D6.1 Pilot Use Case Specification

Contributing Partners

AIT, ATOS, FOKUS, GUF, OTE, ICERT, KGH, LISPA

Executive Summary

The CREDENTIAL Wallet is a cloud service hosted set of security and application services. These services provide authentication and authorization mechanisms combined with novel cryptographic technologies like proxy-re-encryption1 and malleable signatures2.

Read more

D2.4 Vulnerability Catalogue

Contributing Partners

AIT, ATOS, FOKUS, GUF, TUG, OTE, LISPA

Executive Summary

On a high level, the central goal of the CREDENTIAL project is to develop a privacy-preserving data sharing platform (wallet) with integrated identity provider (IdP), which can be used to share authenticated data without the wallet learning any of the user's personal information.

Read more

D2.2 System Security Requirements, Risk and Threat Analysis – 1st Iteration

D2.2 System Security Requirements, Risk and Threat Analysis - 1st Iteration

Contributing Partners

AIT, ATOS, FOKUS, TUG, KAU, LISPA, SIC

Executive Summary

On a high level, the central goal of the CREDENTIAL project is to develop a privacy-preserving data sharing platform (wallet) with integrated identity provider (IdP), which can be used to share authenticated data without the wallet learning any of the user's personal information.

Read more

D2.1 Scenarios and Use-Cases

Contributing Partners

AIT, ATOS, FOKUS, TUG, OTE, ICERT, KGH, LISPA

Executive Summary

In traditional Identity and Access Management as a Service (IDMaaS) systems an Identity Provider (IdP) has full access to the user’s identity data. The shift of such services into the cloud discloses sensible user data to the cloud provider.

Read more

Towards a Unified Secure Cloud Service Development and Deployment Life-Cycle

Authors

Aleksandar Hudic (AIT Austrian Institute of Technology GmbH), Matthias Flittner (Karlsruhe Institute of Technology), Thomas Lorünser (AIT Austrian Institute of Technology GmbH), Philipp M. Radl (AIT Austrian Institute of Technology GmbH), Roland Bless (Karlsruhe Institute of Technology)

Abstract

Designing and developing cloud services is a challenging task that includes requirements engineering, secure service deployment, maintenance, assurance that proper actions have been taken to support security and, in addition, considering legal aspects.

Read more

Evaluation of Privacy-ABC Technologies – A Study on the Computational Efficiency

Authors

Fatbardh Veseli (Goethe University Frankfurt), Jetzabel Serna (Goethe University Frankfurt)

Abstract

Privacy-enhancing attribute-based credential (Privacy-ABC) technologies use different cryptographic methods to enhance the privacy of the users. This results in important practical differences between these technologies, especially with regard to efficiency, which have not been studied in depth, but is necessary for assessing their suitability for different user devices and for highly dynamic scenarios.

Read more

CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing

Authors

Felix Hörandner (Graz University of Technology), Stephan Krenn (AIT Austrian Institute of Technology GmbH), Andrea Migliavacca (Lombardia Informatica S.p.A.), Florian Thiemer (Fraunhofer FOKUS), and Bernd Zwattendorfer (Stiftung Secure Information and Communication Technologies)

Abstract

Data sharing – and in particular sharing of identity information – plays a vital role in many online systems.

Read more