Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

IdeNtity verifiCatiOn with privacy-preservinG credeNtIals for anonymous access To Online services

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Decentralized Identity and Consent Management (opens in new window)

Extension of the developed platform to support the decentralized management of identity attributes using blockchain Implementation of a web application that will allow endusers to set their consent management preferences based on UMA User Managed Access standard

Final integrated system (opens in new window)

Demonstration of the fully integrated INCOGNITO system

Artificial Intelligence (AI)-based assistant user experience assessment (opens in new window)

Assessment of the enduser experience with the interactions of the automated assistant

Pilots in operation and end user assessment report (opens in new window)

Demonstration of the pilots including final report on end users experience with detailed assessment for each pilots user group

Trusted computing for enhanced anonymous credentials (opens in new window)

This deliverable will describe the integration of Trusted computing solutions to anonymous credentials as well as the performance evaluation of the developed solution

Specification and initial design of the Advanced User Experience / User Interface (UI/UX) Artificial Intelligence (AI)-based assistant pipeline (opens in new window)

This deliverable documents the first stage of the design and components prototyping of the machine learning pipeline that will be the pillar of the Artificial Intelligence (AI)-based assistant.

Advanced security and privacy solutions (opens in new window)

Security and privacy enhancements on the developed software stack as well as anonymized networks such as TOR The Onion Router

Pilots initial set up and progressing initial setup of the two pilots (opens in new window)

The two pilots will be set up and first tests will run to prove their usability

Federated anonymous credentials (opens in new window)

Design and implementation of the qualified anonymous framework that will be based on the cryptographic credentials software stacks. Integration of anonymous framework with device-centric authentication solutions such as FIDO (Fast IDentity Online).

Reference architecture (opens in new window)

Report on system architecture, components and interfaces.

Identity Acquisition and Integration Platform (opens in new window)

Full identity acquisition through a web and mobile application that will support acquisition from multiple soft proofs of identities and online accounts.

Initial system design and prototyping (opens in new window)

This deliverable demonstrates the initial stand-alone prototype of the INCOGNITO system, to be used as basis for the initial pilot activities.

Overall user assessment (opens in new window)

User experience assessment of all the developed software and refinements according to the obtained feedback

Publications

Trusted and Secure Self-Sovereign Identity framework (opens in new window)

Author(s): Vaios Bolgouras; Anna Angelogianni; Ilias Politis; Christos Xenakis
Published in: Crossref, Issue 7, 2022, ISBN 978-1-4503-9670-7
Publisher: Association for Computing Machinery
DOI: 10.1145/3538969.3544436

Multi-Attribute Decision Making-based Trust Score Calculation in Trust Management in IoT (opens in new window)

Author(s): Michail Bampatsikos; Ilias Politis; Vaios Bolgouras; Christos Xenakis
Published in: Crossref, Issue 4, 2023
Publisher: ACM
DOI: 10.1145/3600160.3605074

Enabling Qualified Anonymity for Enhanced User Privacy in the Digital Era (opens in new window)

Author(s): Vaios Bolgouras, Konstantinos Papadamou, Ioana Stroinea, Michail Papadakis, George Gugulea, Michael Sirivianos, Christos Xenakis
Published in: 2023, ISBN 979-8-4007-0772-8
Publisher: Association for Computing Machinery
DOI: 10.1145/3600160.3605075

Securing the Flow: Security and Privacy Tools for Flow-based Programming (opens in new window)

Author(s): Thodoris Ioannidis, Vaios Bolgouras, Christos Xenakis, Ilias Politis
Published in: 2023
Publisher: Association for Computing Machinery
DOI: 10.1145/3600160.3605089

BRIDGE: BRIDGing the gap bEtween CTI production and consumption (opens in new window)

Author(s): Marios Karatisoglou; Aristeidis Farao; Vaios Bolgouras; Christos Xenakis
Published in: 2022 14th International Conference on Communications (COMM), Issue 1, 2022
Publisher: IEEE
DOI: 10.1109/comm54429.2022.9817359

[Preprint] ObjectMap: Detecting Insecure Object Deserialization (opens in new window)

Author(s): Koutroumpouchos Nikolaos; Lavdanis Georgios; Eleni, Veroni; Ntantogian Christoforos; Xenakis Christos
Published in: PCI '19: Proceedings of the 23rd Pan-Hellenic Conference on Informatics, 2019, Page(s) 67-72
Publisher: ICPS Proceedings
DOI: 10.5281/zenodo.3553676

P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go. (opens in new window)

Author(s): Aristeidis Farao; Eleni Veroni; Christoforos Ntantogian; Christos Xenakis
Published in: Issue 8, Issue 5, 2021, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s21082686

Defense strategies for Adversarial Machine Learning: A survey (opens in new window)

Author(s): Panagiotis Bountakas, Apostolis Zarras, Alexios Lekidis, Christos Xenakis
Published in: Computer Science Review, 2023, ISSN 1574-0137
Publisher: Elsevier BV
DOI: 10.1016/j.cosrev.2023.100573

A Unified Graph-Based Approach to Disinformation Detection Using Contextual and Semantic Relations (opens in new window)

Author(s): Marius Paraschiv; Nikos Salamanos; Costas Iordanou; Nikolaos Laoutaris; Michael Sirivianos
Published in: International AAAI Conference on Web and Social Media (ICWSM 2022), Issue 8, 2022, ISSN 2334-0770
Publisher: AAAI Press
DOI: 10.1609/icwsm.v16i1.19331

Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication (opens in new window)

Author(s): Kostantinos Papadamou; Savvas Zannettou; Bogdan-Cosmin Chifor; Sorin Teican; George Gugulea; Annamaria Recupero; Alberto Caponi; Claudio Pisa; Giuseppe Bianchi; Steven Gevers; Christos Xenakis; Michael Sirivianos
Published in: IEEE Transactions on Information Forensics and Security, Issue 15, 2019, Page(s) 2183 - 2193, ISSN 1556-6013
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.5281/zenodo.3578089

Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone. (opens in new window)

Author(s): Nikolaos Koutroumpouchos; Christoforos Ntantogian; Christos Xenakis
Published in: ZENODO, Issue 8, 2021, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s21020520

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0