D7.7 Protocols and Software Integration Guidelines

Contributing Partners

TUG, SIC

Executive Summary 

In identity- and access management (IAM), an identity provider (IdP) forwards identity attributes to a service provider (SP) on an untrusted network. The Transport Layer Security (TLS) protocol protects the integrity and the confidentiality of these attributes in transit, but it only establishes protection in between nodes and not from one end to the other end, which means that intermediaries, such as IdPs, have access to sensitive information.

Read more

D7.3 Exploitation Plan and Report

Contributing Partners

KGH, AIT, ATOS, FOKUS, GUF, TUG, OTE, ICERT, KAU, SIC

Executive Summary

The objective of this deliverable D7.3 – “Exploitation Plan and report” is to approach to the project exploitation by presenting the exploitation strategy that will be enforced during the project lifetime (from September 2015 to September 2018).

Read more

D7.2 Business Plan

Contributing Partners

KGH, AIT, ATOS, FOKUS, GUF, TUG, OTE, ICERT, KAU, SIC

Executive Summary 

The objective of this deliverable D7.2 – “Initial and Final Business Plan” is to define the overall strategy to ensure the gear transfer to the security market the project outcomes.

Read more

D7.12 Final Report on Standardization Activities and Achievements

Contributing Partners

AIT, GUF, SIC

Executive Summary 

This document summarizes the standardization and certification activities undertaken in the credential project. It represents the second and final iteration of the Standards Activity Reports. While the first iteration mainly explained our initial plans, strategies, and activities to diffuse project results into standards and certifications, this report complements the first iteration by reporting efforts taken towards standardization and liaison activities over the entire project duration, and beyond.

Read more

D7.11 Communication and Dissemination Activity Report 3

Contributing Partners

KGH, AIT

Executive Summary

Dissemination and communication of project results is essential for CREDENTIAL and it is the mission of the project that all results will be widely communicated and disseminated to the target audience. This deliverable is prepared within tasks T7.3 “Liaison and standardization activities”, T7.5 “External project communication” and T7.6 “Dissemination of foreground knowledge”.  

Read more

D5.7 Test and Evaluation Report

Contributing Partners

AIT, ATOS, FOKUS, GUF, KGH, LISPA, OTE, TUG

Executive Summary 

Software testing is an integral part of the software development lifecycle. For systems handling potentially sensitive information, not only the functionality but also the security and privacy of the system need to be properly tested and validated.

Read more

D6.5 – Test and Evaluation Report of Pilot Domain 2 (eHealth)

Contributing Partners

FOKUS, KGH, GUF

Executive Summary

The eHealth pilot is one of the domain-specific applications developed to showcase functionalities offered by CREDENTIAL Wallet, providing authentication and authorization mechanism combined with novel cryptographic technologies, like proxy re-encryption. This document describes how the pilot testing has been carried out for both the patient and the doctors app.

Read more

D6.6 – Test and Evaluation Report of Pilot Domain 3 (eBusiness)

Contributing Partners

ICERT

Executive Summary

The e-Business pilot integrates CREDENTIAL components and services to showcase the technologies of proxy re-encryption and redactable signatures developed among the project partners. In particular, it integrates the authentication and authorization flows offered by the Wallet service and it uses the crypto libraries developed within this project to manage re-encrypted data.

Read more

D6.4 – Test and Evaluation Report of Pilot Domain 1 (eGovernment)

Contributing Partners

LISPA

Executive Summary

The eGovernment pilot is one of the domain-specific application developed to showcase functionalities offered by CREDENTIAL Wallet, providing authentication and authorization mechanism combined with novel cryptographic technologies, like proxy re-encryption and redactable signatures. This document describes how the pilot has been tested, both with quantitative and qualitative criteria, according to KPIs defined in deliverable D6.1: in that document, clear key performance indicators to keep track of were defined, and how to take actions within the pilot in order to measure them.

Read more

D6.8 – Authorisations and Notifications

Contributing Partners

AIT, FOKUS, ICERT, KGH, LISPA, OTE

Executive Summary

This document contains a collection of all consent forms signed by the pilot participants within the CREDENTIAL project, thereby complementing deliverables D8.1, D8.2, and D8.3 that contained the necessary approvals from the Ethics Committee and our external ethics advisor.

Read more