End-to-End Security Enforcement on Packet and Optical Transport Providers in Untrustworthy Multi-stakeholder Scenario

25th International Conference on Transparent Optical Networks (ICTON 2025)
(TO BE PUBLISHED SOON) This paper introduces a new service and security orchestration solution designed to help operators and security providers establish a trust-based relationship in a multi-stakeholder environment.

The business potential of Smart Contracts

6G ENABLERS blog
The telecom sector continues its transition towards virtualizing infrastructure. The digitalization of assets and their commercialization in a marketplace is expected to play a central role in 6G networks.

Security and Trust in Open and Disaggregated 6G networks

24th International Conference on Transparent Optical Networks (ICTON), Bari (Italy)
Telecommunication networks are undergoing a significant shift from closed and proprietary systems towards open and interoperable networks. This transition allows for greater flexibility and reduced dependence on single providers.

Self-Sovereign Identity: Realising the journey from innovation to market

Atos Digital Security Magazine
Self-Sovereign Identity can be considered as the most significant paradigm shift, surpassing the more established centralised and federated approaches that have shaped identity management in the past decades.

ARIES project

Chapter 11 in book “Challenges in Cybersecurity and Privacy – the European Research Landscape”, ISBN: 978-87-7022-088-0

An Overview on ARIES: Reliable European Identity Ecosystem

Chapter in book “Challenges in Cybersecurity and Privacy - the European Research Landscape” by River Publishers. ISBN: 9788770220880 doi: https://doi.org/10.13052/rp-9788770220873

ARIES Reliable European Identity Ecosystem

ERCIM News 109

Orchestrating Privacy Enhancing Technologies and Services with BPM Tools. The WITDOM Data Protection Orchestrator.

ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security Article No. 89