PRISMACLOUD

PRISMACLOUD
PRIvacy & Security MAintaining Services in the CLOUD
Formal Policy-based Provenance Audit

27Oct

Formal Policy-based Provenance Audit

Denis Butin, Denise Demirel, and Johannes Buchmann (TU Darmstadt). Formal Policy-based Provenance Audit. 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings.

Details
Dynamic and Verifiable Hierarchical Secret Sharing

27Oct

Dynamic and Verifiable Hierarchical Secret Sharing

Giulia Traverso, Denise Demirel, Johannes Buchmann. Dynamic and Verifiable Hierarchical Secret Sharing. 9th International Conference on Information Theoretic Security (ICITS 2016). Tacoma, Washington, USA, 9-12 August 2016. Proceedings.

Details
Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT

29Sep

Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT

Digitally signing data allows to verify authenticity and thus provides strong data quality assurance or forensic evidence even in the presence of an active attacker. A drawback of cryptographic standard signatures is that the signed data set can not...

Details
Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing

29Sep

Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing

David Derler, Stephan Krenn, and Daniel Slamanig. “Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing“, in: CANS 2016, LNCS, Milan/Italy, Springer. (in press)

Details
Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds

08Sep

Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds

Länger, T., Pöhls, H. C., Ghernaouti, S: "Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds"; in: Privacy Technologies and Policy, Proceedings of the 4th Annual Privacy Forum APF 2016, Springer LNCS, ISBN 978-3-319-44759-9

Details
Efficient Third Party Auditing for a Distributed Storage System

29Aug

Efficient Third Party Auditing for a Distributed Storage System

When using distributed storage systems to outsource data storage into the cloud, it is often vital that this is done in a privacy preserving way, i.e., without the storage servers learning anything about the stored data. Especially when storing...

Details
PRISMACLOUD Tools: A cryptographic toolbox for increasing security in cloud services

29Aug

PRISMACLOUD Tools: A cryptographic toolbox for increasing security in cloud services

The EC Horizon 2020 project PRISMACLOUD aims at cryptographically addressing several severe risks threatening end user security and privacy in current cloud settings. This shall be achieved by the provision of a reusable toolbox encapsulating cryptographic functionality from which...

Details
Practical Signing-Right Revocation

29Aug

Practical Signing-Right Revocation

Michael Till Beck, Stephan Krenn, Franz-Stefan Preiss, and Kai Samelin. “Practical Signing-Right Revocation“, in: Michael Franz and Panos Papadimitratos (eds.) TRUST 2016, pp. 21-39, LNCS 9824, Vienna/Austria, Springer.

Details
Towards a Unified Secure Cloud Service Development and Deployment Life-cycle

28Jul

Towards a Unified Secure Cloud Service Development and Deployment Life-cycle

A. Hudic, M. Flittner, P. Radl, T. Lorunser, R. Bless. Towards a Unified Secure Cloud Service Development and Deployment Life-cycle. SAW Workshop - ARES 2016. Salzburg, Austria, August 31 – September 2, 2016.

Details
Towards Authenticity and Privacy Preserving Accountable Workflows

28Jul

Towards Authenticity and Privacy Preserving Accountable Workflows

David Derler, Christian Hanser, Henrich C. Pöhls, Daniel Slamanig. Towards Authenticity and Privacy Preserving Accountable Workflows. 10th IFIP International Summer School. Edinburgh, UK, August 16-21, 2015.

Details

Element

Become a Member


Continue