Risultati finali
Software components that will implement the privacy extensions to a complete and testable set of functions and all the findings from the MVP trial validation.
Final (MVP) version of business driven toolsThis deliverable will contain the second version of the business driven tools.
Release candidate PA I/F and User ManagementThis software release is a complete implementation of all components according to specifications. Fully integrated, usable platform. This (agile) version will be used to continue end-user trials and generate case studies until the end of the project.
Final (Product) version of business driven toolsThis deliverable will contain the final version of the business driven tools.
Healthcare trial results-updateThis deliverable will update D8.7 with the final results of the healthcare trials .
Source Code for research innovationsThis deliverable will provide the source code implementing all the research findings of WP4.
Initial (Prototype) version of privacy enhanced toolsThis deliverable will include the design and implementation of the first version of the privacy enhanced mechanisms and tools to be included in the PA platform, that will perform the enforcement of the privacy protection of the users’ personal data controlled by the OPERANDO system, including data collection, processing and storage. The software released will be accompanied with a technical design document.
Final release PA Interfaces and User ManagementThis software release is a full Solution: working, tested, and validated product. Implementation of all field trial feedbacks. Complete fix of all known bugs.
Final (MVP) version of security aware toolsThis deliverable will contain the second version of the security enhanced mechanisms and tools to be included in the PA platform. The focus on this stage is the usage of the component features by the users.
Final (Product) version of security aware toolsThis deliverable will contain the final version of the security enhanced mechanisms and tools to be included in the PA platform.
Initial (Prototype) version of business driven toolsThis deliverable will specify and implement the first version of the methods and tools that enable PSPs to control, monitor and measure the use of the online services executed in the PA. Some main aspects that will be considered being in a cloud-based approach that deals with high volume of data are load balancing, monitoring, scalability, resource usage, and multi-tenancy. Furthermore, aspects for a privacy-for-benefit negotiation service in order to support negotiated access to magnetisable personal data under user consent will be dealt with in this deliverable
CS Final productSoftware components that will implement the findings and feedback from the end users and OSP based on Release Candidate
CS Beta ReleaseSoftware components that will implement a complete set of UAA on all targeted user devices, according to the specifications. A privacy extensions component (library) will be developed with a core set of functions to enable the highest level of reputation for applications that use it
Final (MVP) version of privacy enhanced toolsThis deliverable will contain the second version of the privacy enhanced mechanisms and tools to be included in the PA platform. The focus on this stage is the usage of the component features by the users.
Public administration trial resultsThis deliverable will describe the results of the performed public administration trials and the lessons learned.
Initial (Prototype) version of security aware toolsThis deliverable will include the design and implementation of the first version of the security enhanced mechanisms and tools to be included in the PA platform.
Final (Product) version of privacy enhanced toolsThis deliverable will contain the final version of the privacy enhanced mechanisms and tools to be included in the PA platform.
Healthcare trial resultsThis deliverable will describe the results of the performed healthcare trials and the lessons learned.
CS MVP (Minimal Valuable Product)Software components that will enhance the core functions of UPG and UAM to the defined MVP functions. The basic UPP (User Privacy Policies) will be developed as a subset of the UAA will be developed accompanied by the necessary interface functions with UAM.
Public administration trial results-updateThis deliverable will update D8.7 with the final results of the public administration trials.
Use cases of OSP end usersDocumentation of envisaged applications of the platform by the participating OSPs and their end users.
A reference business plan document to be used by prospective PSPs, allowing them to prepare their actual business plan and simulate business outcomes, in order to reach a decision to enter the PSP business.
Project & Quality Management ManualThis manual defines the processes by which the project will be run and the quality of its deliverables assured. The manual states plans for communication within the consortium and includes risk management processes. It identifies industry standard project management tools to assure the quality of deliverables including templates, guidelines and standards for the elaboration of deliverables as well as workflow for their assessment.
Initial dissemination and communication packageIt will include: project corporate image with logo, letterhead, and guidelines. Creation of the project/consortium website, official mail system and social network accounts (LinkedIn, Twitter, SlideShare, Youtube)
Final PA platform specification and guideThis is the final version of the integrated platform and accompanying guides and specifications
Trust Models Study ReportA report describing a variety of trust model concepts that are essential for the adoption of PSPs' service by consumers and OSPs.
RC PA platform specification and guideThis deliverable will focus on the integration of all components coming from tasks 6.1 - 6.3 that will result integrated Privacy Authority platform. This version will be the first version of the integrated platform. In addition to the software, the deliverable will include a specification document as well as a users' guide
Updated D2.1, D2.2, D2.3Ongoing updates to the consumer- and OSP use cases and PSP Business Models.
Ethical trial protocols, scenarios and requirementsThis deliverable will describe the design of the ethical trial protocols including the data management procedures. It will also include the technical requirements for supporting these protocols.
OSP Use Cases DocumentDocument summarizing a study of Data Protection and Privacy requirements imposed on the OSPs, either by themselves or by regulations; describing use cases and providing insights on services that will be offered to OSPs by PSPs.
Characterization of enabling technologiesThis Deliverable will provide a theoretically and practically oriented overview of available privacy preserving and security-enabling techniques for the cloud that will constitute the base for the research of tasks 4.3 & 4.4.
CS final technical documentation and guideFinal version of the documents that will describe the detailed design and the implementation on source code level of each component accompanied by guides for the usage of these components
Security & Privacy for cloud data Innovations reportThis report will document the novel methods in security, privacy and authentication of cloud services relevant to OPERANDO that allow users to selectively share access of their data and their authenticity.
Report of evaluation of competing technologiesDocument outlining the competitive landscape of the market for OPERANDO platform, and comparative analysis with competing technologies and solutions.
Guidelines for data anonymization reportThis report comprises a includes a profile of the data stored and processed by OPERANDO, a review of data anonymization techniques with their respective strengths and weaknesses, a description of novel algorithms for data anonymization and document sanitization as well as the cryptographic primitives and protocols and an identification of the distinctive approach of OPERANDO.
Initial PA platform specificationThis deliverable will contain the first version of the specification of the methods, tools and services that complement and interact with each other in the OPERANDO cloud-based PA platform. As well as how the PA platform interoperates with other OPERANDO platform modules and other external stakeholders such as OSPs.
CS technical documentation and guideDocuments that will describe the detailed design and the implementation on source code level of each component accompanied by guides for the usage of these components
Innovations in data publication & mining reportThis report will highlight the new techniques for privacy-aware data-mining, data publication, collaborative filtering and for document sanitization that will be developed for OPERANDO
PSP Business Models Study ReportReport of a study of various business models that can be used by PSPs, in respect to PSPs' target market, competitive landscape, and profitability goals.
Guidelines on legal aspectsThis deliverable will analyse relevant ethical values and legal data protection principles for OPERANDO market segments.
Consumer Use Cases DocumentDocument summarizing a study of consumer online privacy needs, elaborating on typical use cases where privacy of consumers is insufficiently protected.
Specifications for Cloud Security & Privacy algorithmsThis report will provide the requirements and specifications for the security, privacy methods that will be implemented in PDR.
Private Data Repository architecture SpecificationsThis Deliverable will define the platform requirements, identify the roles, attributes, behaviour, and interactions of the different entities. It will also define the functionality of the PDR components and the operations performed on data.
Updated D2.6, D2.7, D2.8Ongoing updates to the requirements and specifications documents.
Report describing the activities done by the consortium about dissemination and open source strategy in the third year
Dissemination and open source report Y2Report describing the activities done by the consortium about dissemination and open source strategy in the second year
Dissemination, communication and collaboration planPaper summarizing the action of each member of the Consortium about the activities to do in order to maximize the dissemination., the involvement of stakeholders and the implementation of new collaborations
Open Source StrategyDocument summarizing the activity for engaging OSS communities. Identification of the potential OSS communities, engagement of these communities towards OPERANDO, and management of the open source repository.
Dissemination and open source report Y1Report describing the activities done by the consortium about dissemination and open source strategy in the first year
Pubblicazioni
Autori:
Gorka Benguria, Juncal Alonso, Iñaki Etxaniz, Leire Orue-Echevarria and Marisa Escalante
Pubblicato in:
EuroAsiaSPI 2018, 2018
Editore:
Springer
Autori:
Paul Grace, Mike Surridge
Pubblicato in:
Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, 2017, Pagina/e 1-8, ISBN 9781-450352574
Editore:
ACM Press
DOI:
10.1145/3098954.3104054
Autori:
Paul Grace, Daniel Burns, Geoffrey Neumann, Brian Pickering, Panagiotis Melas and Mike Surridge
Pubblicato in:
38th IEEE International Conference on Distributed Computing Systems, 2018
Editore:
IEEE
Autori:
Constantinos Patsakis, Efthimios Alepis
Pubblicato in:
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Pagina/e 52-61, ISBN 978-989-758-282-0
Editore:
SCITEPRESS - Science and Technology Publications
DOI:
10.5220/0006603200520061
Autori:
Efthimios Alepis, Constantinos Patsakis
Pubblicato in:
SPACE 2017: Security, Privacy, and Applied Cryptography Engineering pp 53-73, 2017, Pagina/e 53-73
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-71501-8_4
Autori:
Constantinos Patsakis, Athanasios Zigomitros, Agusti Solanas
Pubblicato in:
MSPN 2015 Selected Papers of the First International Conference on Mobile, Secure, and Programmable Networking, 2015, Pagina/e 151-162
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-25744-0_13
Autori:
Efthimios Alepis, Constantinos Patsakis
Pubblicato in:
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Pagina/e 278-284, ISBN 978-989-758-209-7
Editore:
SCITEPRESS - Science and Technology Publications
DOI:
10.5220/0006125502780284
Autori:
Efthimios Alepis, Constantinos Patsakis
Pubblicato in:
International Symposium on Research in Attacks, Intrusions, and Defenses RAID 2017: Research in Attacks, Intrusions, and Defenses, 2017, Pagina/e 334-354
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-66332-6_15
Autori:
Vasilis Tsiakos, Constantinos Patsakis
Pubblicato in:
International Conference on Mobile, Secure, and Programmable Networking MSPN 2016, 2016, Pagina/e 183-196
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-50463-6_15
Autori:
Efthimios Alepis, Aristea Kontogianni, Constantinos Patsakis
Pubblicato in:
2017 IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI), 2017, Pagina/e 822-829, ISBN 978-1-5386-3876-7
Editore:
IEEE
DOI:
10.1109/ictai.2017.00129
Autori:
Athanasios Zigomitros, Achilleas Papageorgiou, Constantinos Patsakis
Pubblicato in:
2016 7th International Conference on Information, Intelligence, Systems & Applications (IISA), 2016, Pagina/e 1-4, ISBN 978-1-5090-3429-1
Editore:
IEEE
DOI:
10.1109/iisa.2016.7785379
Autori:
Efthimios Alepis, Constantinos Patsakis
Pubblicato in:
International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2017, 2017, Pagina/e 93-107
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-72389-1_9
Autori:
Efthimios Alepis, Constantinos Patsakis
Pubblicato in:
International Conference on Mobile Networks and Management MONAMI 2017, 2017, Pagina/e 14-29
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-90775-8_2
Autori:
Juncal Alonso Ibarra, Leire Orue-Echevarria, Marisa Escalante, Gorka Benguria
Pubblicato in:
Proceedings of the 6th International Conference on Cloud Computing and Services Science, 2016, Pagina/e 283-288, ISBN 978-989-758-182-3
Editore:
SCITEPRESS - Science and and Technology Publications
DOI:
10.5220/0005893302830288
Autori:
Sinica Alboaie, Lenuta Alboaie, Andrei Panu
Pubblicato in:
24th International Conference on Information Systems Development (ISD), 2015, ISBN 978-962-442-393-8
Editore:
Springer
Autori:
Alexios Nikas, Efthimios Alepis, Constantinos Patsakis
Pubblicato in:
Digital Investigation, Numero 25, 2018, Pagina/e 78-89, ISSN 1742-2876
Editore:
Elsevier BV
DOI:
10.1016/j.diin.2018.03.004
Autori:
Eugenia Politou, Efthimios Alepis, Constantinos Patsakis
Pubblicato in:
Journal of Cybersecurity, 2018, ISSN 2057-2093
Editore:
Oxford University Press
Autori:
Efthimios Alepis, Constantinos Patsakis
Pubblicato in:
IEEE Access, Numero 5, 2017, Pagina/e 17841-17851, ISSN 2169-3536
Editore:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/access.2017.2747626
Autori:
Constantinos Patsakis, Athanasios Charemis, Achilleas Papageorgiou, Dimitrios Mermigas, Sotirios Pirounias
Pubblicato in:
Computers & Security, Numero 73, 2018, Pagina/e 194-206, ISSN 0167-4048
Editore:
Pergamon Press Ltd.
DOI:
10.1016/j.cose.2017.11.002
Autori:
Achilleas Papageorgiou, Michael Strigkos, Eugenia Politou, Efthimios Alepis, Agusti Solanas, Constantinos Patsakis
Pubblicato in:
IEEE Access, Numero 6, 2018, Pagina/e 9390-9403, ISSN 2169-3536
Editore:
Institute of Electrical and Electronics Engineers Inc.
DOI:
10.1109/access.2018.2799522
Autori:
Panayiotis Kotzanikolaou, Constantinos Patsakis, Emmanouil Magkos, Michalis Korakakis
Pubblicato in:
Computer Communications, Numero 73, 2016, Pagina/e 263-270, ISSN 0140-3664
Editore:
Elsevier BV
DOI:
10.1016/j.comcom.2015.07.017
Autori:
Panayiotis Kotzanikolaou, George Chatzisofroniou, Mike Burmester
Pubblicato in:
International Journal of Information Security, 2016, ISSN 1615-5262
Editore:
Springer Verlag
DOI:
10.1007/s10207-016-0318-0
Autori:
Constantinos Patsakis, Jeroen van Rest, Michał Choraś, Mélanie Bouroche
Pubblicato in:
Data Privacy Management, and Security Assurance, 2016, Pagina/e 169-182, ISBN 978-3-319-29883-2
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-29883-2_11
Autori:
Constantinos Patsakis, Panayiotis Kotzanikolaou, Mélanie Bouroche
Pubblicato in:
Security and Trust Management, 2015, Pagina/e 172-184, ISBN 978-3-319-24858-5
Editore:
Springer International Publishing
DOI:
10.1007/978-3-319-24858-5_11
È in corso la ricerca di dati su OpenAIRE...
Si è verificato un errore durante la ricerca dei dati su OpenAIRE
Nessun risultato disponibile