Compositional View of the Continuum Reference Architecture: graphical representation of common and potential capabilities
EUCEI initiative - https://eucloudedgeiot.eu/
This is the last document of a series of 3 for designing a Reference Architecture for the continuum. The first document of the series presented an initial version of a common taxonomy, considering it as a unified language for all actors of the value chain.
Functional View of the Continuum Reference Architecture: Minimum set of expected functionalities
EUCEI initiative - https://eucloudedgeiot.eu
This is the second document of a series of three defining a reference architecture for the continuum. In the previous one, different building blocks were identified setting the path for the different aspects to be taken into account while defining the architecture.
Self-Sovereign Identity: Realising the journey from innovation to market
Atos Digital Security Magazine
Self-Sovereign Identity can be considered as the most significant paradigm shift, surpassing the more established centralised and federated approaches that have shaped identity management in the past decades.
Developing a Reference Architecture for the Continuum - Concept, Taxonomy and Building Blocks
EUCEI initiative - https://eucloudedgeiot.eu
Cloud and edge computing are essential technologies in a computing continuum to ensure data is managed more efficiently – closer to the originating source rather than transmitting raw data to data centres. As recent studies suggest, data processing is moving closer to the edge.
MegaM@Rt2 EU Project: Open Source Tools for Mega-Modelling at Runtime of CPSs
16th International Conference on Open Source Systems
Data protection in the era of artificial intelligence. Trends, existing solutions and recommendations for privacy-preserving technologies
Published by Big Data Value Association (BDVA)
ARIES project
Chapter 11 in book “Challenges in Cybersecurity and Privacy – the European Research Landscape”, ISBN: 978-87-7022-088-0
An Overview on ARIES: Reliable European Identity Ecosystem
Chapter in book “Challenges in Cybersecurity and Privacy - the European Research Landscape” by River Publishers.
ISBN: 9788770220880
doi: https://doi.org/10.13052/rp-9788770220873
From Innovative Niches to a Cooperative IoT Ecosystem. Creating Business Value for Federated and Interoperable IoT Platforms.
2nd Global IoT Summit: IoT Technologies and Applications for the Benefit of Society
Orchestrating Privacy Enhancing Technologies and Services with BPM Tools. The WITDOM Data Protection Orchestrator.
ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security
Article No. 89