Deliverables and reports presented here are the official project results as delivered to the European Commission

  1. D2.1 Architecture for Attribute-based Credential Technologies –Version 1 (December 2011) (PDF)
  2. D2.2 Architecture for Attribute-based Credential Technologies - Final Version (August 2014) (PDF)
  3. D2.3 Benchmarking Criteria (June 2014) (PDF)
  4. R2.1 Privacy-ABC Technologies, Personal Data Ecosystem, and Business Models (January 2015) (PDF)
  5. H2.1 ABC4Trust Architecture for Developers (November 2012) (PDF)
  6. H2.2 ABC4Trust Architecture for Developers (October 2013) (PDF)
  7. H2.4 The Proposal for a Regulation on Electronic Identification and Trust Services under a Privacy and ABC4Trust Perspective (October 2013) (PDF)
  8. D3.1 Scientific Comparison of ABC Protocols (June 2014) - Part I (PDF) and Part II (PDF)
  9. D3.2 Guidance on Selection and Complementarity of ABC Protocols (August 2014) (PDF)
  10. D4.2 Final Reference Implementation (August 2014) (PDF)
  11. D4.3 Final Perturbation Analysis of the Implementation (July 2014) (PDF)
  12. D4.4 Smartphone feasibility analysis (August 2014) (PDF)
  13. D5.1 Scenario Definition for both Pilots (February 2012) (PDF)
  14. D5.2 Description of the “Common Denominator” Elements (September 2012) (PDF)
  15. D5.2a Amendment Building Blocks of ABC Technology (September 2013) (PDF)
  16. D5.3 Experiences and Feedback of the Pilots (May 2014) (PDF)
  17. D6.1 Application Description for the School Deployment (March 2012) (PDF
  18. D6.2 Necessary hardware and software package for the school pilot deployment (March 2013) (PDF)
  19. D6.3 Evaluation of the School Pilot (May 2014) (PDF)
  20. D7.1 Application Description for Students (March 2012) (PDF)
  21. D7.2 Necessary hardware and software package for the student Pilot deployment (November 2012) (PDF
  22. D7.3 Evaluation of the Student Pilot (May 2014) (PDF)
  23. D8.12 Architecture for Standardization V2 (November 2014) (PDF)
  24. D8.13 Reference Implementation for Standardization V2 (November 2014) (PDF)

Below is a short list of the selected ABC4Trust scientific publications. For the full list visit Papers and Articles.

 

arrow Attribute-based Credentials for Trust: Identity in the Information Society
  Kai Rannenberg, Jan Camenisch, and Ahmad Sabouri, eds.
  ISBN 978-3-319-14439-9. Springer, 2015.
 
arrow ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-life
  Ahmad Sabouri, Kai Rannenberg
  Privacy and Identity Management for the Future Internet in the Age of Globalisation; 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, pp. 3-16. Springer, 2015.
   
arrow ABC4Trust Workshop on Core Features of Privacy-ABCs, Practical Use and Legal Issues
  Felix Bieker, Marit Hansen, Gert L. Mikkelsen, Hannah Obersteller
  Privacy and Identity Management for the Future Internet in the Age of Globalisation; 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, pp. 253-266. Springer, 2015.
   
arrow Anonymous ePetitions – Another Step towards eDemocracy
  Hannah Obersteller
  Privacy and Identity Management for the Future Internet in the Age of Globalisation; 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, pp. 110-124. Springer, 2015.
   
arrow Concepts and Languages for Privacy-preserving Attribute-based Authentication
  Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss
  Journal of Information Security and Applications, Vol. 19, Issue 1, pp. 25-44. Elsevier, 2014.
   
arrow Privacy-Preserving Auditing for Attribute-Based Credentials
  Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial
  Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, pp. 109-127. Springer, 2014.
   
arrow Trust Relationships in Privacy-ABCs Ecosystem
  Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg
  11th International Conference on Trust, Privacy, and Security in Digital Business (TrustBus 2014), pp. 13-23. Springer, 2014.
   
arrow Towards a Framework for Benchmarking Privacy-ABC Technologies
  Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri
  ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference (SEC 2014), pp. 197-204. Springer, 2014.
   
arrow Privacy-respecting School Community Interaction Platform
  Ahmad Sabouri, Souheil Bcheri, Kai Rannenberg
  Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum (CSP Forum 2014), pp. 108-119. Springer, 2014.
   
arrow Privacy Preserving Course Evaluations in Greek Higher Education Institutes: An e-Participation Case Study with the Empowerment of Attribute Based Credentials
  Vasiliki Liagkou, George Metakides, Apostolis Pyrgelis, Christoforos Raptopoulos, Paul Spirakis, and Yannis Stamatiou
  Privacy Technologies and Policy - First Annual Privacy Forum (APF 2012), pp. 140-156. Springer, 2014.
   
arrow Efficient Attributes for Anonymous Credentials
  Jan Camenisch, Thomas Groß
  ACM Transactions on Information and System Security, Vol. 15, Issue 1, Art. Nr. 4. ACM, 2012.
   
arrow Privacy-by-Design Based on Quantitative Threat Modeling
  Jesus Luna Garcia, Neeraj Suri, Ioannis Krontiris
  7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012), pp. 2012. IEEE, 2012.
   

Talks references selected talks and presentations

  1. First Reference Group Meeting (2012)