Home » Marketplace » Information Protection Processes and Procedures

Information Protection Processes and Procedures

Toolkit for Privacy-Preserving Data Storage on Ledgers

This toolkit is meant for data storage is a ledger-oriented solution for bridging data re-siding on a blockchain with those stored in an off-chain database. It is responsible for coordinating interaction between the backend ledger, storage, and the cryptographic library of an API service.

This toolkit was produced by National Infrastructures for Research and Technology for Greece and is available here.

Toolkit for Zero-knowledge Proofs for Ledgers

This toolkit, with the nickname SNARKY, is a Rust implementation of the Snarky Ceremonies protocol over the BLS12- 381 elliptic curve. It is the first experimental version of a production-grade library for running the protocol in real-life applications. 

This toolkit was produced by National Infrastructures for Research and Technology for Greece and The University of Edinburgh and is available here.

Toolkit for Secure Multi-Party Computation on Ledgers

This toolkit allows  libraries for two/multi-party computation to use a ledger as a communication channel instead of point-to-point connections. The toolkit consists of two parts: 1) the first module generically allows libraries from two/multi-party computation to use a ledger as a communication channel instead of point-to-point connections; 2) the second module is an upgrade of MPyC to add the possibility of verifying computations.

Toolkit for Mir-BFT: High-throughput Consensus for Hyperledger Fabric

This toolkit introduces an efficient consensus algorithm to Hyperledger Fabric to accommodate high-throughput applications.

This toolkit was produced by IBM and is available here.

Toolkit for Post-Quantum Secure Protocols

This enables authentication and integrity protection based on hash functions which are believed to be resilient against quantum attacks. Hash function based time-stamping can also indemnify transactions authenticated with current technology against future quantum attacks.

This toolkit was produced by Guardtime and is partially available here.

Toolikit for Anonymous Authentication for Hyperledger Fabric

This toolkit allows users to anonymously authenticate their Hyperledger Fabric transactions while supporting revocation and audit functionalities.

This toolkit was produced by IBM Research and is available here.

Information Notice Tool

The Information Notice Tool is mainly focused only on Art. 13 and Art. 14 of the GDPR which enlist the elements that must be included in an Information Notice to data subjects.

The tool will help you with a very practical check-list for the components required in an Information Notice under the GDPR.

Cybersecurity Awareness Solution for Local Public Administrations

CS-AWARE is a cybersecurity situational awareness software solution for Local Public Administrations. It was designed to detect, classify and visualize cybersecurity incidents in real time, supporting the prevention or mitigation of cyber-attacks. It addresses small, medium or big size Local Public Administrations and it can be taylored to any local software set-up, any European language and any type of LPA internal workflow and specifics.

The main features are:

1) Versatile connectivity: it is capable to connect to any type of internal or external data source

IoTsTrust

In this wild IoT market, estimating cybersecurity risks, selecting the right standard to comply with and getting certified during the manufacturing process is an extremely complex task. Security Requirements, Security Controls and Security Assurance Activities must be considered by all the project stakeholders including business-lines and risk-owners.

GuardYoo

GuardYoo is an easy-to-use, agentless, yet powerful solution, that enables organizations of all sizes to proactively discover malware and persistent threats (active or dormant), that have breached existing defenses including online and real-time protection measures.

Pages

News

The pandemic has shown the importance of international supply chains and how dependent we are. Attacks in the virtual space may have an increasing impact on supplies in our analogue world.