Search for European Projects

4 European Projects Found

Searched on 125080 European Projects

 FINISHED 

PRACTICE: Privacy-Preserving Computation in the Cloud (PRACTICE)

Start date: Nov 1, 2013, End date: Oct 31, 2016,

The traditional computing paradigm is experiencing a fundamental shift: organizations no longer completely control their own data, but instead hand it to external untrusted parties - cloud service providers, for processing and storage. There currently exist no satisfactory approach to protect data during computation from cloud providers and from other users of the cloud.PRACTICE has assembled the ...
Read Project

 20

 FINISHED 

Shaping the future of electronic identity (FutureID)

Start date: Nov 1, 2012, End date: Oct 31, 2015,

The FutureID project builds a comprehensive, flexible, privacy-aware and ubiquitously usable identity management infrastructure for Europe, which integrates existing eID technology and trust infrastructures, emerging federated identity management services and modern credential technologies to provide a user-centric system for the trustworthy and accountable management of identity claims.The Future ...
Read Project

 20

 FINISHED 
Protecting critical infrastructures providing communications, energy, or healthcare presents increasing ICT challenges as ICT itself has become vital to them. Internet-scale ICT infrastructures ("infrastructure clouds") promise scalable virtualised computing, network, and storage resources over the Internet. They provide scalability and cost-efficiency but pose significant new privacy and resilien ...
Read Project

 16

 FINISHED 

Foundations for Forgery-Resistant Security Hardware (UNIQUE)

Start date: Sep 1, 2009, End date: May 31, 2012,

The goal of the UNIQUE project is to tackle the problem of counterfeiting of and tampering with Integrated Circuits (ICs). Since ICs are at the core of modern and often critical electronics products and IT systems it is very important that their integrity can be guaranteed. We will develop an integrated approach to protect hardware systems against counterfeiting, cloning, reverse engineering, tamp ...
Read Project

 10