{"id":4417,"date":"2025-06-30T11:24:00","date_gmt":"2025-06-30T09:24:00","guid":{"rendered":"https:\/\/cybernemo.eu\/?p=4417"},"modified":"2025-07-08T11:35:03","modified_gmt":"2025-07-08T09:35:03","slug":"cybernemo-at-secsoft-2025-presenting-research-on-verifiable-evidence-for-zero-trust-networks","status":"publish","type":"post","link":"https:\/\/cybernemo.eu\/index.php\/2025\/06\/30\/cybernemo-at-secsoft-2025-presenting-research-on-verifiable-evidence-for-zero-trust-networks\/","title":{"rendered":"CyberNEMO at SecSoft 2025 &#8211; Presenting Research on Verifiable Evidence for Zero Trust Networks"},"content":{"rendered":"\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The CyberNEMO project was represented at the SecSoft 2025 workshop, held on June 27th in Budapest in conjunction with the IEEE NetSoft 2025 conference. The workshop brought together researchers, practitioners, and industry partners working on topics related to security, privacy, and trust in software-defined and AI-enabled network environments.<\/p>\n\n\n\n<p>As part of the program, Ana M\u00e9ndez, researcher from TID in the CyberNEMO consortium, presented the paper: \u201cTransparent Notary Service: A Transparency Framework for Secure and Verifiable Network Evidence.\u201d<\/p>\n\n\n\n<p>This contribution introduces a lightweight, cryptographically verifiable notarization system that supports secure evidence handling and traceability in Zero Trust architectures. The work proposes a novel way to register and verify signed statements. such as access events, policy attestations, or network anomalies, using append-only logs and COSE-based signatures.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1024\" src=\"https:\/\/cybernemo.eu\/wp-content\/uploads\/2025\/07\/post5-768x1024.jpg\" alt=\"\" class=\"wp-image-4418\" style=\"width:504px;height:auto\" srcset=\"https:\/\/cybernemo.eu\/wp-content\/uploads\/2025\/07\/post5-768x1024.jpg 768w, https:\/\/cybernemo.eu\/wp-content\/uploads\/2025\/07\/post5-225x300.jpg 225w, https:\/\/cybernemo.eu\/wp-content\/uploads\/2025\/07\/post5-1152x1536.jpg 1152w, https:\/\/cybernemo.eu\/wp-content\/uploads\/2025\/07\/post5-1536x2048.jpg 1536w, https:\/\/cybernemo.eu\/wp-content\/uploads\/2025\/07\/post5-600x800.jpg 600w, https:\/\/cybernemo.eu\/wp-content\/uploads\/2025\/07\/post5-scaled.jpg 1920w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/figure><\/div>\n\n\n<p>In addition to the paper, the CyberNEMO project poster was also presented at the event, outlining the project\u2019s approach to trusted automation, distributed identity, and evidence-based orchestration in future 6G and cloud-native infrastructures.<\/p>\n\n\n\n<p>The session was a valuable opportunity to share ongoing results, exchange ideas with other European and international initiatives, and highlight CyberNEMO\u2019s commitment to building transparent and trustworthy network systems.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The CyberNEMO project was represented at the SecSoft 2025 workshop, held on June 27th in Budapest in conjunction with the IEEE NetSoft 2025 conference. The workshop brought together researchers, practitioners, and industry partners working on topics related to security, privacy, &hellip;<\/p>\n","protected":false},"author":4,"featured_media":4419,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[],"cc_featured_image_caption":{"caption_text":"","source_text":"","source_url":""},"_links":{"self":[{"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/posts\/4417"}],"collection":[{"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/comments?post=4417"}],"version-history":[{"count":1,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/posts\/4417\/revisions"}],"predecessor-version":[{"id":4420,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/posts\/4417\/revisions\/4420"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/media\/4419"}],"wp:attachment":[{"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/media?parent=4417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/categories?post=4417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/tags?post=4417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}