Deliverables


D1.1 First version of requirements from the use cases (M6) [pdf]
It provides a first version of the security requirements coming from the use cases.

D6.1 Data management plan (M6) [pdf]
It provides a detailed description of the data management plan.

D1.2 Requirements from the use cases (M12) [pdf]
It provides the final version of the security requirements coming from the use cases.

D2.1 Report on data protection techniques (M12) [pdf]
It provides a first version of the data protection techniques designed in WP2.

D3.1 Report on techniques for selective access (M12) [pdf]
It provides a first version of the techniques for enforcing selective access on outsourced data.

D4.1 First report on security metrics and assessment (M12) [pdf]
It provides a formal definition of the security metrics that can be used to characterize the guarantees offered by different providers.

D5.1 First report on dissemination, communication, and exploitation (M12)
It provides a description of the activities performed to disseminate and exploit the project’s results of the first year.

D6.2 First periodic report: Progress of work, use of resources, financial report (M12)
It provides an overview of the progress of work, the use of the resources, and a financial statement from each partner.

D2.2 Tools for protecting confidentiality and integrity of data and access (M18) [pdf]
It provides a first version of the tools developed for protecting the confidentiality and integrity of outsourced data and their accesses.

D3.2 Report on techniques for security testing (M21)
It provides a first version of the techniques for security testing. 

D1.3 Report on research alignment and deployment status (M24)
It reports on the status about the alignment between the research and technological development in WPs 2-4 and the requirements of the use cases.

D2.3 Report on data and access protection (M24)
It provides an extension of the protection techniques presented in D2.1.

D3.3 Report on techniques for selective and secure data sharing (M24)
It provides techniques for ensuring collaborative access to data while ensuring the confidentiality and integrity of data and processes.

D4.2 First report on multi cloud and federated cloud (M24)
It provides a first version of the protection techniques that leverage multiple providers.

D5.2 Second report on dissemination, communication, and exploitation (M24)
It provides a description of the activities performed to disseminate and exploit the project’s results of the second year.

D6.3 Second periodic report: Progress of work, use of resources, financial report (M24)
It provides an overview of the progress of work, the use of the resources, and a financial statement from each partner.

D2.4 Report on requirement-based threat analysis (M27)
It provides techniques for estimating risks, based on requirement-based threat analysis.

D2.5 Final tools for the protection of integrity and confidentiality of data and access (M27)
It provides the final version of the tools developed for protecting the confidentiality and integrity of outsourced data and their accesses according to the findings in D2.3.

D3.4 Tools for selective and private multi-user queries and interactions (M27)
It provides tools for supporting the private collaborative execution of queries.

D4.3 Final versions of tools for security with multiple providers (M30)
It provides the tools implementing the protection techniques developed in WP4.

D2.6 Final report on data protection and key management solutions (M34)
It illustrates the complete techniques for protecting data and access and for key management.

D3.5 Report on secure information sharing in the cloud (M34)
It provides the techniques designed in WP4 for supporting secure and selective information sharing.

D4.4 Reports on multi cloud and federated cloud (M34)
It provides a final version of the techniques designed and implemented in WP4.

D1.4 Final evaluation report from use cases (M36)
It reports on the assessment and evaluation of the techniques and tools available in WPs2-4 with respect to the satisfaction of the security requirements of the use cases.

D1.5 Use case prototypes (M36)
It provides the prototype applications for the use cases leveraging the tools in W1.3-W1.6.

D5.3 Final report on dissemination, communication, and exploitation (M36)
It provides a final description of all the activities performed to disseminate and exploit the project’s results.

D6.4 Final version of data management plan (M36)
It provides the final detailed description of the data management plan

D6.5 Third periodic report: Progress of work, use of resources, financial report (M36)
It provides an overview of the work performed in the project, the use of the resources, and a financial statement from each partner.