PRISMACLOUD

Blog Standard

D3.7 Secure Cloud Usage for End Users

Contributing Partners UNIL, AIT, UNI PASSAU, ATOS, FCSR, IRT Executive Summary The PRISMACLOUD services are intended for use by people, companies, and organisa-tions who are rather experts for their own domains than for the complexities of highly distributed cloud...

Details

D9.9 Advisory board communication summary 2

Contributing Partners AIT, UNIL, ATOS, UNI PASSAU, KAU Executive Summary PRISMACLOUD is a huge undertaking with various results, and an outside to the consortium advice and guidance is necessary to achieve outstanding results with high exploitation possibilities. At the...

Details

D1.4 Final Management and Progress Report

Contributing Partners AIT Executive Summary In summary, PRISMACLOUD was successfully executed as planned in the grant agree-ment without any delay. All core work packages of the current reporting period (WP3, WP7 and WP8) were in time and delivered as...

Details

D8.5 Evaluation results of the PRISMACLOUD advancements in real environments

Contributing Partners ATOS, LISPA, FCSR, ETRA Executive Summary This document reports on the evaluation of the PRISMACLOUD services in the different scenarios against the functional requirements defined in D8.1 [1]. The objective of the evaluation is to assess if...

Details

D9.4 Dissemination and Exploitation Report 3

Contributing Partners ETRA, AIT, UNI PASSAU Executive Summary This deliverable presents the dissemination, communication, and exploitation activities of the PRISMACLOUD project for the last reporting period, following the strategy described in D9.2 Dissemination and exploitation report 1 and concreted...

Details

A Modular Framework for Privacy-Enhancing Signatures: Generalizations, Extensions and Novel Building Blocks

Title A Modular Framework for Privacy-Enhancing Signatures: Generalizations, Extensions and Novel Building Blocks Authors David Derler Abstract New computing paradigms such as cloud computing attracted significant attention in recent years and meanwhile numerous enterprises outsource data, computations or services...

Details

HCI Patterns for Cryptographically Equipped Cloud Services

Title HCI Patterns for Cryptographically Equipped Cloud Services Authors Thomas Länger, Ala Alaqra, Simone Fischer-Hübner, Erik Framner, John Sören Pettersson, Katrin Riemer Abstract tba Venue 20th International Conference on Human-Computer Interaction (http://2018.hci.international/) Place and Date  Las Vegas, Nevada, USA....

Details

CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case

Title CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case Authors Lucas Schabhüser, Denis Butin, Johannes Buchmann Abstract Sensitive data is often outsourced to cloud servers, with the server performing computation on the data. Computational correctness must be efficiently...

Details

Function-Dependent Commitments for Verifiable Multi-Party Computation

Title Function-Dependent Commitments for Verifiable Multi-Party Computation Authors Lucas Schabhüser, Denis Butin, Denise Demirel, Johanens Buchmann Abstract In cloud computing, delegated computing raises the security issue of guaranteeing data authenticity during a remote computation. Existing solutions do not simultaneously...

Details

Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures

Title Increasing the Legal Probative Value of Cryptographically Private Malleable Signatures Subtitle  Maintaining a legally sufficient integrity protection while achieving personal data protection by means of authorized subsequent modifications. Authors Henrich C. Pöhls (UNI PASSAU) Abstract [en] This thesis...

Details

Element

Become a Member


Continue