Skip to main content
Weiter zur Homepage der Europäischen Kommission (öffnet in neuem Fenster)
Deutsch Deutsch
CORDIS - Forschungsergebnisse der EU
CORDIS

Secure Cloud Identity Wallet

CORDIS bietet Links zu öffentlichen Ergebnissen und Veröffentlichungen von HORIZONT-Projekten.

Links zu Ergebnissen und Veröffentlichungen von RP7-Projekten sowie Links zu einigen Typen spezifischer Ergebnisse wie Datensätzen und Software werden dynamisch von OpenAIRE abgerufen.

Leistungen

Identity wallet service (öffnet in neuem Fenster)

The central identity wallet service used in all different use case specific pilot sites is deployed and accessible for service provider side integration

Test and evaluation report of pilot domain 3 (e-Business) (öffnet in neuem Fenster)

e-Business evaluation and testing report

Test and evaluation report of pilot domain 1 (e-Government) (öffnet in neuem Fenster)

e-Government evaluation and testing report

Test and evaluation report of pilot domain 2 (e-Health) (öffnet in neuem Fenster)

e-Health evaluation and testing report

System security requirements, risk and threat analysis – 2nd iteration (öffnet in neuem Fenster)

Based on the pilot definition in T6.1 and the elaborate vulnerability catalogue and this report contains an updated version of the security analysis from D2.2.

Recommendations for improving identity protocols (öffnet in neuem Fenster)

Detailed documentation of enhancements and improvements w.r.t. identity protocols

Proxy cryptography potential for current identity management solutions (öffnet in neuem Fenster)

Assess. to which extent current IdM systems and solutions can be enhanced with proxy cryptography schemes

Guidelines for secure authentication to the cloud (öffnet in neuem Fenster)

Detailed documentation of enhancements and improvements w.r.t. authentication mechanisms

Security enhancements for basic cryptographic technologies (öffnet in neuem Fenster)

Detailed documentation of basis cryptographic technology enhancements

Final report on standardization activities and achievements (öffnet in neuem Fenster)

Summary of project standardization activities during the reporting period

UI Prototypes V1 (öffnet in neuem Fenster)

Demonstration of first version of user interface prototypes

System security requirements, risk and threat analysis – 1st iteration (öffnet in neuem Fenster)

Analysis of threats, evaluation of risks and def. of security measurements through established methods (STrIDE&DREAD)

Exploitation Plan and Report (öffnet in neuem Fenster)

first version contains project-wide exploitation plans including impact creation plan with specific exploitation measures; the second version will report the exploitation activities performed and the business models suitable for market adoption of Secure Cloud Identity Wallet

Functional Design (öffnet in neuem Fenster)

Detailed functional design of the architecture as basis for the technical design and implementation

User centric privacy and usability requirements (öffnet in neuem Fenster)

Requirements for centric privacy design aspects

Recommendations on privacy-enhancing mechanisms (öffnet in neuem Fenster)

Report providing detailed analysis of privacy risks and recommendations to mitigate the identified risks

Gap analysis for current identity management standards (öffnet in neuem Fenster)

Detailed assessment of identity management technologies and standards identifying gaps w.r.t. to the support of encrypted identity data

Assessment report on cryptographic technologies, protocols and mechanisms (öffnet in neuem Fenster)

Detailed report on assessment of security technologies regarding CREDENTIAL requirements w.r.t. to encryption, identity protocols and authentication mechanisms

CREDENTIAL technology overview and recommendations for applications (öffnet in neuem Fenster)

Summary of lessons learned from piloting and recommendations for adoption of CREDENTIAL technology and the application of developed components

Recommendations for operating the CREDENTIAL wallet (öffnet in neuem Fenster)

Summary and lessons learned from operating the CREDENTIAL identity wallet service

Cloud identity wallet requirements (öffnet in neuem Fenster)

Documentation of all collected requirements and offering of knowledge base for requirements engineering

Protocol and software integration guidelines (öffnet in neuem Fenster)

HowTo’s and best-practice guidelines for IdM software producers and standard organizations facilitating the easy take-up of proxy cryptography

Vulnerability catalogue (öffnet in neuem Fenster)

Report on the assessment of vulnerabilities present in federated IAM systems in general and the CREDENTIAL system in particular

UI Prototypes V2 and HCI Patterns (öffnet in neuem Fenster)

Demonstration of the final user interface prototypes and report about HCI patterns for Cloud Identity Wallets

Pilot use case specification (öffnet in neuem Fenster)

Detailed specification of use cases with consideration of pilot site backend infrastructure and client side integration

Scenarios and use-cases (öffnet in neuem Fenster)

Detailed description of applicable scenarios and formalized use cases.

Communication and dissemination kit (öffnet in neuem Fenster)

This kit will be provided as supplement to the final report containing suitable material with copyright clearance, which the EC may use for its own dissemination of project results

Project home page and collaboration platform (öffnet in neuem Fenster)

Technical platform for online presentation of home page and project intern collaboration platform.

Public project web presence (öffnet in neuem Fenster)

Public web presence with different section targeting different user groups and communities set up based on the technology platform prepared in WP1

Veröffentlichungen

Practical Signing-Right Revocation (öffnet in neuem Fenster)

Autoren: Michael Till Beck, Stephan Krenn, Franz-Stefan Preiss, Kai Samelin
Veröffentlicht in: Trust and Trustworthy Computing, 2016, Seite(n) 21-39, ISBN 978-3-319-45572-3
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-319-45572-3_2

Evaluation of Privacy-ABC Technologies - a Study on the Computational Efficiency (öffnet in neuem Fenster)

Autoren: Fatbardh Veseli, Jetzabel Serna
Veröffentlicht in: Trust Management X, 2016, Seite(n) 63-78, ISBN 978-3-319-41354-9
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-319-41354-9_5

Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing (öffnet in neuem Fenster)

Autoren: David Derler, Stephan Krenn, Daniel Slamanig
Veröffentlicht in: Cryptology and Network Security, 2016, Seite(n) 211-227, ISBN 978-3-319-48965-0
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-319-48965-0_13

CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing (öffnet in neuem Fenster)

Autoren: Felix Horandner, Stephan Krenn, Andrea Migliavacca, Florian Thiemer, Bernd Zwattendorfer
Veröffentlicht in: 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Seite(n) 742-749, ISBN 978-1-5090-0990-9
Herausgeber: IEEE
DOI: 10.1109/ARES.2016.79

Helping Johnny to Make Informed Decisions in the Context of Social Login

Autoren: Farzaneh Karegar, Nina Gerber, Melanie Volkamer, and Simone Fischer-Hübner
Veröffentlicht in: ACM/SIGAPP Symposium On Applied Computing, 2018
Herausgeber: ACM

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications

Autoren: David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, and Christoph Striecks
Veröffentlicht in: PKC, 2018
Herausgeber: Springer

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange

Autoren: David Derler, Tibor Jager, Daniel Slamanig, and Christoph Striecks
Veröffentlicht in: EUROCRYPT, 2018
Herausgeber: Springer

Secure and Privacy-Friendly Storage and Data Processing in the Cloud

Autoren: Pasquale Chiaro, Simone Fischer-Hübner, Thomas Groß, Stephan Krenn, Thomas Lorünser, Ana Isabel Martı́nez Garcı́a, Andrea Migliavacca, Kai Rannenberg, Daniel Slamanig, Christoph Striecks, and Alberto Zanini
Veröffentlicht in: IFIP Privacy and Identity Management, 2017
Herausgeber: Springer

Engineering Privacy by Design - Lessons from the Design and Implementation of an Identity Wallet Platform

Autoren: Fatbardh Veseli, Jetzabel Serna Olvera, and Kai Rannenberg
Veröffentlicht in: ACM/SIGAPP Symposium On Applied Computing, 2019
Herausgeber: ACM

Protean Signature Schemes (öffnet in neuem Fenster)

Autoren: Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Veröffentlicht in: CANS 2018, 2018, Seite(n) 256-276, ISBN 978-3-030-00433-0
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-00434-7_13

Towards a Unified Secure Cloud Service Development and Deployment Life-Cycle (öffnet in neuem Fenster)

Autoren: Aleksandar Hudic, Matthias Flittner, Thomas Lorunser, Philipp M. Radl, Roland Bless
Veröffentlicht in: 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Seite(n) 428-436, ISBN 978-1-5090-0990-9
Herausgeber: IEEE
DOI: 10.1109/ARES.2016.73

Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider

Autoren: Farzaneh Karegar, Christoph Striecks, Stephan Krenn, Felix Hörandner, Thomas Lorünser, and Simone Fischer-Hübner
Veröffentlicht in: IFIP Privacy and Identity Management, 2016
Herausgeber: Springer

Sharing Information with Web Services - A Mental Model Approach in the Context of Optional Information

Autoren: Oksana Kulyk, Benjamin Maximilian Reinheimer, and Melanie Volkamer
Veröffentlicht in: HCI International, 2017
Herausgeber: Springer

Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation

Autoren: David Derler, Sebastian Ramacher, and Daniel Slamanig
Veröffentlicht in: Financial Cryptography and Data Security, 2017
Herausgeber: Springer Verlag

Exploring Consumers' Attitudes of Smart TV Related Privacy Risks

Autoren: Marco Ghiglieri, Melanie Volkamer, and Karen Renaud
Veröffentlicht in: HCI International, 2017
Herausgeber: Springer

Towards the Adoption of Secure Cloud Identity Services (öffnet in neuem Fenster)

Autoren: Alexandros Kostopoulos, Evangelos Sfakianakis, Ioannis Chochliouros, John Sören Pettersson, Stephan Krenn, Welderufael Tesfay, Andrea Migliavacca, Felix Hörandner
Veröffentlicht in: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, 2017, Seite(n) 1-7, ISBN 9781450352574
Herausgeber: ACM Press
DOI: 10.1145/3098954.3104061

Towards Privacy-Preserving and User-Centric Identity Management as a Service

Autoren: Pritam Dash, Christoph Rabensteiner, Felix Hörandner, Simon Roth
Veröffentlicht in: Open Identity Summit 2017, 2017
Herausgeber: GI

Assessments of a Cloud-Based Data Wallet for Personal Identity Management

Autoren: Farzaneh Karegar, Daniel Lindegren, John Sören Pettersson, Simone Fischer-Hübner
Veröffentlicht in: 26th International Conference on Information Systems Development, 2017
Herausgeber: Association for Information Systems

Towards Attribute-Based Credentials in the Cloud

Autoren: Stephan Krenn, Thomas Lorünser, Anja Salzer, Christoph Striecks
Veröffentlicht in: CANS 2017, 2017
Herausgeber: Springer

CREDENTIAL: seCuRE clouD idENTIty wALlet

Autoren: Nicolás Notario, Stephan Krenn, Bernd Zwattendorfer, Felix Hörandner
Veröffentlicht in: ERCIM News, Ausgabe No. 106 July 2016, 2016, Seite(n) 11-12, ISSN 0926-4981
Herausgeber: ERCIM EEIG

The Austrian eID ecosystem in the public cloud: How to obtain privacy while preserving practicality (öffnet in neuem Fenster)

Autoren: Bernd Zwattendorfer, Daniel Slamanig
Veröffentlicht in: Journal of Information Security and Applications, Ausgabe 27-28, 2016, Seite(n) 35-53, ISSN 2214-2126
Herausgeber: Elsevier
DOI: 10.1016/j.jisa.2015.11.004

Agile cryptographic solutions for the cloud (öffnet in neuem Fenster)

Autoren: Thomas Lorünser, Stephan Krenn, Christoph Striecks, Thomas Länger
Veröffentlicht in: e & i Elektrotechnik und Informationstechnik, 2017, ISSN 0932-383X
Herausgeber: Springer Verlag
DOI: 10.1007/s00502-017-0519-x

Research and innovation challenges in data protection, security and privacy in the cloud: Map of synergies of the clustered projects - version 2.0 (öffnet in neuem Fenster)

Autoren: Gallego-Nicasio Crespo, Beatriz; PRIETO, Elsa; RIOS, Erkuden; Rak, Massimiliano; Deussen, Peter; Samarati, Pierangela; Cascella, Roberto; Braun, Simons; Krenn, Stephan; Lörunser, Thomas
Veröffentlicht in: 2016
Herausgeber: DPSP Cluster
DOI: 10.13140/RG.2.2.22406.37444

Challenges for trustworthy (multi-)Cloud-based services in the Digital Single Market

Autoren: Aljosa Pasic, Beatriz Gallego, Bernd Zwattendorfer, Bojan Suzic, Elsa Prieto, Erkuden Rios, Josep Domingo-Ferrer, Julia Vuong, Massimiliano Rak, Nicholas Ferguson, Nuria Rodríguez, Peter H. Deussen, Pierangela Samarati, Roberto Cascella, Sabrina de Capitani, Simone Braun, Stephan Krenn, Stephanie Parker, Thomas Länger, Thomas Lorünser, Zhiming Zhao
Veröffentlicht in: 2016
Herausgeber: DPSP Cluster

Secure and Privacy Preserving Identity Management in the Cloud

Autoren: Bernd Zwattendorfer, Stephan Krenn, Thomas Lorünser
Veröffentlicht in: ERCIM News, Ausgabe No. 104 January 2016, 2016, Seite(n) 44-45, ISSN 0926-4981
Herausgeber: ERCIM EEIG

Rechte des geistigen Eigentums

Cloud-basierte Authentifizierung

Antrags-/Publikationsnummer: AT A51019/2016
Datum: 2016-11-09
Antragsteller: AIT AUSTRIAN INSTITUTE OF TECHNOLOGY GMBH

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor

Mein Booklet 0 0