Livrables Documents, reports (28) Final assessment of privacy framework and tools A continuous validation process will be conducted thought the whole development process, providing the correction paths where needed. Results and analysis will be reported in this deliverable. Inputs will come from WP3, which sets the basis for the assessment methodology, and from WP4 and WP5. This is the final version of D2.3, and will collect both the refined procedures and the results and analysis of the validation cycle. Contributors: UVIGO (Editor), FCSR, IBM Report of final Advisory Board Workshop After each SAB workshop, Atos will write a report with all conclusions, including observations on project results, recommendations for research and on actions for impact creation, among others. Contributors: ATOS (Editor), All partners Preliminary standardisation Reports This deliverable will describe the relevant standards, the on-going standardisation efforts, and their priority with respect to the project. Contributors: KU Leuven (Editor), UVIGO, IBM WITDOM formalized technological requirements As the tangible result of subtask 3.1.1, the first revision of this deliverable will present the formal definition of the technological security, privacy and verifiability requirements, taking into account the connection with user-centric requirements and European privacy and data protection legislation. It will also gather the identified limitations of technologies for verifiability and security and privacy protection of outsourced process, and initial approaches for tackling them. This revision at M12 will collect the first results of subtask 3.2.2, namely the description of the holistic privacy framework, the definition of privacy metrics and privacy preferences, and the assessment methodology used to evaluate the end-to-end privacy and security of the solutions developed in WITDOM, reformalizing the gathered requirements to assess that the developed metrics are sufficiently representative and perfectly aligned to the requirements. Contributors: UVIGO (Editor), Atos, KU Leuven, IBM, XLAB, FCSR Definition of Validation framework and protocols The final validation activities reported in D2.6 will be based on the validation framework defined within this deliverable. The validation framework will collect the relevant metrics, successful criteria, validation activities and protocols and tools used for validation to assess the requirements defined in D2.1, D2.2, D6.1 and D6.2 and formalized in D3.2. The aim of this deliverable is to align all the partners and prepare the ground for the implementation of the final validation activities focused of the developed platform and prototypes. Contributors: FCSR (Editor), UVIGO Final specification of an end-to-end secure architecture The final major data-management components, functional specification, architectural layers, information flows and implementation guidelines will be described and integrated into a coherent view of the system architecture. Contributors: IBM (Editor), UVIGO, ATOS, XLAB, KU Leuven WITDOM final report on Cryptographic and Privacy-preserving primitives The final version of this deliverable will contain the research outcomes from Tasks 3.2 to 3.5 (WD3.3, WD 3.4, WD 3.5), including also the detailed description of the developed and adapted techniques, their applicability and a detailed quantitative evaluation in terms of efficiency and achieved security/privacy protection, both at the primitive level and end-to-end when integrated in a whole system within WITDOM evaluation framework. Contributors: UVIGO (Editor), KU Leuven, IBM Legal validation and recommendations This deliverable will contain a legal assessment of the general privacy enabling tools and technologies, as well as the specific e-Health and Financial Services scenarios that have been developed in the WITDOM project and will furthermore include draft recommendations on privacy enabling tools and technologies to ensure legally compliant systems. Contributor: KU Leuven (Editor), UVIGO, FCSR Legal and Ethical framework and privacy and security principles This deliverable will analyse the soon to be expected revised data protection package and the cybersecurity package on its implications for privacy enhancing technologies in untrusted environments, focusing specifically on the application of privacy and data protection principles, as well as ethical aspects. Editor & Contributor: KU Leuven Final Scientific and Technical Validation of WITDOM prototypes By using the validation framework and protocols defined in D2.4 the validation activities will be performed. This deliverable will provide a final result of quantitative and qualitative validation against the project prototypes. All partners that have contributed during the development will be called to assess the requirements of the respective component of the platform and use cases. Contributors: FCSR (Editor), All Partners Functional analysis and use case identification While D2.1 is focused on privacy and stakeholder requirements analysis and definition, D2.2 has its focus on the functional analysis and use case identification. Within this deliverable the main business logic and rules will be defined and described. Contributors: FCSR (Editor), BBVA, ATOS, IBM Initial Exploitation Plan It will present the first version of the consortium/project-wide as well as partner specific exploitation plans for the WITDOM project, including the impact creation plan. It will include initial market analysis. Contributors: ATOS (Editor), All partners Final communication Activities Report This deliverable will be the final report of the completed communication activities from M25 to M36. Contributors: ATOS (Editor), All partners Final specification of the adaptation layer for Cloud computing The final characteristics, elements, and interfaces of the extension to Cloud computing developed in T4.4 (i.e. WD4.2) will be collected in this deliverable, together with the implementation guidelines corresponding to the Cloud scenario produced by T4.4. Contributors: IBM (Editor), UVIGO, ATOS, XLAB, FCSR Requirements analysis for un-trusted environments At the beginning of WITDOM project an extensive analysis of requirements will be conducted. Requirements will be with high level of abstraction, with no bias towards technology and they will focus mainly on privacy and security issues highlighted by the stakeholder analysis. Requirements will span from general requirements for the whole platform as well as specific requirements for the two use case. This deliverable, in conjunction with D2.2, D6.1 and D6.2 will be the basis to design and develop the whole project. Contributors: FCSR (Editor), BBVA, ATOS, UVIGO, KU Leuven, IBM Report of second Advisory Board Workshop After each SAB workshop, Atos will write a report with all conclusions, including observations on project results, recommendations for research and on actions for impact creation, among others. Contributors: ATOS (Editor), All partners Dissemination Plan D7.2 will outline the plan for dissemination activities for the various channels described in Task 7.1 and will identify potential avenues for dissemination. It will also contain the first version of the dissemination materials (flyers, leaflet, poster, presentation templates). Contributors: ATOS (Editor), All partners Report of first Advisory Board Workshop After each SAB workshop, Atos will write a report with all conclusions, including observations on project results, recommendations for research and on actions for impact creation, among others. Contributors: ATOS (Editor), All partners Final Exploitation Plan and Report It will update D7.10 based on the finalised developments and validation of the WITDOM project, and will include a report on exploitation activities performed. It will include a definition of business models suitable for market adoption of project results for enhanced privacy and security in Cloud environments. Contributors: ATOS (Editor), All partners First dissemination Report& Material This report will periodically update the dissemination plan, report on the dissemination and awareness creation activities of the past period and will provide updated versions of the dissemination material. Contributors: ATOS (Editor), All partners Legal requirements on privacy, data protection and security in WITDOM scenarios This deliverable will specify ethical and legal privacy and security requirements that need to be taken into account for the development of the eHealth and Financial Services scenarios. Contributor: KU Leuven (Editor), FCSR Final specification of system architectures for WITDOM scenarios This deliverable will comprise the final scenario-specific architectural description for both use-cases, adequately redefining the initial architecture (WD4.1, D4.1) and the relationships between its elements in order to meet the objectives of this WP. Contributors: UVIGO (Editor), IBM, FCSR, BBVA, ATOS, XLAB, KU Leuven Final dissemination Report& Material This report updates and constitutes the final version of the dissemination plan, report on the dissemination and awareness creation activities of the past period and will provide updated versions of the dissemination material. Contributors: ATOS (Editor), All partners Second communication Activities Report This report will periodically report the completed communication activities from M13 to M24 and the planned activities for next year (M25 to M36). Contributors: ATOS (Editor), All partners Second dissemination Report& Material This report updates and constitutes the final version of the dissemination plan, report on the dissemination and awareness creation activities of the past period and will provide updated versions of the dissemination material. Contributors: ATOS (Editor), All partners WITDOM Holistic Privacy framework, privacy metrics and assessment methodology This revision of the deliverable will build upon D3.1, will collecting the final results of subtask 3.2.2, namely the description of the holistic privacy framework, the definition of privacy metrics and privacy preferences, and the assessment methodology used to evaluate the end-to-end privacy and security of the solutions developed in WITDOM, reformalizing the gathered requirements to assess that the developed metrics are sufficiently representative and perfectly aligned to the requirements. A preliminary theoretical evaluation of the existing and to-be-developed privacy-enhancing techniques and secure cryptographic signal processing approaches will also be given (WD3.1). This deliverable will also account for the evolving research outcomes in WP3 and from the actual evaluation and assessment in WP2 to refine and improve the framework from D3.1. Contributors: UVIGO (Editor), Atos, KU Leuven, IBM, XLAB, FCSR Final standardisation Reports This deliverable will offer a consolidated view of standardisation-related achievements in relation to the project and its outcomes. Contributors: KU Leuven (Editor), UVIGO, IBM First communication Activities Report This report will periodically report the completed communication activities from M1 to M12 and the planned activities for next year (M13 to M24). Contributors: ATOS (Editor), All partners Websites, patent fillings, videos etc. (3) WITDOM Internal Website The internal portal will be created initially to form a repository of documentary and other information that is relevant to the execution of the project, and that can also be used to provide an initial intra-project communication system. In the private area, a project management tool will be made available to facilitate the communication of the partners providing a common workspace. As the project evolves, the information structure and the IT-infrastructure will be adapted according to current needs and requirements. The usual collaboration tools and procedures will be installed and made available to the project partners. It will also be extended with an external portal that will make available information about WITDOM available to the public; that work will be performed in WP7 (see Task 7.1 D7.1, Task 7.2 and D7.3). Editor & Contributor: ATOS WITDOM Internal Website and Communication Infrastructure The internal portal will be created initially to form a repository of documentary and other information that is relevant to the execution of the project and that can also be used to provide an initial intraproject communication system In the private area a project management tool will be made available to facilitate the communication of the partners providing a common workspace In a second phase ending in month 3 a communication infrastructure consisting in a richer internal Internet portal and set of mailing lists will be provided As the project evolves the information structure and the ITinfrastructure will be adapted according to current needs and requirements The usual collaboration tools and procedures will be installed and made available to the project partners It will also be extended with an external portal that will make available information about WITDOM available to the public that work will be performed in WP7 see Task 71 D71 Task 72 and D73D74Editor Contributor ATOS Public Web Presence A public website will be established In the internal projects area a management tool will be made available to facilitate partners communication providing a common workspace A specific restricted area will be designed for SAB members The relationship with focus groups will be facilitated eg by management of mailing lists and electronic newslettersContributors ATOS Editor All partners Other (1) Final common trustworthy privacy-preserving platform toolkit This deliverable comprises the final prototype of the trustworthy privacy-preserving platform toolkit and the necessary reports, detailing the platform from the documentation point of view. This final version will refine the initial revision provided in D5.1, accounting for the successive scientific/technical validations performed in T2.3 and T2.4. Contributors: XLAB (Editor), Atos, UVIGO Publications Conference proceedings (13) Secure genomic susceptibility testing based on lattice encryption Auteurs: Juan Ramon Troncoso-Pastoriza, Alberto Pedrouzo-Ulloa, Fernando Perez-Gonzalez Publié dans: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017, Page(s) 2067-2071, ISBN 978-1-5090-4117-6 Éditeur: IEEE DOI: 10.1109/ICASSP.2017.7952520 Multivariate lattices for encrypted image processing Auteurs: Alberto Pedrouzo-Ulloa, Juan Ramon Troncoso-Pastoriza, Fernando Perez-Gonzalez Publié dans: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015, Page(s) 1707-1711, ISBN 978-1-4673-6997-8 Éditeur: IEEE DOI: 10.1109/ICASSP.2015.7178262 Orchestrating Privacy Enhancing Technologies and Services with BPM Tools - The WITDOM Data Protection Orchestrator Auteurs: Nicolás Notario, Eleonora Ciceri, Alberto Crespo, Eduardo González Real, Ilio Catallo, Sauro Vicini Publié dans: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, 2017, Page(s) 1-7, ISBN 9781-450352574 Éditeur: ACM Press DOI: 10.1145/3098954.3104057 Rollback and Forking Detection for Trusted Execution Environments Using Lightweight Collective Memory Auteurs: Marcus Brandenburger, Christian Cachin, Matthias Lorenz, Rudiger Kapitza Publié dans: 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017, Page(s) 157-168, ISBN 978-1-5386-0542-4 Éditeur: IEEE DOI: 10.1109/dsn.2017.45 Outsourcing Genomic Data. Trust in the untrusted. Auteurs: Griet Verhenneman Publié dans: 2017 Éditeur: European Conference on Health Law edition:6 location:Bergen, Norway date:27-29 September 2017 Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition Auteurs: Abdelrahaman Aly, Aysajan Abidin, and Svetla Nikova Publié dans: 2018 Éditeur: Financial Cryptography and Data Security - 22nd International Conference, FC 2018 Co-creating Security-and-Privacy-by-Design Systems Auteurs: Sauro Vicini, Francesco Alberti, Nicolas Notario, Alberto Crespo, Juan Ramon Troncoso Pastoriza, Alberto Sanna Publié dans: 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Page(s) 768-775, ISBN 978-1-5090-0990-9 Éditeur: IEEE DOI: 10.1109/ARES.2016.74 Image denoising in the encrypted domain Auteurs: Alberto Pedrouzo-Ulloa, Juan Ramon Troncoso-Pastoriza, Fernando Perez-Gonzalez Publié dans: 2016 IEEE International Workshop on Information Forensics and Security (WIFS), 2016, Page(s) 1-6, ISBN 978-1-5090-1138-4 Éditeur: IEEE DOI: 10.1109/WIFS.2016.7823916 Enhancing Co-Creation with Privacy and Security-by-Design methodologies Auteurs: F. Alberti, S. Vicini Publié dans: ENoLL Research Day Conference Proceedings 2015, 2015, ISBN 9789-082102741 Éditeur: ENoLL - European Network of Living Labs Don't trust the cloud, verify - integrity and consistency for cloud object stores Auteurs: Marcus Brandenburger, Christian Cachin, Nikola Knežević Publié dans: Proceedings of the 8th ACM International Systems and Storage Conference on - SYSTOR '15, 2015, Page(s) 1-11, ISBN 9781-450336079 Éditeur: ACM Press DOI: 10.1145/2757667.2757681 Engineering Privacy by Design Reloaded Auteurs: Seda Gurses, Claudia Diaz and Carmela Troncoso Publié dans: Proceedings of the Amsterdam Privacy Conference 2015 (APC 2015), 2015 Éditeur: Amsterdam Platform for Privacy Research (APPR) Dynamic Privacy-Preserving Genomic Susceptibility Testing Auteurs: Mina Namazi, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González Publié dans: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security - IH&MMSec '16, 2016, Page(s) 45-50, ISBN 9781-450342902 Éditeur: ACM Press DOI: 10.1145/2909827.2930791 Convention 108: the international standard for data protection to come? Auteurs: G. Verhenneman, F. Coudert Publié dans: Proceedings of the Amsterdam Privacy Conference 2015 (APC 2015), 2015 Éditeur: Amsterdam Platform for Privacy Research (APPR) Other (2) On Ring Learning with Errors over the Tensor Product of Number Fields Auteurs: A. Pedrouzo-Ulloa, J.R. Troncoso-Pastoriza, Fernando Pérez-González Publié dans: 2017 Éditeur: Arxiv e-prints, (arXiv:1607.05244v2) An open-source tool for managing time-evolving variant annotation Auteurs: Ilio Catallo, Eleonora Ciceri, Stefania Stenirri, Stefania Merella, Alberto Sanna, Maurizio Ferrari, Paola Carrera, Sauro Vicini. Publié dans: 2017 Éditeur: Proceedings of CIBB Book chapters (4) Updatable Tokenization: Formal Definitions and Provably Secure Constructions Auteurs: Christian Cachin, Jan Camenisch, Eduarda Freire-Stögbuchner, Anja Lehmann Publié dans: 2017, Page(s) 59-75 Éditeur: Springer International Publishing DOI: 10.1007/978-3-319-70972-7_4 Enhancing Personas for Well-Being e-Services and Product Service Systems Auteurs: Sauro Vicini, Adriano Gariglio, Francesco Alberti, Elettra Oleari, Alberto Sanna Publié dans: Design, User Experience, and Usability: Design Thinking and Methods, 2016, Page(s) 365-376, ISBN 978-3-319-40409-7 Éditeur: Springer International Publishing DOI: 10.1007/978-3-319-40409-7_35 A Masked Ring-LWE Implementation Auteurs: Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede Publié dans: Cryptographic Hardware and Embedded Systems -- CHES 2015, 2015, Page(s) 683-702, ISBN 978-3-662-48324-4 Éditeur: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-48324-4_34 Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation Auteurs: Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil Dimitrov, Ingrid Verbauwhede Publié dans: Cryptographic Hardware and Embedded Systems -- CHES 2015, 2015, Page(s) 164-184, ISBN 978-3-662-48324-4 Éditeur: Springer Berlin Heidelberg DOI: 10.1007/978-3-662-48324-4_9 Peer reviewed articles (5) Number Theoretic Transforms for Secure Signal Processing Auteurs: Alberto Pedrouzo-Ulloa, Juan Ramon Troncoso-Pastoriza, Fernando Perez-Gonzalez Publié dans: IEEE Transactions on Information Forensics and Security, Numéro 12/5, 2017, Page(s) 1125-1140, ISSN 1556-6013 Éditeur: Institute of Electrical and Electronics Engineers DOI: 10.1109/TIFS.2016.2647223 Towards Inferring Communication Patterns in Online Social Networks Auteurs: Ero Balsa, Cristina Pérez-Solà, Claudia Diaz Publié dans: ACM Transactions on Internet Technology, Numéro 17/3, 2017, Page(s) 1-21, ISSN 1533-5399 Éditeur: Association for Computing Machinary, Inc. DOI: 10.1145/3093897 Hardware Assisted Fully Homomorphic Function Evaluation and Encrypted Search Auteurs: Sujoy Sinha Roy, Frederik Vercauteren, Jo Vliegen, Ingrid Verbauwhede Publié dans: IEEE Transactions on Computers, Numéro 66/9, 2017, Page(s) 1562-1572, ISSN 0018-9340 Éditeur: Institute of Electrical and Electronics Engineers DOI: 10.1109/TC.2017.2686385 Design of Pool Mixes Against Profiling Attacks in Real Conditions Auteurs: Simon Oya, Fernando Perez-Gonzalez, Carmela Troncoso Publié dans: IEEE/ACM Transactions on Networking, 2016, Page(s) 1-14, ISSN 1063-6692 Éditeur: Institute of Electrical and Electronics Engineers DOI: 10.1109/TNET.2016.2547391 Widening and strengthening the appeal of Convention 108 Auteurs: Griet Verhenneman, Fanny Coudert Publié dans: Data Protection Law & Policy, Numéro vol:12 issue:3, 2015, Page(s) 8-10, ISSN 1743-6605 Éditeur: Cecile Park Publishing Non-peer reviewed articles (1) WITDOM: Empowering Privacy and Security in Non-trusted Environments Auteurs: Juan Ramón Troncoso-Pastoriza, Elsa Prieto Pérez Publié dans: ERCIM News. Tackling Big Data in the Life Sciences., Numéro 104, 2015, ISSN 0926-4981 Éditeur: ERCIM EEIG Droits de propriété intellectuelle Patent (1) Data Masking Numéro de demande/publication: 15/ 417851 Date: 2017-01-27 Demandeur(s): IBM RESEARCH GMBH Recherche de données OpenAIRE... Une erreur s’est produite lors de la recherche de données OpenAIRE Aucun résultat disponible