Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

A FRAMEWORK FOR USER CENTRED PRIVACY AND SECURITY IN THE CLOUD

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

Security as a service for CLARUS (se abrirá en una nueva ventana)

This deliverable describes the security services incorporated in the CLARUS archiecture, which include identity and access management and key and risk management

Standardisation assessment (se abrirá en una nueva ventana)

This deliverable presents the assessment of the standardisation guidelines and requirements identified in WP2 and documented in D2.5. It will result in a set of recommendations for Europe and European CSPs concerning standardisation issues, drawing also on related work at project/research level.

First progress report, financial statement and review (se abrirá en una nueva ventana)

Progress according to the plan will be described in terms of technical activities, record of activities related to undertaken dissemination and exploitation activities, and use of resources (financial and personnel) at the end of the first year. Any deviations from the plan will be described, together with an assessment of the possible consequences and proposals for any necessary re-planning. The document will contain the completed project deliverables, a report of scientific production, and a summary of the periodic reports submitted by the partners to the coordinator.

An attack-tolerant framework for the cloud V1 (se abrirá en una nueva ventana)

This report will specify the framework provided by CLARUS to cope and preserve cloud services.

Dissemination and standards report V1 (se abrirá en una nueva ventana)

An initial dissemination plan will be produced after 6 months, and revised versions that also cover standardisation efforts will be produced at 12-month intervals. Results of standards monitoring, analysis and dissemination activities will be included in this report.

Dissemination and standards report V3 (se abrirá en una nueva ventana)

An initial dissemination plan will be produced after 6 months, and revised versions that also cover standardisation efforts will be produced at 12-month intervals. Results of standards monitoring, analysis and dissemination activities will be included in this report.

Architecture V2 (se abrirá en una nueva ventana)

This deliverable will provide the architecture design of the CLARUS system, including the functional components, data location, data flows and protocols.

Standardisation and interoperability (se abrirá en una nueva ventana)

This deliverable will provide the main results concerning standardisation and interoperability issues. It will focus more on outcomes and impact in the EU & global context.

The CLARUS modules V1 (se abrirá en una nueva ventana)

This document will specify the detailed design of the CLARUS solution

Quality assurance plan (including the Project Handbook) (se abrirá en una nueva ventana)

This deliverable will include information about timescales, reporting information, and finance information.

New security techniques (se abrirá en una nueva ventana)

As a result of the work in Task 3.2, a report will be produced describing the original research contribution given by the new or improved privacy-preserving techniques that will be obtained from the study on the limitations of current state-of-the-art methods and techniques. In particular, the report will describe original research contribution to the problem of secure cloud storage in cloud computing.

Report on Validation Results (se abrirá en una nueva ventana)

The deliverable will focus on the evaluation and assessment of CLARUS

Requirements specification V1 (se abrirá en una nueva ventana)

It will include a set of CLARUS requirements (functional and nonfunctional, technical and social) with priorities and definition of possible limitations and constraints

Standardisation requirements (se abrirá en una nueva ventana)

This deliverable will report on the necessary requirement results and implementation roadmap, effort and analysis, considering the EU and global landscape.

An attack-tolerant framework for the cloud V2 (se abrirá en una nueva ventana)

This report will specify the framework provided by CLARUS to cope and preserve cloud services.

Definition of application cases (se abrirá en una nueva ventana)

Definition of the application cases that will inform all further development and will be tested and validated within WP6.

Final progress report, financial statement and review (se abrirá en una nueva ventana)

As in D1.3, for the second year.

Adapted monitoring tool for the cloud V1 (se abrirá en una nueva ventana)

This software package (including a user manual) will enable the supervision of client operations.

Legal and ethical requirements (se abrirá en una nueva ventana)

This deliverable will include the specification of concrete legal requirements for the CLARUS system and describe means for surveillance and guidance all along the project.

Architecture V1 (se abrirá en una nueva ventana)

This deliverable will provide the architecture design of the CLARUS system, including the functional components, data location, data flows and protocols.

The CLARUS interface (se abrirá en una nueva ventana)

This deliverable will document the platform interface specification and implementation.

Dissemination and standards report V2 (se abrirá en una nueva ventana)

An initial dissemination plan will be produced after 6 months, and revised versions that also cover standardisation efforts will be produced at 12-month intervals. Results of standards monitoring, analysis and dissemination activities will be included in this report.

Legal assessment and recommendations (se abrirá en una nueva ventana)

This deliverable will describe the active collaboration between the legal and technical partners for the implementation of the legal requirements that are identified in WP2 and documented in D2.1. It will carry out the legal assessment of the CLARUS system and result in a specific and tailor made recommendations for Europe and European service providers on how to get the privacy and data protection principles built in cloud computing systems and services, thereby realising in practice the ‘privacy-by-design’ model.

Requirements Specification V2 (se abrirá en una nueva ventana)

As a delta document with regard to V1, this document will refine requirements specifications for the final version of the CLARUS platform. In particular it will take into consideration intermediate results of the project achieved in WP5 and WP6.

Characterisation of enabling technologies (se abrirá en una nueva ventana)

As a result of Task 3.1, a characterisation of privacypreserving and security-enabling techniques will be provided in this report. The document will analyse available techniques and methods from different perspectives, by identifying their main advantages and limitations with regard to clouds. The document will be an input for research in Task 3.2.

The CLARUS platform V1 (se abrirá en una nueva ventana)

This document will specify the design of CLARUS platform as well as a user manual.

Adapted monitoring tool for the cloud V2 (se abrirá en una nueva ventana)

This software package (including a user manual) will enable the supervision of client operations.

The CLARUS modules V2 (se abrirá en una nueva ventana)

This document will specify the detailed design of the CLARUS solution

CLARUS benchmarking test suite (se abrirá en una nueva ventana)

This deliverable will describe the benchmarking test suite to be applied to the CLARUS platform

The CLARUS platform V2 (se abrirá en una nueva ventana)

This document will specify the design of CLARUS platform as well as a user manual.

Data management plan (se abrirá en una nueva ventana)

In this deliverable we will detail what data the project will generate, whether and how it will be exploited or made accessible for verification and re-use, and how it will be curated and preserved.

Publicaciones

Flexible and Robust Privacy-Preserving Implicit Authentication (se abrirá en una nueva ventana)

Autores: Josep Domingo-Ferrer, Qianhong Wu, Alberto Blanco-Justicia
Publicado en: ICT Systems Security and Privacy Protection, Edición 455, 2015, Página(s) 18-34, ISBN 978-3-319-18467-8
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-18467-8_2

Cryptographic Enforcement of Information Flow Policies Without Public Information (se abrirá en una nueva ventana)

Autores: Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones, Bertram Poettering
Publicado en: Applied Cryptography and Network Security, 2015, Página(s) 389-408, ISBN 978-3-319-28166-7
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-28166-7_19

Hybrid Publicly Verifiable Computation (se abrirá en una nueva ventana)

Autores: James Alderman, Christian Janson, Carlos Cid, Jason Crampton
Publicado en: Topics in Cryptology - CT-RSA 2016, 2016, Página(s) 147-163, ISBN 978-3-319-29485-8
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-29485-8_9

Extended Functionality in Verifiable Searchable Encryption (se abrirá en una nueva ventana)

Autores: James Alderman, Christian Janson, Keith M. Martin, Sarah Louise Renwick
Publicado en: Cryptography and Information Security in the Balkans, 2016, Página(s) 187-205, ISBN 978-3-319-29172-7
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-29172-7_12

Cryptographic Tools for Cloud Environments (se abrirá en una nueva ventana)

Autores: James Alderman, Jason Crampton, Keith M. Martin
Publicado en: Guide to Security Assurance for Cloud Computing, 2015, Página(s) 15-30, ISBN 978-3-319-25988-8
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-25988-8_2

Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile (se abrirá en una nueva ventana)

Autores: Malik Imran Daud, David Sánchez, Alexandre Viejo
Publicado en: Trust, Privacy and Security in Digital Business, Edición 9264, 2015, Página(s) 18-29, ISBN 978-3-319-22906-5
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-22906-5_2

Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies (se abrirá en una nueva ventana)

Autores: Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones
Publicado en: Data and Applications Security and Privacy XXIX, 2015, Página(s) 330-345, ISBN 978-3-319-20810-7
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-20810-7_23

Enforcing transparent access to private content in social networks by means of automatic sanitization (se abrirá en una nueva ventana)

Autores: Alexandre Viejo, David Sánchez
Publicado en: Expert Systems with Applications, Edición 62, 2016, Página(s) 148-160, ISSN 0957-4174
Editor: Pergamon Press Ltd.
DOI: 10.1016/j.eswa.2016.06.026

"Comment on ""Unique in the shopping mall: On the reidentifiability of credit card metadata""" (se abrirá en una nueva ventana)

Autores: D. Sanchez, S. Martinez, J. Domingo-Ferrer
Publicado en: Science, Edición 351/6279, 2016, Página(s) 1274-1274, ISSN 0036-8075
Editor: American Association for the Advancement of Science
DOI: 10.1126/science.aad9295

Privacy-driven access control in social networks by means of automatic semantic annotation (se abrirá en una nueva ventana)

Autores: Malik Imran-Daud, David Sánchez, Alexandre Viejo
Publicado en: Computer Communications, Edición 76, 2016, Página(s) 12-25, ISSN 0140-3664
Editor: Elsevier BV
DOI: 10.1016/j.comcom.2016.01.001

Toward sensitive document release with privacy guarantees (se abrirá en una nueva ventana)

Autores: David Sánchez, Montserrat Batet
Publicado en: Engineering Applications of Artificial Intelligence, Edición 59, 2017, Página(s) 23-34, ISSN 0952-1976
Editor: Pergamon Press Ltd.
DOI: 10.1016/j.engappai.2016.12.013

Privacy-preserving data outsourcing in the cloud via semantic data splitting (se abrirá en una nueva ventana)

Autores: David Sánchez, Montserrat Batet
Publicado en: Computer Communications, Edición 110, 2017, Página(s) 187-201, ISSN 0140-3664
Editor: Elsevier BV
DOI: 10.1016/j.comcom.2017.06.012

A Simple Method for Limiting Disclosure in Continuous Microdata Based on Principal Component Analysis (se abrirá en una nueva ventana)

Autores: Aida Calviño
Publicado en: Journal of Official Statistics, Edición 33/1, 2017, ISSN 2001-7367
Editor: De Gruyter Open
DOI: 10.1515/jos-2017-0002

Individual Differential Privacy: A Utility-Preserving Formulation of Differential Privacy Guarantees (se abrirá en una nueva ventana)

Autores: Jordi Soria-Comas, Josep Domingo-Ferrer, David Sanchez, David Megias
Publicado en: IEEE Transactions on Information Forensics and Security, Edición 12/6, 2017, Página(s) 1418-1429, ISSN 1556-6013
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TIFS.2017.2663337

Cloud Cryptography: Theory, Practice and Future Research Directions (se abrirá en una nueva ventana)

Autores: Kim-Kwang Raymond Choo, Josep Domingo-Ferrer, Lei Zhang
Publicado en: Future Generation Computer Systems, Edición 62, 2016, Página(s) 51-53, ISSN 0167-739X
Editor: Elsevier BV
DOI: 10.1016/j.future.2016.04.017

C-sanitized: A privacy model for document redaction and sanitization (se abrirá en una nueva ventana)

Autores: David Sánchez, Montserrat Batet
Publicado en: Journal of the Association for Information Science and Technology, Edición 67/1, 2016, Página(s) 148-163, ISSN 2330-1635
Editor: Wiley
DOI: 10.1002/asi.23363

t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation (se abrirá en una nueva ventana)

Autores: Jordi Soria-Comas, Josep Domingo-Ferrer, David Sanchez, Sergio Martinez
Publicado en: IEEE Transactions on Knowledge and Data Engineering, Edición 27/11, 2015, Página(s) 3098-3110, ISSN 1041-4347
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TKDE.2015.2435777

Utility-preserving differentially private data releases via individual ranking microaggregation (se abrirá en una nueva ventana)

Autores: David Sánchez, Josep Domingo-Ferrer, Sergio Martínez, Jordi Soria-Comas
Publicado en: Information Fusion, Edición 30, 2016, Página(s) 1-14, ISSN 1566-2535
Editor: Elsevier BV
DOI: 10.1016/j.inffus.2015.11.002

Generating Searchable Public-Key Ciphertexts With Hidden Structures for Fast Keyword Search (se abrirá en una nueva ventana)

Autores: Peng Xu, Qianhong Wu, Wei Wang, Willy Susilo, Josep Domingo-Ferrer, Hai Jin
Publicado en: IEEE Transactions on Information Forensics and Security, Edición 10/9, 2015, Página(s) 1993-2006, ISSN 1556-6013
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TIFS.2015.2442220

Flexible attribute-based encryption applicable to secure e-healthcare records (se abrirá en una nueva ventana)

Autores: Bo Qin, Hua Deng, Qianhong Wu, Josep Domingo-Ferrer, David Naccache, Yunya Zhou
Publicado en: International Journal of Information Security, Edición 14/6, 2015, Página(s) 499-511, ISSN 1615-5262
Editor: Springer Verlag
DOI: 10.1007/s10207-014-0272-7

t-closeness through microaggregation: Strict privacy with enhanced utility preservation (se abrirá en una nueva ventana)

Autores: Jordi Soria-Comas, Josep Domingo-Ferrer, David Sanchez, Sergio Martinez
Publicado en: 2016 IEEE 32nd International Conference on Data Engineering (ICDE), 2016, Página(s) 1464-1465, ISBN 978-1-5090-2020-1
Editor: IEEE
DOI: 10.1109/ICDE.2016.7498376

Ontology-based Access Control Management: Two Use Cases (se abrirá en una nueva ventana)

Autores: Malik Imran-Daud, David Sanchez, Alexandre Viejo
Publicado en: Proceedings of the 8th International Conference on Agents and Artificial Intelligence, 2016, Página(s) 244-249, ISBN 978-989-758-172-4
Editor: SCITEPRESS - Science and and Technology Publications
DOI: 10.5220/0005777902440249

Private Outsourced Kriging Interpolation (se abrirá en una nueva ventana)

Autores: James Alderman, Benjamin R. Curtis, Oriol Farràs, Keith M. Martin, Jordi Ribes-González
Publicado en: Lecture Notes in Computer Science, Edición 10323, 2017, Página(s) 75-90, ISSN 0302-9743
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-70278-0_5

Framework for Searchable Encryption with SQL Databases

Autores: M. Azraoui, M. Önen, R. Molva
Publicado en: CLOSER 2018 - 8th International Conference on Cloud Computing and Services Science, 2018
Editor: Springer

Factor Analysis for Anonymization (se abrirá en una nueva ventana)

Autores: Aida Calvino, Palmira Aldeguer, Josep Domingo-Ferrer
Publicado en: 2017 IEEE International Conference on Data Mining Workshops (ICDMW), 2017, Página(s) 984-991, ISBN 978-1-5386-3800-2
Editor: IEEE
DOI: 10.1109/ICDMW.2017.139

Steered Microaggregation: A Unified Primitive for Anonymization of Data Sets and Data Streams (se abrirá en una nueva ventana)

Autores: Josep Domingo-Ferrer, Jordi Soria-Comas
Publicado en: 2017 IEEE International Conference on Data Mining Workshops (ICDMW), 2017, Página(s) 995-1002, ISBN 978-1-5386-3800-2
Editor: IEEE
DOI: 10.1109/ICDMW.2017.141

Model-Based Attack Tolerance (se abrirá en una nueva ventana)

Autores: Georges Ouffoue, Fatiha Zaidi, Ana R. Cavalli, Mounir Lallali
Publicado en: 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2017, Página(s) 68-73, ISBN 978-1-5090-6231-7
Editor: IEEE
DOI: 10.1109/WAINA.2017.88

An Attack-Tolerant Framework for Web Services (se abrirá en una nueva ventana)

Autores: Georges L.A. Ouffoue, Fatiha Zaidi, Ana R. Cavalli, Mounir Lallali
Publicado en: 2017 IEEE International Conference on Services Computing (SCC), 2017, Página(s) 503-506, ISBN 978-1-5386-2005-2
Editor: IEEE
DOI: 10.1109/SCC.2017.75

Multi-level Access in Searchable Symmetric Encryption (se abrirá en una nueva ventana)

Autores: James Alderman, Keith M. Martin, Sarah Louise Renwick
Publicado en: Financial Cryptography Workshops, 2017, Página(s) 35-52
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-70278-0_3

A Non-Parametric Model for Accurate and Provably Private Synthetic Data Sets (se abrirá en una nueva ventana)

Autores: Jordi Soria-Comas, Josep Domingo-Ferrer
Publicado en: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, 2017, Página(s) 1-10, ISBN 9781-450352574
Editor: ACM Press
DOI: 10.1145/3098954.3098962

Empirical Comparison of Anonymization Methods Regarding Their Risk-Utility Trade-Off

Autores: J. Domingo-Ferrer, S. Ricci and J. Soria-Comas
Publicado en: Work Session on Statistical Data Confidentiality, 2017
Editor: -

A Framework for the Cryptographic Enforcement of Information Flow Policies (se abrirá en una nueva ventana)

Autores: James Alderman, Jason Crampton, Naomi Farley
Publicado en: Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies - SACMAT '17 Abstracts, 2017, Página(s) 143-154, ISBN 9781-450347020
Editor: ACM Press
DOI: 10.1145/3078861.3078868

How Web Services Can Be Tolerant to Intruders through Diversification (se abrirá en una nueva ventana)

Autores: Georges Ouffoue, Fatiha Zaidi, Ana R. Cavalli, Mounir Lallali
Publicado en: 2017 IEEE International Conference on Web Services (ICWS), 2017, Página(s) 436-443, ISBN 978-1-5386-0752-7
Editor: IEEE
DOI: 10.1109/ICWS.2017.50

Privacy-Preserving Cloud-Based Statistical Analyses on Sensitive Categorical Data (se abrirá en una nueva ventana)

Autores: Sara Ricci, Josep Domingo-Ferrer, David Sánchez
Publicado en: MDAI 2016: Modeling Decisions for Artificial Intelligence, 2016, Página(s) 227-238, ISBN 978-3-319-45655-3
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-45656-0_19

Rank-Based Record Linkage for Re-Identification Risk Assessment (se abrirá en una nueva ventana)

Autores: Krishnamurty Muralidhar, Josep Domingo-Ferrer
Publicado en: PSD 2016: Privacy in Statistical Databases, 2016, Página(s) 225-236
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-45381-1_17

Intrusion Detection and Attack Tolerance for Cloud Environments: The CLARUS Approach (se abrirá en una nueva ventana)

Autores: Georges Ouffoue, Antonio M. Ortiz, Ana R. Cavalli, Wissam Mallouli, Josep Domingo-Ferrer, David Sanchez, Fatiha Zaidi
Publicado en: 2016 IEEE 36th International Conference on Distributed Computing Systems Workshops (ICDCSW), 2016, Página(s) 61-66, ISBN 978-1-5090-3686-8
Editor: IEEE
DOI: 10.1109/ICDCSW.2016.27

Perturbative Data Protection of Multivariate Nominal Datasets (se abrirá en una nueva ventana)

Autores: Mercedes Rodriguez-Garcia, David Sánchez, Montserrat Batet
Publicado en: PSD 2016: Privacy in Statistical Databases, 2016, Página(s) 94-106
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-45381-1_8

Searchable encryption for geo-referenced data (se abrirá en una nueva ventana)

Autores: Oriol Farras, Jordi Ribes-Gonzalez
Publicado en: 2016 Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), 2016, Página(s) 1-8, ISBN 978-1-5090-1983-0
Editor: IEEE
DOI: 10.1109/MedHocNet.2016.7528430

Publicly verifiable conjunctive keyword search in outsourced databases (se abrirá en una nueva ventana)

Autores: Monir Azraoui, Kaoutar Elkhiyaoui, Melek Onen, Refik Molva
Publicado en: 2015 IEEE Conference on Communications and Network Security (CNS), 2015, Página(s) 619-627, ISBN 978-1-4673-7876-5
Editor: IEEE
DOI: 10.1109/CNS.2015.7346876

Disclosure risk assessment via record linkage by a maximum-knowledge attacker (se abrirá en una nueva ventana)

Autores: Josep Domingo-Ferrer, Sara Ricci, Jordi Soria-Comas
Publicado en: 2015 13th Annual Conference on Privacy, Security and Trust (PST), 2015, Página(s) 28-35, ISBN 978-1-4673-7828-4
Editor: IEEE
DOI: 10.1109/PST.2015.7232951

Semantic Noise: Privacy-Protection of Nominal Microdata through Uncorrelated Noise Addition (se abrirá en una nueva ventana)

Autores: Mercedes Rodriguez-Garcia, Montserrat Batet, David Sanchez
Publicado en: 2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI), 2015, Página(s) 1106-1113, ISBN 978-1-5090-0163-7
Editor: IEEE
DOI: 10.1109/ICTAI.2015.157

Privacy-preserving distributed statistical computation to a semi-honest multi-cloud (se abrirá en una nueva ventana)

Autores: Aida Calvino, Sara Ricci, Josep Domingo-Ferrer
Publicado en: 2015 IEEE Conference on Communications and Network Security (CNS), 2015, Página(s) 506-514, ISBN 978-1-4673-7876-5
Editor: IEEE
DOI: 10.1109/CNS.2015.7346863

Access Control in Publicly Verifiable Outsourced Computation (se abrirá en una nueva ventana)

Autores: James Alderman, Christian Janson, Carlos Cid, Jason Crampton
Publicado en: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '15, 2015, Página(s) 657-662, ISBN 9781-450332453
Editor: ACM Press
DOI: 10.1145/2714576.2714636

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0