End-to-End Security Enforcement on Packet and Optical Transport Providers in Untrustworthy Multi-stakeholder Scenario

25th International Conference on Transparent Optical Networks (ICTON 2025)
This paper introduces a new service and security orchestration solution designed to help operators and security providers establish a trust-based relationship in a multi-stakeholder environment.

The NEPHELE Meta-Orchestration Approach for Distributed Applications in the Computing Continuum

SAMOS XXV - 25th International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation
Following the trend for the provision of applications over programmable resources distributed across the computing continuum, in this manuscript, we detail a novel meta-orchestration approach for management of such applications. Two main challenges are considered.

Open Source approach in two metaOS projects

2nd International Workshop on MetaOS for the Cloud-Edge-IoT Continuum (MECC 2025), Rotterdam, The Netherlands
Transparency, collaboration, security, and digital sovereignty are the open source values that are also important to many European countries and institutions.

Real-time Probabilistic Data Fusion for Large-scale IoT Applications

IEEE Access, vol. PP, no. 99, pp. 1-1. DOI: 10.1109/ACCESS.2018.2804623

Real-time Probabilistic Data Fusion for Large-scale IoT Applications

 IEEE Access, vol. PP, no. 99, pp. 1-1. doi: 10.1109/ACCESS.2018.2804623