Learn More
The users of Cloud Service Providers (CSP) often motivate their choice of providers based on criteria such as the offered service level agreements (SLA) and costs, and also recently based on security aspects (i.e., due to regulatory compliance). Unfortunately, it is quite uncommon for a CSP to specify the security levels associated with their services,(More)
Physically co-located virtual machines should be securely isolated from one another, as well as from the underlying layers in a virtualized environment. In particular the virtualized environment is supposed to guarantee the impossibility of an adversary to attack a virtual machine e.g., by exploiting a side-channel stemming from the usage of shared physical(More)
A virtualized environment (VE) is expected to provide secure logical isolation across the co-located tenants encapsulated in the virtual machines. In particular the VE should prevent covert-channels exploitation stemming from the usage of shared resources. However, as sophisticated covert-and side-channel attacks exist, the logical isolation in a VE is(More)
<i>3dScan</i> is a scanning-based software system allowing its user to interact with the immediate environment by intentionally contracting a single muscle of choice as input signals. The system is targeted at persons with severe physical impairments with the objective to improve its users' quality of life by empowering them to independently perform certain(More)
The research leading to these results has received funding from the European Community's Seventh Framework Programme (FP7/2007-2013) under grant agreement n° 257782 for the project Attribute-based Credentials for Trust (ABC4Trust) as part of the " ICT Trust and Security Research " theme. Abstract This part of deliverable D3.1 presents a practical comparison(More)