European Commission logo
polski polski
CORDIS - Wyniki badań wspieranych przez UE
CORDIS

Future Trust Services for Trustworthy Global Transactions

Rezultaty

State of the art in relation to privacy and data protection requirements (preliminary report)

Analysis of current state of the art in relation to privacy and data protection requirements. The report will comprise an analysis of current and proposed EU legislation in order to derive a list of to-be built in requirements applicable to an EU eID metasystem to ensure compliance with EU privacy and data protection laws, including the newly adopted eIDAS Regulation. This will be carried out via literature review and desk research.

Overview of eID services

Task 2.2: A document describing in detail the examined eID services as well as the applied authentication schemes.

Conformance and Interoperability Testing Architecture and Results

This document contains adopted Minder architecture to the FutureTrust building blocks and conformance and interoperability test results performed.

Evaluation and impact analysis of pilots

This deliverable reports on the technical pilot validation. It is based on SMART criteria established before and reviewed once after pilot launch and three interviews with the pilot teams (ex-ante, mid-term, ex post)

eGov Portal Services Pilot Implementation Documentation

The document comprises a definition and documentation of the FutureTrust eGov Portal Services pilot application functionality principles and its infrastructural set-up, as well as, the concept and implementation of the pilot infrastructure.

German Pilot continuous documentation

This deliverable contains a constantly updated description of the German pilot.

Design documentation Remote Signing and Sealing
Definition of Pilot Marketing Measures

Describes the definition of the communication actions with potential pilot users which will help prepare the ground for the execution of the pilot.

Evaluation of eID services

A document comparing the examined eID services and pointing the intersections as well as the differences between the different authentication mechanisms. A penetration test tool evaluating the security of the applied authentication schemes.

Composition & Procedures of Advisory Board and Associate Program

Including management procedures for interacting with the Advisory Board

PSDA Demonstrator Implementation Documentation

The document comprises a definition and documentation of the FutureTrust PSDA demonstrator application functionality principles and its infrastructural set-up, as well as, the concept and implementation of the demonstrator infrastructure.

Report on Standardization Contribution

This deliverable is a report describing relevant current standardization activities within and beyond the FutureTrust project. This serves for both evaluation purposes and information of partners that do not take part in standardization directly.

Implementation Plan
Documentation of the Legal Foundations of Trust and Trustworthiness

Second report, based on (iterative) interaction with WP3 and WP4 will assess a range of MS eID architectures which could be integrated within an EU eID metasystem and/or influence the very development of an EU eID metasystem. This will be carried out via a combination of relevant desk research and consultation with experts in a sample of Member States including Austria and the UK. The goal is to compare a range of different eID scheme architectures, and assess the implications of the eIDAS Regulations in particular in the light of Articles 8, 11 and 12.

German Pilot

The document comprises a definition and documentation of the FutureTrust German Pilot application functionality principles and its infrastructural set-up, as well as, the concept and implementation of the Pilot infrastructure.

Pilot and Demonstrators continuous documentation

This deliverable consists of a set of measures against that the pilot and the demonstrator will be checked. This measurement will be applied every three month in measuring points within the pilot and demonstrator phase. This consecutive documentation comprise all results from all measuring points.

Complete set of Minutes of Advisory Board meetings

Contains the complete minutes of the advisory group meetings during the project lifetime of FUTURETRUST, as well as additional documentation of the meetings.

FutureTrust Newsletters

A consolidated report containing all project newsletters (which describe dissemination, exploitation and list of technical outcomes)

Contextual, situational description and benchmark of events YR3

Summarises the activities at FutureTrust dissemination events, to highlight the dissemination successes and activities of the project, for both evaluation purposes and information of partners that do not take part in the event.

Report on Effectiveness and Results of Pilot Marketing

Reports on the engagement of relevant stakeholders in the pilot phase. Pilot community building starts directly after the pilot design phase (WP3) and will continue until the end of the project.

Rollout plan

This deliverable describes the planning of the pilot and the demonstrator roll-out and the necessary steps, which have to be taken to bring the pilot and demonstrators in an alignment and into an operation.

On Trust and Trust Models

A document describing the results of T2.5 (foundations of trust) and how these can be reflected in trust models (T.26)

Legal evaluation of the FutureTrust architecture

This deliverable comprises the overall legal assessment of the FutureTrust architecture.

Design documentation Comprehensive Validation Service

Documentation resulting from Task 3.2: Use Case Model (definitions of interactions between actors and the system to be developed); Analysis Model (results of the use case analysis identifying a preliminary mapping of the required behaviour onto modelling elements in the system, such as class diagrams, state diagrams. It defines an architecture that will support the features to be implemented.)

Report on Exploitation Planning & Reporting YR1

This deliverable describes the planned FutureTrust exploitation activities and report the performed exploitation activities. This serves for both evaluation purposes and information of the consortium regarding individual exploitation of the FutureTrust results.

Global Trust Service Status List
Gap Analysis of Current Relevant Standards

This deliverable will provide an overview of the current state of standardization activities pertinent to FutureTrust at various de-jure and de-facto standardization bodies. Based on this, it will identify gaps in the relevant standards in comparison to the FutureTrust vision that FutureTrust can help close.

Comprehensive Validation Service
Definition of Future Trust Pilot Application Infrastructure Set-up: Concept and Implementation of the pilot infrastructure
Evaluation Scheme for Trustworthy Services

Documentation describing an evaluation scheme for trustworthy services.

Architecture Plan

This deliverable describes the architecture of all FutureTrust services and the overall definitions of technical aspects, incl. infrastructural requirements and requirements to the interfaces to the pilot and demonstrators applications

Contextual, situational description and benchmark of events YR2

Summarises the activities at FutureTrust dissemination events, to highlight the dissemination successes and activities of the project, for both evaluation purposes and information of partners that do not take part in the event.

Design documentation Scalable Preservation Services
Measurement of Trustworthiness

A document describing an approach measuring trustworthiness, the results of the provided measurement. Additionally, an implementation of a tool measuring trustworthiness based on knowledge regarding the applied authentication mechanisms.

Design documentation Global Trust Service Status List

Documentation resulting from Task 3.2: Use Case Model (definitions of interactions between actors and the system to be developed); Analysis Model (results of the use case analysis identifying a preliminary mapping of the required behaviour onto modelling elements in the system, such as class diagrams, state diagrams. It defines an architecture that will support the features to be implemented.)

Definition of demonstrators, pilot and pilot applications

This deliverable documents the definition and documentation of FutureTrust pilot- and demonstrator applications following the overall architectural principles described in D3.1. It includes the definition and documentation of functional principles and a description of a specification of the overall technical design of the Future Trust pilot- and demonstrator applications (and interface connectivity, functional and non-functional requirements) - these deliverable will be extended continuously due to dynamic evaluation of the principles during WP4 (implementation).

International Symposium on eIDAS Implementation YR2

(Approximate date) Holding the first international symposium discussing how FutureTrust and eIDAS can interoperate with schemes in the Americas, and possibly the Asia-Pacific Economic Cooperation (APEC) area.

International Symposium on eIDAS Implementation YR3

(Approximate date) With the FutureTrust project nearing completion, holding the second international symposium discussing how FutureTrust and eIDAS can interoperate with schemes in the Americas, and possibly the Asia-Pacific Economic Cooperation (APEC) area.

Publikacje

Return of Bleichenbacher's Oracle Threat (ROBOT)

Autorzy: Hanno Böck, Juraj Somorovsky, Craig Young
Opublikowane w: 2018
Wydawca: 27th USENIX Security Symposium

Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels

Autorzy: Damian Poddebniak, Christian Dresen, Jens Müller, Fabian Ising, Sebastian Schinzel, Simon Friedberger, Juraj Smorovsky, Jörg Schwenk
Opublikowane w: 2018
Wydawca: 27th USENIX Security Symposium

Security Analysis of eiDAS - The Cross-Country Athentication Scheme in Europe

Autorzy: Nils Engelbertz, Nurullah Erinola, David Herring, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk
Opublikowane w: 2018
Wydawca: 12th USENIX Workshop on Offensive Technologies (WOOT)

Bridging Policy, Regulation, and Practice? A Techno-Legal Analysis of Three Types of Data in the GDPR

Autorzy: Runshan Hu, Sophie Stalla-Bourdillon, Mu Yang, Valeria Schiavo and Vladimiro Sassone
Opublikowane w: 2017
Wydawca: Hart Publishing

Breaking and Fixing Gridcoin

Autorzy: Martin Grothe, Tobias Niemann, Juraj Somorovsky, Jörg Schwenk
Opublikowane w: 2017
Wydawca: 11th USENIX Workshop on Offensive Technologies 2017 (WOOT)

On The (In-)Security Of JavaScript Object Signing And Encryption

Autorzy: Dennis Detering, Juraj Somorovsky, Christian Mainka, Vladislav Mladenov, Jörg Schwenk
Opublikowane w: 2017
Wydawca: 1st Reversing and Offensive-orientated Trends Symposium 2017 (ROOTS)

Towards a standardised preservation service for qualified electronic signatures and qualified electronic seals

Autorzy: Otto, F., Wich, T., Hühnlein, T., Prechtl, M. & Hühnlein, D.
Opublikowane w: Open Identity Summit 2019, 2019, Strona(/y) 13-23
Wydawca: Roßnagel, H., Wagner, S. & Hühnlein, D. (Hrsg.)

How to harmonise local and remote signing

Autorzy: Hühnlein, D., Wich, ., Hühnlein, ., Schuberth, S., Lottes, R., Crossley, N. & Otto, F.
Opublikowane w: Open Identity Summit 2019, 2019, Strona(/y) 25-36
Wydawca: Roßnagel, H., Wagner, S. & Hühnlein, D. (Hrsg.)

A Hierarchical Evaluation Scheme for Pilot-based Research Projects

Autorzy: Thomas Zefferer
Opublikowane w: Proceedings of the 14th International Conference on Web Information Systems and Technologies, 2018, Strona(/y) 356-363, ISBN 978-989-758-324-7
Wydawca: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0007228103560363

Systematic Fuzzing and Testing of TLS Libraries

Autorzy: Juraj Somorovsky
Opublikowane w: 2016
Wydawca: ACM

SoK: Exploiting Network Printers

Autorzy: Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk
Opublikowane w: 2017
Wydawca: IEEE

SoK: Sin-gle Sign-On Se-cu-ri-ty – An Eva-lua-ti-on of Open-ID Con-nect

Autorzy: Christian Mainka, Vladislav Mladenov, Tobias Wich, Jörg Schwenk
Opublikowane w: 2017
Wydawca: IEEE

SECRET: On the Feasibility of a Secure, Efficient, and Collaborative Real-Time Web Editor

Autorzy: Dennis Felsch, Christian Mainka, Vladislav Mladenov, Jörg Schwenk
Opublikowane w: 2017, Strona(/y) 835--848
Wydawca: ACM

DROWN: Breaking TLS using SSLv2

Autorzy: Aviram, Nimrod and Schinzel, Sebastian and Somorovsky, Juraj and Heninger, Nadia and Dankel, Maik and Steube, Jens and Valenta, Luke and Adrian, David and Halderman, J Alex and Dukhovni, Viktor and others
Opublikowane w: 2016
Wydawca: USENIX

Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS.

Autorzy: Böck, Hanno and Zauner, Aaron and Devlin, Sean and Somorovsky, Juraj and Jovanovic, Philipp
Opublikowane w: 2016
Wydawca: USENIX

Architecture for Controlled Credential issuance Enhanced with Single Sign-On (ACCESSO)

Autorzy: Daniel Nemmert, Detlef Hühnlein, Tobias Wich, Tina Hühnlein
Opublikowane w: Open Identity Summit 2016, Lecture Notes in Informatics (LNI), Numer 264, 2016, Strona(/y) 67-79
Wydawca: Gesellschaft für Informatik

Turkish e-ID card based derived mobile credentials

Autorzy: Edona Fasllija, Elif Ustundag Soykan
Opublikowane w: Privacy vs Identity, EEMA'S 30th Annual Conference, 2017
Wydawca: EEMA

Commentary on Article 87 of the GDPR

Autorzy: Nikos Tsakalakis, Sophie Stalla-Bourdillon edited by Indra Spiecker gen. Döhmann, Vagelis Papakonstantinou, Gerrit Hornung and Paul de Hert
Opublikowane w: 2017
Wydawca: Nomos

Anonymous Data v. Personal Data — A False Debate: An EU Perspective on Anonymization, Pseudonymization and Personal Data

Autorzy: Sophie Stalla-Bourdillon, Allison Knight
Opublikowane w: Wisconsin International Law Journal, 2017
Wydawca: Wisconsin International Law Journal

Towards secure and standard - compliant implementations of the PSD2 Directive

Autorzy: Tobias Wich, Daniel Nemmert, Detlef Hühnlein
Opublikowane w: 2017
Wydawca: Lecture Notes in Informatics, Gesellschaft für Informatik

Identity Assurance in the UK: technical implementation and legal implications under eIDAS

Autorzy: Niko Tsakalakisz, Sophie Stalla-Bourdillon, Kieron O'Hara
Opublikowane w: Journal of Web Science, Numer 3/1, 2017, Strona(/y) 32-46, ISSN 2332-4031
Wydawca: now publishers
DOI: 10.1561/106.00000010

The GDPR: A game changer for electronic identification schemes? The case study of Gov.UK Verify

Autorzy: Sophie Stalla-Bourdillon, Henry Pearce, Niko Tsakalakis
Opublikowane w: Computer Law & Security Review, Numer 34/4, 2018, Strona(/y) 784-805, ISSN 0267-3649
Wydawca: Pergamon Press Ltd.
DOI: 10.1016/j.clsr.2018.05.012

Aufbruchsstimmung im eIDAS-Ökosystem

Autorzy: Hühnlein, T., Hühnlein, D.
Opublikowane w: Datenschutz und Datensicherheit - DuD, Numer 43 (4), 2019, Strona(/y) 185, ISSN 1614-0702
Wydawca: Springer Verlag

Neue APIs für das eIDAS-Ökosystem

Autorzy: Huehnlein, Detlef, Korte, Ulrike, Kuehne, Andreas; Roeck, Andrea
Opublikowane w: Datenschutz und Datensicherheit, Numer 43 (4), 2019, Strona(/y) 198-202, ISSN 1862-2607
Wydawca: Springer Verlag

Sichere Digitalisierung mit TR-RESISCAN und TR-ESOR

Autorzy: Ahmad, Jawad, Huehnlein, Detlef; Korte, Ulrike
Opublikowane w: Datenschutz und Datensicherheit, Numer 43 (4), 2019, Strona(/y) 203-208, ISSN 1862-2607
Wydawca: Springer Verlag

Moderne Vertrauensdienste für vertrauenswürdige Transaktionen

Autorzy: Schwenk, Joerg, Wich, Tobias; Huehnlein, Detlef
Opublikowane w: Datenschutz und Datensicherheit, Numer 43(4), 2019, Strona(/y) 214-219., ISSN 1862-2607
Wydawca: Springer Verlag

Wyszukiwanie danych OpenAIRE...

Podczas wyszukiwania danych OpenAIRE wystąpił błąd

Brak wyników