Objective
ReCRED’s ultimate goal is to promote the user’s personal mobile device to the role of a unified authentication and authorization proxy towards the digital world. ReCRED adopts an incrementally deployable strategy in two complementary directions: extensibility in the type and nature of supported stakeholders and services (from local access control to online service access), as well as flexibility and extensibility in the set of supported authentication and access control techniques; from widely established and traditional ones to emerging authentication and authorization protocols as well as cryptographically advanced attribute-based access control approaches. Simplicity, usability, and users privacy is accomplished by: i) hiding inside the device all the complexity involved in the aggregation and management of multiple digital identifiers and access control attribute credentials, as well as the relevant interaction with the network infrastructure and with identity consolidation services; ii) integrating in the device support for widespread identity management standards and their necessary extensions; and iii) controlling the exposure of user credentials to third party service providers. ReCRED addresses key security and privacy issues such as resilience to device loss, theft and impersonation, via a combination of: i) local user-to-device and remote device-to-service secure authentication mechanisms; ii) multi-factor authentication mechanisms based on behavioral and physiological user signatures not bound to the device; iii) usable identity management and privacy awareness tools; iv) usable tools that offer the ability for complex reasoning of authorization policies through advanced learning techniques. ReCRED’s viability will be assessed via four large-scale realistic pilots in real-world operational environments. The pilots will demonstrate the integration of the developed components and their suitability for end-users, so as to show their TRL7 readiness.
Fields of science
- natural sciencescomputer and information sciencescomputer securityaccess control
- natural sciencescomputer and information sciencesinternet
- natural sciencescomputer and information sciencescomputer securitydata protection
- social scienceseconomics and businessbusiness and managementcommerceeCommerce
- natural sciencesbiological sciencesecologyecosystems
Programme(s)
Topic(s)
Funding Scheme
IA - Innovation actionCoordinator
185 33 Piraeus
Greece
See on map
Participants (12)
28050 Madrid
See on map
1096 AM Amsterdam
See on map
041303 Bucuresti
See on map
141 22 N Irakleio
See on map
The organization defined itself as SME (small and medium-sized enterprise) at the time the Grant Agreement was signed.
E14 3BS London
See on map
1040 Bruxelles
See on map
The organization defined itself as SME (small and medium-sized enterprise) at the time the Grant Agreement was signed.
2481AW Woubrugge
See on map
The organization defined itself as SME (small and medium-sized enterprise) at the time the Grant Agreement was signed.
3036 Lemesos
See on map
28903 Getafe (Madrid)
See on map
Legal entity other than a subcontractor which is affiliated or legally linked to a participant. The entity carries out work under the conditions laid down in the Grant Agreement, supplies goods or provides services for the action, but did not sign the Grant Agreement. A third party abides by the rules applicable to its related participant under the Grant Agreement with regard to eligibility of costs and control of expenditure.
28918 Leganes (Madrid)
See on map
43124 Parma
See on map
20121 Milano
See on map