Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

Oblivious identitY Management for Private and User-friendly Services

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

Public Workshop (se abrirá en una nueva ventana)

will disseminate and demonstrate results to raise awareness

OLYMPUS Future Business Development (se abrirá en una nueva ventana)

describes results from the evaluation with external stakeholders related possible business models based on the demonstrating capabilities of the OLYMPUS technologies in real working environments

Initial Version of Project’s Web Site (se abrirá en una nueva ventana)

will be updated on a monthly basis.

Requirements and Design Templates for OLYMPUS (se abrirá en una nueva ventana)

describes cross domain scenarios and related use-case requirements. Moreover, it contains design guidelines and detailed KPI for evaluation of OLYMPUS.

OLYMPUS Framework and Tools (se abrirá en una nueva ventana)

contains the final version of the integrated OLYMPUS framework including the tools developed in T52 and T53 It also contains the final specification of the deployment packages and software tools

OLYMPUS Benchmarking and Testing Environment (se abrirá en una nueva ventana)

contains a first version of the benchmarking and testing environment including a documentation of how to use it.

Business and Innovation Plans (se abrirá en una nueva ventana)
Quality Assurance Plan (se abrirá en una nueva ventana)

describes the quality system and procedures.

Final Public Report (se abrirá en una nueva ventana)

summarises the project results

First pilots deployment and initial evaluation (se abrirá en una nueva ventana)

describes real working pilotsMVPs corresponding to the two usecases and initial feedback

Intermediate Integrated OLYMPUS Framework and Tools (se abrirá en una nueva ventana)

contains a first version of the integrated OLYMPUS framework including the tools developed in T5.2 and T5.3. It also contains a specification of the deployment packages and software tools.

First Reference Implementation of Oblivious IdM (se abrirá en una nueva ventana)

describes the first implementation of the oblivious IdM solution including the APIs that are offered to higherlevel applications and the design security mechanisms and implementation of a solution to enable authentication in offline use cases with an oblivious IdM

OLYMPUS Blueprint (se abrirá en una nueva ventana)

outlines the overall OLYMPUS framework including its components and interfaces Further focus is on the required components to realize the novel cryptographic approaches of the intended ecosystem A first draft version IntD11 will be generated on M13 to WP3 and WP4 and based on the feedback of the initial evaluation a final version will be generated on M24

Final Pilot deployment and evaluation of User Experience and GDPR compliance (se abrirá en una nueva ventana)

reports on final description of the pilots deployment integration aspects and lesson learnt related to the user experiences with the solutions tested in the two use cases Also compliance report with a special focus in GDPR fulfillment

Use-case descriptions (se abrirá en una nueva ventana)

contains a complete list of requirement and specifications of the use-cases for demonstration and evaluation.

Second Reference Implementation of Oblivious IdM (se abrirá en una nueva ventana)

is an update on D32 reflecting the changes that were made to the implementation after incorporating feedback from the use cases

Security and Privacy-aware OLYMPUS Framework Impact Assessment (se abrirá en una nueva ventana)

This deliverable will describe how OLYMPUS will enhance the current IdM solutions and will provide a DPIA evaluation based on the GDPR regulation. Additionally this deliverable will answer ethics requirements for collection, storage, and protection of personal data.

Final Report on Dissemination, Exploitation and Standardisation Activities (se abrirá en una nueva ventana)

reports on results regarding dissemination exploitation and standardisation

Intermediate Report on Dissemination and Standardisation Activities (se abrirá en una nueva ventana)

reports on activities and plans for dissemination, exploitation and standardisation.

Project Handbook (se abrirá en una nueva ventana)

details project management and reporting procedures.

OLYMPUS support for extended eID models (se abrirá en una nueva ventana)

contains the analysis done for extending the capabilities of OLYMPUS for new functionalities like extended Document Signer or the possible extension to another physical identities holders for eg through bridging with eIDAS or STORK

OLYMPUS User Experience Design Guidelines (se abrirá en una nueva ventana)

A document describing the results of the user studies and how they are used to create a set of user experience design guidelines for OLYMPUS technology

Cryptographic Design of an Oblivious IdM System (se abrirá en una nueva ventana)

contains a full specification of the cryptographic protocols performed between the user device, partial IdPs, and the service provider.

Publicaciones

Towards a standardized model for privacy-preserving Verifiable Credentials (se abrirá en una nueva ventana)

Autores: Jesús García-Rodríguez, Rafael Torres Moreno, Jorge Bernal Bernabé, Antonio Skarmeta
Publicado en: The 16th International Conference on Availability, Reliability and Security, 2021, Página(s) 1-6, ISBN 9781450390514
Editor: ACM
DOI: 10.1145/3465481.3469204

A Holistic Approach to Enhanced Security and Privacy in Digital Health Passports (se abrirá en una nueva ventana)

Autores: Tore Frederiksen
Publicado en: The 16th International Conference on Availability, Reliability and Security, 2021, Página(s) 1-10, ISBN 9781450390514
Editor: ACM
DOI: 10.1145/3465481.3469212

Approaching the Data Protection Impact Assessment as a legal methodology to evaluate the degree of privacy by design achieved in technological proposals. A special reference to Identity Management systems (se abrirá en una nueva ventana)

Autores: Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos
Publicado en: The 16th International Conference on Availability, Reliability and Security, 2021, Página(s) 1-9, ISBN 9781450390514
Editor: ACM
DOI: 10.1145/3465481.3469207

Which authentication method to choose. A legal perspective on user-device authentication in IoT ecosystems (se abrirá en una nueva ventana)

Autores: Cristina Timón López, Ignacio Alamillo Alamillo Domingo, Julián Valero Valero Torrijos
Publicado en: The 16th International Conference on Availability, Reliability and Security, 2021, Página(s) 1-6, ISBN 9781450390514
Editor: ACM
DOI: 10.1145/3465481.3470068

Towards the Design of a Privacy-preserving Attribute Based Credentials-based Digital ID in Denmark – Usefulness, Barriers, and Recommendations (se abrirá en una nueva ventana)

Autores: Mads Schaarup Andersen
Publicado en: The 16th International Conference on Availability, Reliability and Security, 2021, Página(s) 1-8, ISBN 9781450390514
Editor: ACM
DOI: 10.1145/3465481.3469211

OLYMPUS: towards Oblivious identitY Management for Private and User-friendly Services (se abrirá en una nueva ventana)

Autores: Rafael Torres Moreno, Jorge Bernal Bernabe, Antonio Skarmeta, Michael Stausholm, Tore Kasper Frederiksen, Noelia Martinez, Nuno Ponte, Evangelos Sakkopoulos, Anja Lehmann
Publicado en: 2019 Global IoT Summit (GIoTS), Edición 2019, 2019, Página(s) 1-6, ISBN 978-1-7281-2171-0
Editor: IEEE
DOI: 10.1109/giots.2019.8766357

PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server (se abrirá en una nueva ventana)

Autores: Carsten Baum, Tore Frederiksen, Julia Hesse, Anja Lehmann, Avishay Yanai
Publicado en: 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 2020, Página(s) 587-606, ISBN 978-1-7281-5087-1
Editor: IEEE
DOI: 10.1109/eurosp48549.2020.00044

OLYMPUS: A distributed privacy-preserving identity management system (se abrirá en una nueva ventana)

Autores: Rafael Torres Moreno, Jesus Garcia Rodriguez, Cristina Timon Lopez, Jorge Bernal Bernabe, Antonio Skarmeta
Publicado en: 2020 Global Internet of Things Summit (GIoTS), 2020, Página(s) 1-6, ISBN 978-1-7281-6728-2
Editor: IEEE
DOI: 10.1109/giots49054.2020.9119663

Security Analysis of CPace

Autores: Michel Abdalla, Julia Hesse, Björn M. Haase
Publicado en: 2021
Editor: -

Implications juridiques relatives à la gestion de l’identité numérique et perspectives d’innovation en Europe

Autores: Cristina Timón López
Publicado en: 2020
Editor: -

Digital Identity Management: a key factor on the pursuit of privacy and the fight against cybercrime (se abrirá en una nueva ventana)

Autores: Cristina Timón, Julián Valero & Ignacio Alamillo
Publicado en: 2020, ISBN 978-84-17580-15-5
Editor: Huygens Editorial
DOI: 10.5281/zenodo.6242441

Fuzzy Asymmetric Password-Authenticated Key Exchange (se abrirá en una nueva ventana)

Autores: Andreas Erwig, Julia Hesse, Maximilian Orlt, Siavash Riahi
Publicado en: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II, Edición 12492, 2020, Página(s) 761-784, ISBN 978-3-030-64833-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-64834-3_26

Succinct Diophantine-Satisfiability Arguments (se abrirá en una nueva ventana)

Autores: Patrick Towa, Damien Vergnaud
Publicado en: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III, Edición 12493, 2020, Página(s) 774-804, ISBN 978-3-030-64839-8
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-64840-4_26

(R)CCA Secure Updatable Encryption with Integrity Protection (se abrirá en una nueva ventana)

Autores: Michael Klooß, Anja Lehmann, Andy Rupp
Publicado en: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I, Edición 11476, 2019, Página(s) 68-99, ISBN 978-3-030-17652-5
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-17653-2_3

Short Threshold Dynamic Group Signatures (se abrirá en una nueva ventana)

Autores: Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa
Publicado en: Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings, Edición 12238, 2020, Página(s) 401-423, ISBN 978-3-030-57989-0
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-57990-6_20

Identity Management: State of the Art, Challenges and Perspectives (se abrirá en una nueva ventana)

Autores: Tore Kasper Frederiksen, Julia Hesse, Anja Lehmann, Rafael Torres Moreno
Publicado en: Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers, Edición 576, 2020, Página(s) 45-62, ISBN 978-3-030-42503-6
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-42504-3_4

Deploying Personalized Oblivious Mobile Identity (se abrirá en una nueva ventana)

Autores: Georgia Sourla, Evangelos Sakkopoulos
Publicado en: Knowledge-Based Software Engineering: 2020 - Proceedings of the 13th International Joint Conference on Knowledge-Based Software Engineering (JCKBSE 2020), Larnaca, Cyprus, August 24-26, 2020, Edición 19, 2020, Página(s) 162-177, ISBN 978-3-030-53948-1
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-53949-8_15

Public-Key Generation with Verifiable Randomness (se abrirá en una nueva ventana)

Autores: Olivier Blazy, Patrick Towa, Damien Vergnaud
Publicado en: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I, Edición 12491, 2020, Página(s) 97-127, ISBN 978-3-030-64836-7
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-64837-4_4

Separating Symmetric and Asymmetric Password-Authenticated Key Exchange (se abrirá en una nueva ventana)

Autores: Julia Hesse
Publicado en: Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings, Edición 12238, 2020, Página(s) 579-599, ISBN 978-3-030-57989-0
Editor: Springer International Publishing
DOI: 10.1007/978-3-030-57990-6_29

Implementation and evaluation of a privacy-preserving distributed ABC scheme based on multi-signatures (se abrirá en una nueva ventana)

Autores: Jesús García-Rodríguez, Rafael Torres Moreno, Jorge Bernal Bernabe, Antonio Skarmeta
Publicado en: Journal of Information Security and Applications, Edición 62, 2021, Página(s) 102971, ISSN 2214-2126
Editor: -
DOI: 10.1016/j.jisa.2021.102971

ScrambleDB: Oblivious (Chameleon) Pseudonymization-as-a-Service (se abrirá en una nueva ventana)

Autores: Anja Lehmann
Publicado en: Proceedings on Privacy Enhancing Technologies, Edición 2019/3, 2019, Página(s) 289-309, ISSN 2299-0984
Editor: -
DOI: 10.2478/popets-2019-0048

The OLYMPUS Architecture—Oblivious Identity Management for Private User-Friendly Services (se abrirá en una nueva ventana)

Autores: Rafael Torres Moreno, Jorge Bernal Bernabe, Jesús García Rodríguez, Tore Kasper Frederiksen, Michael Stausholm, Noelia Martínez, Evangelos Sakkopoulos, Nuno Ponte, Antonio Skarmeta
Publicado en: Sensors, Edición 20/3, 2020, Página(s) 945, ISSN 1424-8220
Editor: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s20030945

Privacy-Preserving Solutions for Blockchain: Review and Challenges (se abrirá en una nueva ventana)

Autores: Jorge Bernal Bernabe, Jose Luis Canovas, Jose L. Hernandez-Ramos, Rafael Torres Moreno, Antonio Skarmeta
Publicado en: IEEE Access, Edición 7, 2019, Página(s) 164908-164940, ISSN 2169-3536
Editor: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2019.2950872

A Trusted Approach for Decentralised and Privacy-Preserving Identity Management (se abrirá en una nueva ventana)

Autores: Rafael Torres Moreno, Jesus Garcia-Rodriguez, Jorge Bernal Bernabe, Antonio Skarmeta
Publicado en: IEEE Access, Edición 9, 2021, Página(s) 105788-105804, ISSN 2169-3536
Editor: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2021.3099837

Security and privacy in the Internet of Things: Challenges Solutions (se abrirá en una nueva ventana)

Autores: Jorge Bernal Bernabe, Jose L. Canovas, Jose L. Hernandez-Ramos, Rafael Torres Moreno and A. Skarmeta
Publicado en: Security and privacy in the Internet of Things: Challenges Solutions, 2020, ISBN 978-1-64368-053-8
Editor: IOS Press BV
DOI: 10.3233/aise27

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0