D7.7 Protocols and Software Integration Guidelines

Contributing Partners

TUG, SIC

Executive Summary 

In identity- and access management (IAM), an identity provider (IdP) forwards identity attributes to a service provider (SP) on an untrusted network. The Transport Layer Security (TLS) protocol protects the integrity and the confidentiality of these attributes in transit, but it only establishes protection in between nodes and not from one end to the other end, which means that intermediaries, such as IdPs, have access to sensitive information.

Read more

D7.3 Exploitation Plan and Report

Contributing Partners

KGH, AIT, ATOS, FOKUS, GUF, TUG, OTE, ICERT, KAU, SIC

Executive Summary

The objective of this deliverable D7.3 – “Exploitation Plan and report” is to approach to the project exploitation by presenting the exploitation strategy that will be enforced during the project lifetime (from September 2015 to September 2018).

Read more

D7.2 Business Plan

Contributing Partners

KGH, AIT, ATOS, FOKUS, GUF, TUG, OTE, ICERT, KAU, SIC

Executive Summary 

The objective of this deliverable D7.2 – “Initial and Final Business Plan” is to define the overall strategy to ensure the gear transfer to the security market the project outcomes.

Read more

D7.12 Final Report on Standardization Activities and Achievements

Contributing Partners

AIT, GUF, SIC

Executive Summary 

This document summarizes the standardization and certification activities undertaken in the credential project. It represents the second and final iteration of the Standards Activity Reports. While the first iteration mainly explained our initial plans, strategies, and activities to diffuse project results into standards and certifications, this report complements the first iteration by reporting efforts taken towards standardization and liaison activities over the entire project duration, and beyond.

Read more

D7.11 Communication and Dissemination Activity Report 3

Contributing Partners

KGH, AIT

Executive Summary

Dissemination and communication of project results is essential for CREDENTIAL and it is the mission of the project that all results will be widely communicated and disseminated to the target audience. This deliverable is prepared within tasks T7.3 “Liaison and standardization activities”, T7.5 “External project communication” and T7.6 “Dissemination of foreground knowledge”.  

Read more

D5.7 Test and Evaluation Report

Contributing Partners

AIT, ATOS, FOKUS, GUF, KGH, LISPA, OTE, TUG

Executive Summary 

Software testing is an integral part of the software development lifecycle. For systems handling potentially sensitive information, not only the functionality but also the security and privacy of the system need to be properly tested and validated.

Read more

Protean Signature Schemes

Title

Protean Signature Schemes

Authors

Stephan Krenn (AIT), Henrich C. Pöhls (UNI PASSAU), Kai Samelin (IBM Research Zurich), Daniel Slamanig (AIT)

Abstract

We introduce the notion of Protean Signature schemes. This novel type of signature scheme allows to remove and edit signer-chosen parts of signed messages by a semi-trusted third party simultaneously.

Read more

D6.5 – Test and Evaluation Report of Pilot Domain 2 (eHealth)

Contributing Partners

FOKUS, KGH, GUF

Executive Summary

The eHealth pilot is one of the domain-specific applications developed to showcase functionalities offered by CREDENTIAL Wallet, providing authentication and authorization mechanism combined with novel cryptographic technologies, like proxy re-encryption. This document describes how the pilot testing has been carried out for both the patient and the doctors app.

Read more