Explore the words cloud of the SERECA project. It provides you a very rough idea of what is the project "SERECA" about.
The following table provides information about the project.
Coordinator |
TECHNISCHE UNIVERSITAET DRESDEN
Organization address contact info |
Coordinator Country | Germany [DE] |
Project website | http://www.serecaproject.eu/ |
Total cost | 3˙834˙340 € |
EC max contribution | 3˙834˙340 € (100%) |
Programme |
1. H2020-EU.2.1.1.3. (Future Internet: Software, hardware, Infrastructures, technologies and services) |
Code Call | H2020-ICT-2014-1 |
Funding Scheme | RIA |
Starting year | 2015 |
Duration (year-month-day) | from 2015-03-01 to 2018-02-28 |
Take a look of project's partnership.
# | ||||
---|---|---|---|---|
1 | TECHNISCHE UNIVERSITAET DRESDEN | DE (DRESDEN) | coordinator | 655˙937.00 |
2 | IMPERIAL COLLEGE OF SCIENCE TECHNOLOGY AND MEDICINE | UK (LONDON) | participant | 630˙743.00 |
3 | RED HAT LIMITED | IE (Cork) | participant | 593˙175.00 |
4 | CLOUD&HEAT TECHNOLOGIES GMBH | DE (DRESDEN) | participant | 522˙500.00 |
5 | TECHNISCHE UNIVERSITAET BRAUNSCHWEIG | DE (BRAUNSCHWEIG) | participant | 490˙358.00 |
6 | EPSILON S.R.L. | IT (NAPOLI) | participant | 437˙250.00 |
7 | JCLARITY LIMITED | UK (LONDON) | participant | 334˙375.00 |
8 | ENTE PER LO SVILUPPO DELL'IRRIGAZIONE NELLA PUGLIA BASILICATA IRPINA | IT (Bari) | participant | 170˙000.00 |
Cloud security is of immediate concern to organisations that must comply with strict confidentiality and integrity policies. More broadly, security has emerged as a commercial imperative for cloud computing across a wide range of markets. The lack of adequate security guarantees is becoming the primary barrier to the broad adoption of cloud computing. The Secure Enclaves for REactive Cloud Applications (SERECA) project aims to remove technical impediments to secure cloud computing, and thereby encourage greater uptake of cost-effective and innovative cloud solutions in Europe. It proposes to develop secure enclaves, a new technique that exploits secure commodity CPU hardware for cloud deployments, empowering applications to ensure their own security without relying on public cloud operators. Secure enclaves additionally support regulatory-compliant data localisation by allowing applications to securely span multiple cloud data centres. Although secure enclaves are a general mechanism, SERECA focuses on a particularly important and rapidly growing class of applications: reactive applications for the Internet of Things (IoT), Cyber-Physical Systems (CPS), augmented reality, gaming, computer-mediated social interaction, and the like. These applications are highly interactive, data intensive, and distributed, often involving extremely sensitive societal and personal information. SERECA is validating its results through the development of two innovative and challenging industry-led use cases. One concerns the monitoring of a civil water supply network, a critical infrastructure targeted by malicious attacks. The other concerns a commercial software-as-a-service (SaaS) application for analysing the performance of cloud-deployed applications. Such a service collects sensitive performance metrics about live usage, assets that must be protected from industrial espionage and other criminal activities.
Evaluation report | Documents, reports | 2020-03-04 08:12:54 |
Up and running, constantly updated web site | Websites, patent fillings, videos etc. | 2020-03-04 08:12:54 |
First prototypes of the use case applications | Documents, reports | 2020-03-04 08:12:54 |
Release of dissemination and communication instruments: initial press release and media kit | Documents, reports | 2020-03-04 08:12:54 |
Design of system support for secure enclaves (initial) | Documents, reports | 2020-03-04 08:12:54 |
Design and initial implementation of the management of secure, reactive cloud applications (initial) | Documents, reports | 2020-03-04 08:12:54 |
Design and implementation of the management of secure, reactive cloud applications (final) | Demonstrators, pilots, prototypes | 2020-03-04 08:12:54 |
First project workshop and tutorial | Documents, reports | 2020-03-04 08:12:54 |
Application requirements (final) | Documents, reports | 2020-03-04 08:12:54 |
Design and implementation of operations on distributed secure enclaves (final) | Demonstrators, pilots, prototypes | 2020-03-04 08:12:54 |
Rolling report on dissemination, communication, standardization, and exploitation activities (updated) | Documents, reports | 2020-03-04 08:12:53 |
Design and implementation of System Support for secure enclaves (final) | Demonstrators, pilots, prototypes | 2020-03-04 08:12:53 |
Second project workshop and tutorial | Documents, reports | 2020-03-04 08:12:53 |
Application requirements (initial) | Documents, reports | 2020-03-04 08:12:53 |
Design and initial implementation of the management of secure, reactive cloud applications (updated) | Documents, reports | 2020-03-04 08:12:54 |
Take a look to the deliverables list in detail: detailed list of SERECA deliverables.
year | authors and title | journal | last update |
---|---|---|---|
2018 |
Bohdan Trach, Alfred Krohmer, Franz Gregor, and Sergei Arnautov, Pramod Bhatotia , Christof Fetzer High Performance Secure Network Appliances published pages: , ISSN: , DOI: |
Proceedings of ACM SOSR 2018 (Symposium on SDN Research) | 2020-03-04 |
2018 |
Pierre-Louis Aublin, Florian Kelbert, Dan O\'Keeffe, Divya Muthukumaran, Christian Priebe, Joshua Lind, Robert Krahn, Christof Fetzer, David Eyers, Peter Pietzuch LibSEAL: Revealing Service Integrity Violations Using Trusted Execution published pages: , ISSN: , DOI: 10.1145/3190508.3190547 |
Proceedings of the 13th European Conference on Computer Systems | 2020-03-04 |
2017 |
Joshua Lind, Christian Priebe, Divya Muthukumaran, Dan O\'Keeffe, Pierre-Louis Aublin, Florian Kelbert, Tobias Reiher, David Goltzsche, David Eyers, Ruediger Kapitza, Christof Fetzer, and Peter Pietzuch Glamdring: Automatic application partitioning for Intel SGX published pages: , ISSN: , DOI: |
Proceedings of the USENIX ATC 2017 | 2020-03-04 |
2016 |
Mazzeo, Giovanni; Cerullo, Gianfranco; Papale, Gaetano; Sgaglione, Luigi; Cristaldi, Rosario A Secure Cloud-Based SCADA Application: the Use Case of a Water Supply Network published pages: , ISSN: , DOI: 10.3233/978-1-61499-674-3-291 |
2 | 2020-03-04 |
2018 |
Bohdan Trach, Alfred Krohmer, Franz Gregor, and Sergei Arnautov, Pramod Bhatotia, Christof Fetzer ShieldBox: Secure Middleboxes using Shielded Execution published pages: , ISSN: , DOI: |
Proceedings of Open Networking Summit North America 2018 | 2020-03-04 |
2017 |
Stefan Brenner, Tobias Hundt, Giovanni Mazzeo, Rüdiger Kapitza Secure Cloud Micro Services using Intel SGX published pages: 177-191, ISSN: , DOI: 10.1007/978-3-319-59665-5_13 |
2020-03-04 | |
2018 |
Robert Krahn, Bohdan Trach, Anjo Vahldiek-Oberwagner, Thomas Knauth, Pramod Bhatotia, Christof Fetzer PESOS: Policy Enhanced Secure Object Store published pages: , ISSN: , DOI: 10.1145/3190508.3190518 |
Proceedings of the EuroSys 2018 | 2020-03-04 |
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "SERECA" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "SERECA" are provided by the European Opendata Portal: CORDIS opendata.