PRISMACLOUD

Blog Standard

D5.10 Privately and publicly verifiable computing techniques providing privacy, integrity, and authenticity (VERIDAP Tool)

PRISMACLOUD aims at bringing novel cryptographic concepts and methods to practical application, to improve the security and privacy of cloud based services, and make them usable for providers and users. The purpose of this deliverable is to outline the architecture...

Details

D5.4 Tools for Encryption and Tokenization Techniques Developed in T4.4

In the deliverable D4.10 we described the underlying algorithms for FPE, OPE and anonymization that we developed during the project. In particular, with respect to encryption, we developed a framework for general formats definition, and fast encryption/decryption techniques, operating...

Details

D4.11 Final Design and Evaluation

In this document, we present our progress with respect to FPE, OPE and anonymization in the last year. In the previous report (D4.10 [1]) we described the underlying algorithms for FPE, OPE and anonymization that we had developed, implemented...

Details

D4.8 Report on Privacy-Enhancing Cryptography

PRISMACLOUD aims at bringing novel cryptographic concepts and methods to practical application to improve the security and privacy of cloud based services and make them usable for providers and users. The purpose of this report is to document the progress...

Details

D4.5 Signature Schemes Allowing for Verifiable Operations on Authenticated Data

PRISMACLOUD aims at bringing novel cryptographic concepts and methods to practical application to improve the security and privacy of cloud based services and make them usable for providers and users. The purpose of this report is to document the progress...

Details

D4.3 Efficient Sharing-Based Storage Protocols for Mixed Adversaries

Efficient and secure cloud-storage solutions are of increasing importance in real-world ITsecurity applications and a vibrant field of research. In that sense, PRISMACLOUD tries to address confidentiality, integrity, and high availability of distributed data in the cloudcomputing context. In...

Details

D3.5 Business and Governance Model for Cryptographically Secured Services

The present document compiles the work carried out in T3.3 business and governance models after two years and a half of the start of the project, as an extension of the work reported in D3.4 Progress report on business...

Details

D3.2 HCI Guidelines

This deliverable presents the first HCI (Human Computer Interaction) guidelines for the PRISMACLOUD use cases in the area of eHealth, Smart Cities and eGovernment that require the development of user interfaces. HCI Guidance is mainly provided in terms of...

Details

D1.3 Second management and progress report

PRISMACLOUD is a research and innovation action scheduled for 3.5 years (42 month) in the domain of security and privacy for cloud computing. This report titled “D1.3 Second Management and Progress Report” gives an overview on the project’s progress...

Details

D7.6 Improved Guidelines and Architecture for Secure Service Composition

This report covers the results of "Task 7.3 Architecture and guidelines for secure service composition". In particular, it presents the PRISMACLOUD architecture and the associated development methodology called Cryptographic Software Development Lifecycle (CryptS- DLC). It also provides recommendations for...

Details

Element

Become a Member


Continue