Opendata, web and dolomites

CASCAde SIGNED

Confidentiality-preserving Security Assurance

Total Cost €

0

EC-Contrib. €

0

Partnership

0

Views

0

 CASCAde project word cloud

Explore the words cloud of the CASCAde project. It provides you a very rough idea of what is the project "CASCAde" about.

six    pursues    hypothesis    journey    efficient    first    citizens    confidential    usable    advantages    preliminary    data    pursue    dependability    disclosing    attribute    investigation    dynamically    handle    solution    investigates    techniques    compelling    signature    connected    assurance    transactions    accepts    schemes    benefit    usability    keeping    maintaining    hosts    confidentiality    significantly    obstacle    cross    cryptographic    essence    obstacles    back    sensitive    create    traced    anonymous    shift    feasible    clears    trigger    security    time    invention    human    soundness    paradigm    topologies    prove    trust    encodings    creation    structures    proofs    changing    signatures    graph    critical    integrity    primitives    assuring    generation    earlier    wps    credential    blueprint    verifier    2008    participate    translate    showed    sense    foremost    preserving    2015    prototypes    governments    their    inter    architectures    certify   

Project "CASCAde" data sheet

The following table provides information about the project.

Coordinator
UNIVERSITY OF NEWCASTLE UPON TYNE 

Organization address
address: KINGS GATE
city: NEWCASTLE UPON TYNE
postcode: NE1 7RU
website: http://www.ncl.ac.uk/

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country United Kingdom [UK]
 Total cost 1˙485˙642 €
 EC max contribution 1˙485˙642 € (100%)
 Programme 1. H2020-EU.1.1. (EXCELLENT SCIENCE - European Research Council (ERC))
 Code Call ERC-2016-STG
 Funding Scheme ERC-STG
 Starting year 2017
 Duration (year-month-day) from 2017-11-01   to  2022-10-31

 Partnership

Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    UNIVERSITY OF NEWCASTLE UPON TYNE UK (NEWCASTLE UPON TYNE) coordinator 1˙485˙642.00

Map

 Project objective

'This proposal aims to create a new generation of security assurance. It investigates whether one can certify an inter-connected dynamically changing system in such a way that one can prove its security properties without disclosing sensitive information about the system's blueprint.

This has several compelling advantages. First, the security of large-scale dynamically changing systems will be significantly improved. Second, we can prove properties of topologies, hosts and users who participate in transactions in one go, while keeping sensitive information confidential. Third, we can prove the integrity of graph data structures to others, while maintaining their their confidentiality. This will benefit EU governments and citizens through the increased security of critical systems.

The proposal pursues the main research hypothesis that usable confidentiality-preserving security assurance will trigger a paradigm shift in security and dependability. It will pursue this objective by the creation of new cryptographic techniques to certify and prove properties of graph data structures. A preliminary investigation in 2015 showed that graph signature schemes are indeed feasible. The essence of this solution can be traced back to my earlier research on highly efficient attribute encodings for anonymous credential schemes in 2008.

However, the invention of graph signature schemes only clears one obstacle in a long journey to create a new generation of security assurance systems. There are still many complex obstacles, first and foremost, assuring 'soundness' in the sense that integrity proofs a verifier accepts translate to the state of the system at that time. The work program involves six WPs: 1) to develop graph signatures and new cryptographic primitives; 2) to establish cross-system soundness; 3) to handle scale and change; 4) to establish human trust and usability; 5) to create new architectures; and 6) to test prototypes in practice.'

 Publications

year authors and title journal last update
List of publications.
2019 Syh-Yuan Tan
Correction to “Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing”
published pages: 17045-17049, ISSN: 2169-3536, DOI: 10.1109/access.2019.2894289
IEEE Access 7 2019-07-03
2019 Thomas Gross
Fidelity of Statistical Reporting in 10 Years ofCyber Security User Studies
published pages: 1-35, ISSN: , DOI:
Newcastle University Tech Report TR-1529 2019-09-04
2019 Kovila Coopamootoo, Thomas Gross
A Systematic Evaluation of Evidence-Based Methods in Cyber Security User Studies
published pages: , ISSN: , DOI:
Newcastle University Tech Reports TR-1528 2019-07-03
2018 Mohammed Aamir Ali, Thomas Groß, Aad van Moorsel
Investigation of 3-D Secure\'s Model for Fraud Detection
published pages: , ISSN: , DOI:
8th International Workshop on Socio-Technical Aspects in SecuriTy 2019-08-05
2019 Syh-Yuan Tan, Thomas Groß
A Pairing-Based Anonymous Credential System with Efficient Attribute Encoding
published pages: , ISSN: , DOI:
Newcastle University Technical Reports TR-1527 2019-08-05

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "CASCADE" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "CASCADE" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.1.1.)

MITOvTOXO (2020)

Understanding how mitochondria compete with Toxoplasma for nutrients to defend the host cell

Read More  

TechChild (2019)

Just because we can, should we? An anthropological perspective on the initiation of technology dependence to sustain a child’s life

Read More  

FatVirtualBiopsy (2020)

MRI toolkit for in vivo fat virtual biopsy

Read More