End-to-End Security Enforcement on Packet and Optical Transport Providers in Untrustworthy Multi-stakeholder Scenario
25th International Conference on Transparent Optical Networks (ICTON 2025)
(TO BE PUBLISHED SOON) This paper introduces a new service and security orchestration solution designed to help operators and security providers establish a trust-based relationship in a multi-stakeholder environment.
Security and Trust in Open and Disaggregated 6G networks
24th International Conference on Transparent Optical Networks (ICTON), Bari (Italy)
Telecommunication networks are undergoing a significant shift from closed and proprietary systems towards open and interoperable networks. This transition allows for greater flexibility and reduced dependence on single providers.
An Approach to Support Automated Deployment of Applications on Heterogeneous Cloud-HPC Infrastructures
22nd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)
Complex applications, which include microservices, computationally intensive batch jobs, and sophisticated interaction with the external environment, demand for heterogeneous computational infrastructures that range from cloud to HPC and edge computing.
LEPS – Leveraging eID in the Private Sector
Chapter in book “Challenges in Cybersecurity and Privacy - the European Research Landscape” by River Publishers.
ISBN: 9788770220880
doi: https://doi.org/10.13052/rp-9788770220873
https://www.riverpublishers.com/research_details.php?book_id=711