CORDIS - Forschungsergebnisse der EU
CORDIS

Oblivious identitY Management for Private and User-friendly Services

Leistungen

Public Workshop

will disseminate and demonstrate results to raise awareness

OLYMPUS Future Business Development

describes results from the evaluation with external stakeholders related possible business models based on the demonstrating capabilities of the OLYMPUS technologies in real working environments

Initial Version of Project’s Web Site

will be updated on a monthly basis.

Requirements and Design Templates for OLYMPUS

describes cross domain scenarios and related use-case requirements. Moreover, it contains design guidelines and detailed KPI for evaluation of OLYMPUS.

OLYMPUS Framework and Tools

contains the final version of the integrated OLYMPUS framework including the tools developed in T52 and T53 It also contains the final specification of the deployment packages and software tools

OLYMPUS Benchmarking and Testing Environment

contains a first version of the benchmarking and testing environment including a documentation of how to use it.

Business and Innovation Plans
Quality Assurance Plan

describes the quality system and procedures.

Final Public Report

summarises the project results

First pilots deployment and initial evaluation

describes real working pilotsMVPs corresponding to the two usecases and initial feedback

Intermediate Integrated OLYMPUS Framework and Tools

contains a first version of the integrated OLYMPUS framework including the tools developed in T5.2 and T5.3. It also contains a specification of the deployment packages and software tools.

First Reference Implementation of Oblivious IdM

describes the first implementation of the oblivious IdM solution including the APIs that are offered to higherlevel applications and the design security mechanisms and implementation of a solution to enable authentication in offline use cases with an oblivious IdM

OLYMPUS Blueprint

outlines the overall OLYMPUS framework including its components and interfaces Further focus is on the required components to realize the novel cryptographic approaches of the intended ecosystem A first draft version IntD11 will be generated on M13 to WP3 and WP4 and based on the feedback of the initial evaluation a final version will be generated on M24

Final Pilot deployment and evaluation of User Experience and GDPR compliance

reports on final description of the pilots deployment integration aspects and lesson learnt related to the user experiences with the solutions tested in the two use cases Also compliance report with a special focus in GDPR fulfillment

Use-case descriptions

contains a complete list of requirement and specifications of the use-cases for demonstration and evaluation.

Second Reference Implementation of Oblivious IdM

is an update on D32 reflecting the changes that were made to the implementation after incorporating feedback from the use cases

Security and Privacy-aware OLYMPUS Framework Impact Assessment

This deliverable will describe how OLYMPUS will enhance the current IdM solutions and will provide a DPIA evaluation based on the GDPR regulation. Additionally this deliverable will answer ethics requirements for collection, storage, and protection of personal data.

Final Report on Dissemination, Exploitation and Standardisation Activities

reports on results regarding dissemination exploitation and standardisation

Intermediate Report on Dissemination and Standardisation Activities

reports on activities and plans for dissemination, exploitation and standardisation.

Project Handbook

details project management and reporting procedures.

OLYMPUS support for extended eID models

contains the analysis done for extending the capabilities of OLYMPUS for new functionalities like extended Document Signer or the possible extension to another physical identities holders for eg through bridging with eIDAS or STORK

OLYMPUS User Experience Design Guidelines

A document describing the results of the user studies and how they are used to create a set of user experience design guidelines for OLYMPUS technology

Cryptographic Design of an Oblivious IdM System

contains a full specification of the cryptographic protocols performed between the user device, partial IdPs, and the service provider.

Veröffentlichungen

Towards a standardized model for privacy-preserving Verifiable Credentials

Autoren: Jesús García-Rodríguez, Rafael Torres Moreno, Jorge Bernal Bernabé, Antonio Skarmeta
Veröffentlicht in: The 16th International Conference on Availability, Reliability and Security, 2021, Seite(n) 1-6, ISBN 9781450390514
Herausgeber: ACM
DOI: 10.1145/3465481.3469204

A Holistic Approach to Enhanced Security and Privacy in Digital Health Passports

Autoren: Tore Frederiksen
Veröffentlicht in: The 16th International Conference on Availability, Reliability and Security, 2021, Seite(n) 1-10, ISBN 9781450390514
Herausgeber: ACM
DOI: 10.1145/3465481.3469212

Approaching the Data Protection Impact Assessment as a legal methodology to evaluate the degree of privacy by design achieved in technological proposals. A special reference to Identity Management systems

Autoren: Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos
Veröffentlicht in: The 16th International Conference on Availability, Reliability and Security, 2021, Seite(n) 1-9, ISBN 9781450390514
Herausgeber: ACM
DOI: 10.1145/3465481.3469207

Which authentication method to choose. A legal perspective on user-device authentication in IoT ecosystems

Autoren: Cristina Timón López, Ignacio Alamillo Alamillo Domingo, Julián Valero Valero Torrijos
Veröffentlicht in: The 16th International Conference on Availability, Reliability and Security, 2021, Seite(n) 1-6, ISBN 9781450390514
Herausgeber: ACM
DOI: 10.1145/3465481.3470068

Towards the Design of a Privacy-preserving Attribute Based Credentials-based Digital ID in Denmark – Usefulness, Barriers, and Recommendations

Autoren: Mads Schaarup Andersen
Veröffentlicht in: The 16th International Conference on Availability, Reliability and Security, 2021, Seite(n) 1-8, ISBN 9781450390514
Herausgeber: ACM
DOI: 10.1145/3465481.3469211

OLYMPUS: towards Oblivious identitY Management for Private and User-friendly Services

Autoren: Rafael Torres Moreno, Jorge Bernal Bernabe, Antonio Skarmeta, Michael Stausholm, Tore Kasper Frederiksen, Noelia Martinez, Nuno Ponte, Evangelos Sakkopoulos, Anja Lehmann
Veröffentlicht in: 2019 Global IoT Summit (GIoTS), Ausgabe 2019, 2019, Seite(n) 1-6, ISBN 978-1-7281-2171-0
Herausgeber: IEEE
DOI: 10.1109/giots.2019.8766357

PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server

Autoren: Carsten Baum, Tore Frederiksen, Julia Hesse, Anja Lehmann, Avishay Yanai
Veröffentlicht in: 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 2020, Seite(n) 587-606, ISBN 978-1-7281-5087-1
Herausgeber: IEEE
DOI: 10.1109/eurosp48549.2020.00044

OLYMPUS: A distributed privacy-preserving identity management system

Autoren: Rafael Torres Moreno, Jesus Garcia Rodriguez, Cristina Timon Lopez, Jorge Bernal Bernabe, Antonio Skarmeta
Veröffentlicht in: 2020 Global Internet of Things Summit (GIoTS), 2020, Seite(n) 1-6, ISBN 978-1-7281-6728-2
Herausgeber: IEEE
DOI: 10.1109/giots49054.2020.9119663

Security Analysis of CPace

Autoren: Michel Abdalla, Julia Hesse, Björn M. Haase
Veröffentlicht in: 2021
Herausgeber: -

Implications juridiques relatives à la gestion de l’identité numérique et perspectives d’innovation en Europe

Autoren: Cristina Timón López
Veröffentlicht in: 2020
Herausgeber: -

Digital Identity Management: a key factor on the pursuit of privacy and the fight against cybercrime

Autoren: Cristina Timón, Julián Valero & Ignacio Alamillo
Veröffentlicht in: 2020, ISBN 978-84-17580-15-5
Herausgeber: Huygens Editorial
DOI: 10.5281/zenodo.6242441

Fuzzy Asymmetric Password-Authenticated Key Exchange

Autoren: Andreas Erwig, Julia Hesse, Maximilian Orlt, Siavash Riahi
Veröffentlicht in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II, Ausgabe 12492, 2020, Seite(n) 761-784, ISBN 978-3-030-64833-6
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-64834-3_26

Succinct Diophantine-Satisfiability Arguments

Autoren: Patrick Towa, Damien Vergnaud
Veröffentlicht in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III, Ausgabe 12493, 2020, Seite(n) 774-804, ISBN 978-3-030-64839-8
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-64840-4_26

(R)CCA Secure Updatable Encryption with Integrity Protection

Autoren: Michael Klooß, Anja Lehmann, Andy Rupp
Veröffentlicht in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I, Ausgabe 11476, 2019, Seite(n) 68-99, ISBN 978-3-030-17652-5
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-17653-2_3

Short Threshold Dynamic Group Signatures

Autoren: Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa
Veröffentlicht in: Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings, Ausgabe 12238, 2020, Seite(n) 401-423, ISBN 978-3-030-57989-0
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-57990-6_20

Identity Management: State of the Art, Challenges and Perspectives

Autoren: Tore Kasper Frederiksen, Julia Hesse, Anja Lehmann, Rafael Torres Moreno
Veröffentlicht in: Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers, Ausgabe 576, 2020, Seite(n) 45-62, ISBN 978-3-030-42503-6
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-42504-3_4

Deploying Personalized Oblivious Mobile Identity

Autoren: Georgia Sourla, Evangelos Sakkopoulos
Veröffentlicht in: Knowledge-Based Software Engineering: 2020 - Proceedings of the 13th International Joint Conference on Knowledge-Based Software Engineering (JCKBSE 2020), Larnaca, Cyprus, August 24-26, 2020, Ausgabe 19, 2020, Seite(n) 162-177, ISBN 978-3-030-53948-1
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-53949-8_15

Public-Key Generation with Verifiable Randomness

Autoren: Olivier Blazy, Patrick Towa, Damien Vergnaud
Veröffentlicht in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I, Ausgabe 12491, 2020, Seite(n) 97-127, ISBN 978-3-030-64836-7
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-64837-4_4

Separating Symmetric and Asymmetric Password-Authenticated Key Exchange

Autoren: Julia Hesse
Veröffentlicht in: Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings, Ausgabe 12238, 2020, Seite(n) 579-599, ISBN 978-3-030-57989-0
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-57990-6_29

Implementation and evaluation of a privacy-preserving distributed ABC scheme based on multi-signatures

Autoren: Jesús García-Rodríguez, Rafael Torres Moreno, Jorge Bernal Bernabe, Antonio Skarmeta
Veröffentlicht in: Journal of Information Security and Applications, Ausgabe 62, 2021, Seite(n) 102971, ISSN 2214-2126
Herausgeber: -
DOI: 10.1016/j.jisa.2021.102971

ScrambleDB: Oblivious (Chameleon) Pseudonymization-as-a-Service

Autoren: Anja Lehmann
Veröffentlicht in: Proceedings on Privacy Enhancing Technologies, Ausgabe 2019/3, 2019, Seite(n) 289-309, ISSN 2299-0984
Herausgeber: -
DOI: 10.2478/popets-2019-0048

The OLYMPUS Architecture—Oblivious Identity Management for Private User-Friendly Services

Autoren: Rafael Torres Moreno, Jorge Bernal Bernabe, Jesús García Rodríguez, Tore Kasper Frederiksen, Michael Stausholm, Noelia Martínez, Evangelos Sakkopoulos, Nuno Ponte, Antonio Skarmeta
Veröffentlicht in: Sensors, Ausgabe 20/3, 2020, Seite(n) 945, ISSN 1424-8220
Herausgeber: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s20030945

Privacy-Preserving Solutions for Blockchain: Review and Challenges

Autoren: Jorge Bernal Bernabe, Jose Luis Canovas, Jose L. Hernandez-Ramos, Rafael Torres Moreno, Antonio Skarmeta
Veröffentlicht in: IEEE Access, Ausgabe 7, 2019, Seite(n) 164908-164940, ISSN 2169-3536
Herausgeber: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2019.2950872

A Trusted Approach for Decentralised and Privacy-Preserving Identity Management

Autoren: Rafael Torres Moreno, Jesus Garcia-Rodriguez, Jorge Bernal Bernabe, Antonio Skarmeta
Veröffentlicht in: IEEE Access, Ausgabe 9, 2021, Seite(n) 105788-105804, ISSN 2169-3536
Herausgeber: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2021.3099837

Security and privacy in the Internet of Things: Challenges Solutions

Autoren: Jorge Bernal Bernabe, Jose L. Canovas, Jose L. Hernandez-Ramos, Rafael Torres Moreno and A. Skarmeta
Veröffentlicht in: Security and privacy in the Internet of Things: Challenges Solutions, 2020, ISBN 978-1-64368-053-8
Herausgeber: IOS Press BV
DOI: 10.3233/aise27

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor