CORDIS provides links to public deliverables and publications of HORIZON projects.
Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .
Deliverables
This deliverable includes the documentation of the newly designed secure and scalable network attestation mechanism including the necessary models and the full specification of the internal crypto primitives
Exploitation, Standardisation, Dissemination and Communication Activities Report - version 2This report includes updates on the exploitation standardisation dissemination and communication plans as well as initial reports on the executed activities It furthermore includes a view on the market its opportunities and on TAs
Security Context Broker Specification d Smart Contract Definition & Implementation for Policy Enforcement - version 1Documentation on the Security Context Broker specification modelling and the security
ASSURED Attestation Model and SpecificationThis deliverable defines requirements specification and trust assumptions for enforcing runtime behavioural attestation in the ASSURED architecture
Policy Modelling & Cybersecurity, Privacy and Trust Policy ConstraintsDocumentation on the details of the policy modelling to be used for expressing and managing the different types of policies and the definition of the policy constraints based upon SoS asset security and data privacy preferences
ASSURED Blockchain ArchitectureThis deliverable will give an indetail description of the components of the ASSURED Blockchain architecture for supporting enhanced data sharing and the necessary trust guarantees to be then developed and implemented in T42T45
Operational SoS Process Models & Specification of PropertiesDocumentation of the modelling for the safe implementation of mixedcriticality applications in SoSs including the identification of those safetycritical components that require realtime attestation and verification coupled with the detailed specification of the attestation properties of interest
Project's Impact Assessment - version 2Report documenting evaluation of the validation of the developed technologies the overall projects impact assessment and the adoption guidelines
ASSURED Secure Distributed Ledger Maintenance & Data ManagementDocumentation of the details for the maintenance of the Blockchain infrastructure and the detailed operations for data management
Risk Assessment PlanThe risk assessment plan shows how potential risks are assessed and mitigated in order to avoid any negative influence on the ASSURED project objectives The interrelated risk assessment plan will be established
Exploitation, Standardisation, Dissemination and Communication Activities Report - version 1This report includes updates on the exploitation standardisation dissemination and communication plans as well as initial reports on the executed activities It furthermore includes a view on the market its opportunities and on TAs
ASSURED Blockchain-based Control Services and Crypto functions for Decentralized Data Storage, Sharing and Access Control - version 1Release of the ASSURED Blockchainbased components design modelling and implementation including the developed crypto primitives attributebased encryption proxy reencryption and searchable encryption
ASSURED Layered Attestation and Runtime Verification Enablers Design & Implementation - version 1This deliverable is a report that presents the details of the ASSURED layered attestation architecture the components design for enforcing the developed runtime behavioural attestation enablers and the design of the runtime monitors and verifiers
ASSURED Real-time Monitoring and Tracing Functionalities - version 1This deliverable includes the documentation of the advanced monitoring and introspection functionalities of ASSURED Framework for the dynamic tracing of a systems control and informationflow graphs
Evaluation Framework and Demonstrators PlanningDocumentation of the evaluation framework the validation methodology and the set of scenarios that will run during each demonstrator
Project's Impact Assessment - version 1Report documenting evaluation of the validation of the developed technologies the overall projects impact assessment and the adoption guidelines
ASSURED Reference ArchitectureThis deliverable will provide the specification of the ASSURED reference architecture the functional components and interfaces between them It will provide an analysis and point of reference for the ASSURED in relation to the four specific use cases
Report on Security, Privacy and Accountability Models for Dynamic Trusted Consent and Data SharingThis deliverable describes and outlines the security privacy and accountability models for data collection sharing and storage indetail description of the dynamic trusted consent management mechanism of ASSURED
ASSURED Blockchain-based Control Services and Crypto functions for Decentralized Data Storage, Sharing and Access Control - version 2Release of the ASSURED Blockchainbased components design modelling and implementation including the developed crypto primitives attributebased encryption proxy reencryption and searchable encryption
ASSURED TC-based Functionalities - version 1Details on the implementation specifications of the protocols and crypto algorithms to be used in the context of TCbased security and privacy services offered in ASSURED for enabling device authentication efficient and scalable Blockchain verification and enhanced trust
This deliverable is the proofofconcept implementation of the advanced monitoring and introspection functionalities of ASSURED Framework for the dynamic tracing of a systems control and informationflow graphs
ASSURED TC-based Functionalities - version 2Implementation of the protocols and crypto algorithms to be used in the context of TCbased security and privacy services offered in ASSURED for enabling device authentication efficient and scalable Blockchain verification and enhanced trust
ASSURED Secure and Scalable Aggregate Network Attestation - version 2This deliverable is the proofofconcept implementation of the newly designed secure and scalable network attestation mechanism including the necessary models and the full specification of the internal crypto primitives
ASSURED Layered Attestation and Runtime Verification Enablers Design & Implementation - version 2This deliverable is a prototype implementation of the attestation services and the verification models
Security Context Broker Specification d Smart Contract Definition & Implementation for Policy Enforcement - version 2Data management policies interpreter coupled with the implementation of the smart contract based system
The external IT communication infrastructure constitutes a guideline for communication of the ASSURED project to external target groups including conferences marketing measures and communication channels
The DMP will provide an analysis of the main elements of the data management policy regarding all the research datasets that will be generated by the project
Data Management Plan (DMP) - version 2Updated version of the Data Management Plan
Publications
Author(s):
Dushku, Edlira, Østergaard, Jeppe Hagelskjær, Dragoni, Nicola
Published in:
2022
Publisher:
Zenodo
DOI:
10.3390/s22124340
Author(s):
Georgios Fotiadis, José Moreira, Thanassis Giannetsos, Liqun Chen, Peter B. Rønne, Mark D. Ryan & Peter Y. A. Ryan
Published in:
Security and Trust Management: 17th International Workshop, 2021, Page(s) 163-184
Publisher:
Lecture Notes in Computer Science book series (LNSC,volume 13075)
DOI:
10.1007/978-3-030-91859-0_9
Author(s):
Chen, Tianyang, Xu, Peng, Picek, Stjepan, Luo, Bo, Susilo, Willy, Jin, Hai, Liang, Kaitai
Published in:
2023
Publisher:
Zenodo
DOI:
10.14722/ndss.2023.24725
Author(s):
Benjamin Larsen, Nada El Kaseem, Thanassis Giannetsos, Ioannis Krontiris, Liqun Chen
Published in:
2023
Publisher:
Zenodo
DOI:
10.5281/zenodo.8215222
Author(s):
Liqun Chen, Nada El Kassem, Christopher J.P. Newton
Published in:
2023
Publisher:
Zenodo
DOI:
10.1093/comjnl/bxad037
Author(s):
Heini Bergsson Debes; Edlira Dushku; Thanassis Giannetsos; Ali Marandi
Published in:
Issue 1, 2023
Publisher:
Zenodo
DOI:
10.5281/zenodo.8215271
Author(s):
Peng Xu, Willy Susilo, Wei Wang, Tianyang Chen, Qianhong Wu, Kaitai Liang, Hai Jin
Published in:
2022
Publisher:
Zenodo
DOI:
10.1109/tifs.2022.3155977
Author(s):
Thanh Nguyen; Meni Orenbach; Ahmad Atamli
Published in:
Crossref, Issue 1, 2022
Publisher:
Zenodo
DOI:
10.1016/j.fsidi.2022.301398
Author(s):
Heini Bergsson Debes, Thanassis Giannetsos
Published in:
2022
Publisher:
Zenodo
DOI:
10.1145/3538969.3539004
Author(s):
Thanassis Giannetsos; Dimitris Papamartzivanos; Sofia Anna Menesidou; Sophia Karagiorgou
Published in:
European Conferenceon Networks and Communications, Issue 1, 2021
Publisher:
EuCNC
DOI:
10.5281/zenodo.5337038
Author(s):
Masoom Rabbani, Edlira Dushku, Jo Vliegen, An Braeken, Nicola Dragoni, Nele Mentens
Published in:
Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems, 2021
Publisher:
ENSsys, Workshop co-located with ACM SenSys’21
DOI:
10.1145/3485730.3493364
Author(s):
Haibo Cheng, Wenting Li, Ping Wang, Kaitai Liang
Published in:
2021
Publisher:
Zenodo
DOI:
10.1109/icassp39728.2021.9414886
Author(s):
Jeppe Hagelskjær Østergaard; Edlira Dushku; Nicola Dragoni
Published in:
2021 IEEE International Conference on Cyber Security and Resilience (CSR), 2021
Publisher:
IEEE
DOI:
10.1109/csr51186.2021.9527978
Author(s):
Zhao, Zhendong, Chen, Xiaojun, Xuan, Yuexin, Dong, Ye, Wang, Dakui, Liang, Kaitai
Published in:
2022
Publisher:
Zenodo
DOI:
10.1109/cvpr52688.2022.01478
Author(s):
Liqun Chen; Changyu Dong; Nada El Kassem; Christopher J.P. Newton; Yalan Wang
Published in:
Issue 1, 2023
Publisher:
Zenodo
DOI:
10.5281/zenodo.8127739
Author(s):
Wenting Li, Ping Wang, Kaitai Liang
Published in:
2022
Publisher:
Zenodo
DOI:
10.1109/tifs.2022.3214729
Author(s):
Debes, Heini Bergsson; Thanassis Giannetsos
Published in:
Issue 1, 2023
Publisher:
Zenodo
DOI:
10.5281/zenodo.8215259
Author(s):
Gordijn, Daan, Kromes, Roland, Giannetsos, Thanassis, Liang, Kaitai
Published in:
2022
Publisher:
Zenodo
DOI:
10.48550/arxiv.2207.01599
Author(s):
Sigurd Frej Joel Jørgensen Ankergård, Edlira Dushku, Nicola Dragoni
Published in:
14th International Symposium on Foundations & Practice of Security, 2022
Publisher:
Springer
Author(s):
Xingkai Wang; Zhenfu Cao; Zhen Liu; Kaitai Liang
Published in:
Issue 1, 2022
Publisher:
Zenodo
DOI:
10.5281/zenodo.8224940
Author(s):
Dimitris Papamartzivanos; Sofia Anna menesidou; Panagiotis Gouvas; Thanassis Giannetsos
Published in:
IEEE International Mediterranean Conference on Communications and Networking, Issue 1, 2021
Publisher:
IEEE
DOI:
10.5281/zenodo.5336142
Author(s):
Chiu, Wei-Yang; Weizhi Meng; Lampe, Brooke
Published in:
Issue 1, 2023
Publisher:
Zenodo
DOI:
10.5281/zenodo.8122217
Author(s):
Long Meng, Liqun Chen
Published in:
International Conference on Applied Cryptography and Network Security, 2021, Page(s) 28-49
Publisher:
Springer
DOI:
10.1007/978-3-030-78372-3_2
Author(s):
Sebastian Surminski, Christian Niesler, Ferdinand Brasser, Lucas Davi, Ahmad-Reza Sadeghi
Published in:
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 2021, Page(s) 2890-2905
Publisher:
ACM Digital Library
DOI:
10.1145/3460120.3484788
Author(s):
Edlira Dushku, Md. Masoom Rabbani, Jo Vliegen, An Braeken, Nele Mentens
Published in:
2023
Publisher:
Zenodo
DOI:
10.1016/j.jisa.2023.103448
Author(s):
Yubo Zheng; Peng Xu; Wei Wang; Tianyang Chen; Willy Susilo; Kaitai Liang; Hai Jin
Published in:
Issue 1, 2022
Publisher:
Zenodo
DOI:
10.5281/zenodo.8224846
Author(s):
Rieger, Phillip; Chilese, Marco; Mohamed, Reham; Miettinen, Markus; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Published in:
Issue 1, 2023
Publisher:
ARXIV
DOI:
10.48550/arxiv.2302.07589
Author(s):
Haibo Cheng, Wenting Li, Ping Wang, Chao-Hsien Chu, Kaitai Liang
Published in:
30th USENIX Security Symposium, 2021
Publisher:
USENIX
Author(s):
Xu, Jing, Wang, Rui, Koffas, Stefanos, Liang, Kaitai, Picek, Stjepan
Published in:
2022
Publisher:
Zenodo
DOI:
10.1145/3564625.3567999
Author(s):
Tommaso Frassetto, Patrick Jauernig, David Koisser, David Kretzler, Benjamin Schlosser, Sebastian Faust, Ahmad-Reza Sadeghi
Published in:
2023
Publisher:
Zenodo
DOI:
10.14722/ndss.2023.23118
Author(s):
Tian, Yuhang, Wang, Rui, Qiao, Yanqi, Panaousis, Emmanouil, Liang, Kaitai
Published in:
2022
Publisher:
Zenodo
DOI:
10.48550/arxiv.2207.00428
Author(s):
Tigist Abera; Ferdinand Brasser; Lachlan J. Gunn; Patrick Jauernig; David Koisser; Ahmad-Reza Sadeghi
Published in:
RAID, Issue 1, 2021
Publisher:
RAID 21
DOI:
10.1145/3471621.3471868
Author(s):
Benjamin Larsen; Thanassis Giannetsos; Ioannis Krontiris; Kenneth Goldman
Published in:
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Issue 1, 2021
Publisher:
ACM
DOI:
10.1145/3448300.3467832
Author(s):
Koisser, David, Jauernig, Patrick, Tsudik, Gene, Sadeghi, Ahmad-Reza
Published in:
2022
Publisher:
Zenodo
DOI:
10.48550/arxiv.2205.01973
Author(s):
Wenting Li; Haibo Cheng; Ping Wang; Kaitai Liang
Published in:
IEEE Transactions on Information Forensics and Security ( Volume: 16), 2021, Page(s) 3573 - 3588
Publisher:
IEEE
DOI:
10.1109/tifs.2021.3081263
Author(s):
Long Meng; Liqun Chen
Published in:
Issue 1, 2021
Publisher:
Zenodo
DOI:
10.5281/zenodo.8325514
Author(s):
Heini Bergsson Debes; Thanassis Giannetsos
Published in:
2021 17th International Conference on Distributed Computing in Sensor Systems (DCOSS), 2021, ISBN 978-1-6654-3930-5
Publisher:
IEEE
DOI:
10.1109/dcoss52077.2021.00029
Author(s):
Huanhuan Chen; Shihui Fu; Kaitai Liang
Published in:
Issue 1, 2022
Publisher:
Zenodo
DOI:
10.5281/zenodo.8225009
Author(s):
Lambregts, Steven; Huanhuan Chen; Jianting Ning; Kaitai Liang
Published in:
Issue 1, 2022
Publisher:
Zenodo
DOI:
10.5281/zenodo.8224991
Author(s):
Ragnar Mikael Halldórsson; Edlira Dushku; Nicola Dragoni
Published in:
IEEE Access ( Volume: 9), 2021, ISSN 2169-3536
Publisher:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/access.2021.3122391
Author(s):
Dimitrios Papamartzivanos; Sofia Anna Menesidou; Panagiotis Gouvas; Thanassis Giannetsos
Published in:
Future Internet 2021, Issue 1, 2021, ISSN 1999-5903
Publisher:
Future Internet 2021
DOI:
10.3390/fi13020030
Author(s):
E Chen; Yan Zhu; Kaitai Liang; Hongjian Yin
Published in:
IEEE Transactions on Cloud Computing, Issue 1, 2023, ISSN 2168-7161
Publisher:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/TCC.2021.3104323
Author(s):
Long Meng, Liqun Chen
Published in:
IEEE Communications Standards Magazine, 2021, Page(s) 20-25, ISSN 2471-2833
Publisher:
IEEE
DOI:
10.1109/mcomstd.011.2000083
Author(s):
Sigurd Frej Joel Jørgensen Ankergård, Edlira Dushku and Nicola Dragoni
Published in:
Special Issue Recent Advances in Sensing and IoT Technologies, 2021
Publisher:
MDPI
DOI:
10.3390/s21051598
Author(s):
Heini Bergsson Debes, Thanassis Giannetsos, Ioannis Krontiris
Published in:
2021
Publisher:
ARXIV
DOI:
10.48550/arxiv.2107.05054
Searching for OpenAIRE data...
There was an error trying to search data from OpenAIRE
No results available