Skip to main content
European Commission logo
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

Secure Data Processing in the Cloud

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

Final RestAssured Handbook

The first release of the RestAssured Handbook aligned with V3 of the RestAssured Architecture, Methodology and code.

Final Impact and Innovation Management Summary Report

This report summarizes the achievements in innovation management. It is the definitive statement of the achievements exploiting the project results, the potential for further progress.

Final Validation Plan

This document constitutes the final validation plan for all three RestAssured use cases.

Initial High Level Architecture

This report will describe the initial technical architecture of RestAssured providing a blueprint for WP3–WP6

First Impact and Innovation Management Summary Report

This report summarizes the achievements in innovation management.

Project Management and Quality Assurance Handbook

This handbook will contain key management and governance structures, procedures and contact persons; it will include clear procedures to be followed by each work package, task and deliverable leader. If required, it will be updated in periodic reports. The handbook will also define the internal procedures for measuring and evaluating the project execution and results obtained.

Integrated Approach for Enforcing End-User Privacy Policies across Third-party Cloud Infrastructures

This final report will describe the RestAssured integrated approach for detecting end-user privacy policy violations as well as their dissolving through runtime reconfigurations. It will report about the prototype implementation of the RestAssured engine for automatically restoring privacy compliancy.

Impact Plan

This plan sets out the channels and protocols by which partners communicate outside of the project, establishing a consistent and clear message, including dissemination and communication.

First Validation Plan

This document constitutes the initial validation plan for all three RestAssured use cases.

Revised Methodology and Technical Concept for Decentralized Data Lifecycle Management

This report will describe the final version of the methodology for specifying end-user privacy policies and for enforcing specified policies amongst decentralized cloud application components. It provides an integrated prototype that allows specifying end-user privacy policies, observing their changes and propagating these changes to the RestAssured Secure Enclaves

Methodology for Decentralized Data Lifecycle Management

This report will introduce the RestAssured data lifecycle management approach that allows for enforcing end-user privacy policies amongst multiple cloud service providers. It will also report on the prototype for connecting end-user privacy policies to sensitive data via encryption.

RestAssured Security and Privacy Engineering Methodology

This report will describe the overall risk-based Privacy by Design methodology to be supported by the project, as well as the semantics of the RestAssured threat models. It will also report on the prototype RestAssured modelling tool that empowers users to create threat models.

Conceptual Foundation of the RestAssured Secure Enclave

This report describes the concept of the RestAssured Secure Enclave, the API of the software encryption toolbox, as well as the prototypical implementation of augmenting of Apache Spark with software encryption libraries.

Technical Concept for Communicating Policy Changes across RestAssured Secure Enclaves

This report will describe the technical concept that captures end-users’ privacy policy changes and that selects Secure Enclaves being affected by captured changes. It also reports on a prototype enabling end-users to specify privacy policies.

Conceptual Foundation for the RestAssured Security and Privacy Engineering

This report will describe the semantics of the RestAssured mitigation models and will include the up-dated RestAssured engineering methodology. It will also report about prototype tool for creating mitigation models.

First Validation Results

This document constitutes the results of the initial validation for all three RestAssured use cases

First RestAssured Handbook

The first release of the RestAssured Handbook aligned with V2 of the RestAssured Architecture, Methodology and code

RestAssured Security and Privacy Engineering

This report will include the final version of the RestAssured risk-based privacy by design methodology that ensures a comprehensive coverage of privacy and threats in the cloud. It will report on the final version of the RestAssured modelling tools and API.

Final Validation Results

This document constitutes the results of the final validation for all three RestAssured use cases.

RestAssured Roadmap

This document will highlight issues for both future research and application of RestAssured technolo-gies.

Concept for End-User Privacy Policy Violation Detection

This report will document the RestAssured runtime meta model semantics that aims for expressing the cloud-application aspects to be checked against the privacy policies. Further, the report will describe the RestAssured approach for checking the runtime model against end-user privacy policies, and report on the prototype for detecting privacy policy violations.

Final High Level Architecture & Methodology

This report will describe the final RestAssured methodology and the overall composition of the RestAssured components at a functional level, and describes the interactions between the components, including the conceptual description of their APIs, as well as the deployment and usage of the RestAssured Testbed.

WP4 2d Half Technical Report

This report describes the work done in the second half of the project on WP4, including a description of the use of AMD SEV hardware enclaves and the development of encryption in Apache Parquet.

RestAssured Secure Enclave Manual

This report will describe the final version of the RestAssured Secure Enclave. The description will include the manual of the RestAssured Secure Enclave as well as its extension capabilities. It will also describe the RestAssured Secure Enclave Platform.

First High Level Architecture & Methodology

This report will describe the RestAssured methodology and the overall composition of the RestAssured components at a functional level, and describes the interactions between the components, including the conceptual description of their APIs, as well as the deployment and usage of the RestAssured Testbed.

Concept for Privacy Compliance Restoring Reconfigurations

This report will document the RestAssured approach for deriving adaptations plans based on runtime models and violation traces. The concept will include the utilization for privacy violation traces that will dissolve detected privacy violation root causes, and it reports on the prototype for generating and executing a reconfiguration plan for the cloud application.

Publicaciones

Resource Optimization Across the Cloud Stack

Autores: Zoltan Adam Mann
Publicado en: IEEE Transactions on Parallel and Distributed Systems, Edición 29/1, 2018, Página(s) 169-182, ISSN 1045-9219
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TPDS.2017.2744627

Cloud simulators in the implementation and evaluation of virtual machine placement algorithms

Autores: Zoltán Ádám Mann
Publicado en: Software: Practice and Experience, 2018, ISSN 0038-0644
Editor: John Wiley & Sons Inc.
DOI: 10.1002/spe.2579

Specification of cloud topologies and orchestration using TOSCA: a survey

Autores: Julian Bellendorf, Zoltán Ádám Mann
Publicado en: Computing, 2019, ISSN 0010-485X
Editor: Springer Verlag
DOI: 10.1007/s00607-019-00750-3

Situativer Datenschutz im Fog-Computing

Autores: Zoltán Ádám Mann, Andreas Metzger, Klaus Pohl
Publicado en: Informatik Spektrum, Edición 42/4, 2019, Página(s) 236-243, ISSN 0170-6012
Editor: Springer Verlag
DOI: 10.1007/s00287-019-01190-1

Using risk patterns to identify violations of data protection policies in cloud systems

Autores: Stefan Schoenen Zoltán Ádám Mann Andreas Metzger
Publicado en: 13th International Workshop on Engineering Service-Oriented Applications and Cloud Services (WESOACS 2017), 2018
Editor: Springer

The special case of data protection and self-adaptation

Autores: Zoltán Ádám Mann Andreas Metzger
Publicado en: IEEE/ACM 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2018), 2018
Editor: ACM

Towards a run-time model for data protection in the cloud

Autores: Zoltán Ádám Mann Andreas Metzger Stefan Schoenen
Publicado en: Modellierung 2018, 2018
Editor: GI

Secure Data Processing in the Cloud

Autores: Zoltán Ádám Mann, Eliot Salant, Mike Surridge, Dhouha Ayed, John Boyle, Maritta Heisel, Andreas Metzger, Paul Mundt
Publicado en: Advances in Service-Oriented and Cloud Computing - Workshops of ESOCC 2017, 2017, Página(s) 149-153
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-79090-9_10

Two are better than one: An algorithm portfolio approach to cloud resource management

Autores: Zoltán Ádám Mann
Publicado en: Proceedings of the 6th European Conference on Service-Oriented and Cloud Computing (ESOCC 2017), 2017, Página(s) 93-108
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-67262-5_8

Towards an End-to-End Architecture for Run-Time Data Protection in the Cloud

Autores: Nazila Gol Mohammadi, Zoltan Adam Mann, Andreas Metzger, Maritta Heisel, James Greig
Publicado en: 2018 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), Edición 2018, 2018, Página(s) 514-518, ISBN 978-1-5386-7383-6
Editor: IEEE
DOI: 10.1109/seaa.2018.00088

Modeling Data Protection Vulnerabilities of Cloud Systems using Risk Patterns

Autores: Palm, Alexander; Mann, Zoltán Ádám; Metzger, Andreas
Publicado en: 10th International Conference on System Analysis and Modeling Languages, Methods, and Tools for Systems Engineering (SAM 2018), Edición 2018, 2018, Página(s) 1-19
Editor: Springer
DOI: 10.5281/zenodo.1324125

Auto-Adjusting Self-Adaptive Software Systems

Autores: Zoltan Adam Mann, Andreas Metzger
Publicado en: 2018 IEEE International Conference on Autonomic Computing (ICAC), Edición 2018, 2018, Página(s) 181-186, ISBN 978-1-5386-5139-1
Editor: IEEE
DOI: 10.1109/icac.2018.00030

Data protection in fog computing through monitoring and adaptation

Autores: Zoltán Ádám Mann
Publicado en: KuVS-Fachgespräch Fog Computing 2018, 2018
Editor: Technische Universität Wien

Architecture and Quality of Cloud Simulators

Autores: Zoltán Ádám Mann
Publicado en: Software Engineering and Software Management 2019, 2019, Página(s) 177-178, ISBN 978-3-88579-686-2
Editor: Gesellschaft für Informatik e.V.
DOI: 10.18420/se2019-56

Optimized cloud deployment of multi-tenant software considering data protection concerns - Abridged version

Autores: Zoltán Ádám Mann, Andreas Metzger
Publicado en: Software Engineering und Software Management 2018, 2018, Página(s) 59-60, ISBN 978-3-88579-673-2
Editor: Gesellschaft für Informatik

Finding Risk Patterns in Cloud System Models

Autores: Florian Kunz, Zoltan Adam Mann
Publicado en: 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), 2019, Página(s) 251-255, ISBN 978-1-7281-2705-7
Editor: IEEE
DOI: 10.1109/cloud.2019.00051

Optimized Cloud Deployment of Multi-tenant Software Considering Data Protection Concerns

Autores: Zoltan Adam Mann, Andreas Metzger
Publicado en: 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), 2017, Página(s) 609-618, ISBN 978-1-5090-6611-7
Editor: IEEE
DOI: 10.1109/CCGRID.2017.10

Joint Optimization of Scaling and Placement of Virtual Network Services

Autores: Sevil Draxler, Holger Karl, Zoltan Adam Mann
Publicado en: 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), 2017, Página(s) 365-370, ISBN 978-1-5090-6611-7
Editor: IEEE
DOI: 10.1109/CCGRID.2017.25

Cloud Topology and Orchestration Using TOSCA: A Systematic Literature Review

Autores: Julian Bellendorf, Zoltán Ádám Mann
Publicado en: Service-Oriented and Cloud Computing - 7th IFIP WG 2.14 European Conference, ESOCC 2018, Como, Italy, September 12-14, 2018, Proceedings, Edición 11116, 2018, Página(s) 207-215, ISBN 978-3-319-99818-3
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-99819-0_16

Optimized Application Deployment in the Fog

Autores: Zoltán Ádám Mann, Andreas Metzger, Johannes Prade, Robert Seidl
Publicado en: Service-Oriented Computing - 17th International Conference, ICSOC 2019, Toulouse, France, October 28–31, 2019, Proceedings, Edición 11895, 2019, Página(s) 283-298, ISBN 978-3-030-33701-8
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-33702-5_22

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles