Skip to main content
Weiter zur Homepage der Europäischen Kommission (öffnet in neuem Fenster)
Deutsch Deutsch
CORDIS - Forschungsergebnisse der EU
CORDIS

IdeNtity verifiCatiOn with privacy-preservinG credeNtIals for anonymous access To Online services

CORDIS bietet Links zu öffentlichen Ergebnissen und Veröffentlichungen von HORIZONT-Projekten.

Links zu Ergebnissen und Veröffentlichungen von RP7-Projekten sowie Links zu einigen Typen spezifischer Ergebnisse wie Datensätzen und Software werden dynamisch von OpenAIRE abgerufen.

Leistungen

Decentralized Identity and Consent Management (öffnet in neuem Fenster)

Extension of the developed platform to support the decentralized management of identity attributes using blockchain Implementation of a web application that will allow endusers to set their consent management preferences based on UMA User Managed Access standard

Final integrated system (öffnet in neuem Fenster)

Demonstration of the fully integrated INCOGNITO system

Artificial Intelligence (AI)-based assistant user experience assessment (öffnet in neuem Fenster)

Assessment of the enduser experience with the interactions of the automated assistant

Pilots in operation and end user assessment report (öffnet in neuem Fenster)

Demonstration of the pilots including final report on end users experience with detailed assessment for each pilots user group

Trusted computing for enhanced anonymous credentials (öffnet in neuem Fenster)

This deliverable will describe the integration of Trusted computing solutions to anonymous credentials as well as the performance evaluation of the developed solution

Specification and initial design of the Advanced User Experience / User Interface (UI/UX) Artificial Intelligence (AI)-based assistant pipeline (öffnet in neuem Fenster)

This deliverable documents the first stage of the design and components prototyping of the machine learning pipeline that will be the pillar of the Artificial Intelligence (AI)-based assistant.

Advanced security and privacy solutions (öffnet in neuem Fenster)

Security and privacy enhancements on the developed software stack as well as anonymized networks such as TOR The Onion Router

Pilots initial set up and progressing initial setup of the two pilots (öffnet in neuem Fenster)

The two pilots will be set up and first tests will run to prove their usability

Federated anonymous credentials (öffnet in neuem Fenster)

Design and implementation of the qualified anonymous framework that will be based on the cryptographic credentials software stacks. Integration of anonymous framework with device-centric authentication solutions such as FIDO (Fast IDentity Online).

Reference architecture (öffnet in neuem Fenster)

Report on system architecture, components and interfaces.

Identity Acquisition and Integration Platform (öffnet in neuem Fenster)

Full identity acquisition through a web and mobile application that will support acquisition from multiple soft proofs of identities and online accounts.

Initial system design and prototyping (öffnet in neuem Fenster)

This deliverable demonstrates the initial stand-alone prototype of the INCOGNITO system, to be used as basis for the initial pilot activities.

Overall user assessment (öffnet in neuem Fenster)

User experience assessment of all the developed software and refinements according to the obtained feedback

Veröffentlichungen

Trusted and Secure Self-Sovereign Identity framework (öffnet in neuem Fenster)

Autoren: Vaios Bolgouras; Anna Angelogianni; Ilias Politis; Christos Xenakis
Veröffentlicht in: Crossref, Ausgabe 7, 2022, ISBN 978-1-4503-9670-7
Herausgeber: Association for Computing Machinery
DOI: 10.1145/3538969.3544436

Multi-Attribute Decision Making-based Trust Score Calculation in Trust Management in IoT (öffnet in neuem Fenster)

Autoren: Michail Bampatsikos; Ilias Politis; Vaios Bolgouras; Christos Xenakis
Veröffentlicht in: Crossref, Ausgabe 4, 2023
Herausgeber: ACM
DOI: 10.1145/3600160.3605074

Enabling Qualified Anonymity for Enhanced User Privacy in the Digital Era (öffnet in neuem Fenster)

Autoren: Vaios Bolgouras, Konstantinos Papadamou, Ioana Stroinea, Michail Papadakis, George Gugulea, Michael Sirivianos, Christos Xenakis
Veröffentlicht in: 2023, ISBN 979-8-4007-0772-8
Herausgeber: Association for Computing Machinery
DOI: 10.1145/3600160.3605075

Securing the Flow: Security and Privacy Tools for Flow-based Programming (öffnet in neuem Fenster)

Autoren: Thodoris Ioannidis, Vaios Bolgouras, Christos Xenakis, Ilias Politis
Veröffentlicht in: 2023
Herausgeber: Association for Computing Machinery
DOI: 10.1145/3600160.3605089

BRIDGE: BRIDGing the gap bEtween CTI production and consumption (öffnet in neuem Fenster)

Autoren: Marios Karatisoglou; Aristeidis Farao; Vaios Bolgouras; Christos Xenakis
Veröffentlicht in: 2022 14th International Conference on Communications (COMM), Ausgabe 1, 2022
Herausgeber: IEEE
DOI: 10.1109/comm54429.2022.9817359

[Preprint] ObjectMap: Detecting Insecure Object Deserialization (öffnet in neuem Fenster)

Autoren: Koutroumpouchos Nikolaos; Lavdanis Georgios; Eleni, Veroni; Ntantogian Christoforos; Xenakis Christos
Veröffentlicht in: PCI '19: Proceedings of the 23rd Pan-Hellenic Conference on Informatics, 2019, Seite(n) 67-72
Herausgeber: ICPS Proceedings
DOI: 10.5281/zenodo.3553676

P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go. (öffnet in neuem Fenster)

Autoren: Aristeidis Farao; Eleni Veroni; Christoforos Ntantogian; Christos Xenakis
Veröffentlicht in: Ausgabe 8, Ausgabe 5, 2021, ISSN 1424-8220
Herausgeber: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s21082686

Defense strategies for Adversarial Machine Learning: A survey (öffnet in neuem Fenster)

Autoren: Panagiotis Bountakas, Apostolis Zarras, Alexios Lekidis, Christos Xenakis
Veröffentlicht in: Computer Science Review, 2023, ISSN 1574-0137
Herausgeber: Elsevier BV
DOI: 10.1016/j.cosrev.2023.100573

A Unified Graph-Based Approach to Disinformation Detection Using Contextual and Semantic Relations (öffnet in neuem Fenster)

Autoren: Marius Paraschiv; Nikos Salamanos; Costas Iordanou; Nikolaos Laoutaris; Michael Sirivianos
Veröffentlicht in: International AAAI Conference on Web and Social Media (ICWSM 2022), Ausgabe 8, 2022, ISSN 2334-0770
Herausgeber: AAAI Press
DOI: 10.1609/icwsm.v16i1.19331

Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication (öffnet in neuem Fenster)

Autoren: Kostantinos Papadamou; Savvas Zannettou; Bogdan-Cosmin Chifor; Sorin Teican; George Gugulea; Annamaria Recupero; Alberto Caponi; Claudio Pisa; Giuseppe Bianchi; Steven Gevers; Christos Xenakis; Michael Sirivianos
Veröffentlicht in: IEEE Transactions on Information Forensics and Security, Ausgabe 15, 2019, Seite(n) 2183 - 2193, ISSN 1556-6013
Herausgeber: Institute of Electrical and Electronics Engineers
DOI: 10.5281/zenodo.3578089

Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone. (öffnet in neuem Fenster)

Autoren: Nikolaos Koutroumpouchos; Christoforos Ntantogian; Christos Xenakis
Veröffentlicht in: ZENODO, Ausgabe 8, 2021, ISSN 1424-8220
Herausgeber: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s21020520

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor

Mein Booklet 0 0