Leistungen
A continuous validation process will be conducted thought the whole development process, providing the correction paths where needed. Results and analysis will be reported in this deliverable. Inputs will come from WP3, which sets the basis for the assessment methodology, and from WP4 and WP5. This is the final version of D2.3, and will collect both the refined procedures and the results and analysis of the validation cycle. Contributors: UVIGO (Editor), FCSR, IBM
After each SAB workshop, Atos will write a report with all conclusions, including observations on project results, recommendations for research and on actions for impact creation, among others. Contributors: ATOS (Editor), All partners
This deliverable will describe the relevant standards, the on-going standardisation efforts, and their priority with respect to the project. Contributors: KU Leuven (Editor), UVIGO, IBM
As the tangible result of subtask 3.1.1, the first revision of this deliverable will present the formal definition of the technological security, privacy and verifiability requirements, taking into account the connection with user-centric requirements and European privacy and data protection legislation. It will also gather the identified limitations of technologies for verifiability and security and privacy protection of outsourced process, and initial approaches for tackling them. This revision at M12 will collect the first results of subtask 3.2.2, namely the description of the holistic privacy framework, the definition of privacy metrics and privacy preferences, and the assessment methodology used to evaluate the end-to-end privacy and security of the solutions developed in WITDOM, reformalizing the gathered requirements to assess that the developed metrics are sufficiently representative and perfectly aligned to the requirements. Contributors: UVIGO (Editor), Atos, KU Leuven, IBM, XLAB, FCSR
The final validation activities reported in D2.6 will be based on the validation framework defined within this deliverable. The validation framework will collect the relevant metrics, successful criteria, validation activities and protocols and tools used for validation to assess the requirements defined in D2.1, D2.2, D6.1 and D6.2 and formalized in D3.2. The aim of this deliverable is to align all the partners and prepare the ground for the implementation of the final validation activities focused of the developed platform and prototypes. Contributors: FCSR (Editor), UVIGO
The final major data-management components, functional specification, architectural layers, information flows and implementation guidelines will be described and integrated into a coherent view of the system architecture. Contributors: IBM (Editor), UVIGO, ATOS, XLAB, KU Leuven
The final version of this deliverable will contain the research outcomes from Tasks 3.2 to 3.5 (WD3.3, WD 3.4, WD 3.5), including also the detailed description of the developed and adapted techniques, their applicability and a detailed quantitative evaluation in terms of efficiency and achieved security/privacy protection, both at the primitive level and end-to-end when integrated in a whole system within WITDOM evaluation framework. Contributors: UVIGO (Editor), KU Leuven, IBM
This deliverable will contain a legal assessment of the general privacy enabling tools and technologies, as well as the specific e-Health and Financial Services scenarios that have been developed in the WITDOM project and will furthermore include draft recommendations on privacy enabling tools and technologies to ensure legally compliant systems. Contributor: KU Leuven (Editor), UVIGO, FCSR
This deliverable will analyse the soon to be expected revised data protection package and the cybersecurity package on its implications for privacy enhancing technologies in untrusted environments, focusing specifically on the application of privacy and data protection principles, as well as ethical aspects. Editor & Contributor: KU Leuven
By using the validation framework and protocols defined in D2.4 the validation activities will be performed. This deliverable will provide a final result of quantitative and qualitative validation against the project prototypes. All partners that have contributed during the development will be called to assess the requirements of the respective component of the platform and use cases. Contributors: FCSR (Editor), All Partners
While D2.1 is focused on privacy and stakeholder requirements analysis and definition, D2.2 has its focus on the functional analysis and use case identification. Within this deliverable the main business logic and rules will be defined and described. Contributors: FCSR (Editor), BBVA, ATOS, IBM
It will present the first version of the consortium/project-wide as well as partner specific exploitation plans for the WITDOM project, including the impact creation plan. It will include initial market analysis. Contributors: ATOS (Editor), All partners
This deliverable will be the final report of the completed communication activities from M25 to M36. Contributors: ATOS (Editor), All partners
The final characteristics, elements, and interfaces of the extension to Cloud computing developed in T4.4 (i.e. WD4.2) will be collected in this deliverable, together with the implementation guidelines corresponding to the Cloud scenario produced by T4.4. Contributors: IBM (Editor), UVIGO, ATOS, XLAB, FCSR
At the beginning of WITDOM project an extensive analysis of requirements will be conducted. Requirements will be with high level of abstraction, with no bias towards technology and they will focus mainly on privacy and security issues highlighted by the stakeholder analysis. Requirements will span from general requirements for the whole platform as well as specific requirements for the two use case. This deliverable, in conjunction with D2.2, D6.1 and D6.2 will be the basis to design and develop the whole project. Contributors: FCSR (Editor), BBVA, ATOS, UVIGO, KU Leuven, IBM
After each SAB workshop, Atos will write a report with all conclusions, including observations on project results, recommendations for research and on actions for impact creation, among others. Contributors: ATOS (Editor), All partners
D7.2 will outline the plan for dissemination activities for the various channels described in Task 7.1 and will identify potential avenues for dissemination. It will also contain the first version of the dissemination materials (flyers, leaflet, poster, presentation templates). Contributors: ATOS (Editor), All partners
After each SAB workshop, Atos will write a report with all conclusions, including observations on project results, recommendations for research and on actions for impact creation, among others. Contributors: ATOS (Editor), All partners
It will update D7.10 based on the finalised developments and validation of the WITDOM project, and will include a report on exploitation activities performed. It will include a definition of business models suitable for market adoption of project results for enhanced privacy and security in Cloud environments. Contributors: ATOS (Editor), All partners
This report will periodically update the dissemination plan, report on the dissemination and awareness creation activities of the past period and will provide updated versions of the dissemination material. Contributors: ATOS (Editor), All partners
This deliverable will specify ethical and legal privacy and security requirements that need to be taken into account for the development of the eHealth and Financial Services scenarios. Contributor: KU Leuven (Editor), FCSR
This deliverable will comprise the final scenario-specific architectural description for both use-cases, adequately redefining the initial architecture (WD4.1, D4.1) and the relationships between its elements in order to meet the objectives of this WP. Contributors: UVIGO (Editor), IBM, FCSR, BBVA, ATOS, XLAB, KU Leuven
This report updates and constitutes the final version of the dissemination plan, report on the dissemination and awareness creation activities of the past period and will provide updated versions of the dissemination material. Contributors: ATOS (Editor), All partners
This report will periodically report the completed communication activities from M13 to M24 and the planned activities for next year (M25 to M36). Contributors: ATOS (Editor), All partners
This report updates and constitutes the final version of the dissemination plan, report on the dissemination and awareness creation activities of the past period and will provide updated versions of the dissemination material. Contributors: ATOS (Editor), All partners
This revision of the deliverable will build upon D3.1, will collecting the final results of subtask 3.2.2, namely the description of the holistic privacy framework, the definition of privacy metrics and privacy preferences, and the assessment methodology used to evaluate the end-to-end privacy and security of the solutions developed in WITDOM, reformalizing the gathered requirements to assess that the developed metrics are sufficiently representative and perfectly aligned to the requirements. A preliminary theoretical evaluation of the existing and to-be-developed privacy-enhancing techniques and secure cryptographic signal processing approaches will also be given (WD3.1). This deliverable will also account for the evolving research outcomes in WP3 and from the actual evaluation and assessment in WP2 to refine and improve the framework from D3.1. Contributors: UVIGO (Editor), Atos, KU Leuven, IBM, XLAB, FCSR
This deliverable will offer a consolidated view of standardisation-related achievements in relation to the project and its outcomes. Contributors: KU Leuven (Editor), UVIGO, IBM
This report will periodically report the completed communication activities from M1 to M12 and the planned activities for next year (M13 to M24). Contributors: ATOS (Editor), All partners
The internal portal will be created initially to form a repository of documentary and other information that is relevant to the execution of the project, and that can also be used to provide an initial intra-project communication system. In the private area, a project management tool will be made available to facilitate the communication of the partners providing a common workspace. As the project evolves, the information structure and the IT-infrastructure will be adapted according to current needs and requirements. The usual collaboration tools and procedures will be installed and made available to the project partners. It will also be extended with an external portal that will make available information about WITDOM available to the public; that work will be performed in WP7 (see Task 7.1 D7.1, Task 7.2 and D7.3). Editor & Contributor: ATOS
The internal portal will be created initially to form a repository of documentary and other information that is relevant to the execution of the project, and that can also be used to provide an initial intra-project communication system. In the private area, a project management tool will be made available to facilitate the communication of the partners providing a common workspace. In a second phase ending in month 3, a communication infrastructure consisting in a richer internal Internet portal and set of mailing lists will be provided. As the project evolves, the information structure and the IT-infrastructure will be adapted according to current needs and requirements. The usual collaboration tools and procedures will be installed and made available to the project partners. It will also be extended with an external portal that will make available information about WITDOM available to the public; that work will be performed in WP7 (see Task 7.1 D7.1, Task 7.2 and D7.3-D7.4). Editor & Contributor: ATOS
A public website will be established. In the internal project’s area, a management tool will be made available to facilitate partners’ communication providing a common workspace. A specific restricted area will be designed for SAB members. The relationship with focus groups will be facilitated (e.g. by management of mailing lists and electronic newsletters). Contributors: ATOS (Editor), All partners
This deliverable comprises the final prototype of the trustworthy privacy-preserving platform toolkit and the necessary reports, detailing the platform from the documentation point of view. This final version will refine the initial revision provided in D5.1, accounting for the successive scientific/technical validations performed in T2.3 and T2.4. Contributors: XLAB (Editor), Atos, UVIGO
Veröffentlichungen
Autoren: Juan Ramon Troncoso-Pastoriza, Alberto Pedrouzo-Ulloa, Fernando Perez-Gonzalez
Veröffentlicht in: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017, Page(s) 2067-2071, ISBN 978-1-5090-4117-6
Herausgeber: IEEE
DOI: 10.1109/ICASSP.2017.7952520
Autoren: Alberto Pedrouzo-Ulloa, Juan Ramon Troncoso-Pastoriza, Fernando Perez-Gonzalez
Veröffentlicht in: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015, Page(s) 1707-1711, ISBN 978-1-4673-6997-8
Herausgeber: IEEE
DOI: 10.1109/ICASSP.2015.7178262
Autoren: Nicolás Notario, Eleonora Ciceri, Alberto Crespo, Eduardo González Real, Ilio Catallo, Sauro Vicini
Veröffentlicht in: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, 2017, Page(s) 1-7, ISBN 9781-450352574
Herausgeber: ACM Press
DOI: 10.1145/3098954.3104057
Autoren: Marcus Brandenburger, Christian Cachin, Matthias Lorenz, Rudiger Kapitza
Veröffentlicht in: 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017, Page(s) 157-168, ISBN 978-1-5386-0542-4
Herausgeber: IEEE
DOI: 10.1109/dsn.2017.45
Autoren: Griet Verhenneman
Veröffentlicht in: 2017
Herausgeber: European Conference on Health Law edition:6 location:Bergen, Norway date:27-29 September 2017
Autoren: Abdelrahaman Aly, Aysajan Abidin, and Svetla Nikova
Veröffentlicht in: 2018
Herausgeber: Financial Cryptography and Data Security - 22nd International Conference, FC 2018
Autoren: Sauro Vicini, Francesco Alberti, Nicolas Notario, Alberto Crespo, Juan Ramon Troncoso Pastoriza, Alberto Sanna
Veröffentlicht in: 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Page(s) 768-775, ISBN 978-1-5090-0990-9
Herausgeber: IEEE
DOI: 10.1109/ARES.2016.74
Autoren: Alberto Pedrouzo-Ulloa, Juan Ramon Troncoso-Pastoriza, Fernando Perez-Gonzalez
Veröffentlicht in: 2016 IEEE International Workshop on Information Forensics and Security (WIFS), 2016, Page(s) 1-6, ISBN 978-1-5090-1138-4
Herausgeber: IEEE
DOI: 10.1109/WIFS.2016.7823916
Autoren: F. Alberti, S. Vicini
Veröffentlicht in: ENoLL Research Day Conference Proceedings 2015, 2015, ISBN 9789-082102741
Herausgeber: ENoLL - European Network of Living Labs
Autoren: Marcus Brandenburger, Christian Cachin, Nikola Knežević
Veröffentlicht in: Proceedings of the 8th ACM International Systems and Storage Conference on - SYSTOR '15, 2015, Page(s) 1-11, ISBN 9781-450336079
Herausgeber: ACM Press
DOI: 10.1145/2757667.2757681
Autoren: Seda Gurses, Claudia Diaz and Carmela Troncoso
Veröffentlicht in: Proceedings of the Amsterdam Privacy Conference 2015 (APC 2015), 2015
Herausgeber: Amsterdam Platform for Privacy Research (APPR)
Autoren: Mina Namazi, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González
Veröffentlicht in: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security - IH&MMSec '16, 2016, Page(s) 45-50, ISBN 9781-450342902
Herausgeber: ACM Press
DOI: 10.1145/2909827.2930791
Autoren: G. Verhenneman, F. Coudert
Veröffentlicht in: Proceedings of the Amsterdam Privacy Conference 2015 (APC 2015), 2015
Herausgeber: Amsterdam Platform for Privacy Research (APPR)
Autoren: A. Pedrouzo-Ulloa, J.R. Troncoso-Pastoriza, Fernando Pérez-González
Veröffentlicht in: 2017
Herausgeber: Arxiv e-prints, (arXiv:1607.05244v2)
Autoren: Ilio Catallo, Eleonora Ciceri, Stefania Stenirri, Stefania Merella, Alberto Sanna, Maurizio Ferrari, Paola Carrera, Sauro Vicini.
Veröffentlicht in: 2017
Herausgeber: Proceedings of CIBB
Autoren: Christian Cachin, Jan Camenisch, Eduarda Freire-Stögbuchner, Anja Lehmann
Veröffentlicht in: 2017, Page(s) 59-75
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-319-70972-7_4
Autoren: Sauro Vicini, Adriano Gariglio, Francesco Alberti, Elettra Oleari, Alberto Sanna
Veröffentlicht in: Design, User Experience, and Usability: Design Thinking and Methods, 2016, Page(s) 365-376, ISBN 978-3-319-40409-7
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-319-40409-7_35
Autoren: Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
Veröffentlicht in: Cryptographic Hardware and Embedded Systems -- CHES 2015, 2015, Page(s) 683-702, ISBN 978-3-662-48324-4
Herausgeber: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-48324-4_34
Autoren: Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil Dimitrov, Ingrid Verbauwhede
Veröffentlicht in: Cryptographic Hardware and Embedded Systems -- CHES 2015, 2015, Page(s) 164-184, ISBN 978-3-662-48324-4
Herausgeber: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-48324-4_9
Autoren: Alberto Pedrouzo-Ulloa, Juan Ramon Troncoso-Pastoriza, Fernando Perez-Gonzalez
Veröffentlicht in: IEEE Transactions on Information Forensics and Security, 12/5, 2017, Page(s) 1125-1140, ISSN 1556-6013
Herausgeber: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TIFS.2016.2647223
Autoren: Ero Balsa, Cristina Pérez-Solà, Claudia Diaz
Veröffentlicht in: ACM Transactions on Internet Technology, 17/3, 2017, Page(s) 1-21, ISSN 1533-5399
Herausgeber: Association for Computing Machinary, Inc.
DOI: 10.1145/3093897
Autoren: Sujoy Sinha Roy, Frederik Vercauteren, Jo Vliegen, Ingrid Verbauwhede
Veröffentlicht in: IEEE Transactions on Computers, 66/9, 2017, Page(s) 1562-1572, ISSN 0018-9340
Herausgeber: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TC.2017.2686385
Autoren: Simon Oya, Fernando Perez-Gonzalez, Carmela Troncoso
Veröffentlicht in: IEEE/ACM Transactions on Networking, 2016, Page(s) 1-14, ISSN 1063-6692
Herausgeber: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TNET.2016.2547391
Autoren: Griet Verhenneman, Fanny Coudert
Veröffentlicht in: Data Protection Law & Policy, vol:12 issue:3, 2015, Page(s) 8-10, ISSN 1743-6605
Herausgeber: Cecile Park Publishing
Autoren: Juan Ramón Troncoso-Pastoriza, Elsa Prieto Pérez
Veröffentlicht in: ERCIM News. Tackling Big Data in the Life Sciences., 104, 2015, ISSN 0926-4981
Herausgeber: ERCIM EEIG