D5.10 Privately and publicly verifiable computing techniques providing privacy, integrity, and authenticity (VERIDAP Tool)
PRISMACLOUD aims at bringing novel cryptographic concepts and methods to practical application, to improve the security and privacy of cloud based services, and make them usable for providers and users. The purpose of this deliverable is to outline the architecture...
DetailsD5.4 Tools for Encryption and Tokenization Techniques Developed in T4.4
In the deliverable D4.10 we described the underlying algorithms for FPE, OPE and anonymization that we developed during the project. In particular, with respect to encryption, we developed a framework for general formats definition, and fast encryption/decryption techniques, operating...
DetailsD4.11 Final Design and Evaluation
In this document, we present our progress with respect to FPE, OPE and anonymization in the last year. In the previous report (D4.10 [1]) we described the underlying algorithms for FPE, OPE and anonymization that we had developed, implemented...
DetailsD4.8 Report on Privacy-Enhancing Cryptography
PRISMACLOUD aims at bringing novel cryptographic concepts and methods to practical application to improve the security and privacy of cloud based services and make them usable for providers and users. The purpose of this report is to document the progress...
DetailsD4.5 Signature Schemes Allowing for Verifiable Operations on Authenticated Data
PRISMACLOUD aims at bringing novel cryptographic concepts and methods to practical application to improve the security and privacy of cloud based services and make them usable for providers and users. The purpose of this report is to document the progress...
DetailsD4.3 Efficient Sharing-Based Storage Protocols for Mixed Adversaries
Efficient and secure cloud-storage solutions are of increasing importance in real-world ITsecurity applications and a vibrant field of research. In that sense, PRISMACLOUD tries to address confidentiality, integrity, and high availability of distributed data in the cloudcomputing context. In...
DetailsD3.5 Business and Governance Model for Cryptographically Secured Services
The present document compiles the work carried out in T3.3 business and governance models after two years and a half of the start of the project, as an extension of the work reported in D3.4 Progress report on business...
DetailsD3.2 HCI Guidelines
This deliverable presents the first HCI (Human Computer Interaction) guidelines for the PRISMACLOUD use cases in the area of eHealth, Smart Cities and eGovernment that require the development of user interfaces. HCI Guidance is mainly provided in terms of...
DetailsD1.3 Second management and progress report
PRISMACLOUD is a research and innovation action scheduled for 3.5 years (42 month) in the domain of security and privacy for cloud computing. This report titled “D1.3 Second Management and Progress Report” gives an overview on the project’s progress...
DetailsD7.6 Improved Guidelines and Architecture for Secure Service Composition
This report covers the results of "Task 7.3 Architecture and guidelines for secure service composition". In particular, it presents the PRISMACLOUD architecture and the associated development methodology called Cryptographic Software Development Lifecycle (CryptS- DLC). It also provides recommendations for...
Details