Opendata, web and dolomites

PRISMACLOUD project deliverables

The page lists 20 deliverables related to the research project "PRISMACLOUD".

 List of Deliverables

PRISMACLOUD: list of downloadable deliverables.
title and desprition type last update

Advanced architecture for distributed storage in dynamic environments

Design of a storage layer with increased dynamicity and additional user privacy for intra-cloud deployment.

Programme: H2020-EU.2.1.1. - Topic(s): ICT-32-2014

download deliverable 

Documents, reports 2019-05-30

Final report on privacy and anonymisation techniques

Final report on privacy and anonymisation techn.

Programme: H2020-EU.2.1.1. - Topic(s): ICT-32-2014

download deliverable 

Documents, reports 2019-05-30

Publicly verifiable computing techniques providing long-term privacy

Proposal for a publicly verifiable computing technique that provides long-term privacy.

Programme: H2020-EU.2.1.1. - Topic(s): ICT-32-2014

download deliverable 

Documents, reports 2019-05-30

User advisory board communication summary 1

Summary of UAB establishment, first interactions, workshops.

Programme: H2020-EU.2.1.1. - Topic(s): ICT-32-2014

download deliverable 

Documents, reports 2019-05-30

Report on Privacy-enhancing cryptography

Final report on the advancements of privacy-enhancing cryptography.

Programme: H2020-EU.2.1.1. - Topic(s): ICT-32-2014

download deliverable 

Documents, reports 2019-05-30

Holistic security model for secure service composition

Holistic security model for secure service composition

Programme: H2020-EU.2.1.1. - Topic(s): ICT-32-2014

download deliverable 

Documents, reports 2019-05-30

Domain independent generic security models

Presents a security model indepenent for domain specific use cases.

Programme: H2020-EU.2.1.1. - Topic(s): ICT-32-2014

download deliverable 

Documents, reports 2019-05-30

Analysis of malleable signatures for defining allowed modification and providing verifiable means of conformant processing

Report describing the usage and limitations of malleable sign. to build cryptographic checks that detect non-conformance of processing and allows to honour compliant processor by keeping the authenticity verifiable on the result of the processing.

Programme: H2020-EU.2.1.1. - Topic(s): ICT-32-2014

download deliverable 

Documents, reports 2019-05-30

Dissemination and exploitation report 1

Summary of diss. and exploitation activities for the reporting period.

Programme: H2020-EU.2.1.1. - Topic(s): ICT-32-2014

download deliverable 

Documents, reports 2019-05-30

Legal, social and HCI requirements

Presents and discusses the requirements that are elicited by task 1.1.

Programme: H2020-EU.2.1.1. - Topic(s): ICT-32-2014

download deliverable 

Documents, reports 2019-05-30

Verifiable computing techniques and integrity preserving modifications for data managed by secure storage solutions

Proposals how the storage solutions from T5.1 can be combined with the integrity preserving modification and verifiable computation solutions from T5.3.

Programme: H2020-EU.2.1.1. - Topic(s): ICT-32-2014

download deliverable 

Documents, reports 2019-05-30

Improved guidelines and architecture for secure service composition

Improved and revised final version of report.

Programme: H2020-EU.2.1.1. - Topic(s): ICT-32-2014

download deliverable 

Documents, reports 2019-05-30

Analysis of the State of the Art of FPE, OPE and Tokenization schemes

A review of current solutions for FPE, OPE and Tokenization schemes.

Programme: H2020-EU.2.1.1. - Topic(s): ICT-32-2014

download deliverable 

Documents, reports 2019-05-30

Security and privacy by design guidelines for PRISMACLOUD

Security and privacy by design guidelines for PRISMACLOUD

Programme: H2020-EU.2.1.1. - Topic(s): ICT-32-2014

download deliverable 

Documents, reports 2019-05-30

Overview of verifiable computing techniques providing private and public verification

Overview of state of the art privately and publicly verifiable computing techniques and an analysis of their properties, e.g., privacy, efficiency, and applicability.

Programme: H2020-EU.2.1.1. - Topic(s): ICT-32-2014

download deliverable 

Documents, reports 2019-05-30

Risk and threat analysis with security requirements

Summarizes the threat and risk analysis as well as derived security requirements.

Programme: H2020-EU.2.1.1. - Topic(s): ICT-32-2014

download deliverable 

Documents, reports 2019-05-30

HCI Research Report

Presentation of the project\'s HCI Research results including final HCI guidelines.

Programme: H2020-EU.2.1.1. - Topic(s): ICT-32-2014

download deliverable 

Documents, reports 2019-05-30

User advisory board communication summary 2

Summary of communication activities and feedback from UAB.

Programme: H2020-EU.2.1.1. - Topic(s): ICT-32-2014

download deliverable 

Documents, reports 2019-05-30

Overview of functional and malleable signature schemes

Overview of state of the art malleable and functional signature schemes and their properties, such as, efficiency, privacy, and unforgeability.

Programme: H2020-EU.2.1.1. - Topic(s): ICT-32-2014

download deliverable 

Documents, reports 2019-05-30

Secure cloud usage for end user

Final report- in form of a handbook or book.

Programme: H2020-EU.2.1.1. - Topic(s): ICT-32-2014

download deliverable 

Documents, reports 2019-05-30