Deliverables
The central identity wallet service used in all different use case specific pilot sites is deployed and accessible for service provider side integration
e-Business evaluation and testing report
e-Government evaluation and testing report
e-Health evaluation and testing report
Based on the pilot definition in T6.1 and the elaborate vulnerability catalogue and this report contains an updated version of the security analysis from D2.2.
Detailed documentation of enhancements and improvements w.r.t. identity protocols
Assess. to which extent current IdM systems and solutions can be enhanced with proxy cryptography schemes
Detailed documentation of enhancements and improvements w.r.t. authentication mechanisms
Detailed documentation of basis cryptographic technology enhancements
Summary of project standardization activities during the reporting period
Demonstration of first version of user interface prototypes
Analysis of threats, evaluation of risks and def. of security measurements through established methods (STrIDE&DREAD)
first version contains project-wide exploitation plans including impact creation plan with specific exploitation measures; the second version will report the exploitation activities performed and the business models suitable for market adoption of Secure Cloud Identity Wallet
Detailed functional design of the architecture as basis for the technical design and implementation
Requirements for centric privacy design aspects
Report providing detailed analysis of privacy risks and recommendations to mitigate the identified risks
Detailed assessment of identity management technologies and standards identifying gaps w.r.t. to the support of encrypted identity data
Detailed report on assessment of security technologies regarding CREDENTIAL requirements w.r.t. to encryption, identity protocols and authentication mechanisms
Summary of lessons learned from piloting and recommendations for adoption of CREDENTIAL technology and the application of developed components
Summary and lessons learned from operating the CREDENTIAL identity wallet service
Documentation of all collected requirements and offering of knowledge base for requirements engineering
HowTo’s and best-practice guidelines for IdM software producers and standard organizations facilitating the easy take-up of proxy cryptography
Report on the assessment of vulnerabilities present in federated IAM systems in general and the CREDENTIAL system in particular
Demonstration of the final user interface prototypes and report about HCI patterns for Cloud Identity Wallets
Detailed specification of use cases with consideration of pilot site backend infrastructure and client side integration
Detailed description of applicable scenarios and formalized use cases.
This kit will be provided as supplement to the final report containing suitable material with copyright clearance, which the EC may use for its own dissemination of project results
Technical platform for online presentation of home page and project intern collaboration platform.
Public web presence with different section targeting different user groups and communities set up based on the technology platform prepared in WP1
Searching for OpenAIRE data...
Publications
Author(s): Michael Till Beck, Stephan Krenn, Franz-Stefan Preiss, Kai Samelin
Published in: Trust and Trustworthy Computing, 2016, Page(s) 21-39, ISBN 978-3-319-45572-3
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-45572-3_2
Author(s): Fatbardh Veseli, Jetzabel Serna
Published in: Trust Management X, 2016, Page(s) 63-78, ISBN 978-3-319-41354-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-41354-9_5
Author(s): David Derler, Stephan Krenn, Daniel Slamanig
Published in: Cryptology and Network Security, 2016, Page(s) 211-227, ISBN 978-3-319-48965-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-48965-0_13
Author(s): Felix Horandner, Stephan Krenn, Andrea Migliavacca, Florian Thiemer, Bernd Zwattendorfer
Published in: 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Page(s) 742-749, ISBN 978-1-5090-0990-9
Publisher: IEEE
DOI: 10.1109/ARES.2016.79
Author(s): Farzaneh Karegar, Nina Gerber, Melanie Volkamer, and Simone Fischer-Hübner
Published in: ACM/SIGAPP Symposium On Applied Computing, 2018
Publisher: ACM
Author(s): David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, and Christoph Striecks
Published in: PKC, 2018
Publisher: Springer
Author(s): David Derler, Tibor Jager, Daniel Slamanig, and Christoph Striecks
Published in: EUROCRYPT, 2018
Publisher: Springer
Author(s): Pasquale Chiaro, Simone Fischer-Hübner, Thomas Groß, Stephan Krenn, Thomas Lorünser, Ana Isabel Martı́nez Garcı́a, Andrea Migliavacca, Kai Rannenberg, Daniel Slamanig, Christoph Striecks, and Alberto Zanini
Published in: IFIP Privacy and Identity Management, 2017
Publisher: Springer
Author(s): Fatbardh Veseli, Jetzabel Serna Olvera, and Kai Rannenberg
Published in: ACM/SIGAPP Symposium On Applied Computing, 2019
Publisher: ACM
Author(s): Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Published in: CANS 2018, 2018, Page(s) 256-276, ISBN 978-3-030-00433-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-00434-7_13
Author(s): Aleksandar Hudic, Matthias Flittner, Thomas Lorunser, Philipp M. Radl, Roland Bless
Published in: 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Page(s) 428-436, ISBN 978-1-5090-0990-9
Publisher: IEEE
DOI: 10.1109/ARES.2016.73
Author(s): Farzaneh Karegar, Christoph Striecks, Stephan Krenn, Felix Hörandner, Thomas Lorünser, and Simone Fischer-Hübner
Published in: IFIP Privacy and Identity Management, 2016
Publisher: Springer
Author(s): Oksana Kulyk, Benjamin Maximilian Reinheimer, and Melanie Volkamer
Published in: HCI International, 2017
Publisher: Springer
Author(s): David Derler, Sebastian Ramacher, and Daniel Slamanig
Published in: Financial Cryptography and Data Security, 2017
Publisher: Springer Verlag
Author(s): Marco Ghiglieri, Melanie Volkamer, and Karen Renaud
Published in: HCI International, 2017
Publisher: Springer
Author(s): Alexandros Kostopoulos, Evangelos Sfakianakis, Ioannis Chochliouros, John Sören Pettersson, Stephan Krenn, Welderufael Tesfay, Andrea Migliavacca, Felix Hörandner
Published in: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, 2017, Page(s) 1-7, ISBN 9781-450352574
Publisher: ACM Press
DOI: 10.1145/3098954.3104061
Author(s): Pritam Dash, Christoph Rabensteiner, Felix Hörandner, Simon Roth
Published in: Open Identity Summit 2017, 2017
Publisher: GI
Author(s): Farzaneh Karegar, Daniel Lindegren, John Sören Pettersson, Simone Fischer-Hübner
Published in: 26th International Conference on Information Systems Development, 2017
Publisher: Association for Information Systems
Author(s): Stephan Krenn, Thomas Lorünser, Anja Salzer, Christoph Striecks
Published in: CANS 2017, 2017
Publisher: Springer
Author(s): Nicolás Notario, Stephan Krenn, Bernd Zwattendorfer, Felix Hörandner
Published in: ERCIM News, No. 106 July 2016, 2016, Page(s) 11-12, ISSN 0926-4981
Publisher: ERCIM EEIG
Author(s): Bernd Zwattendorfer, Daniel Slamanig
Published in: Journal of Information Security and Applications, 27-28, 2016, Page(s) 35-53, ISSN 2214-2126
Publisher: Elsevier
DOI: 10.1016/j.jisa.2015.11.004
Author(s): Thomas Lorünser, Stephan Krenn, Christoph Striecks, Thomas Länger
Published in: e & i Elektrotechnik und Informationstechnik, 2017, ISSN 0932-383X
Publisher: Springer Verlag
DOI: 10.1007/s00502-017-0519-x
Author(s): Gallego-Nicasio Crespo, Beatriz; PRIETO, Elsa; RIOS, Erkuden; Rak, Massimiliano; Deussen, Peter; Samarati, Pierangela; Cascella, Roberto; Braun, Simons; Krenn, Stephan; Lörunser, Thomas
Published in: 2016
Publisher: DPSP Cluster
DOI: 10.13140/RG.2.2.22406.37444
Author(s): Aljosa Pasic, Beatriz Gallego, Bernd Zwattendorfer, Bojan Suzic, Elsa Prieto, Erkuden Rios, Josep Domingo-Ferrer, Julia Vuong, Massimiliano Rak, Nicholas Ferguson, Nuria Rodríguez, Peter H. Deussen, Pierangela Samarati, Roberto Cascella, Sabrina de Capitani, Simone Braun, Stephan Krenn, Stephanie Parker, Thomas Länger, Thomas Lorünser, Zhiming Zhao
Published in: 2016
Publisher: DPSP Cluster
Author(s): Bernd Zwattendorfer, Stephan Krenn, Thomas Lorünser
Published in: ERCIM News, No. 104 January 2016, 2016, Page(s) 44-45, ISSN 0926-4981
Publisher: ERCIM EEIG