PRISMACLOUD

PRISMACLOUD
PRIvacy & Security MAintaining Services in the CLOUD
D9.3 Dissemination and exploitation report 2

24Oct

D9.3 Dissemination and exploitation report 2

Contributing Partners ETRA, AIT, UNIL, UNI PASSAU Executive Summary  This deliverable presents the dissemination, communication, and exploitation activities of the PRISMACLOUD project for the second reporting period, following the strategy described in D9.2 Dissemination and exploitation report 1. There...

Details
D8.1 Specification of test-bed configurations for validation phase

24Oct

D8.1 Specification of test-bed configurations for validation phase

Contributing Partners ETRA, ATOS, LISPA, IRT Executive Summary Nowadays, big companies and public authorities are reluctant to entrust their most sensitive data to external parties for storage and processing, due there are no satisfactory approaches to adequately protect the...

Details
D7.8 First release of software modules for use case integration and validation

24Oct

D7.8 First release of software modules for use case integration and validation

Contributing Partners ETRA, IBM, TUGRAZ, AIT, UNI PASSAU Executive Summary  This report provides a second overview of the work done in the frame of task T7.4 - Software development of framework and components to realize use cases. This is...

Details
D6.8 Prototype of a secured device implementing crypto primitives

24Oct

D6.8 Prototype of a secured device implementing crypto primitives

Contributing Partners CEA Executive Summary PRISMACLOUD aims at bringing novel cryptographic concepts and methods to practical application to improve the security and privacy of cloud based services and makes them usable for providers and users. The purpose of this...

Details
D6.6 Final Release Efficient Implementation of Selected Components

24Oct

D6.6 Final Release Efficient Implementation of Selected Components

Contributing Partners UNI PASSAU, TUGRAZ, IBM, AIT, TUDA, UNEW Executive Summary  PRISMACLOUD aims at bringing novel cryptographic concepts and methods to practical application to improve the security and privacy of cloud based services and make them usable for providers...

Details
D6.3 Proof-of-Concept Implementations of Basic Components

24Oct

D6.3 Proof-of-Concept Implementations of Basic Components

Contributing Partners UNI PASSAU, AIT, TUGRAZ, UNEW Executive Summary This document accompanies the software prototypes built for the deliverable D6.3, which is of type ’other’. These proof-of-concept implementations of cryptographic and closely related functionality provide the basis for their...

Details
D6.2 Activity Report on Software Prototyping for Cryptographic Support

24Oct

D6.2 Activity Report on Software Prototyping for Cryptographic Support

Contributing Partners UNI PASSAU, AIT, IBM, TUDA, TUGRAZ, XITRUST Executive Summary This report provides an overview of the software artefacts developed in parallel within the PRISMACLOUD project and this is the final report of its predecessor D6.1 Intermediate activity...

Details
D5.10 Privately and publicly verifiable computing techniques providing privacy, integrity, and authenticity (VERIDAP Tool)

24Oct

D5.10 Privately and publicly verifiable computing techniques providing privacy, integrity, and authenticity (VERIDAP Tool)

Contributing Partners TUDA, UNI PASSAU Executive Summary PRISMACLOUD aims at bringing novel cryptographic concepts and methods to practical application, to improve the security and privacy of cloud based services, and make them usable for providers and users. The purpose...

Details
D5.4 Tools for Encryption and Tokenization Techniques Developed in T4.4

24Oct

D5.4 Tools for Encryption and Tokenization Techniques Developed in T4.4

Contributing Partners IBM Executive Summary In the deliverable D4.10 we described the underlying algorithms for FPE, OPE and anonymization that we developed during the project. In particular, with respect to encryption, we developed a framework for general formats definition,...

Details
D4.11 Final Design and Evaluation

24Oct

D4.11 Final Design and Evaluation

Contributing Partners IBM Executive Summary In this document, we present our progress with respect to FPE, OPE and anonymization in the last year. In the previous report (D4.10 [1]) we described the underlying algorithms for FPE, OPE and anonymization...

Details

Element

Become a Member


Continue