ARIES Articles

Ethical Impact Assessment – Drudge or necessary evil?


The current emphasis on developing an evidence-based approach to policing has resulted in the increase of police and academic collaboration. New partnerships are being forged to tackle all manner of national security and neighbourhood safety concerns. These partnerships are also serving to encourage police officers participation in research and innovation activities with academic and private industry partners. 

Holistic Privacy-Preserving Identity Management System for the Internet of Things


Security and privacy concerns are becoming an important barrier for large scale adoption and deployment of the Internet of Things. To address this issue, the identity management system defined herein provides a novel holistic and privacy-preserving solution aiming to cope with heterogeneous scenarios that requires both traditional online access control and authentication, along with claim-based approach for M2M (machine to machine) interactions required in IoT.

Policing borders after Brexit - Combatting online identity theft


As Britain prepares to leave the EU, the question of what UK’s borders should look like is high on the political, economic and security agenda. The policing of UK borders post-Brexit is further complicated by security concerns of online identity verification of people passing through our ports, underpinned by the rise of increasingly sophisticated attacks by cybercriminals to steal identities.

Towards privacy preserving data provenance for the Internet of Things


As the Internet of Things evolves, security and privacy aspects are becoming the main barriers in the development of innovative and valuable services that will transform our society. One of the biggest challenges in IoT lies in the design of secure and privacy-preserving solutions guaranteeing privacy properties such as anonymity, unlinkability, minimal disclosure of personally identifiable information, as well as assuring security properties, such as content integrity and authenticity.

Integration of Anonymous Credential Systems in IoT Constrained Environments


The pervasive nature of the Internet of Things (IoT) entails additional threats that compromise the security and privacy of IoT devices and, eventually, the users. This issue is aggravated in constrained IoT devices equipped with minimal hardware resources. Current security and privacy implementations need to be redesigned and implemented maintaining its level of assurance, aiming for this family of devices. To cope with this issue, this paper proposes the rst novel attempt to leverage anonymous credential systems (ACSs) to preserve the privacy of autonomous IoT constrained devices.

Towards a Privacy-preserving Reliable European Identity Ecosystem


This paper introduces the ARIES identity ecosystem aimed at setting up a reliable identity framework comprising new technologies, processes and security features that ensure highest levels of quality in secure credentials for highly secure and privacy-respecting physical and digital identity management processes. The identity ecosystem is being devised in the scope of ARIES European project and aspires to tangibly achieve a reduction in levels of identity fraud, theft, wrong identity and associated crimes and to create a decisive competitive advantage for Europe at a global level.

Securing cyberspace - Combatting cyberfraud and online identity theft


Online activities have now become central to the very way in which millions of people across the world live their lives. While the Internet has positively enriched societal communications and economic opportunities, these technological advancements have changed – and continue to change – the very nature of crime, serving to breed a new sophisticated and technically capable criminal and terrorist. The scale of contemporary cybercrime is significantly challenging the capacity and capability of even the most sophisticated Law Enforcement Agencies (LEAs).

Privacy + Identity = Opportunity and Challenges


How can identity be made secure, easy to use and private?  Creating an appropriate balance in the digital single market between privacy and security remains a core challenge and opportunity in developing and managing e-identity. Ensuring both privacy and security for our digital persona is the best way forward to combat identity fraud and other identity-related crimes and has to be considered at all stages in the definition and design of any technological project comprising electronic identity.