PRISMACLOUD

Blog Standard

D3.2 HCI Guidelines

This deliverable presents the first HCI (Human Computer Interaction) guidelines for the PRISMACLOUD use cases in the area of eHealth, Smart Cities and eGovernment that require the development of user interfaces. HCI Guidance is mainly provided in terms of...

Details

D1.3 Second management and progress report

PRISMACLOUD is a research and innovation action scheduled for 3.5 years (42 month) in the domain of security and privacy for cloud computing. This report titled ā€œD1.3 Second Management and Progress Reportā€ gives an overview on the projectā€™s progress...

Details

D7.6 Improved Guidelines and Architecture for Secure Service Composition

This report covers the results of "Task 7.3 Architecture and guidelines for secure service composition". In particular, it presents the PRISMACLOUD architecture and the associated development methodology called Cryptographic Software Development Lifecycle (CryptS- DLC). It also provides recommendations for...

Details

D5.7 Final Report on Privacy and Anonymization Techniques

PRISMACLOUD implements novel cryptographic concepts and methods to lift them into practical application and improve the security and privacy of cloud based services, while at the same time make the services accessible to providers and end users. The purpose of...

Details

D5.3 Advanced architecture for distributed storage in dynamic environments

In this report we present the speci cation of the secure object storage tool (SECOSTOR), as it has been developed in the project. The tool comes with a clean architecture and easy to use modules and interfaces. All components are...

Details

D5.9 Analysis of malleable signatures for defining allowed modification and providing verifiable means of conformant processing

PRISMACLOUD aims at bringing novel cryptographic concepts and methods to practical application to improve the security and privacy of cloud based services and make them usable for providers and users. The purpose of this deliverable is to present the nal...

Details

Agile Cryptographic Solutions for the Cloud

Cloud computing, with its estimated market size of 150 billion USD annual turnover, is one of the major growth areas in information and communication technologies today. As a paradigm building on outsourcing of storage and processing, cloud computing suffers...

Details

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

We propose a new class of post-quantum digital signature schemes that: (a) derive their security entirely from the security of symmetric-key primitives, believed to be quantum-secure, and (b) have extremely small keypairs, and, (c) are highly parameterizable. In our...

Details

MoPS: A Modular Protection Scheme for Long-Term Storage

Current trends in technology, such as cloud computing, allow outsourcing the storage, backup, and archiving of data. This provides efficiency and flexibility, but also poses new risks for data security. It in particular became crucial to develop protection schemes...

Details

Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability

In this work the first linearly homomorphic authenticated encryption scheme with public verifiability and provable correctness, calledĀ  LEPCoV , is presented. It improves the initial proposal by avoiding false negatives during the verification algorithm. This work provides a detailed...

Details

Element

Become a Member


Continue