Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

NEXTLEAP

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Principles for Decentralized Protocol Design (opens in new window)

An abstract framework and easy-to-use cookbook for principles of decentralized and rights-preserving protocol design that finalizes the solutions found to the hard problems of Internet Science for decentralized systems given in D2.1.

Yearly Technical and Dissemination Assessment 1 (opens in new window)

First yearly update on technical progress and dissemination, focus on the secure address book use-case. Technical progress and dissemination reports will be delivered yearly and the dissemination plan will be updated if necessary. It will include all presentations, papers, videos, and all other outreach material to be archived - as well as links to any running code, demos, and in-depth technical analysis of the primary challenges and next steps. This will include the advise of the advisory board and an updated communications strategy that takes into account whether the previous technical and dissemination objectives were met or not, and how they can be achieved in the next period. Dissemination and technical progress in each of the appointed sectors will be tracked against objectives and goals.

Draft Decentralized Case-studies (opens in new window)

This subset of the list of case-studies will be finalized, and initial analysis completed over the communities to feed into the fundamental science of protocol design in WP2.

Privacy-Enhanced Analytics for Wisdom of the Crowds Simulation (opens in new window)

Simulation-based evaluation of the scalability of privacy-enhanced crowd-sourcing analytics built on a private information retrieval framework. Depends on D2.4

Publication-ready Philosophy of the Internet (opens in new window)

Due to discussion with NEXTLEAP and a to-be-chosen publisher (one that should enable 'green' access), the book on the Philosophy of the Internet should by the end of the project be publication-ready.

– Draft of Philosophy of the Internet and web hermeneutics book (opens in new window)

This will list chapters and general philosophical theses, to be discussed among the NEXTLEAP project partners. The history of the Internet and Web section should be completed by then.

Identifying communities, Use cases, Development flows (opens in new window)

This deliverable will select the projects (including but not limited to other CAPS projects) where we aim to integrate the decentralized protocols, describe accordingly their various use cases for these protocols, and outline development guidelines and roles within the development and validation processes.

Yearly Technical and Dissemination Assessment 2 (opens in new window)

Second yearly update on technical progress and dissemination, focus on the privacy-preserving messaging use-case. Technical progress and dissemination reports will be delivered yearly and the dissemination plan will be updated if necessary. It will include all presentations, papers, videos, and all other outreach material to be archived - as well as links to any running code, demos, and in-depth technical analysis of the primary challenges and next steps. This will include the advise of the advisory board and an updated communications strategy that takes into account whether the previous technical and dissemination objectives were met or not, and how they can be achieved in the next period. Dissemination and technical progress in each of the appointed sectors will be tracked against objectives and goals.

Privacy Preserving Messaging Scalability Simulations (opens in new window)

Simulation-based evaluation showing the scalability of NEXTLEAP private messaging protocols, with a key focus on quality of performance in comparison to centralized systems, in terms of properties like decentralization, privacy, security, or anonymity.

Dissemination Plan (opens in new window)

A dissemination plan will be outlined, where dissemination activities via various channels will be planned as described in Task 2.1. The advisory board will be notified for input. The dissemination plan will also set objectives for each of the target audiences and develop a communication strategy tailored to the audience. Each of the target areas of outreach will have a champion from the Advisory Board.

– Principles of Decentralized Internet Governance (opens in new window)

The principles of internet governance will be explored using the standpoint of science technology studies, with a focus on how to improve citizen participation and decentralization, as well as “fundamental rights” inspired by Berners-Lee's concept of a “magna carta” for the Web.

Initial Decentralization Case-studies (opens in new window)

This list of case-studies will be an initial list of up to 30 communities that could be investigated with ethnographic and social scientific methods. These communities will include ideally the open-source projects that will implement the NEXTLEAP protocols and existing CAPS projects.

Finalized Decentralized Case-studies (opens in new window)

The final analysis completed over the communities, including understanding the impact of any new protocols from NEXTLEAP into these communities.

Preliminary Education Plan and Draft Net Rights (opens in new window)

In this deliverable the first version of education plan will be presented with topics and speakers on the philosophy of collective intelligence, Net Rights, the 'magna carta' for the Web, user privacy and encryption, contributive categorization, and more. It will be aligned with a seminar series focussed on a unified internet science around digital studies, rights, and protocols as well as an in-face summer school. A draft list of net rights will be selected for crowd-sourcing support.

Exploitation Plan for Decentralization Sustainability Models (opens in new window)

Final update of the exploitation plan that takes into account first and foremost the long-term sustainability of decentralized Internet eco-systems. A focus will exist on commons-based non-market solutions and other metrics outside of profit, although the potential for profit-making enterprises, public-private partnerships, and the “privacy market” will also be assessed. This will be presented and a list of exploitation activities performed during the last year of the project will be reported.

Formal Modelling of Federated Identity (opens in new window)

Formal definitions of decentralization, privacy, security, and anonymity properties will be developed and proven using automatic proof-proving on the federated identity protocol. Results will be validated against open-source code. Depends on D2.2.

Yearly Technical and Dissemination Assessment 3 (opens in new window)

Third yearly update on technical progress and dissemination, focus on the secure address book use-case. Technical progress and dissemination reports will be delivered yearly and the dissemination plan will be updated if necessary. It will include all presentations, papers, videos, and all other outreach material to be archived - as well as links to any running code, demos, and in-depth technical analysis of the primary challenges and next steps. This will include the advise of the advisory board and an updated communications strategy that takes into account whether the previous technical and dissemination objectives were met or not, and how they can be achieved in the next period. Dissemination and technical progress in each of the appointed sectors will be tracked against objectives and goals.

Policy Recommendations for Decentralized Systems (opens in new window)

This deliverable describes in a more 'easy-to-understand' language on a high-level the results on the previous deliverables on formal methods and simulations and so provides recommendations on a policy level for those wishing to support decentralization within an institutional framework in order to achieve data sovereignty.

Internet Science Vocabulary and Key Questions (opens in new window)

A list of key questions facing decentralized systems and initial agreed-upon common interdisciplinary vocabulary terms based on Internet Science.

Review 1 Assessment (opens in new window)

This deliverable will review and assess the activities, results, and progress of the first review period. This will provide a basis for moving into the second review period and examine where the consortium was successful and where improvements are needed for the following review period. This deliverable will focus on assessing the progress made on the sociological case studies for decentralization and the secure address-book.

Standardization Report (opens in new window)

The standardization-related efforts and achievements will be collected in this report, with a focus on federated identity, secure asynchronous messaging (email), synchronous messaging, and privacy-enhanced crowd-sourcing for collective intelligence via privacy-enhanced cloud analytics. The state of the standardization of each of these deliverables and their uptake by both grassroots-activists, governments, and industry will be assessed.

Scalability Simulations for Federated Identity (opens in new window)

Simulation-based evaluation showing the scalability of NEXTLEAP federated identity protocols in terms of properties like decentralization, privacy, security, or anonymity.

Privacy Preserving Messaging Formal Modelling (opens in new window)

Models of messaging protocols from WP2 with respect to a number of possible primitives for properties related to decentralization, privacy, security, and anonymity.

Complete Education Report and Finalized Net Rights (opens in new window)

We will update D6.4 with exploitation activities already performed and results from the online categorization and participatory contributions in the seminar series. The list of net rights, based on crowd-sourced support, will be finalized.

Privacy-enhanced Analytics for Wisdom of the Crowds Open Source Module (opens in new window)

A module producing code for private information retrieval for crowd-sourcing analytics will be produced. Since the module will be used primarily to ask questions of users, a “lean design” round will not be needed proof-proving results.

Releasing Initial Prototypes (opens in new window)

Initial prototypes for protocols for identity and privacy-preserving are released to the public and communicated to previously identified communities.

Privacy-Preserving End-to-End Encrypted Messaging (opens in new window)

Two protocols, with an upgrade path, for both secure and privacy-preserving end-to-end encrypted synchronous and asynchronous messaging across decentralized systems. A revised federated secure identity protocol may be included based on feedback.

Federated Secure Identity Protocol (opens in new window)

An initial design of a federated identity system that protects the user's social graph using a secure address-book and associates an identity with key material across different systems in a privacy-preserving manner.

Privacy-Preserving Analytics for Wisdom of Crowds (opens in new window)

A protocol for privacy-preserving analytics that allow collective intelligence tasks based on machine-learning to be accomplished over end-to-end encrypted and decentralized systems.

Validated modules for Federated Identity and Privacy-Preserving End-to-End Encrypted Messaging (opens in new window)

Based on feedback and user-experience “lean design” rounds prototypes with the selected user-bases will be refactored and improved to the point of being ready for integration with real-life projects.

Public Web Page (opens in new window)

A public webpage, including a repository of all videos, contributions, seminars, and will be created and updated throughout the duration of the project.

Publications

LEAP: A next-generation client VPN and encrypted email provider (opens in new window)

Author(s): Sparrow, Elijah; Halpin, Harry; Kaneko, Kali; Pollan, Ruben
Published in: Proceedings of the Cryptography and Applied Network Security Conference, Issue 6, 2016
Publisher: Springer
DOI: 10.1007/978-3-319-48965-0_11

Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach (opens in new window)

Author(s): Nadim Kobeissi, Karthikeyan Bhargavan, Bruno Blanchet
Published in: 2017 IEEE European Symposium on Security and Privacy (EuroS&P), Issue 2017, 2017, Page(s) 435-450, ISBN 978-1-5090-5762-7
Publisher: IEEE
DOI: 10.1109/EuroSP.2017.38

End-to-End Encrypted Messaging Protocols: An Overview (opens in new window)

Author(s): Ksenia Ermoshina, Francesca Musiani, Harry Halpin
Published in: Proceedings of the Internet Science Conference, Issue 2016, 2016, Page(s) 244-254
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-45982-0_22

On the (In)security of SNARKs in the Presence of Oracles (opens in new window)

Author(s): Fiore, Dario; Nitulescu, Anca
Published in: TCC 2016-B - Fourteenth IACR Theory of Cryptography Conference, Issue 7, 2016, Page(s) 138-144
Publisher: Springer
DOI: 10.1007/978-3-662-53641-4_5

UnlimitID - Privacy-Preserving Federated Identity Management using Algebraic MACs (opens in new window)

Author(s): Marios Isaakidis, Harry Halpin, George Danezis
Published in: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society - WPES'16, Issue 2016, 2016, Page(s) 139-142, ISBN 9781-450345699
Publisher: ACM Press
DOI: 10.1145/2994620.2994637

The Responsibility of Open Standards in the Era of Surveillance

Author(s): Halpin, Harry
Published in: Proceedings of Hot Topics in Privacy Enhancing Technolgies, Issue 10, 2016, Page(s) https://www.petsymposium.org/2016/hotpets.php
Publisher: Online

Security Analysis of the W3C Web Cryptography API (opens in new window)

Author(s): Kelsey Cairns, Harry Halpin, Graham Steel
Published in: Proceedings of the Security Standardisation Research Conference, Issue 2016, 2016, Page(s) 112-140
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-49100-4_5

Formal verification of the W3C web authentication protocol (opens in new window)

Author(s): Iness Ben Guirat, Harry Halpin
Published in: Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security - HoTSoS '18, Issue 6, 2018, Page(s) 1-10, ISBN 9781-450364553
Publisher: ACM Press
DOI: 10.1145/3190619.3190640

ClaimChain - Improving the Security and Privacy of In-band Key Distribution for Messaging (opens in new window)

Author(s): Bogdan Kulynych, Wouter Lueks, Marios Isaakidis, George Danezis, Carmela Troncoso
Published in: Proceedings of the 2018 Workshop on Privacy in the Electronic Society - WPES'18, Issue 2018, 2018, Page(s) 86-103, ISBN 9781-450359894
Publisher: ACM Press
DOI: 10.1145/3267323.3268947

The decentralization of knowledge: How Carnap and Heidegger influenced the Web (opens in new window)

Author(s): Harry Halpin, Alexandre Monnin
Published in: First Monday, Issue 21/12, 2016, ISSN 1396-0466
Publisher: Munksgaard International Publishers
DOI: 10.5210/fm.v21i12.7109

Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments (opens in new window)

Author(s): Carmela Troncoso, Marios Isaakidis, George Danezis, Harry Halpin
Published in: Proceedings on Privacy Enhancing Technologies, Issue 2017/4, 2017, Page(s) 404-426, ISSN 2299-0984
Publisher: DeGruyter Press
DOI: 10.1515/popets-2017-0056

What is a Good Secure Messaging Tool? The EFF Secure Messaging Scorecard and the Shaping of Digital (Usable) Security (opens in new window)

Author(s): Francesca Musiani, Ksenia Ermoshina
Published in: Westminster Papers in Communication and Culture, Issue 12/3, 2017, Page(s) 51-71, ISSN 1744-6716
Publisher: University of Westminister
DOI: 10.16997/wpcc.265

Migrating Servers, Elusive Users: Reconfigurations of the Russian Internet in the Post-Snowden Era (opens in new window)

Author(s): Ksenia Ermoshina, Francesca Musiani
Published in: Media and Communication, Issue 5/1, 2017, Page(s) 42, ISSN 2183-2439
Publisher: Cogitatio Press
DOI: 10.17645/mac.v5i1.816

Co-ordinating Developers and High-Risk Users of Privacy-Enhanced Secure Messaging Protocols (opens in new window)

Author(s): Harry Halpin, Ksenia Ermoshina, Francesca Musiani
Published in: Security Standardisation Research - 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings, Issue 11322, 2018, Page(s) 56-75, ISBN 978-3-030-04761-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-04762-7_4

The Crisis of Standardizing DRM: The Case of W3C Encrypted Media Extensions (opens in new window)

Author(s): Harry Halpin
Published in: Security, Privacy, and Applied Cryptography Engineering, Issue 10662, 2017, Page(s) 10-29, ISBN 978-3-319-71500-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-71501-8_2

The Neganthropocene

Author(s): Bernard Stiegler
Published in: Critical Climate Chaos, 2018, Page(s) 349, ISBN 978-1-78542-049-8
Publisher: Open Humanities Press

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0