Deliverables
will disseminate and demonstrate results to raise awareness
describes results from the evaluation with external stakeholders related possible business models based on the demonstrating capabilities of the OLYMPUS technologies in real working environments
will be updated on a monthly basis.
describes cross domain scenarios and related use-case requirements. Moreover, it contains design guidelines and detailed KPI for evaluation of OLYMPUS.
contains the final version of the integrated OLYMPUS framework including the tools developed in T52 and T53 It also contains the final specification of the deployment packages and software tools
contains a first version of the benchmarking and testing environment including a documentation of how to use it.
describes the quality system and procedures.
summarises the project results
describes real working pilotsMVPs corresponding to the two usecases and initial feedback
contains a first version of the integrated OLYMPUS framework including the tools developed in T5.2 and T5.3. It also contains a specification of the deployment packages and software tools.
describes the first implementation of the oblivious IdM solution including the APIs that are offered to higherlevel applications and the design security mechanisms and implementation of a solution to enable authentication in offline use cases with an oblivious IdM
outlines the overall OLYMPUS framework including its components and interfaces Further focus is on the required components to realize the novel cryptographic approaches of the intended ecosystem A first draft version IntD11 will be generated on M13 to WP3 and WP4 and based on the feedback of the initial evaluation a final version will be generated on M24
reports on final description of the pilots deployment integration aspects and lesson learnt related to the user experiences with the solutions tested in the two use cases Also compliance report with a special focus in GDPR fulfillment
contains a complete list of requirement and specifications of the use-cases for demonstration and evaluation.
is an update on D32 reflecting the changes that were made to the implementation after incorporating feedback from the use cases
This deliverable will describe how OLYMPUS will enhance the current IdM solutions and will provide a DPIA evaluation based on the GDPR regulation. Additionally this deliverable will answer ethics requirements for collection, storage, and protection of personal data.
reports on results regarding dissemination exploitation and standardisation
reports on activities and plans for dissemination, exploitation and standardisation.
details project management and reporting procedures.
contains the analysis done for extending the capabilities of OLYMPUS for new functionalities like extended Document Signer or the possible extension to another physical identities holders for eg through bridging with eIDAS or STORK
A document describing the results of the user studies and how they are used to create a set of user experience design guidelines for OLYMPUS technology
contains a full specification of the cryptographic protocols performed between the user device, partial IdPs, and the service provider.
Publications
Author(s): Jesús García-Rodríguez, Rafael Torres Moreno, Jorge Bernal Bernabé, Antonio Skarmeta
Published in: The 16th International Conference on Availability, Reliability and Security, 2021, Page(s) 1-6, ISBN 9781450390514
Publisher: ACM
DOI: 10.1145/3465481.3469204
Author(s): Tore Frederiksen
Published in: The 16th International Conference on Availability, Reliability and Security, 2021, Page(s) 1-10, ISBN 9781450390514
Publisher: ACM
DOI: 10.1145/3465481.3469212
Author(s): Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos
Published in: The 16th International Conference on Availability, Reliability and Security, 2021, Page(s) 1-9, ISBN 9781450390514
Publisher: ACM
DOI: 10.1145/3465481.3469207
Author(s): Cristina Timón López, Ignacio Alamillo Alamillo Domingo, Julián Valero Valero Torrijos
Published in: The 16th International Conference on Availability, Reliability and Security, 2021, Page(s) 1-6, ISBN 9781450390514
Publisher: ACM
DOI: 10.1145/3465481.3470068
Author(s): Mads Schaarup Andersen
Published in: The 16th International Conference on Availability, Reliability and Security, 2021, Page(s) 1-8, ISBN 9781450390514
Publisher: ACM
DOI: 10.1145/3465481.3469211
Author(s): Rafael Torres Moreno, Jorge Bernal Bernabe, Antonio Skarmeta, Michael Stausholm, Tore Kasper Frederiksen, Noelia Martinez, Nuno Ponte, Evangelos Sakkopoulos, Anja Lehmann
Published in: 2019 Global IoT Summit (GIoTS), 2019, 2019, Page(s) 1-6, ISBN 978-1-7281-2171-0
Publisher: IEEE
DOI: 10.1109/giots.2019.8766357
Author(s): Carsten Baum, Tore Frederiksen, Julia Hesse, Anja Lehmann, Avishay Yanai
Published in: 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 2020, Page(s) 587-606, ISBN 978-1-7281-5087-1
Publisher: IEEE
DOI: 10.1109/eurosp48549.2020.00044
Author(s): Rafael Torres Moreno, Jesus Garcia Rodriguez, Cristina Timon Lopez, Jorge Bernal Bernabe, Antonio Skarmeta
Published in: 2020 Global Internet of Things Summit (GIoTS), 2020, Page(s) 1-6, ISBN 978-1-7281-6728-2
Publisher: IEEE
DOI: 10.1109/giots49054.2020.9119663
Author(s): Michel Abdalla, Julia Hesse, Björn M. Haase
Published in: 2021
Publisher: -
Author(s): Cristina Timón López
Published in: 2020
Publisher: -
Author(s): Cristina Timón, Julián Valero & Ignacio Alamillo
Published in: 2020, ISBN 978-84-17580-15-5
Publisher: Huygens Editorial
DOI: 10.5281/zenodo.6242441
Author(s): Andreas Erwig, Julia Hesse, Maximilian Orlt, Siavash Riahi
Published in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II, 12492, 2020, Page(s) 761-784, ISBN 978-3-030-64833-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-64834-3_26
Author(s): Patrick Towa, Damien Vergnaud
Published in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III, 12493, 2020, Page(s) 774-804, ISBN 978-3-030-64839-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-64840-4_26
Author(s): Michael Klooß, Anja Lehmann, Andy Rupp
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I, 11476, 2019, Page(s) 68-99, ISBN 978-3-030-17652-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-17653-2_3
Author(s): Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa
Published in: Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings, 12238, 2020, Page(s) 401-423, ISBN 978-3-030-57989-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-57990-6_20
Author(s): Tore Kasper Frederiksen, Julia Hesse, Anja Lehmann, Rafael Torres Moreno
Published in: Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers, 576, 2020, Page(s) 45-62, ISBN 978-3-030-42503-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-42504-3_4
Author(s): Georgia Sourla, Evangelos Sakkopoulos
Published in: Knowledge-Based Software Engineering: 2020 - Proceedings of the 13th International Joint Conference on Knowledge-Based Software Engineering (JCKBSE 2020), Larnaca, Cyprus, August 24-26, 2020, 19, 2020, Page(s) 162-177, ISBN 978-3-030-53948-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-53949-8_15
Author(s): Olivier Blazy, Patrick Towa, Damien Vergnaud
Published in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I, 12491, 2020, Page(s) 97-127, ISBN 978-3-030-64836-7
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-64837-4_4
Author(s): Julia Hesse
Published in: Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings, 12238, 2020, Page(s) 579-599, ISBN 978-3-030-57989-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-57990-6_29
Author(s): Jesús García-Rodríguez, Rafael Torres Moreno, Jorge Bernal Bernabe, Antonio Skarmeta
Published in: Journal of Information Security and Applications, 62, 2021, Page(s) 102971, ISSN 2214-2126
Publisher: -
DOI: 10.1016/j.jisa.2021.102971
Author(s): Anja Lehmann
Published in: Proceedings on Privacy Enhancing Technologies, 2019/3, 2019, Page(s) 289-309, ISSN 2299-0984
Publisher: -
DOI: 10.2478/popets-2019-0048
Author(s): Rafael Torres Moreno, Jorge Bernal Bernabe, Jesús García Rodríguez, Tore Kasper Frederiksen, Michael Stausholm, Noelia Martínez, Evangelos Sakkopoulos, Nuno Ponte, Antonio Skarmeta
Published in: Sensors, 20/3, 2020, Page(s) 945, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s20030945
Author(s): Jorge Bernal Bernabe, Jose Luis Canovas, Jose L. Hernandez-Ramos, Rafael Torres Moreno, Antonio Skarmeta
Published in: IEEE Access, 7, 2019, Page(s) 164908-164940, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2019.2950872
Author(s): Rafael Torres Moreno, Jesus Garcia-Rodriguez, Jorge Bernal Bernabe, Antonio Skarmeta
Published in: IEEE Access, 9, 2021, Page(s) 105788-105804, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2021.3099837
Author(s): Jorge Bernal Bernabe, Jose L. Canovas, Jose L. Hernandez-Ramos, Rafael Torres Moreno and A. Skarmeta
Published in: Security and privacy in the Internet of Things: Challenges Solutions, 2020, ISBN 978-1-64368-053-8
Publisher: IOS Press BV
DOI: 10.3233/aise27