End-to-End Security Enforcement on Packet and Optical Transport Providers in Untrustworthy Multi-stakeholder Scenario
25th International Conference on Transparent Optical Networks (ICTON 2025)
(TO BE PUBLISHED SOON) This paper introduces a new service and security orchestration solution designed to help operators and security providers establish a trust-based relationship in a multi-stakeholder environment.
Decentralized Identity Management
Book chapter: Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025
Chapter 5 of the book Holistic IoT Security, Privacy and Safety: Integrated Approaches Protecting A Highly Connected World, by Konstantinos Loupos (ed.), 2025. ISBN 978-1-63828-506-9. E-ISBN 978-1-63828-507-6.
The business potential of Smart Contracts
6G ENABLERS blog
The telecom sector continues its transition towards virtualizing infrastructure. The digitalization of assets and their commercialization in a marketplace is expected to play a central role in 6G networks.
Importance of cloud continuum service orchestration in industrial environments
Project 6GSMART blog
In industrial environments, cloud services and the Internet of Things (IoT) converge, with the need to manage complex and diverse computing environments for service and infrastructure providers, a process called cloud continuum.
A Security Services Management Architecture Toward Resilient 6G Wireless and Computing Ecosystem
IEEE Access - Early Access
The upcoming sixth-generation (6G) networks are expected to be more heterogeneous, scalable, reliable, secure and energy-efficient.
Security and Trust in Open and Disaggregated 6G networks
24th International Conference on Transparent Optical Networks (ICTON), Bari (Italy)
Telecommunication networks are undergoing a significant shift from closed and proprietary systems towards open and interoperable networks. This transition allows for greater flexibility and reduced dependence on single providers.
Ensuring a Secure Future: Comprehensive Insights into 6G IoT Security and Privacy
The SecureCyber Cluster Europe is a group of European Union-funded cybersecurity projects that collaborate to address cybersecurity challenges in various domains, including Internet of Things (IoT), smart grids, and more.
Leveraging Network Data Analytics Function and Machine Learning for Data Collection, Resource Optimization, Security and Privacy in 6G Networks
IEEE Access Volume 12
The full deployment of sixth-generation (6G) networks is inextricably connected with a holistic network redesign able to deal with various emerging challenges, such as integration of heterogeneous technologies and devices, as well as support of latency and bandwidth demanding applications.
Self-Sovereign Identity: Realising the journey from innovation to market
Atos Digital Security Magazine
Self-Sovereign Identity can be considered as the most significant paradigm shift, surpassing the more established centralised and federated approaches that have shaped identity management in the past decades.
A hierarchical AI-based control plane solution for multitechnology deterministic networks.
MobiHoc 2023
Following the Industry 4.0 vision of a full digitization of the industry, time-critical services and applications, allowing network infrastructures to deliver information with determinism and reliability, are becoming more and more relevant for a set of vertical sectors.
5G-PPP Software Network Working Group - Network Applications: Opening up 5G and Beyond networks
5G Infrastructure Public Private Partnership (5G PPP)
Network Applications is seen as a full-potential enabler for future vertical industries beyond current deployment. Therefore, it must be considered along with other 6G enabling technologies in the next-generation network architecture.
A Blockchain-based Trust Management Collaborative System for Transport Multi-stakeholder Scenarios
IEEE Journal of Optical Communications and Networking
A trend in future networks (i.e., beyond 5G and 6G) is the increasing virtualization and disaggregation of networks (i.e., Open Radio Access Network, network function virtulization/software-defined networking, or disaggregated optical networks, among others).
CyberSec4Europe - Securing and Preserving Privacy Sharing Health Data
ERCIM News
In the context of EU Horizon 2020 CyberSec4Europe project the medical data exchange demonstrator creates a trusted ecosystem for sharing medical data in a secure and privacy preserving manner.
Current Hot Topics in Data Protection
Big Data Value Association
The BDVA position paper Current Hot Topics in Data Protection summarizes the latest and emerging challenges and developments in the field, with a focus on the European Union: "The new paper introduces pr
KRAKEN - Brokerage and Market Platform for Personal data
'Fighting Cyber-Crime'
The EU Horizon 2020 KRAKEN project is dedicated to building a trusted and secure personal data platform enabling exchange and analytics of personal data.
Common pathways and functional profiles reveal underlying patterns in Breast, Kidney and Lung cancers
BMC – Biology Direct
Background: Cancer is an extremely heterogeneous disease, both intra and inter cancer types.