Explore the words cloud of the CREDENTIAL project. It provides you a very rough idea of what is the project "CREDENTIAL" about.
The following table provides information about the project.
Coordinator |
AIT AUSTRIAN INSTITUTE OF TECHNOLOGY GMBH
Organization address contact info |
Coordinator Country | Austria [AT] |
Project website | https://credential.eu |
Total cost | 6˙686˙660 € |
EC max contribution | 5˙978˙082 € (89%) |
Programme |
1. H2020-EU.3.7. (Secure societies - Protecting freedom and security of Europe and its citizens) |
Code Call | H2020-DS-2014-1 |
Funding Scheme | IA |
Starting year | 2015 |
Duration (year-month-day) | from 2015-10-01 to 2018-09-30 |
Take a look of project's partnership.
With increasing mobility and Internet usage, the demand for digital services increases and has reached critical and high assurance domains like e-Government, e-Health and e-Business. Those domains have high security and privacy requirements and hence will be harnessed with various novel mechanisms for secure access. Approaches for handling the resulting variety of authentication and authorisation mechanisms include the use of digital identity and access management systems (IAM). Like other technologies IAMs follow the trend of using cloud services. This allows abstracting over used resources and enables ubiquitous access to identity data which is stored and processed in the cloud, but also results in an additional degree of complexity for securely operating IAMs. The goal of CREDENTIAL is to develop, test and showcase innovative cloud based services for storing, managing, and sharing digital identity information and other critical personal data. The security of these services relies on the combination of strong hardware-based multi-factor authentication with end-to-end encryption representing a significant advantage over current password-based authentication schemes. The use of sophisticated proxy cryptography schemes will enable a secure and privacy preserving information sharing network for cloud-based identity information in which even the identity provider cannot access the data in plain-text and hence protect access to identity data. We focus not only on evaluating and applying novel crypto-approaches for IAMs but also on implementing them in an easy-to-use way to motivate secure handling of identity data. In order to also address security, privacy and trust issues related to the used cloud platforms and services we will investigate assurance and resilience approaches for enhancing underlying cloud services. To empirically evaluate our work and to produce outputs of a high technical readiness we will consider use cases from all three domains mentioned above.
Pilot use case specification | Documents, reports | 2019-08-06 17:55:00 |
Cloud identity wallet requirements | Documents, reports | 2019-08-06 17:55:00 |
UI Prototypes V1 | Documents, reports | 2019-08-06 17:55:00 |
System security requirements, risk and threat analysis – 1st iteration | Documents, reports | 2019-08-06 17:55:00 |
Recommendations on privacy-enhancing mechanisms | Documents, reports | 2019-08-06 17:55:00 |
Project home page and collaboration platform | Websites, patent fillings, videos etc. | 2019-08-06 17:55:00 |
Functional Design | Documents, reports | 2019-08-06 17:55:00 |
Public project web presence | Websites, patent fillings, videos etc. | 2019-08-06 17:55:00 |
Vulnerability catalogue | Documents, reports | 2019-08-06 17:55:00 |
Scenarios and use-cases | Documents, reports | 2019-08-06 17:55:00 |
Assessment report on cryptographic technologies, protocols and mechanisms | Documents, reports | 2019-08-06 17:55:00 |
Guidelines for secure authentication to the cloud | Documents, reports | 2019-08-06 17:54:59 |
Recommendations for improving identity protocols | Documents, reports | 2019-08-06 17:54:59 |
Protocol and software integration guidelines | Documents, reports | 2019-08-06 17:54:59 |
Recommendations for operating the CREDENTIAL wallet | Documents, reports | 2019-08-06 17:54:59 |
Security enhancements for basic cryptographic technologies | Documents, reports | 2019-08-06 17:54:59 |
System security requirements, risk and threat analysis – 2nd iteration | Documents, reports | 2019-08-06 17:54:59 |
Final report on standardization activities and achievements | Documents, reports | 2019-08-06 17:54:59 |
Communication and dissemination kit | Websites, patent fillings, videos etc. | 2019-08-06 17:55:00 |
CREDENTIAL technology overview and recommendations for applications | Documents, reports | 2019-08-06 17:54:59 |
Test and evaluation report of pilot domain 3 (e-Business) | Demonstrators, pilots, prototypes | 2019-08-06 17:54:59 |
Test and evaluation report of pilot domain 1 (e-Government) | Demonstrators, pilots, prototypes | 2019-08-06 17:54:59 |
Exploitation Plan and Report | Documents, reports | 2019-08-06 17:54:59 |
Gap analysis for current identity management standards | Documents, reports | 2019-08-06 17:54:59 |
User centric privacy and usability requirements | Documents, reports | 2019-08-06 17:54:59 |
Proxy cryptography potential for current identity management solutions | Documents, reports | 2019-08-06 17:54:59 |
Identity wallet service | Demonstrators, pilots, prototypes | 2019-08-06 17:54:59 |
UI Prototypes V2 and HCI Patterns | Documents, reports | 2019-08-06 17:54:59 |
Test and evaluation report of pilot domain 2 (e-Health) | Demonstrators, pilots, prototypes | 2019-08-06 17:54:59 |
Take a look to the deliverables list in detail: detailed list of CREDENTIAL deliverables.
year | authors and title | journal | last update |
---|---|---|---|
2016 |
Bernd Zwattendorfer, Daniel Slamanig The Austrian eID ecosystem in the public cloud: How to obtain privacy while preserving practicality published pages: 35-53, ISSN: 2214-2126, DOI: 10.1016/j.jisa.2015.11.004 |
Journal of Information Security and Applications 27-28 | 2019-08-06 |
2016 |
Bernd Zwattendorfer, Stephan Krenn, Thomas Lorünser Secure and Privacy Preserving Identity Management in the Cloud published pages: 44-45, ISSN: 0926-4981, DOI: |
ERCIM News No. 104 January 2016 | 2019-08-06 |
2018 |
David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, and Christoph Striecks Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications published pages: , ISSN: , DOI: |
PKC | 2019-08-06 |
2017 |
Marco Ghiglieri, Melanie Volkamer, and Karen Renaud Exploring Consumers\' Attitudes of Smart TV Related Privacy Risks published pages: , ISSN: , DOI: |
HCI International | 2019-08-06 |
2017 |
Farzaneh Karegar, Daniel Lindegren, John Sören Pettersson, Simone Fischer-Hübner Assessments of a Cloud-Based Data Wallet for Personal Identity Management published pages: , ISSN: , DOI: |
26th International Conference on Information Systems Development | 2019-08-06 |
2018 |
Farzaneh Karegar, Nina Gerber, Melanie Volkamer, and Simone Fischer-Hübner Helping Johnny to Make Informed Decisions in the Context of Social Login published pages: , ISSN: , DOI: |
ACM/SIGAPP Symposium On Applied Computing | 2019-08-06 |
2017 |
Oksana Kulyk, Benjamin Maximilian Reinheimer, and Melanie Volkamer Sharing Information with Web Services - A Mental Model Approach in the Context of Optional Information published pages: , ISSN: , DOI: |
HCI International | 2019-08-06 |
2018 |
David Derler, Tibor Jager, Daniel Slamanig, and Christoph Striecks Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange published pages: , ISSN: , DOI: |
EUROCRYPT | 2019-08-06 |
2017 |
Stephan Krenn, Thomas Lorünser, Anja Salzer, Christoph Striecks Towards Attribute-Based Credentials in the Cloud published pages: , ISSN: , DOI: |
CANS 2017 | 2019-08-06 |
2016 |
Nicolás Notario, Stephan Krenn, Bernd Zwattendorfer, Felix Hörandner CREDENTIAL: seCuRE clouD idENTIty wALlet published pages: 11-12, ISSN: 0926-4981, DOI: |
ERCIM News No. 106 July 2016 | 2019-08-06 |
2016 |
Gallego-Nicasio Crespo, Beatriz; PRIETO, Elsa; RIOS, Erkuden; Rak, Massimiliano; Deussen, Peter; Samarati, Pierangela; Cascella, Roberto; Braun, Simons; Krenn, Stephan; Lörunser, Thomas Research and innovation challenges in data protection, security and privacy in the cloud: Map of synergies of the clustered projects - version 2.0 published pages: , ISSN: , DOI: 10.13140/RG.2.2.22406.37444 |
2019-08-06 | |
2017 |
Pritam Dash, Christoph Rabensteiner, Felix Hörandner, Simon Roth Towards Privacy-Preserving and User-Centric Identity Management as a Service published pages: , ISSN: , DOI: |
Open Identity Summit 2017 | 2019-08-06 |
2016 |
Farzaneh Karegar, Christoph Striecks, Stephan Krenn, Felix Hörandner, Thomas Lorünser, and Simone Fischer-Hübner Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider published pages: , ISSN: , DOI: |
IFIP Privacy and Identity Management | 2019-08-06 |
2016 |
Aljosa Pasic, Beatriz Gallego, Bernd Zwattendorfer, Bojan Suzic, Elsa Prieto, Erkuden Rios, Josep Domingo-Ferrer, Julia Vuong, Massimiliano Rak, Nicholas Ferguson, Nuria RodrÃguez, Peter H. Deussen, Pierangela Samarati, Roberto Cascella, Sabrina de Capitani, Simone Braun, Stephan Krenn, Stephanie Parker, Thomas Länger, Thomas Lorünser, Zhiming Zhao Challenges for trustworthy (multi-)Cloud-based services in the Digital Single Market published pages: , ISSN: , DOI: |
2019-08-06 | |
2017 |
Pasquale Chiaro, Simone Fischer-Hübner, Thomas Groß, Stephan Krenn, Thomas Lorünser, Ana Isabel MartıÌnez GarcıÌa, Andrea Migliavacca, Kai Rannenberg, Daniel Slamanig, Christoph Striecks, and Alberto Zanini Secure and Privacy-Friendly Storage and Data Processing in the Cloud published pages: , ISSN: , DOI: |
IFIP Privacy and Identity Management | 2019-08-06 |
2017 |
Thomas Lorünser, Stephan Krenn, Christoph Striecks, Thomas Länger Agile cryptographic solutions for the cloud published pages: , ISSN: 0932-383X, DOI: 10.1007/s00502-017-0519-x |
e & i Elektrotechnik und Informationstechnik | 2019-08-06 |
2017 |
David Derler, Sebastian Ramacher, and Daniel Slamanig Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation published pages: , ISSN: , DOI: |
Financial Cryptography and Data Security | 2019-08-06 |
2019 |
Fatbardh Veseli, Jetzabel Serna Olvera, and Kai Rannenberg Engineering Privacy by Design - Lessons from the Design and Implementation of an Identity Wallet Platform published pages: , ISSN: , DOI: |
ACM/SIGAPP Symposium On Applied Computing | 2019-08-06 |
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "CREDENTIAL" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "CREDENTIAL" are provided by the European Opendata Portal: CORDIS opendata.