Publications
Deliverables and reports presented here are the official project results as delivered to the European Commission
- D2.1 Architecture for Attribute-based Credential Technologies –Version 1 (December 2011) (PDF)
- D2.2 Architecture for Attribute-based Credential Technologies - Final Version (August 2014) (PDF)
- D2.3 Benchmarking Criteria (June 2014) (PDF)
- R2.1 Privacy-ABC Technologies, Personal Data Ecosystem, and Business Models (January 2015) (PDF)
- H2.1 ABC4Trust Architecture for Developers (November 2012) (PDF)
- H2.2 ABC4Trust Architecture for Developers (October 2013) (PDF)
- H2.4 The Proposal for a Regulation on Electronic Identification and Trust Services under a Privacy and ABC4Trust Perspective (October 2013) (PDF)
- D3.1 Scientific Comparison of ABC Protocols (June 2014) - Part I (PDF) and Part II (PDF)
- D3.2 Guidance on Selection and Complementarity of ABC Protocols (August 2014) (PDF)
- D4.2 Final Reference Implementation (August 2014) (PDF)
- D4.3 Final Perturbation Analysis of the Implementation (July 2014) (PDF)
- D4.4 Smartphone feasibility analysis (August 2014) (PDF)
- D5.1 Scenario Definition for both Pilots (February 2012) (PDF)
- D5.2 Description of the “Common Denominator” Elements (September 2012) (PDF)
- D5.2a Amendment Building Blocks of ABC Technology (September 2013) (PDF)
- D5.3 Experiences and Feedback of the Pilots (May 2014) (PDF)
- D6.1 Application Description for the School Deployment (March 2012) (PDF)
- D6.2 Necessary hardware and software package for the school pilot deployment (March 2013) (PDF)
- D6.3 Evaluation of the School Pilot (May 2014) (PDF)
- D7.1 Application Description for Students (March 2012) (PDF)
- D7.2 Necessary hardware and software package for the student Pilot deployment (November 2012) (PDF)
- D7.3 Evaluation of the Student Pilot (May 2014) (PDF)
- D8.12 Architecture for Standardization V2 (November 2014) (PDF)
- D8.13 Reference Implementation for Standardization V2 (November 2014) (PDF)
Below is a short list of the selected ABC4Trust scientific publications. For the full list visit Papers and Articles.
Attribute-based Credentials for Trust: Identity in the Information Society | |
Kai Rannenberg, Jan Camenisch, and Ahmad Sabouri, eds. | |
ISBN 978-3-319-14439-9. Springer, 2015. | |
ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-life | |
Ahmad Sabouri, Kai Rannenberg | |
Privacy and Identity Management for the Future Internet in the Age of Globalisation; 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, pp. 3-16. Springer, 2015. | |
ABC4Trust Workshop on Core Features of Privacy-ABCs, Practical Use and Legal Issues | |
Felix Bieker, Marit Hansen, Gert L. Mikkelsen, Hannah Obersteller | |
Privacy and Identity Management for the Future Internet in the Age of Globalisation; 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, pp. 253-266. Springer, 2015. | |
Anonymous ePetitions – Another Step towards eDemocracy | |
Hannah Obersteller | |
Privacy and Identity Management for the Future Internet in the Age of Globalisation; 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, pp. 110-124. Springer, 2015. | |
Concepts and Languages for Privacy-preserving Attribute-based Authentication | |
Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss | |
Journal of Information Security and Applications, Vol. 19, Issue 1, pp. 25-44. Elsevier, 2014. | |
Privacy-Preserving Auditing for Attribute-Based Credentials | |
Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial | |
Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, pp. 109-127. Springer, 2014. | |
Trust Relationships in Privacy-ABCs Ecosystem | |
Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg | |
11th International Conference on Trust, Privacy, and Security in Digital Business (TrustBus 2014), pp. 13-23. Springer, 2014. | |
Towards a Framework for Benchmarking Privacy-ABC Technologies | |
Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri | |
ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference (SEC 2014), pp. 197-204. Springer, 2014. | |
Privacy-respecting School Community Interaction Platform | |
Ahmad Sabouri, Souheil Bcheri, Kai Rannenberg | |
Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum (CSP Forum 2014), pp. 108-119. Springer, 2014. | |
Privacy Preserving Course Evaluations in Greek Higher Education Institutes: An e-Participation Case Study with the Empowerment of Attribute Based Credentials | |
Vasiliki Liagkou, George Metakides, Apostolis Pyrgelis, Christoforos Raptopoulos, Paul Spirakis, and Yannis Stamatiou | |
Privacy Technologies and Policy - First Annual Privacy Forum (APF 2012), pp. 140-156. Springer, 2014. | |
Efficient Attributes for Anonymous Credentials | |
Jan Camenisch, Thomas Groß | |
ACM Transactions on Information and System Security, Vol. 15, Issue 1, Art. Nr. 4. ACM, 2012. | |
Privacy-by-Design Based on Quantitative Threat Modeling | |
Jesus Luna Garcia, Neeraj Suri, Ioannis Krontiris | |
7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012), pp. 2012. IEEE, 2012. | |
Talks references selected talks and presentations