The page lists 22 deliverables related to the research project "ESCUDO-CLOUD".
title and desprition | type | last update |
---|---|---|
Report on secure information sharing in the cloudIt provides the techniques for supporting secure and selective information sharing. (T3.*) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Documents, reports | 2019-05-31 |
Report on techniques for security testingIt provides the techniques for security testing. (T3.4) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Documents, reports | 2019-05-31 |
Report on multi cloud and federated cloudIt provides a final version of the techniques designed and implemented in this WP. (T4.*) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Documents, reports | 2019-05-31 |
Requirements from the use casesIt provides the final version of the security requirements coming from the use cases. (T1.1) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Documents, reports | 2019-05-31 |
First report on multi cloud and federated cloudIt provides a first version of the protection techniques that leverage multiple providers. (T4.*) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Documents, reports | 2019-05-31 |
Tools for selective and private multi-user queries and interactionsIt provides tools for supporting the private collaborative execution of queries. (T3.3) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Other | 2019-05-31 |
Final report on data protection and key management solutionsIt illustrates the complete techniques for protecting data and accesses and for key management. (T2.*) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Documents, reports | 2019-05-31 |
Report on techniques for selective accessIt provides a first version of the techniques for enforcing selective access on outsourced data. (T3.1) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Documents, reports | 2019-05-31 |
Tools for protecting confidentiality and integrity of data and accessIt provides a first version of the tools developed for protecting the confidentiality and integrity of outsourced data and their accesses. (T2.1, T2.3) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Other | 2019-05-31 |
Final evaluation report from use casesIt reports on the assessment and evaluation of the techniques and tools available in WPs2–4 with respect to the satisfaction of the security requirements of the use cases. (T1.4) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Documents, reports | 2019-05-31 |
Data management planIt provides a detailed description of the data management plan. (T6.1) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Open Research Data Pilot | 2019-05-31 |
Use case prototypesIt provides the prototype applications for the use cases leveraging the tools in W1.3–W1.6. (T1.3) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Other | 2019-04-29 |
Report on research alignment and deployment statusIt reports on the status about the alignment between the research and technological development in WPs2–4 and the requirements of the use cases. (T1.2) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Documents, reports | 2019-04-29 |
First version of requirements from the use casesIt provides a first version of the security requirements coming from the use cases. (T1.1) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Documents, reports | 2019-04-29 |
Report on data protection techniquesIt provides a first version of the data protection techniques designed in the WP. (T2.*) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Documents, reports | 2019-04-29 |
Final tools for the protection of integrity and confidentiality of data and accessIt provides the final version of the tools developed for protecting the confidentiality and integrity of outsourced data and their accesses according to the findings in D2.3. (T2.1, T2.3) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Other | 2019-04-29 |
Final versions of tools for security with multiple providersIt provides the tools implementing the protection techniques developed in this WP. (T4.*) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Other | 2019-04-29 |
First report on security metrics and assessmentIt provides a formal definition of the security metrics that can be used to characterise the guarantees offered by different providers. (T4.1) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Documents, reports | 2019-04-29 |
Final version of data management planIt provides the final detailed description of the data management plan. (T6.1) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Documents, reports | 2019-04-29 |
Report on techniques for selective and secure data sharingIt provides techniques for ensuring collaborative access to data while ensuring the confidentiality and integrity of data and processes. (T3.*) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Documents, reports | 2019-04-29 |
Report on data and access protectionIt provides an extension of the protection techniques presented in D2.1. (T2.*) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Documents, reports | 2019-04-29 |
Report on requirement-based threat analysisIt provides techniques for estimating risks, based on requirement-based threat analysis. (T2.4) Programme: H2020-EU.2.1.1.3. - Topic(s): ICT-07-2014 |
Documents, reports | 2019-04-29 |