The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Hidden Access Control Policies with Hidden Credentials

Download

Download PDF Document
PDF

Author

K.Frikken, M. Atallah, J. Li

Tech report number

CERIAS TR 2004-78

Entry type

inproceedings

Abstract

In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather than the identity) of the requester, via digital credentials: Access is granted if Alice

Download

PDF

Date

2004 – 10 – 28

Journal

WPES '04

Key alpha

Frikken

Publisher

ACM

Publication Date

2004-10-28

Contents

1. INTRODUCTION 2. MODEL AND PROBLEM DEFINITION 3. OUR PROTOCOL 4. CONCLUSION 5. ACKNOWLEDGEMENTS 6. REFERENCES

Copyright

2004 ACM

Keywords

Secure multi-party computation, access control, trust negotiation, hidden credentials, privacy

Language

English

Location

A hard-copy of this is in the CERIAS Library

Subject

Secure multi-party computation, access control, trust negotiation, hidden credentials, privacy

BibTex-formatted data

To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.