End-to-End Security Enforcement on Packet and Optical Transport Providers in Untrustworthy Multi-stakeholder Scenario
25th International Conference on Transparent Optical Networks (ICTON 2025)
This paper introduces a new service and security orchestration solution designed to help operators and security providers establish a trust-based relationship in a multi-stakeholder environment.
The NEPHELE Meta-Orchestration Approach for Distributed Applications in the Computing Continuum
SAMOS XXV - 25th International Conference on Embedded Computer Systems: Architectures, Modeling and Simulation
Following the trend for the provision of applications over programmable resources distributed across the computing continuum, in this manuscript, we detail a novel meta-orchestration approach for management of such applications. Two main challenges are considered.
Open Source approach in two metaOS projects
2nd International Workshop on MetaOS for the Cloud-Edge-IoT Continuum (MECC 2025), Rotterdam, The Netherlands
Transparency, collaboration, security, and digital sovereignty are the open source values that are also important to many European countries and institutions.
Ensuring a Secure Future: Comprehensive Insights into 6G IoT Security and Privacy
The SecureCyber Cluster Europe is a group of European Union-funded cybersecurity projects that collaborate to address cybersecurity challenges in various domains, including Internet of Things (IoT), smart grids, and more.