Jump to navigation
empoWering prIvacy and securiTy in non-trusteD envirOnMents
Project documentation
Information Kit
06/14/2016
WITDOM presentation 2016
06/10/2016
WITDOM brochure v2
06/10/2016
WITDOM poster v2
04/20/2016
WITDOM presentation at Net Futures 2016
02/15/2016
"Cloud computing: an introduction".
01/22/2016
WITDOM: 1 year later. A project summary.
01/18/2016
About WITDOM
08/26/2015
WITDOM glossary
04/23/2015
WITDOM brochure
04/23/2015
WITDOM poster
Deliverables
D1.2. WITDOM Internal Website and Communication Infrastructure
D2.1. Requirements analysis for un-trusted environments
D2.2. Functional analysis and use cases identification
D2.3. Intermediate asessment of privacy frameworks and tools (summary)
D2.5. Definition of validation framework and protocols
D3.1. WITDOM formalized technological requirements
D4.2. Final specification of an end-to-end secure architecture
D4.4. Final specification of system architectures for WITDOM scenarios
D4.6. Final specification of the adaptation layer for Cloud computing
D6.1. Legal and Ethical framework and privacy and security principles
D6.2. Legal requirements on privacy, data protection and security in WITDOM scenarios
D7.1. Public Web Presence
D7.10. Initial Exploitation Plan
D7.12. First Communication Activities Report
D7.13. Second Communication Activities Report
D7.2. Dissemination Plan
D7.3. First Dissemination Report and Material
D7.4. Second Dissemination Report and Material
D7.5. Report of first Advisory Board Workshop
D7.6. Report of second Advisory Board Workshop
D7.8. Preliminary Standardisation Reports
Main menu
About
Project facts
Objectives
SoTA Advance
WITDOM concept
Architecture
Use cases
Disclaimer
Consortium
Project documentation
Deliverables
Information Kit
Newsroom
Events
Newsroom
Publications
Related Initiatives
Catalogue
User menu
Contact
Linkedin
RSS
Twitter
Login