{"id":1771,"date":"2017-03-22T13:26:00","date_gmt":"2017-03-22T13:26:00","guid":{"rendered":"https:\/\/prismacloud.eu\/?p=1771"},"modified":"2018-04-03T12:39:58","modified_gmt":"2018-04-03T12:39:58","slug":"d5-6-progress-report-on-privacy-and-anonymisation-techniques","status":"publish","type":"post","link":"https:\/\/prismacloud.eu\/d5-6-progress-report-on-privacy-and-anonymisation-techniques\/","title":{"rendered":"D5.6 Progress Report on Privacy and Anonymisation Techniques"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>Contributing Partners<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>UNEW<\/strong>, TUGRAZ, UNI PASSAU<\/p>\n<p style=\"text-align: justify;\"><strong>Executive Summary<\/strong><\/p>\n<p style=\"text-align: justify;\">PRISMACLOUD aims at bringing novel cryptographic concepts and methods to practical application to improve the security and privacy of cloud based services and make them usable for providers and users.<\/p>\n<p style=\"text-align: justify;\">The purpose of this report is to outline the architecture and design of the cryptographic tools FLEXAUTH and TOPOCERT. While FLEXAUTH focuses on flexible authentication protocols with selective disclosure, TOPOCERT aims at the certi\ffication and verifi\fcation of infrastructures. The deliverable describes the design paradigms of both tools, put in context of their terms and de\ffinitions. It outlines their component model and static architecture, determining\u00a0scope and responsibilities of components and roles in cryptographic protocols.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PRISMACLOUD aims at bringing novel cryptographic concepts and methods to practical application to improve the security and privacy of cloud based services and make them usable for providers and users.<\/p>\n<p>The purpose of this report is to outline the architecture and design of the cryptographic tools FLEXAUTH and TOPOCERT. While FLEXAUTH focuses on flexible authentication protocols with selective disclosure, TOPOCERT aims at the certi\ffication and verifi\fcation of infrastructures. The deliverable describes the design paradigms of both tools, put in context of their terms and de\ffinitions. It outlines their component model and static architecture, determining\u00a0scope and responsibilities of components and roles in cryptographic protocols.<\/p>\n","protected":false},"author":2,"featured_media":1851,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[],"_links":{"self":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/1771"}],"collection":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/comments?post=1771"}],"version-history":[{"count":7,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/1771\/revisions"}],"predecessor-version":[{"id":2620,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/1771\/revisions\/2620"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/media\/1851"}],"wp:attachment":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/media?parent=1771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/categories?post=1771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/tags?post=1771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}