European Commission logo
français français
CORDIS - Résultats de la recherche de l’UE
CORDIS

Future Trust Services for Trustworthy Global Transactions

Livrables

State of the art in relation to privacy and data protection requirements (preliminary report)

Analysis of current state of the art in relation to privacy and data protection requirements. The report will comprise an analysis of current and proposed EU legislation in order to derive a list of to-be built in requirements applicable to an EU eID metasystem to ensure compliance with EU privacy and data protection laws, including the newly adopted eIDAS Regulation. This will be carried out via literature review and desk research.

Overview of eID services

Task 2.2: A document describing in detail the examined eID services as well as the applied authentication schemes.

Conformance and Interoperability Testing Architecture and Results

This document contains adopted Minder architecture to the FutureTrust building blocks and conformance and interoperability test results performed.

Evaluation and impact analysis of pilots

This deliverable reports on the technical pilot validation. It is based on SMART criteria established before and reviewed once after pilot launch and three interviews with the pilot teams (ex-ante, mid-term, ex post)

eGov Portal Services Pilot Implementation Documentation

The document comprises a definition and documentation of the FutureTrust eGov Portal Services pilot application functionality principles and its infrastructural set-up, as well as, the concept and implementation of the pilot infrastructure.

German Pilot continuous documentation

This deliverable contains a constantly updated description of the German pilot.

Design documentation Remote Signing and Sealing
Definition of Pilot Marketing Measures

Describes the definition of the communication actions with potential pilot users which will help prepare the ground for the execution of the pilot.

Evaluation of eID services

A document comparing the examined eID services and pointing the intersections as well as the differences between the different authentication mechanisms. A penetration test tool evaluating the security of the applied authentication schemes.

Composition & Procedures of Advisory Board and Associate Program

Including management procedures for interacting with the Advisory Board

PSDA Demonstrator Implementation Documentation

The document comprises a definition and documentation of the FutureTrust PSDA demonstrator application functionality principles and its infrastructural set-up, as well as, the concept and implementation of the demonstrator infrastructure.

Report on Standardization Contribution

This deliverable is a report describing relevant current standardization activities within and beyond the FutureTrust project. This serves for both evaluation purposes and information of partners that do not take part in standardization directly.

Implementation Plan
Documentation of the Legal Foundations of Trust and Trustworthiness

Second report, based on (iterative) interaction with WP3 and WP4 will assess a range of MS eID architectures which could be integrated within an EU eID metasystem and/or influence the very development of an EU eID metasystem. This will be carried out via a combination of relevant desk research and consultation with experts in a sample of Member States including Austria and the UK. The goal is to compare a range of different eID scheme architectures, and assess the implications of the eIDAS Regulations in particular in the light of Articles 8, 11 and 12.

German Pilot

The document comprises a definition and documentation of the FutureTrust German Pilot application functionality principles and its infrastructural set-up, as well as, the concept and implementation of the Pilot infrastructure.

Pilot and Demonstrators continuous documentation

This deliverable consists of a set of measures against that the pilot and the demonstrator will be checked. This measurement will be applied every three month in measuring points within the pilot and demonstrator phase. This consecutive documentation comprise all results from all measuring points.

Complete set of Minutes of Advisory Board meetings

Contains the complete minutes of the advisory group meetings during the project lifetime of FUTURETRUST, as well as additional documentation of the meetings.

FutureTrust Newsletters

A consolidated report containing all project newsletters (which describe dissemination, exploitation and list of technical outcomes)

Contextual, situational description and benchmark of events YR3

Summarises the activities at FutureTrust dissemination events, to highlight the dissemination successes and activities of the project, for both evaluation purposes and information of partners that do not take part in the event.

Report on Effectiveness and Results of Pilot Marketing

Reports on the engagement of relevant stakeholders in the pilot phase. Pilot community building starts directly after the pilot design phase (WP3) and will continue until the end of the project.

Rollout plan

This deliverable describes the planning of the pilot and the demonstrator roll-out and the necessary steps, which have to be taken to bring the pilot and demonstrators in an alignment and into an operation.

On Trust and Trust Models

A document describing the results of T2.5 (foundations of trust) and how these can be reflected in trust models (T.26)

Legal evaluation of the FutureTrust architecture

This deliverable comprises the overall legal assessment of the FutureTrust architecture.

Design documentation Comprehensive Validation Service

Documentation resulting from Task 3.2: Use Case Model (definitions of interactions between actors and the system to be developed); Analysis Model (results of the use case analysis identifying a preliminary mapping of the required behaviour onto modelling elements in the system, such as class diagrams, state diagrams. It defines an architecture that will support the features to be implemented.)

Report on Exploitation Planning & Reporting YR1

This deliverable describes the planned FutureTrust exploitation activities and report the performed exploitation activities. This serves for both evaluation purposes and information of the consortium regarding individual exploitation of the FutureTrust results.

Global Trust Service Status List
Gap Analysis of Current Relevant Standards

This deliverable will provide an overview of the current state of standardization activities pertinent to FutureTrust at various de-jure and de-facto standardization bodies. Based on this, it will identify gaps in the relevant standards in comparison to the FutureTrust vision that FutureTrust can help close.

Comprehensive Validation Service
Definition of Future Trust Pilot Application Infrastructure Set-up: Concept and Implementation of the pilot infrastructure
Evaluation Scheme for Trustworthy Services

Documentation describing an evaluation scheme for trustworthy services.

Architecture Plan

This deliverable describes the architecture of all FutureTrust services and the overall definitions of technical aspects, incl. infrastructural requirements and requirements to the interfaces to the pilot and demonstrators applications

Contextual, situational description and benchmark of events YR2

Summarises the activities at FutureTrust dissemination events, to highlight the dissemination successes and activities of the project, for both evaluation purposes and information of partners that do not take part in the event.

Design documentation Scalable Preservation Services
Measurement of Trustworthiness

A document describing an approach measuring trustworthiness, the results of the provided measurement. Additionally, an implementation of a tool measuring trustworthiness based on knowledge regarding the applied authentication mechanisms.

Design documentation Global Trust Service Status List

Documentation resulting from Task 3.2: Use Case Model (definitions of interactions between actors and the system to be developed); Analysis Model (results of the use case analysis identifying a preliminary mapping of the required behaviour onto modelling elements in the system, such as class diagrams, state diagrams. It defines an architecture that will support the features to be implemented.)

Definition of demonstrators, pilot and pilot applications

This deliverable documents the definition and documentation of FutureTrust pilot- and demonstrator applications following the overall architectural principles described in D3.1. It includes the definition and documentation of functional principles and a description of a specification of the overall technical design of the Future Trust pilot- and demonstrator applications (and interface connectivity, functional and non-functional requirements) - these deliverable will be extended continuously due to dynamic evaluation of the principles during WP4 (implementation).

International Symposium on eIDAS Implementation YR2

(Approximate date) Holding the first international symposium discussing how FutureTrust and eIDAS can interoperate with schemes in the Americas, and possibly the Asia-Pacific Economic Cooperation (APEC) area.

International Symposium on eIDAS Implementation YR3

(Approximate date) With the FutureTrust project nearing completion, holding the second international symposium discussing how FutureTrust and eIDAS can interoperate with schemes in the Americas, and possibly the Asia-Pacific Economic Cooperation (APEC) area.

Publications

Return of Bleichenbacher's Oracle Threat (ROBOT)

Auteurs: Hanno Böck, Juraj Somorovsky, Craig Young
Publié dans: 2018
Éditeur: 27th USENIX Security Symposium

Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels

Auteurs: Damian Poddebniak, Christian Dresen, Jens Müller, Fabian Ising, Sebastian Schinzel, Simon Friedberger, Juraj Smorovsky, Jörg Schwenk
Publié dans: 2018
Éditeur: 27th USENIX Security Symposium

Security Analysis of eiDAS - The Cross-Country Athentication Scheme in Europe

Auteurs: Nils Engelbertz, Nurullah Erinola, David Herring, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk
Publié dans: 2018
Éditeur: 12th USENIX Workshop on Offensive Technologies (WOOT)

Bridging Policy, Regulation, and Practice? A Techno-Legal Analysis of Three Types of Data in the GDPR

Auteurs: Runshan Hu, Sophie Stalla-Bourdillon, Mu Yang, Valeria Schiavo and Vladimiro Sassone
Publié dans: 2017
Éditeur: Hart Publishing

Breaking and Fixing Gridcoin

Auteurs: Martin Grothe, Tobias Niemann, Juraj Somorovsky, Jörg Schwenk
Publié dans: 2017
Éditeur: 11th USENIX Workshop on Offensive Technologies 2017 (WOOT)

On The (In-)Security Of JavaScript Object Signing And Encryption

Auteurs: Dennis Detering, Juraj Somorovsky, Christian Mainka, Vladislav Mladenov, Jörg Schwenk
Publié dans: 2017
Éditeur: 1st Reversing and Offensive-orientated Trends Symposium 2017 (ROOTS)

Towards a standardised preservation service for qualified electronic signatures and qualified electronic seals

Auteurs: Otto, F., Wich, T., Hühnlein, T., Prechtl, M. & Hühnlein, D.
Publié dans: Open Identity Summit 2019, 2019, Page(s) 13-23
Éditeur: Roßnagel, H., Wagner, S. & Hühnlein, D. (Hrsg.)

How to harmonise local and remote signing

Auteurs: Hühnlein, D., Wich, ., Hühnlein, ., Schuberth, S., Lottes, R., Crossley, N. & Otto, F.
Publié dans: Open Identity Summit 2019, 2019, Page(s) 25-36
Éditeur: Roßnagel, H., Wagner, S. & Hühnlein, D. (Hrsg.)

A Hierarchical Evaluation Scheme for Pilot-based Research Projects

Auteurs: Thomas Zefferer
Publié dans: Proceedings of the 14th International Conference on Web Information Systems and Technologies, 2018, Page(s) 356-363, ISBN 978-989-758-324-7
Éditeur: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0007228103560363

Systematic Fuzzing and Testing of TLS Libraries

Auteurs: Juraj Somorovsky
Publié dans: 2016
Éditeur: ACM

SoK: Exploiting Network Printers

Auteurs: Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk
Publié dans: 2017
Éditeur: IEEE

SoK: Sin-gle Sign-On Se-cu-ri-ty – An Eva-lua-ti-on of Open-ID Con-nect

Auteurs: Christian Mainka, Vladislav Mladenov, Tobias Wich, Jörg Schwenk
Publié dans: 2017
Éditeur: IEEE

SECRET: On the Feasibility of a Secure, Efficient, and Collaborative Real-Time Web Editor

Auteurs: Dennis Felsch, Christian Mainka, Vladislav Mladenov, Jörg Schwenk
Publié dans: 2017, Page(s) 835--848
Éditeur: ACM

DROWN: Breaking TLS using SSLv2

Auteurs: Aviram, Nimrod and Schinzel, Sebastian and Somorovsky, Juraj and Heninger, Nadia and Dankel, Maik and Steube, Jens and Valenta, Luke and Adrian, David and Halderman, J Alex and Dukhovni, Viktor and others
Publié dans: 2016
Éditeur: USENIX

Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS.

Auteurs: Böck, Hanno and Zauner, Aaron and Devlin, Sean and Somorovsky, Juraj and Jovanovic, Philipp
Publié dans: 2016
Éditeur: USENIX

Architecture for Controlled Credential issuance Enhanced with Single Sign-On (ACCESSO)

Auteurs: Daniel Nemmert, Detlef Hühnlein, Tobias Wich, Tina Hühnlein
Publié dans: Open Identity Summit 2016, Lecture Notes in Informatics (LNI), Numéro 264, 2016, Page(s) 67-79
Éditeur: Gesellschaft für Informatik

Turkish e-ID card based derived mobile credentials

Auteurs: Edona Fasllija, Elif Ustundag Soykan
Publié dans: Privacy vs Identity, EEMA'S 30th Annual Conference, 2017
Éditeur: EEMA

Commentary on Article 87 of the GDPR

Auteurs: Nikos Tsakalakis, Sophie Stalla-Bourdillon edited by Indra Spiecker gen. Döhmann, Vagelis Papakonstantinou, Gerrit Hornung and Paul de Hert
Publié dans: 2017
Éditeur: Nomos

Anonymous Data v. Personal Data — A False Debate: An EU Perspective on Anonymization, Pseudonymization and Personal Data

Auteurs: Sophie Stalla-Bourdillon, Allison Knight
Publié dans: Wisconsin International Law Journal, 2017
Éditeur: Wisconsin International Law Journal

Towards secure and standard - compliant implementations of the PSD2 Directive

Auteurs: Tobias Wich, Daniel Nemmert, Detlef Hühnlein
Publié dans: 2017
Éditeur: Lecture Notes in Informatics, Gesellschaft für Informatik

Identity Assurance in the UK: technical implementation and legal implications under eIDAS

Auteurs: Niko Tsakalakisz, Sophie Stalla-Bourdillon, Kieron O'Hara
Publié dans: Journal of Web Science, Numéro 3/1, 2017, Page(s) 32-46, ISSN 2332-4031
Éditeur: now publishers
DOI: 10.1561/106.00000010

The GDPR: A game changer for electronic identification schemes? The case study of Gov.UK Verify

Auteurs: Sophie Stalla-Bourdillon, Henry Pearce, Niko Tsakalakis
Publié dans: Computer Law & Security Review, Numéro 34/4, 2018, Page(s) 784-805, ISSN 0267-3649
Éditeur: Pergamon Press Ltd.
DOI: 10.1016/j.clsr.2018.05.012

Aufbruchsstimmung im eIDAS-Ökosystem

Auteurs: Hühnlein, T., Hühnlein, D.
Publié dans: Datenschutz und Datensicherheit - DuD, Numéro 43 (4), 2019, Page(s) 185, ISSN 1614-0702
Éditeur: Springer Verlag

Neue APIs für das eIDAS-Ökosystem

Auteurs: Huehnlein, Detlef, Korte, Ulrike, Kuehne, Andreas; Roeck, Andrea
Publié dans: Datenschutz und Datensicherheit, Numéro 43 (4), 2019, Page(s) 198-202, ISSN 1862-2607
Éditeur: Springer Verlag

Sichere Digitalisierung mit TR-RESISCAN und TR-ESOR

Auteurs: Ahmad, Jawad, Huehnlein, Detlef; Korte, Ulrike
Publié dans: Datenschutz und Datensicherheit, Numéro 43 (4), 2019, Page(s) 203-208, ISSN 1862-2607
Éditeur: Springer Verlag

Moderne Vertrauensdienste für vertrauenswürdige Transaktionen

Auteurs: Schwenk, Joerg, Wich, Tobias; Huehnlein, Detlef
Publié dans: Datenschutz und Datensicherheit, Numéro 43(4), 2019, Page(s) 214-219., ISSN 1862-2607
Éditeur: Springer Verlag

Recherche de données OpenAIRE...

Une erreur s’est produite lors de la recherche de données OpenAIRE

Aucun résultat disponible