dynamic Security and Privacy Seal Model Analysis ReportOutput of Task 5.1 – A clearly specified Dynamic Security and Privacy Seal Model
Final Reaction Component Services Implementation ReportOutput of Task 4.2 – revised version of D4.2 after intermediate evaluation
Second Period Dissemination, Standardization and Outreach ReportOutput of Task 7.1 and 7.2 – Reports on activities in the second period an overall assessment of communication activities in the project.
Secure Software Development Guidelines Final ReportOutput of Task 2.4 – revised version of D2.4 after intermediate evaluation
User-centred Requirement Initial AnalysisOutput of Task 1.2 - Prioritized specifications and a set of UML diagrams to guide the software design and development cycles. Set of Use Case scenarios to be taken as reference scenarios.
Final Use cases implementation and tests ReportOutput of Task 6.2 – revised version of D6.2 after intermediate evaluation
Holistic Security Context AnalysisOutput of Task 1.1 - A holistic security context analysis report with a clear overall view of ANASTACIA approach from the four perspectives, reaching a common understanding and shared vision of ANASTACIA mission.
Secure Software Development Guidelines Initial ReportOutput of Task 2.4 – the secure software development guidelines and procedures o be followed during all the software lifecycle in order to help developers to take into consideration the security from the design phase.
Final Architectural DesignOutput of Task 1.3 - revised version of D1.3 after first prototype validation
Initial Technical integration and validation ReportOutput of Task 6.1 - Integrated ANASTACIA Platform
Final Agents Development ReportOutput of Task 4.3 – revised version of D4.3 after intermediate evaluation
Initial Security Orchestrator ReportOutput of Task 3.2 – The operational security orchestrator along suitable interfaces to SDN controllers and MANO NFV.
Final Security Enforcement Manager ReportOutput of Task 3.1 – revised version of D3.1 after intermediate evaluation
First Period Dissemination, Standardization and Outreach ReportOutput of Task 7.1 and 7.2 – Reports on activities in the first period and updated plan for the second period.
Privacy Risk Modelling and Contingency Initial ReportOutput of Task 2.3 - Report defining a clear risk modelling, including measurement points and mitigation measures.
Policy-based Definition and Policy for Orchestration Final ReportOutput of Task 2.1 – revised version of D2.1 after intermediate evaluation
Final Technical integration and validation ReportOutput of Task 6.1 – revised version of D6.1 after intermediate evaluation
Policy-based Definition and Policy for Orchestration Initial ReportOutput of Task 2.1 - policy models definitions for security and orchestration. Authorization system tailored for holistic scenarios based on SDNs-NFVs and IoT.
Initial Use cases implementation and tests ReportOutput of Task 6.2 - Implementation and test of the use cases
Final Monitoring Component Services Implementation ReportOutput of Task 4.1 – revised version of D4.1 after intermediate evaluation
Initial End-user validation and evaluation ReportOutput of Task 6.2 - ANASTACIA performance evaluation framework. ANASTACIA use cases validation and evaluation results.
Final Virtual Resources Manager ReportOutput of Task 3.3 – revised version of D3.3 after intermediate evaluation
Initial Dissemination, Standardization and Outreach Strategy PlanOutput of Task 7.1 and 7.2 – The initial dissemination, standardisation and outreach plan comprising the identification of target audience, strategy, actions and verification indicators.
Initial Security Enforcement Enablers ReportOutput of Task 3.3 – Collaborative security enforcement enablers in the form of security-aware SDN controller and security-aware NFV MANO.
Final User-centred Requirement AnalysisOutput of Task 1.2 – revised version of D1.2 after first prototype validation
Output of Task 5.3 - A working service and demonstration of the Dynamic Security and Privacy User Interface.
Dynamic Security and Privacy Seal Monitoring Service DemonstratorOutput of Task 5.2 - A working service and demonstration of the Dynamic Security and Privacy Seal Monitoring Service
Publications
Auteurs:
Shankar Lal, Tarik Taleb, Ashutosh Dutta
Publié dans:
IEEE Communications Magazine, Numéro 55/8, 2017, Page(s) 211-217, ISSN 0163-6804
Éditeur:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/MCOM.2017.1600899
Auteurs:
Hichem Sedjelmaci, Sidi Mohamed Senouci, Tarik Taleb
Publié dans:
IEEE Transactions on Vehicular Technology, Numéro 66/10, 2017, Page(s) 9381-9393, ISSN 0018-9545
Éditeur:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/TVT.2017.2701551
Auteurs:
Ivan Vaccari, Enrico Cambiaso, Maurizio Aiello
Publié dans:
Security and Communication Networks, Numéro 2017, 2017, Page(s) 1-9, ISSN 1939-0122
Éditeur:
John Wiley & Sons Ltd.
DOI:
10.1155/2017/1723658
Auteurs:
Enrico Cambiaso, Gianluca Papaleo, Maurizio Aiello
Publié dans:
Journal of Information Security and Applications, Numéro 35, 2017, Page(s) 23-31, ISSN 2214-2126
Éditeur:
Elsevier
DOI:
10.1016/j.jisa.2017.05.005
Auteurs:
S. Ziegler, A. Skarmeta, J. Bernal, E. E. Kim, S. Bianchi
Publié dans:
IEEE Xplore / The Global Internet of Things Summit (GIoTS 2017), 2017
Éditeur:
IEEE
Auteurs:
S. Lal, I. Oliver, S. Ravidas, and T. Taleb
Publié dans:
IEEE ICC 2017, 2017
Éditeur:
IEEE
Auteurs:
M. Bouet and V. Conan
Publié dans:
Workshop on Mobile Edge Communications (MECOMM’2017), co-located with ACM SIGCOMM, 2017
Éditeur:
ACM
Auteurs:
I. Farris, J. B. Bernabe, N. Toumi, D. Garcia-Carrillo, T. Taleb, A. Skarmeta, and B. Sahlin
Publié dans:
IEEE CSCN 2017, 2017
Éditeur:
IEEE
Auteurs:
S. Lal, A. Kalliola, K. Ahola, and T. Taleb
Publié dans:
IEEE CSCN 2017, 2017
Éditeur:
IEEE
Auteurs:
Y. Khettab, Mi. Bagaa, D.L.C Dutra, T. Taleb and N. Toumi
Publié dans:
WCNC 2018, 2017
Éditeur:
IEEE
Auteurs:
Alejandro Molina, Dan Garcia, Jorge Bernal, Jordi Ortiz, Rafael Marin-Perez, Antonio Skarmeta
Publié dans:
The Global Internet of Things Summit (GIoTS 2018), 2018
Éditeur:
IEEE
Auteurs:
D. Mehta, A. Mady, M. Boubekeur, D. M. Shila
Publié dans:
CENICS 2017, 2017
Éditeur:
CENICS
Auteurs:
A. Mady, R. Trapero, A. Skarmeta, S. Bianchi
Publié dans:
2017
Éditeur:
N.A.
Recherche de données OpenAIRE...
Une erreur s’est produite lors de la recherche de données OpenAIRE
Aucun résultat disponible