D3.6 Progress Report on Secure Cloud Usage for End Users
This is the progress report of the task T3.4 “Secure cloud usage for end users”. We are here in the context of work package WP3, “End user and business deployment”, which is the work package with the objective to...
DetailsD7.7 Software architecture and interface specification
This report provides an overview of the preliminary work taken in the frame of task 7.4 Software development of framework and components to realize use cases. This is the first report of the task and will be updated as...
DetailsD7.5 First version of guidelines and architecture for secure service composition
This report covers the first interim results of "Task 7.3 Architecture and guidelines for secure service composition". In particular, it presents the first iteration of the PRISMACLOUD architecture and the associated development methodology Cryptographic Service Development Livecycle (CryptSDLC). It also...
DetailsD7.3 Progress report on holistic security model for secure service composition
In this report we describe the concept behind PRISMACLOUD's service capabilities. A Service Capability is a security & privacy relevant property that is of importance for the application domain of the service and that can be described in a...
DetailsD6.1 Intermediate activity report on software prototyping for cryptographic support
This report provides an overview of all the software artefacts developed in parallel within the PRISMACLOUD project. This is the first report and it will become updated by the final report delivered as D6.2 at month 30 (August 2017). The...
DetailsD3.4 Progress Report on Business and Governance Models for Cryptographically Secured Services
The present document compiles the work carried out in T3.3 business and governance models after one year and a half of the start of the project. It begins with a brief analysis of state of the art business models in...
DetailsD6.4 Selection and specification of tools for software implementation
The Horizon 2020 project PRISMACLOUD reaches out to address several of the most pressing risks threatening end user security and privacy in current public cloud offerings with a portfolio of cryptographically secured services, providing dependable end-to-end security, without having...
DetailsD9.5 Initial assessment of current cloud standardization efforts
In its European Cloud Computing Strategy, the European Commission has pointed out the importance of standardisation for promoting the rapid adoption of cloud computing. Cloud computing products shall be evaluated and certified against standards, in order to support their...
DetailsD6.7 Document of specifications for hardware implementations
This document describes the specications of the selected cryptographic scheme for hardware implementation. The objective is to implement a redactable signature scheme that is robust to attacks with quantum computers. This redactable scheme will serve as a selective disclosure...
DetailsD5.5 Analysis of the requirements for and the state of the art for privacy and anonymisation techniques
This document sets the ground work for the implementation of the anonymisation service. We motivate the need for releasing data and provide formal definitions and background work related to anonymisation and privacy. The document also describes our work with the...
Details