Explore the words cloud of the ReCRED project. It provides you a very rough idea of what is the project "ReCRED" about.
The following table provides information about the project.
Coordinator |
UNIVERSITY OF PIRAEUS RESEARCH CENTER
Organization address contact info |
Coordinator Country | Greece [EL] |
Project website | http://www.recred.eu |
Total cost | 6˙325˙156 € |
EC max contribution | 4˙997˙242 € (79%) |
Programme |
1. H2020-EU.3.7. (Secure societies - Protecting freedom and security of Europe and its citizens) |
Code Call | H2020-DS-2014-1 |
Funding Scheme | IA |
Starting year | 2015 |
Duration (year-month-day) | from 2015-05-01 to 2018-04-30 |
Take a look of project's partnership.
# | ||||
---|---|---|---|---|
1 | UNIVERSITY OF PIRAEUS RESEARCH CENTER | EL (PIRAEUS) | coordinator | 514˙898.00 |
2 | VERIZON NEDERLAND BV | NL (AMSTERDAM) | participant | 524˙170.00 |
3 | TECHNOLOGIKO PANEPISTIMIO KYPROU | CY (LEMESOS) | participant | 516˙127.00 |
4 | TELEFONICA INVESTIGACION Y DESARROLLO SA | ES (MADRID) | participant | 491˙314.00 |
5 | CERTSIGN SA | RO (BUCURESTI) | participant | 487˙375.00 |
6 | WEDIA LIMITED | EL (N IRAKLEIO) | participant | 452˙418.00 |
7 | CONSORZIO NAZIONALE INTERUNIVERSITARIO PER LE TELECOMUNICAZIONI | IT (PARMA) | participant | 437˙500.00 |
8 | UNIVERSIDAD CARLOS III DE MADRID | ES (GETAFE (MADRID)) | participant | 430˙250.00 |
9 | UPCOM BVBA | BE (BRUXELLES) | participant | 427˙875.00 |
10 | EXUS SOFTWARE LTD | UK (LONDON) | participant | 365˙750.00 |
11 | DE PRODUCTIZERS BV | NL (WOUBRUGGE) | participant | 192˙062.00 |
12 | STUDIO PROFESSIONALE ASSOCIATO A BAKER & MCKENZIE | IT (MILANO) | participant | 157˙500.00 |
ReCRED’s ultimate goal is to promote the user’s personal mobile device to the role of a unified authentication and authorization proxy towards the digital world. ReCRED adopts an incrementally deployable strategy in two complementary directions: extensibility in the type and nature of supported stakeholders and services (from local access control to online service access), as well as flexibility and extensibility in the set of supported authentication and access control techniques; from widely established and traditional ones to emerging authentication and authorization protocols as well as cryptographically advanced attribute-based access control approaches. Simplicity, usability, and users privacy is accomplished by: i) hiding inside the device all the complexity involved in the aggregation and management of multiple digital identifiers and access control attribute credentials, as well as the relevant interaction with the network infrastructure and with identity consolidation services; ii) integrating in the device support for widespread identity management standards and their necessary extensions; and iii) controlling the exposure of user credentials to third party service providers. ReCRED addresses key security and privacy issues such as resilience to device loss, theft and impersonation, via a combination of: i) local user-to-device and remote device-to-service secure authentication mechanisms; ii) multi-factor authentication mechanisms based on behavioral and physiological user signatures not bound to the device; iii) usable identity management and privacy awareness tools; iv) usable tools that offer the ability for complex reasoning of authorization policies through advanced learning techniques. ReCRED’s viability will be assessed via four large-scale realistic pilots in real-world operational environments. The pilots will demonstrate the integration of the developed components and their suitability for end-users, so as to show their TRL7 readiness.
Advanced extensions: cryptographic attribute management, learning algorithms for complex ABAC reasoning, and privacy awareness tool | Documents, reports | 2019-05-31 11:41:10 |
Full identity consolidator and attributes acquisition | Demonstrators, pilots, prototypes | 2019-05-31 11:41:02 |
Online identity and profile management | Documents, reports | 2019-05-31 11:40:57 |
Business and technical requirements (revised) | Documents, reports | 2019-05-31 11:41:12 |
Description of device-centric authentication (DCA) protocols and technology support | Other | 2019-05-31 11:41:22 |
Reference architecture | Documents, reports | 2019-05-31 11:41:17 |
Full design and prototype of the ABAC infrastructure | Other | 2019-05-31 11:41:10 |
Dissemination materials including website | Websites, patent fillings, videos etc. | 2019-05-31 11:41:08 |
Multifactor authentication for DCA: user to device and device to network support | Other | 2019-05-31 11:41:08 |
HCI concept testing on user groups | Documents, reports | 2019-05-31 11:41:04 |
Business and technical requirements | Documents, reports | 2019-05-31 11:41:19 |
Second Dissemination report | Documents, reports | 2019-05-31 11:41:18 |
Campus-wide Wi-Fi and web services access control pilot set up | Other | 2019-05-31 11:41:18 |
HCI concept testing on user groups (revised) | Documents, reports | 2019-05-31 11:41:19 |
First dissemination report | Documents, reports | 2019-05-31 11:41:20 |
Description of device-centric authentication (DCA) protocols and technology support (revised and extended) | Documents, reports | 2019-05-31 11:41:10 |
All four pilots initial set up and progressing | Other | 2019-05-31 11:41:25 |
Specification and initial design of the ABAC infrastructure | Documents, reports | 2019-05-31 11:41:03 |
All pilots in operation and end user assessment report (campus, ISIC student authentication and offers, Age verification online gateway, Microloan origination) | Other | 2019-05-31 11:41:17 |
Reference architecture (revised) | Documents, reports | 2019-05-31 11:41:19 |
Market research report | Documents, reports | 2019-05-31 11:41:11 |
Multifactor authentication for DCA: user to device and device to network support (revised and extended) | Other | 2019-05-31 11:41:19 |
Identity consolidator baseline platform | Documents, reports | 2019-05-31 11:41:04 |
Final Dissemination report | Documents, reports | 2019-02-27 09:49:59 |
Take a look to the deliverables list in detail: detailed list of ReCRED deliverables.
year | authors and title | journal | last update |
---|---|---|---|
2018 |
Kostantinos Papadamou; Savvas Zannettou; Giuseppe Bianchi; Alberto Caponi; Annamaria Recupero; Steven Gevers; George Gugulea; Sorin Teican; Bogdan Chifor; Christos Xenakis; Michael Sirivianos Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication published pages: , ISSN: 1556-6021, DOI: 10.5281/zenodo.2556599 |
IEEE Transactions on Information Forensics and Security 7 | 2020-01-30 |
2016 |
M. Marciel, R. Cuevas, A. Banchs, R. Gonzalez, S. Traverso, M. Ahmed, A. Azcorra Understanding the detection of fake-view fraud in Video Content Portal published pages: , ISSN: , DOI: |
25th International World Wide Web Conference (WWW) | 2019-06-11 |
2016 |
Evgenia Christoforou, Antonio Fernández Anta, Chryssis Georgiou, Miguel A. Mosteiro Internet Computing: Using Reputation to Select Workers from a Pool published pages: , ISSN: , DOI: |
Proceedings of the 4th International Conference on Networked Systems (NETYS 2016) annual | 2019-06-11 |
2015 |
Alexia Chatzikonstantinou, Christoforos Ntantogian, Georgios
Karopoulos, Christos Xenakis Evaluation of Cryptography Usage in Android Applications published pages: , ISSN: , DOI: 10.5281/zenodo.46623 |
9th EAI International Conference on Bio-inspired Information and Communications Technologies December 2015 | 2019-06-11 |
2016 |
Kwstantinos Papadamou, Riginos Samaras, Michael Sirivianos Ensuring Authenticity and Fidelity of Captured Photos Using Trusted Execution and Mobile Application Licensing Capabilities published pages: , ISSN: , DOI: |
FASES 2016 - Workshop on Future Access Control, Identity Management and Privacy Preserving Solutions in Internet Services | 2019-06-11 |
2015 |
Juan Miguel Carrascosa, Ruben Cuevas, Roberto Gonzalez, Arturo Azcorra, David Garcia Quantifying the Economic and Cultural Biases of Social Media through Trending Topics published pages: e0134407, ISSN: 1932-6203, DOI: 10.1371/journal.pone.0134407 |
PLOS ONE 10/7 | 2019-06-11 |
2016 |
Moreno Ambrosin, Arman Anzanpour, Mauro Conti, Tooska Dargahi, Sanaz Rahimi Moosavi, Amir M. Rahmani, Pasi Liljeberg On the Feasibility of Attribute-Based Encryption on Internet of Things Devices published pages: 25-35, ISSN: 0272-1732, DOI: 10.1109/MM.2016.101 |
IEEE Micro 36/6 | 2019-06-11 |
2016 |
Evgenia Christoforou, Antonio Fernández Anta, Chryssis Georgiou, Miguel A. Mosteiro Internet Computing: Using Reputation to Select Workers from a Pool published pages: , ISSN: 2331-8422, DOI: |
CoRR arXiv abs/1603.04394 | 2019-06-11 |
2015 |
J. Carrascosa, J. Mikians, R. Cuevas, V. Erramilli, N. Laoutaris I Always Feel Like Somebody\'s Watching Me. Measuring Online Behavioural Advertising published pages: , ISSN: , DOI: |
11th ACM International Conference on emerging Networking Experiments and Technologies (ACM CoNEXT). | 2019-06-11 |
2016 |
Christos Xenakis, Christoforos Ntantogian, Orestis Panos (U)SimMonitor: A mobile application for security evaluation of cellular networks published pages: 62-78, ISSN: 0167-4048, DOI: 10.1016/j.cose.2016.03.005 |
Computers & Security 60 | 2019-06-11 |
2016 |
Nicolas Nicolaou, Antonio Fernández Anta, Chryssis Georgiou CoVer-ability: Consistent Versioning for Concurrent Objects published pages: , ISSN: 2331-8422, DOI: |
CoRR arXiv abs/1601.07352 | 2019-06-11 |
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "RECRED" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "RECRED" are provided by the European Opendata Portal: CORDIS opendata.