D3.7 Secure Cloud Usage for End Users
Contributing Partners UNIL, AIT, UNI PASSAU, ATOS, FCSR, IRT Executive Summary The PRISMACLOUD services are intended for use by people, companies, and organisa-tions who are rather experts for their own domains than for the complexities of highly distributed cloud...
DetailsD9.9 Advisory board communication summary 2
Contributing Partners AIT, UNIL, ATOS, UNI PASSAU, KAU Executive Summary PRISMACLOUD is a huge undertaking with various results, and an outside to the consortium advice and guidance is necessary to achieve outstanding results with high exploitation possibilities. At the...
DetailsD1.4 Final Management and Progress Report
Contributing Partners AIT Executive Summary In summary, PRISMACLOUD was successfully executed as planned in the grant agree-ment without any delay. All core work packages of the current reporting period (WP3, WP7 and WP8) were in time and delivered as...
DetailsD8.5 Evaluation results of the PRISMACLOUD advancements in real environments
Contributing Partners ATOS, LISPA, FCSR, ETRA Executive Summary This document reports on the evaluation of the PRISMACLOUD services in the different scenarios against the functional requirements defined in D8.1 [1]. The objective of the evaluation is to assess if...
DetailsD9.4 Dissemination and Exploitation Report 3
Contributing Partners ETRA, AIT, UNI PASSAU Executive Summary This deliverable presents the dissemination, communication, and exploitation activities of the PRISMACLOUD project for the last reporting period, following the strategy described in D9.2 Dissemination and exploitation report 1 and concreted...
DetailsA Modular Framework for Privacy-Enhancing Signatures: Generalizations, Extensions and Novel Building Blocks
Title A Modular Framework for Privacy-Enhancing Signatures: Generalizations, Extensions and Novel Building Blocks Authors David Derler Abstract New computing paradigms such as cloud computing attracted significant attention in recent years and meanwhile numerous enterprises outsource data, computations or services...
DetailsHCI Patterns for Cryptographically Equipped Cloud Services
Title HCI Patterns for Cryptographically Equipped Cloud Services Authors Thomas Länger, Ala Alaqra, Simone Fischer-Hübner, Erik Framner, John Sören Pettersson, Katrin Riemer Abstract tba Venue 20th International Conference on Human-Computer Interaction (http://2018.hci.international/) Place and Date Las Vegas, Nevada, USA....
DetailsCHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case
Title CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case Authors Lucas Schabhüser, Denis Butin, Johannes Buchmann Abstract Sensitive data is often outsourced to cloud servers, with the server performing computation on the data. Computational correctness must be efficiently...
DetailsFunction-Dependent Commitments for Verifiable Multi-Party Computation
Title Function-Dependent Commitments for Verifiable Multi-Party Computation Authors Lucas Schabhüser, Denis Butin, Denise Demirel, Johanens Buchmann Abstract In cloud computing, delegated computing raises the security issue of guaranteeing data authenticity during a remote computation. Existing solutions do not simultaneously...
DetailsIncreasing the Legal Probative Value of Cryptographically Private Malleable Signatures
Title Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures Subtitle Maintaining a legally sufficient integrity protection while achieving personal data protection by means of authorized subsequent modifications. Authors Henrich C. Pöhls (UNI PASSAU) Abstract [en] This thesis...
Details