Deliverables
A continuous validation process will be conducted thought the whole development process, providing the correction paths where needed. Results and analysis will be reported in this deliverable. Inputs will come from WP3, which sets the basis for the assessment methodology, and from WP4 and WP5. This is the final version of D2.3, and will collect both the refined procedures and the results and analysis of the validation cycle. Contributors: UVIGO (Editor), FCSR, IBM
Report of final Advisory Board WorkshopAfter each SAB workshop, Atos will write a report with all conclusions, including observations on project results, recommendations for research and on actions for impact creation, among others. Contributors: ATOS (Editor), All partners
Preliminary standardisation ReportsThis deliverable will describe the relevant standards, the on-going standardisation efforts, and their priority with respect to the project. Contributors: KU Leuven (Editor), UVIGO, IBM
WITDOM formalized technological requirementsAs the tangible result of subtask 3.1.1, the first revision of this deliverable will present the formal definition of the technological security, privacy and verifiability requirements, taking into account the connection with user-centric requirements and European privacy and data protection legislation. It will also gather the identified limitations of technologies for verifiability and security and privacy protection of outsourced process, and initial approaches for tackling them. This revision at M12 will collect the first results of subtask 3.2.2, namely the description of the holistic privacy framework, the definition of privacy metrics and privacy preferences, and the assessment methodology used to evaluate the end-to-end privacy and security of the solutions developed in WITDOM, reformalizing the gathered requirements to assess that the developed metrics are sufficiently representative and perfectly aligned to the requirements. Contributors: UVIGO (Editor), Atos, KU Leuven, IBM, XLAB, FCSR
Definition of Validation framework and protocolsThe final validation activities reported in D2.6 will be based on the validation framework defined within this deliverable. The validation framework will collect the relevant metrics, successful criteria, validation activities and protocols and tools used for validation to assess the requirements defined in D2.1, D2.2, D6.1 and D6.2 and formalized in D3.2. The aim of this deliverable is to align all the partners and prepare the ground for the implementation of the final validation activities focused of the developed platform and prototypes. Contributors: FCSR (Editor), UVIGO
Final specification of an end-to-end secure architectureThe final major data-management components, functional specification, architectural layers, information flows and implementation guidelines will be described and integrated into a coherent view of the system architecture. Contributors: IBM (Editor), UVIGO, ATOS, XLAB, KU Leuven
WITDOM final report on Cryptographic and Privacy-preserving primitivesThe final version of this deliverable will contain the research outcomes from Tasks 3.2 to 3.5 (WD3.3, WD 3.4, WD 3.5), including also the detailed description of the developed and adapted techniques, their applicability and a detailed quantitative evaluation in terms of efficiency and achieved security/privacy protection, both at the primitive level and end-to-end when integrated in a whole system within WITDOM evaluation framework. Contributors: UVIGO (Editor), KU Leuven, IBM
Legal validation and recommendationsThis deliverable will contain a legal assessment of the general privacy enabling tools and technologies, as well as the specific e-Health and Financial Services scenarios that have been developed in the WITDOM project and will furthermore include draft recommendations on privacy enabling tools and technologies to ensure legally compliant systems. Contributor: KU Leuven (Editor), UVIGO, FCSR
Legal and Ethical framework and privacy and security principlesThis deliverable will analyse the soon to be expected revised data protection package and the cybersecurity package on its implications for privacy enhancing technologies in untrusted environments, focusing specifically on the application of privacy and data protection principles, as well as ethical aspects. Editor & Contributor: KU Leuven
Final Scientific and Technical Validation of WITDOM prototypesBy using the validation framework and protocols defined in D2.4 the validation activities will be performed. This deliverable will provide a final result of quantitative and qualitative validation against the project prototypes. All partners that have contributed during the development will be called to assess the requirements of the respective component of the platform and use cases. Contributors: FCSR (Editor), All Partners
Functional analysis and use case identificationWhile D2.1 is focused on privacy and stakeholder requirements analysis and definition, D2.2 has its focus on the functional analysis and use case identification. Within this deliverable the main business logic and rules will be defined and described. Contributors: FCSR (Editor), BBVA, ATOS, IBM
Initial Exploitation PlanIt will present the first version of the consortium/project-wide as well as partner specific exploitation plans for the WITDOM project, including the impact creation plan. It will include initial market analysis. Contributors: ATOS (Editor), All partners
Final communication Activities ReportThis deliverable will be the final report of the completed communication activities from M25 to M36. Contributors: ATOS (Editor), All partners
Final specification of the adaptation layer for Cloud computingThe final characteristics, elements, and interfaces of the extension to Cloud computing developed in T4.4 (i.e. WD4.2) will be collected in this deliverable, together with the implementation guidelines corresponding to the Cloud scenario produced by T4.4. Contributors: IBM (Editor), UVIGO, ATOS, XLAB, FCSR
Requirements analysis for un-trusted environmentsAt the beginning of WITDOM project an extensive analysis of requirements will be conducted. Requirements will be with high level of abstraction, with no bias towards technology and they will focus mainly on privacy and security issues highlighted by the stakeholder analysis. Requirements will span from general requirements for the whole platform as well as specific requirements for the two use case. This deliverable, in conjunction with D2.2, D6.1 and D6.2 will be the basis to design and develop the whole project. Contributors: FCSR (Editor), BBVA, ATOS, UVIGO, KU Leuven, IBM
Report of second Advisory Board WorkshopAfter each SAB workshop, Atos will write a report with all conclusions, including observations on project results, recommendations for research and on actions for impact creation, among others. Contributors: ATOS (Editor), All partners
Dissemination PlanD7.2 will outline the plan for dissemination activities for the various channels described in Task 7.1 and will identify potential avenues for dissemination. It will also contain the first version of the dissemination materials (flyers, leaflet, poster, presentation templates). Contributors: ATOS (Editor), All partners
Report of first Advisory Board WorkshopAfter each SAB workshop, Atos will write a report with all conclusions, including observations on project results, recommendations for research and on actions for impact creation, among others. Contributors: ATOS (Editor), All partners
Final Exploitation Plan and ReportIt will update D7.10 based on the finalised developments and validation of the WITDOM project, and will include a report on exploitation activities performed. It will include a definition of business models suitable for market adoption of project results for enhanced privacy and security in Cloud environments. Contributors: ATOS (Editor), All partners
First dissemination Report& MaterialThis report will periodically update the dissemination plan, report on the dissemination and awareness creation activities of the past period and will provide updated versions of the dissemination material. Contributors: ATOS (Editor), All partners
Legal requirements on privacy, data protection and security in WITDOM scenariosThis deliverable will specify ethical and legal privacy and security requirements that need to be taken into account for the development of the eHealth and Financial Services scenarios. Contributor: KU Leuven (Editor), FCSR
Final specification of system architectures for WITDOM scenariosThis deliverable will comprise the final scenario-specific architectural description for both use-cases, adequately redefining the initial architecture (WD4.1, D4.1) and the relationships between its elements in order to meet the objectives of this WP. Contributors: UVIGO (Editor), IBM, FCSR, BBVA, ATOS, XLAB, KU Leuven
Final dissemination Report& MaterialThis report updates and constitutes the final version of the dissemination plan, report on the dissemination and awareness creation activities of the past period and will provide updated versions of the dissemination material. Contributors: ATOS (Editor), All partners
Second communication Activities ReportThis report will periodically report the completed communication activities from M13 to M24 and the planned activities for next year (M25 to M36). Contributors: ATOS (Editor), All partners
Second dissemination Report& MaterialThis report updates and constitutes the final version of the dissemination plan, report on the dissemination and awareness creation activities of the past period and will provide updated versions of the dissemination material. Contributors: ATOS (Editor), All partners
WITDOM Holistic Privacy framework, privacy metrics and assessment methodologyThis revision of the deliverable will build upon D3.1, will collecting the final results of subtask 3.2.2, namely the description of the holistic privacy framework, the definition of privacy metrics and privacy preferences, and the assessment methodology used to evaluate the end-to-end privacy and security of the solutions developed in WITDOM, reformalizing the gathered requirements to assess that the developed metrics are sufficiently representative and perfectly aligned to the requirements. A preliminary theoretical evaluation of the existing and to-be-developed privacy-enhancing techniques and secure cryptographic signal processing approaches will also be given (WD3.1). This deliverable will also account for the evolving research outcomes in WP3 and from the actual evaluation and assessment in WP2 to refine and improve the framework from D3.1. Contributors: UVIGO (Editor), Atos, KU Leuven, IBM, XLAB, FCSR
Final standardisation ReportsThis deliverable will offer a consolidated view of standardisation-related achievements in relation to the project and its outcomes. Contributors: KU Leuven (Editor), UVIGO, IBM
First communication Activities ReportThis report will periodically report the completed communication activities from M1 to M12 and the planned activities for next year (M13 to M24). Contributors: ATOS (Editor), All partners
The internal portal will be created initially to form a repository of documentary and other information that is relevant to the execution of the project, and that can also be used to provide an initial intra-project communication system. In the private area, a project management tool will be made available to facilitate the communication of the partners providing a common workspace. As the project evolves, the information structure and the IT-infrastructure will be adapted according to current needs and requirements. The usual collaboration tools and procedures will be installed and made available to the project partners. It will also be extended with an external portal that will make available information about WITDOM available to the public; that work will be performed in WP7 (see Task 7.1 D7.1, Task 7.2 and D7.3). Editor & Contributor: ATOS
WITDOM Internal Website and Communication InfrastructureThe internal portal will be created initially to form a repository of documentary and other information that is relevant to the execution of the project and that can also be used to provide an initial intraproject communication system In the private area a project management tool will be made available to facilitate the communication of the partners providing a common workspace In a second phase ending in month 3 a communication infrastructure consisting in a richer internal Internet portal and set of mailing lists will be provided As the project evolves the information structure and the ITinfrastructure will be adapted according to current needs and requirements The usual collaboration tools and procedures will be installed and made available to the project partners It will also be extended with an external portal that will make available information about WITDOM available to the public that work will be performed in WP7 see Task 71 D71 Task 72 and D73D74Editor Contributor ATOS
Public Web PresenceA public website will be established In the internal projects area a management tool will be made available to facilitate partners communication providing a common workspace A specific restricted area will be designed for SAB members The relationship with focus groups will be facilitated eg by management of mailing lists and electronic newslettersContributors ATOS Editor All partners
This deliverable comprises the final prototype of the trustworthy privacy-preserving platform toolkit and the necessary reports, detailing the platform from the documentation point of view. This final version will refine the initial revision provided in D5.1, accounting for the successive scientific/technical validations performed in T2.3 and T2.4. Contributors: XLAB (Editor), Atos, UVIGO
Publications
Author(s):
Juan Ramon Troncoso-Pastoriza, Alberto Pedrouzo-Ulloa, Fernando Perez-Gonzalez
Published in:
2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017, Page(s) 2067-2071, ISBN 978-1-5090-4117-6
Publisher:
IEEE
DOI:
10.1109/ICASSP.2017.7952520
Author(s):
Alberto Pedrouzo-Ulloa, Juan Ramon Troncoso-Pastoriza, Fernando Perez-Gonzalez
Published in:
2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015, Page(s) 1707-1711, ISBN 978-1-4673-6997-8
Publisher:
IEEE
DOI:
10.1109/ICASSP.2015.7178262
Author(s):
Nicolás Notario, Eleonora Ciceri, Alberto Crespo, Eduardo González Real, Ilio Catallo, Sauro Vicini
Published in:
Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, 2017, Page(s) 1-7, ISBN 9781-450352574
Publisher:
ACM Press
DOI:
10.1145/3098954.3104057
Author(s):
Marcus Brandenburger, Christian Cachin, Matthias Lorenz, Rudiger Kapitza
Published in:
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017, Page(s) 157-168, ISBN 978-1-5386-0542-4
Publisher:
IEEE
DOI:
10.1109/dsn.2017.45
Author(s):
Griet Verhenneman
Published in:
2017
Publisher:
European Conference on Health Law edition:6 location:Bergen, Norway date:27-29 September 2017
Author(s):
Abdelrahaman Aly, Aysajan Abidin, and Svetla Nikova
Published in:
2018
Publisher:
Financial Cryptography and Data Security - 22nd International Conference, FC 2018
Author(s):
Sauro Vicini, Francesco Alberti, Nicolas Notario, Alberto Crespo, Juan Ramon Troncoso Pastoriza, Alberto Sanna
Published in:
2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Page(s) 768-775, ISBN 978-1-5090-0990-9
Publisher:
IEEE
DOI:
10.1109/ARES.2016.74
Author(s):
Alberto Pedrouzo-Ulloa, Juan Ramon Troncoso-Pastoriza, Fernando Perez-Gonzalez
Published in:
2016 IEEE International Workshop on Information Forensics and Security (WIFS), 2016, Page(s) 1-6, ISBN 978-1-5090-1138-4
Publisher:
IEEE
DOI:
10.1109/WIFS.2016.7823916
Author(s):
F. Alberti, S. Vicini
Published in:
ENoLL Research Day Conference Proceedings 2015, 2015, ISBN 9789-082102741
Publisher:
ENoLL - European Network of Living Labs
Author(s):
Marcus Brandenburger, Christian Cachin, Nikola Knežević
Published in:
Proceedings of the 8th ACM International Systems and Storage Conference on - SYSTOR '15, 2015, Page(s) 1-11, ISBN 9781-450336079
Publisher:
ACM Press
DOI:
10.1145/2757667.2757681
Author(s):
Seda Gurses, Claudia Diaz and Carmela Troncoso
Published in:
Proceedings of the Amsterdam Privacy Conference 2015 (APC 2015), 2015
Publisher:
Amsterdam Platform for Privacy Research (APPR)
Author(s):
Mina Namazi, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González
Published in:
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security - IH&MMSec '16, 2016, Page(s) 45-50, ISBN 9781-450342902
Publisher:
ACM Press
DOI:
10.1145/2909827.2930791
Author(s):
G. Verhenneman, F. Coudert
Published in:
Proceedings of the Amsterdam Privacy Conference 2015 (APC 2015), 2015
Publisher:
Amsterdam Platform for Privacy Research (APPR)
Author(s):
A. Pedrouzo-Ulloa, J.R. Troncoso-Pastoriza, Fernando Pérez-González
Published in:
2017
Publisher:
Arxiv e-prints, (arXiv:1607.05244v2)
Author(s):
Ilio Catallo, Eleonora Ciceri, Stefania Stenirri, Stefania Merella, Alberto Sanna, Maurizio Ferrari, Paola Carrera, Sauro Vicini.
Published in:
2017
Publisher:
Proceedings of CIBB
Author(s):
Christian Cachin, Jan Camenisch, Eduarda Freire-Stögbuchner, Anja Lehmann
Published in:
2017, Page(s) 59-75
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-70972-7_4
Author(s):
Sauro Vicini, Adriano Gariglio, Francesco Alberti, Elettra Oleari, Alberto Sanna
Published in:
Design, User Experience, and Usability: Design Thinking and Methods, 2016, Page(s) 365-376, ISBN 978-3-319-40409-7
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-319-40409-7_35
Author(s):
Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
Published in:
Cryptographic Hardware and Embedded Systems -- CHES 2015, 2015, Page(s) 683-702, ISBN 978-3-662-48324-4
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-48324-4_34
Author(s):
Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil Dimitrov, Ingrid Verbauwhede
Published in:
Cryptographic Hardware and Embedded Systems -- CHES 2015, 2015, Page(s) 164-184, ISBN 978-3-662-48324-4
Publisher:
Springer Berlin Heidelberg
DOI:
10.1007/978-3-662-48324-4_9
Author(s):
Alberto Pedrouzo-Ulloa, Juan Ramon Troncoso-Pastoriza, Fernando Perez-Gonzalez
Published in:
IEEE Transactions on Information Forensics and Security, Issue 12/5, 2017, Page(s) 1125-1140, ISSN 1556-6013
Publisher:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/TIFS.2016.2647223
Author(s):
Ero Balsa, Cristina Pérez-Solà, Claudia Diaz
Published in:
ACM Transactions on Internet Technology, Issue 17/3, 2017, Page(s) 1-21, ISSN 1533-5399
Publisher:
Association for Computing Machinary, Inc.
DOI:
10.1145/3093897
Author(s):
Sujoy Sinha Roy, Frederik Vercauteren, Jo Vliegen, Ingrid Verbauwhede
Published in:
IEEE Transactions on Computers, Issue 66/9, 2017, Page(s) 1562-1572, ISSN 0018-9340
Publisher:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/TC.2017.2686385
Author(s):
Simon Oya, Fernando Perez-Gonzalez, Carmela Troncoso
Published in:
IEEE/ACM Transactions on Networking, 2016, Page(s) 1-14, ISSN 1063-6692
Publisher:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/TNET.2016.2547391
Author(s):
Griet Verhenneman, Fanny Coudert
Published in:
Data Protection Law & Policy, Issue vol:12 issue:3, 2015, Page(s) 8-10, ISSN 1743-6605
Publisher:
Cecile Park Publishing
Author(s):
Juan Ramón Troncoso-Pastoriza, Elsa Prieto Pérez
Published in:
ERCIM News. Tackling Big Data in the Life Sciences., Issue 104, 2015, ISSN 0926-4981
Publisher:
ERCIM EEIG
Intellectual Property Rights
Application/Publication number:
15/
417851
Date:
2017-01-27
Applicant(s):
IBM RESEARCH GMBH
Searching for OpenAIRE data...
There was an error trying to search data from OpenAIRE
No results available