PRISMACLOUD

PRISMACLOUD
PRIvacy & Security MAintaining Services in the CLOUD
Towards a Unified Secure Cloud Service Development and Deployment Life-cycle

28Jul

Towards a Unified Secure Cloud Service Development and Deployment Life-cycle

A. Hudic, M. Flittner, P. Radl, T. Lorunser, R. Bless. Towards a Unified Secure Cloud Service Development and Deployment Life-cycle. SAW Workshop - ARES 2016. Salzburg, Austria, August 31 – September 2, 2016.

Details
Towards Authenticity and Privacy Preserving Accountable Workflows

28Jul

Towards Authenticity and Privacy Preserving Accountable Workflows

David Derler, Christian Hanser, Henrich C. Pöhls, Daniel Slamanig. Towards Authenticity and Privacy Preserving Accountable Workflows. 10th IFIP International Summer School. Edinburgh, UK, August 16-21, 2015.

Details
Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario

28Jul

Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario

A. Alaqra, S. Fischer- Hübner, J.S. Pettersson and E. Wästlund (Karlstad University)Stakeholders’ Perspectives on Malleable Signatures in a Cloud-based eHealth Scenario.

Details
LoT: a Reputation-based Trust System for Long-term Archiving

28Jul

LoT: a Reputation-based Trust System for Long-term Archiving

Martín Vigil, Denise Demirel, Sheikh Mahbub Habib, Sascha Hauke, Johannes Buchmann, Max Mühlhäuser. LoT: a Reputation-based Trust System for Long-term Archiving. The Tenth International Conference on Emerging Security Information, Systems and Technologies - SECURWARE 2016, July 24 - 28,...

Details
Cryptographically Enforced Four-Eyes Principle

22Jul

Cryptographically Enforced Four-Eyes Principle

A. Bilzhause, M. Huber, H. C. Pöhls and K. Samelin. Cryptographically Enforced Four-Eyes Principle. In Proc. of the Workshop on Security, Privacy, and Identity Management in the Cloud to be held at the 11th International Conference on Availability, Reliability...

Details
A New Architecture for Developing Cryptographic Cloud Services

13Jul

A New Architecture for Developing Cryptographic Cloud Services

We published an article in ERCIM News Magazine No. 106 July 2016, titled "A New Architecture for Developing Cryptographic Cloud Services" describing the project's architecture. The article can be found on ERCIM News No. 106 online edition Download: ERCIM 106

Details
Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions

30Jun

Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions

Georg Fuchsbauer, Christian Hanser, Chethan Kamath, and Daniel Slamanig. "Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions". In Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2,...

Details
Enhancing “Smart Services” with cryptography for the benefit of the individual end user

29Jun

Enhancing “Smart Services” with cryptography for the benefit of the individual end user

Thomas Länger (University Of Lausanne) and Henrich C. Pöhls (University of Passau) presented PRISMACLOUD project during  ITA: TA16-Konferenz on 30th May 2016 in Vienna, Austria, talking about Enhancing “Smart Services” with cryptography for the benefit of the individual end user....

Details
Signatures for privacy, trust and accountability in the cloud: applications and requirements

10May

Signatures for privacy, trust and accountability in the cloud: applications and requirements

Title Signatures for Trust and Accountability in the Cloud: A Technical and User Perspective Authors Alaa Alaqra (Karlstad University), Simone Fischer-Hübner (Karlstad University), Thomas Groß (Newcastle University), Thomas Lorünser (AIT Austrian Institute of Technology), and Daniel Slamanig (IAIK, Graz University...

Details
Universal Composition with Responsive Environments

13Jan

Universal Composition with Responsive Environments

Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Küsters, and Daniel Rausch, " Universal Composition with Responsive Environments", IACR Cryptology ePrint Archive , 2016:034, 2016.

Details

Element

Become a Member


Continue