Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

Advanced Networked Agents for Security and Trust Assessment in CPS/IOT Architectures

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

Privacy Risk Modelling and Contingency Final Report (se abrirá en una nueva ventana)

Output of Task 2.3 – revised version of D2.3 after intermediate evaluation

Initial Architectural Design (se abrirá en una nueva ventana)

Output of Task 1.3 - ANASTACIA overall reference architecture

Initial Security Enforcement Manager Report (se abrirá en una nueva ventana)

Output of Task 3.1 –The operational Security Enforcement Manager.

Initial Agents Development Report (se abrirá en una nueva ventana)

Output of Task 4.3 – Software agents deployed both in local and remote systems

Final Security Orchestrator Report (se abrirá en una nueva ventana)

Output of Task 3.2 – revised version of D3.2 after intermediate evaluation

Dynamic Security and Privacy Seal Model Analysis Report (se abrirá en una nueva ventana)

Output of Task 5.1 – A clearly specified Dynamic Security and Privacy Seal Model

Final Reaction Component Services Implementation Report (se abrirá en una nueva ventana)

Output of Task 4.2 – revised version of D4.2 after intermediate evaluation

Second Period Dissemination, Standardization and Outreach Report (se abrirá en una nueva ventana)

Output of Task 7.1 and 7.2 – Reports on activities in the second period an overall assessment of communication activities in the project.

Secure Software Development Guidelines Final Report (se abrirá en una nueva ventana)

Output of Task 2.4 – revised version of D2.4 after intermediate evaluation

User-centred Requirement Initial Analysis (se abrirá en una nueva ventana)

Output of Task 1.2 - Prioritized specifications and a set of UML diagrams to guide the software design and development cycles. Set of Use Case scenarios to be taken as reference scenarios.

Final Use cases implementation and tests Report (se abrirá en una nueva ventana)

Output of Task 6.2 – revised version of D6.2 after intermediate evaluation

Holistic Security Context Analysis (se abrirá en una nueva ventana)

Output of Task 1.1 - A holistic security context analysis report with a clear overall view of ANASTACIA approach from the four perspectives, reaching a common understanding and shared vision of ANASTACIA mission.

Secure Software Development Guidelines Initial Report (se abrirá en una nueva ventana)

Output of Task 2.4 – the secure software development guidelines and procedures o be followed during all the software lifecycle in order to help developers to take into consideration the security from the design phase.

Final Architectural Design (se abrirá en una nueva ventana)

Output of Task 1.3 - revised version of D1.3 after first prototype validation

Initial Technical integration and validation Report (se abrirá en una nueva ventana)

Output of Task 6.1 - Integrated ANASTACIA Platform

Final Agents Development Report (se abrirá en una nueva ventana)

Output of Task 4.3 – revised version of D4.3 after intermediate evaluation

Initial Security Orchestrator Report (se abrirá en una nueva ventana)

Output of Task 3.2 – The operational security orchestrator along suitable interfaces to SDN controllers and MANO NFV.

Final Security Enforcement Manager Report (se abrirá en una nueva ventana)

Output of Task 3.1 – revised version of D3.1 after intermediate evaluation

First Period Dissemination, Standardization and Outreach Report (se abrirá en una nueva ventana)

Output of Task 7.1 and 7.2 – Reports on activities in the first period and updated plan for the second period.

Privacy Risk Modelling and Contingency Initial Report (se abrirá en una nueva ventana)

Output of Task 2.3 - Report defining a clear risk modelling, including measurement points and mitigation measures.

Policy-based Definition and Policy for Orchestration Final Report (se abrirá en una nueva ventana)

Output of Task 2.1 – revised version of D2.1 after intermediate evaluation

Final Technical integration and validation Report (se abrirá en una nueva ventana)

Output of Task 6.1 – revised version of D6.1 after intermediate evaluation

Policy-based Definition and Policy for Orchestration Initial Report (se abrirá en una nueva ventana)

Output of Task 2.1 - policy models definitions for security and orchestration. Authorization system tailored for holistic scenarios based on SDNs-NFVs and IoT.

Initial Use cases implementation and tests Report (se abrirá en una nueva ventana)

Output of Task 6.2 - Implementation and test of the use cases

Final Monitoring Component Services Implementation Report (se abrirá en una nueva ventana)

Output of Task 4.1 – revised version of D4.1 after intermediate evaluation

Initial End-user validation and evaluation Report (se abrirá en una nueva ventana)

Output of Task 6.2 - ANASTACIA performance evaluation framework. ANASTACIA use cases validation and evaluation results.

Final Virtual Resources Manager Report (se abrirá en una nueva ventana)

Output of Task 3.3 – revised version of D3.3 after intermediate evaluation

Initial Dissemination, Standardization and Outreach Strategy Plan (se abrirá en una nueva ventana)

Output of Task 7.1 and 7.2 – The initial dissemination, standardisation and outreach plan comprising the identification of target audience, strategy, actions and verification indicators.

Initial Security Enforcement Enablers Report (se abrirá en una nueva ventana)

Output of Task 3.3 – Collaborative security enforcement enablers in the form of security-aware SDN controller and security-aware NFV MANO.

Final User-centred Requirement Analysis (se abrirá en una nueva ventana)

Output of Task 1.2 – revised version of D1.2 after first prototype validation

Dynamic Security and Privacy Seal User Interface (se abrirá en una nueva ventana)

Output of Task 5.3 - A working service and demonstration of the Dynamic Security and Privacy User Interface.

Dynamic Security and Privacy Seal Monitoring Service Demonstrator (se abrirá en una nueva ventana)

Output of Task 5.2 - A working service and demonstration of the Dynamic Security and Privacy Seal Monitoring Service

Publicaciones

NFV: Security Threats and Best Practices (se abrirá en una nueva ventana)

Autores: Shankar Lal, Tarik Taleb, Ashutosh Dutta
Publicado en: IEEE Communications Magazine, Edición 55/8, 2017, Página(s) 211-217, ISSN 0163-6804
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/MCOM.2017.1600899

An Accurate Security Game for Low-Resource IoT Devices (se abrirá en una nueva ventana)

Autores: Hichem Sedjelmaci, Sidi Mohamed Senouci, Tarik Taleb
Publicado en: IEEE Transactions on Vehicular Technology, Edición 66/10, 2017, Página(s) 9381-9393, ISSN 0018-9545
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TVT.2017.2701551

Remotely Exploiting AT Command Attacks on ZigBee Networks (se abrirá en una nueva ventana)

Autores: Ivan Vaccari, Enrico Cambiaso, Maurizio Aiello
Publicado en: Security and Communication Networks, Edición 2017, 2017, Página(s) 1-9, ISSN 1939-0122
Editor: John Wiley & Sons Ltd.
DOI: 10.1155/2017/1723658

Slowcomm: Design, development and performance evaluation of a new slow DoS attack (se abrirá en una nueva ventana)

Autores: Enrico Cambiaso, Gianluca Papaleo, Maurizio Aiello
Publicado en: Journal of Information Security and Applications, Edición 35, 2017, Página(s) 23-31, ISSN 2214-2126
Editor: Elsevier
DOI: 10.1016/j.jisa.2017.05.005

ANASTACIA, Advanced Networked Agents for Security and Trust Assessment in CPS IoT Architectures

Autores: S. Ziegler, A. Skarmeta, J. Bernal, E. E. Kim, S. Bianchi
Publicado en: IEEE Xplore / The Global Internet of Things Summit (GIoTS 2017), 2017
Editor: IEEE

Assuring Virtual Network Function Image Integrity and Host Sealing in Telco Cloud

Autores: S. Lal, I. Oliver, S. Ravidas, and T. Taleb
Publicado en: IEEE ICC 2017, 2017
Editor: IEEE

Geo-partitioning of MEC resources

Autores: M. Bouet and V. Conan
Publicado en: Workshop on Mobile Edge Communications (MECOMM’2017), co-located with ACM SIGCOMM, 2017
Editor: ACM

Towards Provisioning of SDN-NFV-based Security Enablers for Integrated Protection of IoT Systems

Autores: I. Farris, J. B. Bernabe, N. Toumi, D. Garcia-Carrillo, T. Taleb, A. Skarmeta, and B. Sahlin
Publicado en: IEEE CSCN 2017, 2017
Editor: IEEE

Securing VNF Communication in NFVI

Autores: S. Lal, A. Kalliola, K. Ahola, and T. Taleb
Publicado en: IEEE CSCN 2017, 2017
Editor: IEEE

Virtual Security as a Service for 5G Verticals

Autores: Y. Khettab, Mi. Bagaa, D.L.C Dutra, T. Taleb and N. Toumi
Publicado en: WCNC 2018, 2017
Editor: IEEE

Managing AAA in NFV/SDN-enabled IoT scenarios

Autores: Alejandro Molina, Dan Garcia, Jorge Bernal, Jordi Ortiz, Rafael Marin-Perez, Antonio Skarmeta
Publicado en: The Global Internet of Things Summit (GIoTS 2018), 2018
Editor: IEEE

Anomaly-Based Intrusion Detection System for Embedded Devices on Internet

Autores: D. Mehta, A. Mady, M. Boubekeur, D. M. Shila
Publicado en: CENICS 2017, 2017
Editor: CENICS

Towards Secure Building Management System based on Internet of Things

Autores: A. Mady, R. Trapero, A. Skarmeta, S. Bianchi
Publicado en: 2017
Editor: N.A.

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0