메뉴 건너뛰기




Volumn 55, Issue 10, 2006, Pages 1259-1270

Attribute-based access control with hidden policies and hidden credentials

Author keywords

Access control; Authentication; Electronic commerce security; Hidden credentials; Management of computing and information systems; Privacy; Security and protection; Trust negotiation

Indexed keywords

DATA PRIVACY; ELECTRONIC COMMERCE; INTERNET; MANAGEMENT INFORMATION SYSTEMS; NETWORK PROTOCOLS;

EID: 33748485156     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2006.158     Document Type: Article
Times cited : (101)

References (38)
  • 7
    • 0000731055 scopus 로고    scopus 로고
    • "Security and Composition of Multiparty Cryptographic Protocols"
    • R. Canetti, "Security and Composition of Multiparty Cryptographic Protocols," J. Cryptology, vol. 13, no. 1, pp. 143-202, 2000.
    • (2000) J. Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 9
    • 77950151506 scopus 로고    scopus 로고
    • "An Identity Based Encryption Scheme Based on Quadratic Residues"
    • Dec
    • C. Cocks, "An Identity Based Encryption Scheme Based on Quadratic Residues," Proc. Eighth IMA Int'l Conf. Cryptography and Coding, pp. 360-363. Dec. 2001.
    • (2001) Proc. Eighth IMA Int'l Conf. Cryptography and Coding , pp. 360-363
    • Cocks, C.1
  • 13
    • 0022080529 scopus 로고
    • "A Randomized Protocol for Signing Contracts"
    • S. Even, O. Goldreich, and A. Lempel, "A Randomized Protocol for Signing Contracts," Comm. ACM, vol. 28, no. 6, pp. 637-647, 1985.
    • (1985) Comm. ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 15
    • 0141610193 scopus 로고    scopus 로고
    • "Cryptography and Cryptographic Protocols"
    • O. Goldreich, "Cryptography and Cryptographic Protocols," Distributed Computing, vol. 16, nos. 2-3, pp. 177-199, 2003.
    • (2003) Distributed Computing , vol.16 , Issue.2-3 , pp. 177-199
    • Goldreich, O.1
  • 17
    • 0023545076 scopus 로고
    • "How to Play Any Mental Game or a Completeness Theorem for Protocols with Honest Majority"
    • May
    • O. Goldreich, S. Micali, and A. Wigderson, "How to Play Any Mental Game or a Completeness Theorem for Protocols with Honest Majority," Proc. 19th ACM Symp. Theory of Computing, pp. 218-229, May 1986.
    • (1986) Proc. 19th ACM Symp. Theory of Computing , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 22
    • 0037243196 scopus 로고    scopus 로고
    • "Distributed Credential Chain Discovery in Trust Management"
    • Feb
    • N. Li, W.H. Winsborough, and J.C. Mitchell, "Distributed Credential Chain Discovery in Trust Management," J. Computer Security, vol. 11, no. 1, pp. 35-86, Feb. 2003.
    • (2003) J. Computer Security , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 23
  • 26
    • 84942550998 scopus 로고    scopus 로고
    • "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes"
    • P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes," Advances in Cryptology - Proc. EUROCRYPT 1999, pp. 223-238, 1999.
    • (1999) Advances in Cryptology - Proc. EUROCRYPT 1999 , pp. 223-238
    • Paillier, P.1
  • 37
    • 0038148412 scopus 로고    scopus 로고
    • "A Unified Scheme for Resource Protection in Automated Trust Negotiation"
    • May
    • T. Yu and M. Winslett, "A Unified Scheme for Resource Protection in Automated Trust Negotiation," Proc. IEEE Symp. Security and Privacy, pp. 110-122, May 2003.
    • (2003) Proc. IEEE Symp. Security and Privacy , pp. 110-122
    • Yu, T.1    Winslett, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.