Compositional View of the Continuum Reference Architecture: graphical representation of common and potential capabilities

EUCEI initiative - https://eucloudedgeiot.eu/
This is the last document of a series of 3 for designing a Reference Architecture for the continuum. The first document of the series presented an initial version of a common taxonomy, considering it as a unified language for all actors of the value chain.

Functional View of the Continuum Reference Architecture: Minimum set of expected functionalities

EUCEI initiative - https://eucloudedgeiot.eu
This is the second document of a series of three defining a reference architecture for the continuum. In the previous one, different building blocks were identified setting the path for the different aspects to be taken into account while defining the architecture.

Self-Sovereign Identity: Realising the journey from innovation to market

Atos Digital Security Magazine
Self-Sovereign Identity can be considered as the most significant paradigm shift, surpassing the more established centralised and federated approaches that have shaped identity management in the past decades.

Developing a Reference Architecture for the Continuum - Concept, Taxonomy and Building Blocks

EUCEI initiative - https://eucloudedgeiot.eu
Cloud and edge computing are essential technologies in a computing continuum to ensure data is managed more efficiently – closer to the originating source rather than transmitting raw data to data centres. As recent studies suggest, data processing is moving closer to the edge.

ARIES project

Chapter 11 in book “Challenges in Cybersecurity and Privacy – the European Research Landscape”, ISBN: 978-87-7022-088-0

An Overview on ARIES: Reliable European Identity Ecosystem

Chapter in book “Challenges in Cybersecurity and Privacy - the European Research Landscape” by River Publishers. ISBN: 9788770220880 doi: https://doi.org/10.13052/rp-9788770220873

From Innovative Niches to a Cooperative IoT Ecosystem. Creating Business Value for Federated and Interoperable IoT Platforms.

2nd Global IoT Summit: IoT Technologies and Applications for the Benefit of Society

Orchestrating Privacy Enhancing Technologies and Services with BPM Tools. The WITDOM Data Protection Orchestrator.

ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security Article No. 89

ARIES Reliable European Identity Ecosystem

ERCIM News 109