D1.4 Year 1 management and progress report

Contributing Partners

AIT, ATOS, FOKUS, GUF, TUG, OTE, ICERT, KAU, KGH, LISPA, SIC

Executive Summary 

CREDENTIAL is an innovation action scheduled for 3 years (36 month) in the domain of security and privacy for cloud computing. This report titled “D1.4 Year 1 management and progress report” gives an overview on the project’s progress and achievements in the M01–M09 period of the project (October 2015 – June 2016) and summarizes activities undertaken in the respective work packages.

Read more

D1.2 Quality assurance plan

Contributing Partners

AIT, LISPA, OTE

Executive Summary 

The Quality Assurance Plan deliverable is setting out the quality practice, procedures and processes to provide assurance that the quality requirements are planned appropriately and to assure the achievement of the CREDENTIAL project objectives in the highest possible quality.

Read more

D1.1 Project handbook

Contributing Partners

AIT

Executive Summary 

This document underlines the management procedures for an effective tracking of the CREDENTIAL project development including a detailed description of the work plan and strategy.Especially, the principal aims of this handbook are to:

*give an overview of the CREDENTIAL project,
*lay down the rules for collaborative work within the project,
*define the procedures for communication, meetings, deliverables, and publications,
*describe the roles within the project and link them to persons, and
*provide templates for documents relevant to the CREDENTIAL project.

Read more

D5.1 Functional Design

Contributing Partners

ATOS, AIT, FOKUS, GUF, TUG, OTE, SIC

Executive Summary 

The CREDENTIAL system must support a set of generic business and logical use cases that are the result of the generalization of use cases linked to three different scenarios related to different domains.

Read more

D3.1 UI Prototypes v1

Contributing Partners

KAU, AIT, ATOS, FOKUS, GUF, KGH, LISPA, OTE

Executive Summary

The growth of internet has shown a wide range of applications in different domains. Often users need to prove their rights to access certain functions and information, be it email, bank accounts, or others, and also to provide information.

Read more