Identity Management & Access Control

Home » Marketplace » Identity Management & Access Control

MiCADO framework

Auto-scaling Framework for Docker container orchestrated by Kubernetes [Infrastructure as Code]​

The MiCADO framework automates deployment and orchestration of applications in the cloud. The framework is generic, pluggable, technology agnostic as well as open-source and supports various public and private cloud environments, like Open Nebula, Open Stack, Azure, AWS, Cloud Sigma and CloudBroker Platform. 

Project Flyer

Want to know what SPECIAL is about?
Get here our project flyer that explains it all!

Papers and publications of SPECIAL

As a research and development project, SPECIAL offers open access to its publications, which includes scientific papers and presentations, studies and essays, and other dissemination material. All of these are available trough the site linked below.

Code Repository

As a EU H2020-funded project, SPECIAL aims at making its research and development work publicly accessible. Here, you will find our github repository with software code we developed within the project.

Ontologies and Vocabularies

As a EU H2020-funded project, SPECIAL aims at making its research and development work publicly accessible. Here, you will find our work publications related to ontologies and vocabularies developed within the project..

SPECIAL project deliverables

Find here the public deliverables created in SPECIAL. Our vision is to reconcile Big Data and personal data protection via an innovative data handling solution and a transparency framework. We develop this technology to ease industry’s difficulties with GDPR compliance and to enable respectful treatment of personal information. This introduces new ways of user interaction on data protection, fostering trusted customer relationships. Thus, we
- build a big data architecture to handle linked data for privacy policies, as well as deploy scalable, queryable encryption

Direct Link to CANVAS book

The book The Ethics of Cybersecurity discusses the full plethora of ethical aspects of cybersecurity and has a strong practical focus, including case studies that outline ethical dilemmas in cybersecurity and guidelines and other measures to tackle those dilemmas. The book is published open access and is freely available for everybody.

CodeMeter Cloud

CodeMeter Cloud offers the ultimate solution for extremely flexible licensing in the cloud. CodeMeter Cloud is fully compatible with CodeMeter Runtime and CodeMeter License Central and uses a dedicated set of the established CodeMeter capabilities.

CodeMeter Cloud Lite

CodeMeter Cloud Lite offers a simple, but powerful means for licensing via a cloud server. It was designed with SaaS, server, and mobile applications in mind. CodeMeter Cloud Lite is fully compatible with CodeMeter License Central and includes a dedicated set of the established CodeMeter capabilities.

WITDOM Protection Orchestrator

The Protection Orchestrator (PO) coordinates several protection components and services in order to effectively protect data before they leave a trusted environment for processing or storing reasons. The PO is in charge of parsing the protection configuration of an application and applying it. This is done by building requests to Protection Components deployed in the trusted domain and calling them for protecting the input data that a service in the untrusted domain will need, or for unprotecting the results after a service in the untrusted domain has processed them.

Pages

News

On November 13th the Italian Parliament finally approved Law Decree No. 105/2019, which significantly extends the scope of application of the Italian “golden powers” regulations, amending Law Decree No. 21/2012.

Future Events

The Annual Computer Security Applications Conference (ACSAC) will be held in San Juan, Puerto Rico on 9-13 December 2019. 

09/12/2019 to 13/12/2019

The one-day Summit on the 13th of January brings together prominent security practitioners for in-depth talks focused on techniques that can be used to successfully identify, contain, and eliminate adversaries targeting your networks. Attendees will gain tools and methods to leverage as soon as they return to work.

The Summit will explore:

13/01/2020 to 19/01/2020