27Oct
Formal Policy-based Provenance Audit
Denis Butin, Denise Demirel, and Johannes Buchmann (TU Darmstadt). Formal Policy-based Provenance Audit. 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings.
Details27Oct
Dynamic and Verifiable Hierarchical Secret Sharing
Giulia Traverso, Denise Demirel, Johannes Buchmann. Dynamic and Verifiable Hierarchical Secret Sharing. 9th International Conference on Information Theoretic Security (ICITS 2016). Tacoma, Washington, USA, 9-12 August 2016. Proceedings.
Details29Sep
Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT
Digitally signing data allows to verify authenticity and thus provides strong data quality assurance or forensic evidence even in the presence of an active attacker. A drawback of cryptographic standard signatures is that the signed data set can not...
Details29Sep
Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing
David Derler, Stephan Krenn, and Daniel Slamanig. “Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing“, in: CANS 2016, LNCS, Milan/Italy, Springer. (in press)
Details08Sep
Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds
Länger, T., Pöhls, H. C., Ghernaouti, S: "Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds"; in: Privacy Technologies and Policy, Proceedings of the 4th Annual Privacy Forum APF 2016, Springer LNCS, ISBN 978-3-319-44759-9
Details29Aug
Efficient Third Party Auditing for a Distributed Storage System
When using distributed storage systems to outsource data storage into the cloud, it is often vital that this is done in a privacy preserving way, i.e., without the storage servers learning anything about the stored data. Especially when storing...
Details29Aug
PRISMACLOUD Tools: A cryptographic toolbox for increasing security in cloud services
The EC Horizon 2020 project PRISMACLOUD aims at cryptographically addressing several severe risks threatening end user security and privacy in current cloud settings. This shall be achieved by the provision of a reusable toolbox encapsulating cryptographic functionality from which...
Details29Aug
Practical Signing-Right Revocation
Michael Till Beck, Stephan Krenn, Franz-Stefan Preiss, and Kai Samelin. “Practical Signing-Right Revocation“, in: Michael Franz and Panos Papadimitratos (eds.) TRUST 2016, pp. 21-39, LNCS 9824, Vienna/Austria, Springer.
Details28Jul
Towards a Unified Secure Cloud Service Development and Deployment Life-cycle
A. Hudic, M. Flittner, P. Radl, T. Lorunser, R. Bless. Towards a Unified Secure Cloud Service Development and Deployment Life-cycle. SAW Workshop - ARES 2016. Salzburg, Austria, August 31 – September 2, 2016.
Details28Jul
Towards Authenticity and Privacy Preserving Accountable Workflows
David Derler, Christian Hanser, Henrich C. Pöhls, Daniel Slamanig. Towards Authenticity and Privacy Preserving Accountable Workflows. 10th IFIP International Summer School. Edinburgh, UK, August 16-21, 2015.
Details