Home » Marketplace » Information Protection Processes and Procedures

Information Protection Processes and Procedures

SIDE - SWITCH Interactive Development Environment

The SWITCH Interactive Development Environment (SIDE) is a subsystem of SWITCH, responsible for the specification of an application for deployment in a Cloud. SIDE is responsible for ensuring that a given application can be implemented in a cloud context in accordance with both the desires of the developers and the limitations of the cloud providers; it is also responsible for allowing an application to be monitored and controlled by the developer at runtime.

SecureCloud Secure Containers

Ecosystem of cloud facilities characterized by superior security guarantees, providing protection from attacks by privileged users (e.g. the cloud provider or the system administrator) and software (e.g. the hypervisor). SecureCloud is flexible, since it can satisfy a wide range of customers-specific requirements including big data processing, secure intra-cloud communication, precise microservice scheduling and reliable data storage. SecureCloud is interoperable, in that its facilities can be seamlessly integrated with best of breed offerings from the Open Source community.

SCONE

To to improve the Open Rotor and UHBR Fan broadband noise prediction by using high-fidelity Large-Eddy Simulation (LES).

WITDOM Key Manager

The WITDOM Key Management component provides management of secrets (for example, private and public encryption keys or credentials to access the storage) that are required for operations run by protection components. Since secrets are required in trusted and untrusted domains, there are two instances of the KM component in the WITDOM architecture with similar functionalities.

WITDOM Anonymization

Protection component that allows to anonymize data stored in a relational database. It selects automatically the anonymization algorithm that is more suitable for the data and the users' privacy requirements, and applies it seamlessly to the data, in order to protect privacy.

WITDOM Secure Signal Processing

WITDOM’s Secure Signal Processing (SSP) component performs secure signal processing operations on protected data and signals (encrypted, obfuscated, split or a combination thereof) in an untrusted environment, by preventing the disclosure of the sensitive information while it is being processed in the untrusted domain.

WITDOM Secure Computation

The Secure Computation component offers data protection functionalities by means of homomorphic encryption (HE) and secure multiparty computation (MPC), thus enabling privacy preserving computation in the untrusted domain.

WITDOM Data Masking

WITDOM’s data masking component is responsible for masking sensitive data classified as direct identifiers. The masking process creates service-and-user-specific tokens that can be updated over time, satisfying two main security requirements: irreversibility and unlinkability.

WITDOM E2EE

The WITDOM End-2-End Encryption (E2EE) component provides protection functionalities in terms of locally encrypting data in the trusted domain before storing them in the untrusted domain for the secure backup purposes.

Data Encryption

This tool provides the means for processing data in different ways, supporting different purposes with different privacy requirements. It includes several components providing the capabilities to encrypt data while preserving the format or ordering of the data. This tool enables users of legacy applications to move their databases to a public cloud, while preserving data privacy and confidentiality. Moreover, the tool provides components for data generalization as means for anonymizing bulk data using k-anonymity techniques.

Pages

News

Startup OLÉ 2023 will take place from the 4th – 7th of September, and has gather along its history +40.000 attendees from +120 countries; +1.500 startups, scaleups and spin offs; +1.200 speakers; +300 corporates and investors with investment portfolio of over €100kM. Our goal is to present the pr

Future Events

 

Terrorist Content Online (TCO): how to prevent it?

How terrorist organisations spread TCO and what can be done to stop it

Terrorists and violent extremists are increasingly trying to find new ways to exploit the internet. The growth of terrorist propaganda to recruit and inspire attacks is a risk to us all.

11/10/2023

Water Knowledge Europe

Networking and Brokerage Event

17-19 October 2023, BluePoint, Brussels

17/10/2023 to 19/10/2023