Home » Marketplace » Identity Management & Access Control

Identity Management & Access Control

ASAP - Autonomous System Adaptation Platform

Autonomous System Adaptation Platform (ASAP) is a service responsible for monitoring and, where necessary, interceding in the execution of applications deployed by DRIP. ASAP will collect a range of measurements based on a set of metrics determined by the requirements of the developer and the intrinsic monitorability of application and underlying infrastructure.

DRIP - Dynamic Real-Time Infrastructure Planner

Dynamic Real-time Infrastructure Planner (DRIP) is responsible for the planning, validation and provisioning of the virtual infrastructure enlisted to support an application specified in SIDE. DRIP has formulated an acceptable proposed infrastructure, which automatically negotiates with cloud providers in real-time to provision the infrastructure with respect to an agreed set of service level agreements (SLAs) that will satisfy (in principle) all quality of service requirements.

SIDE - SWITCH Interactive Development Environment

The SWITCH Interactive Development Environment (SIDE) is a subsystem of SWITCH, responsible for the specification of an application for deployment in a Cloud. SIDE is responsible for ensuring that a given application can be implemented in a cloud context in accordance with both the desires of the developers and the limitations of the cloud providers; it is also responsible for allowing an application to be monitored and controlled by the developer at runtime.

SecureCloud Secure Containers

Ecosystem of cloud facilities characterized by superior security guarantees, providing protection from attacks by privileged users (e.g. the cloud provider or the system administrator) and software (e.g. the hypervisor). SecureCloud is flexible, since it can satisfy a wide range of customers-specific requirements including big data processing, secure intra-cloud communication, precise microservice scheduling and reliable data storage. SecureCloud is interoperable, in that its facilities can be seamlessly integrated with best of breed offerings from the Open Source community.

SCONE

To to improve the Open Rotor and UHBR Fan broadband noise prediction by using high-fidelity Large-Eddy Simulation (LES).

WITDOM Key Manager

The WITDOM Key Management component provides management of secrets (for example, private and public encryption keys or credentials to access the storage) that are required for operations run by protection components. Since secrets are required in trusted and untrusted domains, there are two instances of the KM component in the WITDOM architecture with similar functionalities.

WITDOM Anonymization

Protection component that allows to anonymize data stored in a relational database. It selects automatically the anonymization algorithm that is more suitable for the data and the users' privacy requirements, and applies it seamlessly to the data, in order to protect privacy.

WITDOM Secure Signal Processing

WITDOM’s Secure Signal Processing (SSP) component performs secure signal processing operations on protected data and signals (encrypted, obfuscated, split or a combination thereof) in an untrusted environment, by preventing the disclosure of the sensitive information while it is being processed in the untrusted domain.

WITDOM Secure Computation

The Secure Computation component offers data protection functionalities by means of homomorphic encryption (HE) and secure multiparty computation (MPC), thus enabling privacy preserving computation in the untrusted domain.

WITDOM Data Masking

WITDOM’s data masking component is responsible for masking sensitive data classified as direct identifiers. The masking process creates service-and-user-specific tokens that can be updated over time, satisfying two main security requirements: irreversibility and unlinkability.

Pages

News

We already know CONCORDIA WOMEN’s AWARDS winners for the RESEARCH category!

Future Events

The M-Sec and Fed4IoT projects will organize next Wednesday 29th of September 2021 at 09h00-11h00am CET (Brussels Time) its joint final project event on “Advanced technologies for hyper-connected societies”.

Sister-projects, both M-Sec and Fed4IoT aimed at research, develop and test advanced technologies combining security, IoT, cloud and bigdata, and interoperable technologies of IoT devices/platforms in the context of smart cities.

29/09/2021

After the highly successful EuroCybersec2018 organized by Prof. Erol Gelenbe (IITIS-PAN & Lab I3S, Université Côte d’Azur), whose proceedings with Springer enjoyed over 140,000 downloads, IoTAC will organize the EuroCybersec2021 Workshop in Nice, France, chaired by Prof. Gelenbe with the help of a Program Committee of experts. The deadline for paper submissions is September 17, 2021.
https://iotac.eu/eurocybersec2021-workshop/

 

 

25/10/2021 to 26/10/2021