Hidden Access Control Policies with Hidden Credentials
Author
K.Frikken, M. Atallah, J. Li
Tech report number
CERIAS TR 2004-78
Abstract
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather than the identity) of the requester, via digital credentials: Access is granted if Alice
Publication Date
2004-10-28
Contents
1. INTRODUCTION
2. MODEL AND PROBLEM DEFINITION
3. OUR PROTOCOL
4. CONCLUSION
5. ACKNOWLEDGEMENTS
6. REFERENCES
Keywords
Secure multi-party computation, access control, trust negotiation, hidden credentials, privacy
Location
A hard-copy of this is in the CERIAS Library
Subject
Secure multi-party computation, access control, trust negotiation, hidden credentials, privacy