{"id":3213,"date":"2019-04-11T09:24:57","date_gmt":"2019-04-11T09:24:57","guid":{"rendered":"https:\/\/prismacloud.eu\/?page_id=3213"},"modified":"2019-04-11T09:24:57","modified_gmt":"2019-04-11T09:24:57","slug":"trustee-primitives-and-components","status":"publish","type":"page","link":"https:\/\/prismacloud.eu\/trustee-primitives-and-components\/","title":{"rendered":"TRUSTEE Primitives and Components"},"content":{"rendered":"<table style=\"border-collapse: collapse;\">\n<tbody>\n<tr>\n<td style=\"border: solid gray; border-width: 0 0 1px 0; vertical-align: middle; width: 189px;\"><a href=\"https:\/\/credential.eu\/trustee\/trustee-primitives-and-components\/trustee-components-data-authentication\/\"><img decoding=\"async\" class=\"aligncenter size-medium wp-image-1699\" src=\"https:\/\/credential.eu\/wp-content\/uploads\/2018\/11\/TRUSTEE-Data_Authentication.png\" alt=\"\" width=\"60\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/credential.eu\/trustee\/trustee-primitives-and-components\/trustee-components-data-authentication\/\"><strong>Data Authentication<\/strong><\/a><\/p>\n<\/td>\n<td style=\"border: solid gray; border-width: 0 0 1px 0; vertical-align: middle; width: 458px;\"><span style=\"font-size: small;\"><b>FLEXAUTH<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Message and document authentication through digital signatures<\/span><span style=\"font-size: small;\"><b>VERIDAP<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Authenticated data processing verification tool for correctness<\/span><\/p>\n<p><span style=\"font-size: small;\"><b>TOPOCERT<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Authentication and certification tool for proving topologies<\/span><\/p>\n<p><span style=\"font-size: small;\"><b>MSSLib<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Malleable Signature Library and part of FLEXAUTH<\/span><\/p>\n<p><span style=\"font-size: small;\"><b>GSSLib<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Group Signature Library which is part of FLEXAUTH<\/span><\/p>\n<p><span style=\"font-size: small;\"><b>PIDMaaS<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Privacy-preserving ID management service based on FLEXAUTH <\/span><\/p>\n<p><span style=\"font-size: small;\"><b>UNICORN<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Authorization enforcement service for microservice security compliance,\u00a0<\/span><span style=\"font-size: small;\">and intrusion detection and notification system<\/span><\/p>\n<p><span style=\"font-size: small;\"><b><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;WITDOM Integrity and Consistency Verification&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:15359,&quot;3&quot;:{&quot;1&quot;:0},&quot;4&quot;:[null,2,16773836],&quot;5&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;6&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;7&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;8&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;9&quot;:0,&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:[null,2,0],&quot;15&quot;:&quot;Calibri&quot;,&quot;16&quot;:11}\">Integrity and Consistency Verification<\/span><br \/>\n<\/b><\/span><span style=\"font-size: small;\">This component protects the integrity and consistency of data outsourced to an untrusted remote storage.<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"border: solid gray; border-width: 0 0 1px 0; vertical-align: middle; width: 189px;\"><a href=\"https:\/\/credential.eu\/trustee\/trustee-primitives-and-components\/trustee-components-secure-storage\/\"><img decoding=\"async\" class=\"aligncenter size-medium wp-image-1699\" src=\"https:\/\/credential.eu\/wp-content\/uploads\/2018\/11\/TRUSTEE-Secure_Storage.png\" alt=\"\" width=\"60\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/credential.eu\/trustee\/trustee-primitives-and-components\/trustee-components-secure-storage\/\"><strong>Secure Storage<\/strong><\/a><\/p>\n<\/td>\n<td style=\"border: solid gray; border-width: 0 0 1px 0; vertical-align: middle; width: 458px;\"><span style=\"font-size: small;\"><b>SECOSTOR<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Secure federated cloud storage<\/span><span style=\"font-size: small;\"><b>Data Transformation and Storage<br \/>\n<\/b><\/span><span style=\"font-size: small;\">With every requrest to the WITDOM platform for processing new data, the data is first transformed into the common WITDOM format and then stored for further processing.<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"border: solid gray; border-width: 0 0 1px 0; vertical-align: middle; width: 189px;\"><a href=\"https:\/\/credential.eu\/trustee\/trustee-primitives-and-components\/trustee-components-data-encryption\/\"><img decoding=\"async\" class=\"aligncenter size-medium wp-image-1699\" src=\"https:\/\/credential.eu\/wp-content\/uploads\/2018\/11\/TRUSTEE-Data_Encryption.png\" alt=\"\" width=\"60\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/credential.eu\/trustee\/trustee-primitives-and-components\/trustee-components-data-encryption\/\"><strong>Data Encryption<\/strong><\/a><\/p>\n<\/td>\n<td style=\"border: solid gray; border-width: 0 0 1px 0; vertical-align: middle; width: 458px;\"><span style=\"font-size: small;\"><b>DATAPRIV<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Versatile sensitive data encryption processing<\/span><span style=\"font-size: small;\"><b>Encrypted Mail Forwarding<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Advanced encryption of forwarded emails<\/span><\/p>\n<p><span style=\"font-size: small;\"><b>End-to-end encryption<br \/>\n<\/b><\/span><span style=\"font-size: small;\"><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;The WITDOM End-2-End Encryption (E2EE) component provides protection functionalities in terms of locally encrypting data in the trusted domain before storing them in the untrusted domain for the secure backup purposes.&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:13247,&quot;3&quot;:{&quot;1&quot;:0},&quot;4&quot;:[null,2,16773836],&quot;5&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;6&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;7&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;8&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;15&quot;:&quot;Calibri&quot;,&quot;16&quot;:11}\">Locally encrypts data in the trusted domain before storing them in the untrusted domain for the secure backup purposes<\/span><br \/>\n<\/span><\/p>\n<p><span style=\"font-size: small;\"><b>Data masking and desensitization<br \/>\n<\/b><\/span><span style=\"font-size: small;\"><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;WITDOM\u2019s data masking component is responsible for masking sensitive data classified as direct identifiers. The masking process creates service-and-user-specific tokens that can be updated over time, satisfying two main security requirements: irreversibility and unlinkability.&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:15359,&quot;3&quot;:{&quot;1&quot;:0},&quot;4&quot;:[null,2,16773836],&quot;5&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;6&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;7&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;8&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;9&quot;:0,&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:[null,2,0],&quot;15&quot;:&quot;Calibri&quot;,&quot;16&quot;:11}\">Masking of sensitive data classified as direct identifiers guaranteeing irreversibility and unlinkability.<\/span><br \/>\n<\/span><\/p>\n<p><span style=\"font-size: small;\"><b>Secure Computation<br \/>\n<\/b><\/span><span style=\"font-size: small;\"><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;The Secure Computation component offers data protection functionalities by means of homomorphic encryption (HE) and secure multiparty computation (MPC), thus enabling privacy preserving computation in the untrusted domain.&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:15359,&quot;3&quot;:{&quot;1&quot;:0},&quot;4&quot;:[null,2,16773836],&quot;5&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;6&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;7&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;8&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;9&quot;:0,&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:[null,2,0],&quot;15&quot;:&quot;Calibri&quot;,&quot;16&quot;:11}\">Data protection functionalities by means of homomorphic encryption (HE) and secure multiparty computation (MPC), thus enabling privacy preserving computation in the untrusted domain.<\/span><br \/>\n<\/span><\/p>\n<p><span style=\"font-size: small;\"><b>Secure Signal Processing<br \/>\n<\/b><\/span><span style=\"font-size: small;\"><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;WITDOM\u2019s Secure Signal Processing (SSP) component performs secure signal processing operations on protected data and signals (encrypted, obfuscated, split or a combination thereof) in an untrusted environment, by preventing the disclosure of the sensitive information while it is being processed in the untrusted domain.&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:15359,&quot;3&quot;:{&quot;1&quot;:0},&quot;4&quot;:[null,2,16773836],&quot;5&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;6&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;7&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;8&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;9&quot;:0,&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:[null,2,0],&quot;15&quot;:&quot;Calibri&quot;,&quot;16&quot;:11}\">Performs secure signal processing operations on protected data and signals (encrypted, obfuscated, split or a combination thereof) in an untrusted environment.<\/span><br \/>\n<\/span><\/p>\n<p><span style=\"font-size: small;\"><b>Anonymization<br \/>\n<\/b><\/span><span style=\"font-size: small;\"><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Protection component that allows to anonymize data stored in a relational database. It selects automatically the anonymization algorithm that is more suitable for the data and the users' privacy requirements, and applies it seamlessly to the data, in order to protect privacy.&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:15359,&quot;3&quot;:{&quot;1&quot;:0},&quot;4&quot;:[null,2,16773836],&quot;5&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;6&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;7&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;8&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;9&quot;:0,&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:[null,2,0],&quot;15&quot;:&quot;Calibri&quot;,&quot;16&quot;:11}\">Allows to anonymize data stored in a relational database.<\/span><br \/>\n<\/span><\/p>\n<p><span style=\"font-size: small;\"><b>Key Manager<br \/>\n<\/b><\/span><span style=\"font-size: small;\"><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;The WITDOM Key Management component provides management of secrets (for example, private and public encryption keys or credentials to access the storage) that are required for operations run by protection components. Since secrets are required in trusted and untrusted domains, there are two instances of the KM component in the WITDOM architecture with similar functionalities.&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:15359,&quot;3&quot;:{&quot;1&quot;:0},&quot;4&quot;:[null,2,16773836],&quot;5&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;6&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;7&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;8&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;9&quot;:0,&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:[null,2,0],&quot;15&quot;:&quot;Calibri&quot;,&quot;16&quot;:11}\">Provides management of secrets (for example, private and public encryption keys or credentials to access the storage) that are required for operations run by protection components.<\/span><\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"border: solid gray; border-width: 0 0 1px 0; vertical-align: middle; width: 189px;\"><a href=\"https:\/\/credential.eu\/trustee\/trustee-primitives-and-components\/trustee-components-secure-containers\/\"><img decoding=\"async\" class=\"aligncenter size-medium wp-image-1699\" src=\"https:\/\/credential.eu\/wp-content\/uploads\/2018\/11\/TRUSTEE-Secure_Containers.png\" alt=\"\" width=\"60\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/credential.eu\/trustee\/trustee-primitives-and-components\/trustee-components-secure-containers\/\"><strong>Secure Containers<\/strong><\/a><\/p>\n<\/td>\n<td style=\"border: solid gray; border-width: 0 0 1px 0; vertical-align: middle; width: 458px;\"><span style=\"font-size: small;\"><b>SCONE<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Secure execution of containers and programs using Intel SGX<\/span><span style=\"font-size: small;\"><b>SecureCloud Secure Containers<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Lightweight secure containers for applications requiring very high security<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"border: solid gray; border-width: 0 0 1px 0; vertical-align: middle; width: 189px;\"><a href=\"https:\/\/credential.eu\/trustee\/trustee-primitives-and-components\/trustee-components-application-development\/\"><img decoding=\"async\" class=\"aligncenter size-medium wp-image-1699\" src=\"https:\/\/credential.eu\/wp-content\/uploads\/2018\/11\/TRUSTEE-App_Development.png\" alt=\"\" width=\"60\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/credential.eu\/trustee\/trustee-primitives-and-components\/trustee-components-application-development\/\"><strong>Application Development<\/strong><\/a><\/p>\n<\/td>\n<td style=\"border: solid gray; border-width: 0 0 1px 0; vertical-align: middle; width: 458px;\"><span style=\"font-size: small;\"><b>SIDE<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Interactive environment for developing applications and controlling execution<\/span><span style=\"font-size: small;\"><b>DRIP<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Real-time infrastructure planner for cloud app deployment<\/span><\/p>\n<p><span style=\"font-size: small;\"><b>ASAP<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Autonomous system adaptation platform for monitoring and adapting system behaviour<\/span><\/p>\n<p><span style=\"font-size: small;\"><b>UNICORN Framework Components and Mechanism Prototypes<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Simplifies the design, deployment and management of secure and elastic by design, multi-cloud services<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"border: solid gray; border-width: 0 0 1px 0; vertical-align: middle; width: 189px;\"><a href=\"https:\/\/credential.eu\/trustee\/trustee-primitives-and-components\/trustee-components-time-critical-management\/\"><img decoding=\"async\" class=\"aligncenter size-medium wp-image-1699\" src=\"https:\/\/credential.eu\/wp-content\/uploads\/2018\/11\/TRUSTEE-Time_Critical.png\" alt=\"\" width=\"60\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/credential.eu\/trustee\/trustee-primitives-and-components\/trustee-components-time-critical-management\/\"><strong>Time Critical Management<\/strong><\/a><\/p>\n<\/td>\n<td style=\"border: solid gray; border-width: 0 0 1px 0; vertical-align: middle; width: 458px;\"><span style=\"font-size: small;\"><b>SecureCloud Secure Stream<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Secure bus for message exchange<\/span><span style=\"font-size: small;\"><b>SecureCloud Monitoring<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Smart Grid monitoring application with SGX support<\/span><\/p>\n<p><span style=\"font-size: small;\"><b>UNICORN CI Monitoring<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Secure critical infrastructure monitoring application<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"border: solid gray; border-width: 0 0 1px 0; vertical-align: middle; width: 189px;\"><a href=\"https:\/\/credential.eu\/trustee\/trustee-primitives-and-components\/trustee-components-cryptographic-primitives\/\"><img decoding=\"async\" class=\"aligncenter size-medium wp-image-1699\" src=\"https:\/\/credential.eu\/wp-content\/uploads\/2018\/11\/TRUSTEE-Crypto_Primitives.png\" alt=\"\" width=\"60\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/credential.eu\/trustee\/trustee-primitives-and-components\/trustee-components-cryptographic-primitives\/\"><strong>Cryptographic Primitives<\/strong><\/a><\/p>\n<\/td>\n<td style=\"border: solid gray; border-width: 0 0 1px 0; vertical-align: middle; width: 458px;\"><span style=\"font-size: small;\"><b>TREDISEC Security Primitives<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Software components for functional-security requirements<\/span><span style=\"font-size: small;\"><b>CREDENTIAL Cryptographic Components<br \/>\n<\/b><\/span><span style=\"font-size: small;\">High-quality implementations privacy-preserving cryptographic technologies such as redactable signatures and proxy re-encryption<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"vertical-align: middle; width: 189px;\">\n<p style=\"text-align: center;\"><a href=\"https:\/\/credential.eu\/trustee\/trustee-primitives-and-components\/trustee-components-identity-privacy-and-secure-data-sharing\/\"><strong><img decoding=\"async\" class=\"aligncenter size-medium wp-image-1699\" src=\"https:\/\/credential.eu\/wp-content\/uploads\/2018\/11\/TRUSTEE-Identity_Privacy.png\" alt=\"\" width=\"60\" \/><\/strong><\/a><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/credential.eu\/trustee\/trustee-primitives-and-components\/trustee-components-identity-privacy-and-secure-data-sharing\/\"><strong>Identity Privacy<\/strong><\/a><\/p>\n<\/td>\n<td style=\"vertical-align: middle; width: 458px;\"><span style=\"font-size: small;\"><b>Protection Orchestrator<br \/>\n<\/b><\/span><span style=\"font-size: small;\">Coordination of several protection components and services in order to effectively protect data before they leave a trusted environment for processing or storing reasons.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Data Authentication FLEXAUTH Message and document authentication through digital signaturesVERIDAP Authenticated data processing verification tool for correctness TOPOCERT Authentication and certification tool for proving topologies MSSLib Malleable Signature Library and part of FLEXAUTH GSSLib Group Signature Library which is part of FLEXAUTH PIDMaaS Privacy-preserving ID management service based on FLEXAUTH UNICORN Authorization enforcement service for [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/pages\/3213"}],"collection":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/comments?post=3213"}],"version-history":[{"count":2,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/pages\/3213\/revisions"}],"predecessor-version":[{"id":3215,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/pages\/3213\/revisions\/3215"}],"wp:attachment":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/media?parent=3213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}