메뉴 건너뛰기




Volumn 18, Issue 1, 2010, Pages 123-160

Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project

Author keywords

Access control; Anonymous credentials; Data handling; Identity management; Privacy policies

Indexed keywords

ANONYMOUS CREDENTIAL; ANONYMOUS CREDENTIALS; ELECTRONIC MEDIA; IDENTITY MANAGEMENT; IDENTITY MANAGEMENT SYSTEMS; INFORMATION SOCIETY; KEY ELEMENTS; PERSONAL INFORMATION; POLICY LANGUAGE; PRIME PROJECTS; PRIVACY POLICIES; PRIVACY-ENHANCING TECHNOLOGIES;

EID: 71849091813     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2010-0367     Document Type: Article
Times cited : (36)

References (77)
  • 4
  • 9
    • 84937578170 scopus 로고    scopus 로고
    • Web MIXes: A system for anonymous and unobservable Internet access
    • Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability H. Federrath, ed. Springer
    • O. Berthold, H. Federrath and S. Köpsell, Web MIXes: A system for anonymous and unobservable Internet access, in: Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, H. Federrath, ed., Lecture Notes in Computer Science, vol.2009, Springer, 2000, pp. 115-129.
    • (2000) Lecture Notes in Computer Science 2009 , pp. 115-129
    • Berthold, O.1    Federrath, H.2    Köpsell, S.3
  • 10
    • 1142309815 scopus 로고    scopus 로고
    • Provisions and obligations in policy management and security applications
    • Hong Kong, China, August
    • C. Bettini, S. Jajodia, X. Sean Wang and D. Wijesekera, Provisions and obligations in policy management and security applications, in: Proc. of the 28th VLDB Conference, Hong Kong, China, August 2002, pp. 502-513.
    • (2002) Proc. of the 28th VLDB Conference , pp. 502-513
    • Bettini, C.1    Jajodia, S.2    Sean Wang, X.3    Wijesekera, D.4
  • 11
    • 0036005214 scopus 로고    scopus 로고
    • Data retention and the panoptic society: The social benefits of forgetfulness
    • J.-F. Blanchette and D.G. Johnson, Data retention and the panoptic society: The social benefits of forgetfulness, The Information Society 18 (2002), 33-45.
    • (2002) The Information Society , vol.18 , pp. 33-45
    • Blanchette, J.-F.1    Johnson, D.G.2
  • 12
    • 0036311802 scopus 로고    scopus 로고
    • A unified framework for regulating access and information release on the web
    • P.A. Bonatti and P. Samarati, A unified framework for regulating access and information release on the web, Journal of Computer Security 10(3) (2002), 241-272.
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 241-272
    • Bonatti, P.A.1    Samarati, P.2
  • 17
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • D. Chaum, Security without identification: Transaction systems to make big brother obsolete, Communications of the ACM 28(10) (1985), 1030-1044.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 18
    • 79251590715 scopus 로고
    • A secure and privacy-protecting protocol for transmitting personal information between organizations
    • Advances in Cryptology - CRYPTO'86, A.M. Odlyzko, ed., Springer
    • D. Chaum and J.-H. Evertse, A secure and privacy-protecting protocol for transmitting personal information between organizations, in: Advances in Cryptology - CRYPTO'86, A.M. Odlyzko, ed., Lecture Notes in Computer Science, vol.263, Springer, 1987, pp. 118-167.
    • (1987) Lecture Notes in Computer Science , vol.263 , pp. 118-167
    • Chaum, D.1    Evertse, J.-H.2
  • 19
    • 84937441148 scopus 로고    scopus 로고
    • Verifiable encryption group encryption and their applications to separable group signatures and signature sharing schemes
    • Advances in Cryptology - ASIACRYPT 2000 T. Okamoto, ed., Springer
    • J. Camenisch and I. Damgård, Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes, in: Advances in Cryptology - ASIACRYPT 2000, T. Okamoto, ed., Lecture Notes in Computer Science, vol.1976, Springer, 2000, pp. 331-345.
    • (2000) Lecture Notes in Computer Science , vol.1976 , pp. 331-345
    • Camenisch, J.1    Damgård, I.2
  • 21
    • 24944435537 scopus 로고    scopus 로고
    • Compact e-cash
    • Advances in Cryptology - EUROCRYPT 2005 R. Cramer, ed., Springer
    • J. Camenisch, S. Hohenberger and A. Lysyanskaya, Compact e-cash, in: Advances in Cryptology - EUROCRYPT 2005, R. Cramer, ed., Lecture Notes in Computer Science, vol.3494, Springer, 2005, pp. 302-321.
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 302-321
    • Camenisch, J.1    Hohenberger, S.2    Lysyanskaya, A.3
  • 22
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • Advances in Cryptology - EUROCRYPT 2001 B. Pfitzmann, ed.,Springer
    • J. Camenisch and A. Lysyanskaya, An efficient system for non-transferable anonymous credentials with optional anonymity revocation, in: Advances in Cryptology - EUROCRYPT 2001, B. Pfitzmann, ed., Lecture Notes in Computer Science, vol.2045, Springer, 2001, pp. 93-118.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 23
    • 35248839965 scopus 로고    scopus 로고
    • A signature scheme with efficient protocols, in: Security in Communication Networks
    • Third International Conference, S. Cimato, C. Galdi and G. Persiano, eds, Springer
    • J. Camenisch and A. Lysyanskaya, A signature scheme with efficient protocols, in: Security in Communication Networks, Third International Conference, S. Cimato, C. Galdi and G. Persiano, eds, Lecture Notes in Computer Science, vol.2576, Springer, 2003, pp. 268-289.
    • (2003) Lecture Notes in Computer Science , vol.2576 , pp. 268-289
    • Camenisch, J.1    Lysyanskaya, A.2
  • 24
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • Advances in Cryptology - CRYPTO 2004 M.K. Franklin, ed., Springer
    • J. Camenisch and A. Lysyanskaya, Signature schemes and anonymous credentials from bilinear maps, in: Advances in Cryptology - CRYPTO 2004, M.K. Franklin, ed., Lecture Notes in Computer Science, vol.3152, Springer, 2004, pp. 56-72.
    • (2004) Lecture Notes in Computer Science , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 25
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • Advances in Cryptology - CRYPTO 2003 D. Boneh, ed., Springer
    • J. Camenisch and V. Shoup, Practical verifiable encryption and decryption of discrete logarithms, in: Advances in Cryptology - CRYPTO 2003, D. Boneh, ed., Lecture Notes in Computer Science, vol.2729, Springer, 2003, pp. 126-144.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 126-144
    • Camenisch, J.1    Shoup, V.2
  • 27
    • 84888301236 scopus 로고
    • The digital persona and its application to data surveillance
    • R. Clarke, The digital persona and its application to data surveillance, The Information Society 10 (1994), 77-92.
    • (1994) The Information Society , vol.10 , pp. 77-92
    • Clarke, R.1
  • 29
    • 85031802442 scopus 로고
    • Payment systems and credential mechanisms with provable security against abuse by individuals
    • Advances in Cryptology - CRYPTO'88, S. Goldwasser, ed., Springer
    • I. Damgård, Payment systems and credential mechanisms with provable security against abuse by individuals, in: Advances in Cryptology - CRYPTO'88, S. Goldwasser, ed., Lecture Notes in Computer Science, vol.403, Springer, 1990, pp. 328-335.
    • (1990) Lecture Notes in Computer Science , vol.403 , pp. 328-335
    • Damgård, I.1
  • 30
    • 33746048789 scopus 로고    scopus 로고
    • Unclonable group identification
    • EUROCRYPT, S. Vaudenay, ed., Springer
    • I. Damgård, K. Dupont and M.ø. Pedersen, Unclonable group identification, in: EUROCRYPT, S. Vaudenay, ed., Lecture Notes in Computer Science, vol.4004, Springer, 2006, pp. 555-572.
    • (2006) Lecture Notes in Computer Science , vol.4004 , pp. 555-572
    • Damgård, I.1    Dupont, K.2    Pedersen, M.Ø.3
  • 31
    • 41949139623 scopus 로고    scopus 로고
    • The seven flaws of identity management: Usability and security challenges
    • R. Dhamija and L. Dusseault, The seven flaws of identity management: Usability and security challenges, IEEE Security and Privacy 6(2) (2008), 24-29.
    • (2008) IEEE Security and Privacy , vol.6 , Issue.2 , pp. 24-29
    • Dhamija, R.1    Dusseault, L.2
  • 32
    • 0003187764 scopus 로고    scopus 로고
    • Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data 23/11/1995
    • Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal L 281, 23/11/1995, pp. 31-50.
    • Official Journal L , vol.281 , pp. 31-50
  • 34
    • 33745883651 scopus 로고    scopus 로고
    • Version 2.0 February
    • eXtensible Access Control Markup Language (XACML) Version 2.0, February 2005; http://docs. oasis-open.org/xacml/2.0/access-control-xacml-2.0-core-spec- os.pdf.
    • (2005) EXtensible Access Control Markup Language (XACML)
  • 37
    • 34547260252 scopus 로고    scopus 로고
    • No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web
    • Heraklion, Greece, May
    • R. Gavriloaie,W. Nejdl, D. Olmedilla, K. Seamons andM.Winslett, No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web, in: Proc. of the 1st First European Semantic Web Symposium, Heraklion, Greece, May 2004, pp. 342-356.
    • (2004) Proc. of the 1st First European Semantic Web Symposium , pp. 342-356
    • Gavriloaie, R.1    Nejdl, W.2    Olmedilla, D.3    Seamons, K.4    Winslett, M.5
  • 39
    • 85032868051 scopus 로고
    • How to prove all NP statements in zero-knowledge and a methodology of cryptographic protocol design
    • Advances in Cryptology - CRYPTO'86, A.M. Odlyzko, ed., Springer
    • O. Goldreich, S. Micali and A. Wigderson, How to prove all NP statements in zero-knowledge and a methodology of cryptographic protocol design, in: Advances in Cryptology - CRYPTO'86, A.M. Odlyzko, ed., Lecture Notes in Computer Science, vol.263, Springer, 1987, pp. 171-185.
    • (1987) Lecture Notes in Computer Science , vol.263 , pp. 171-185
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 40
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosenmessage attacks
    • S. Goldwasser, S. Micali and R. Rivest, A digital signature scheme secure against adaptive chosenmessage attacks, SIAM Journal on Computing 17(2) (1988), 281-308.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 41
    • 84892262169 scopus 로고    scopus 로고
    • M. Hildebrandt and S. Gutwirth (eds) Springer
    • M. Hildebrandt and S. Gutwirth (eds), Profiling the European Citizen, Springer, 2008.
    • (2008) Profiling the European Citizen
  • 42
    • 71849107806 scopus 로고    scopus 로고
    • IDEntity MIXer (IDEMIX)
    • IDEntity MIXer (IDEMIX); http://www.zurich.ibm.com/security/idemix/.
  • 44
    • 17444423290 scopus 로고    scopus 로고
    • Sociotechnical architecture for online privacy
    • D.L. Jutla and P. Bodorik, Sociotechnical architecture for online privacy, IEEE Security & Privacy, 2005, pp. 29-39.
    • (2005) IEEE Security & Privacy , pp. 29-39
    • Jutla, D.L.1    Bodorik, P.2
  • 45
    • 30544438141 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Security analysis in trust management
    • N. Li, J.C. Mitchell andW.H.Winsborough, Beyond proof-of-compliance: Security analysis in trust management, Journal of the ACM 52(3) (2005), 474-514.
    • (2005) Journal of the ACM , vol.52 , Issue.3 , pp. 474-514
    • Li, N.1    Mitchell, J.C.2    Winsborough, W.H.3
  • 48
    • 26444607972 scopus 로고    scopus 로고
    • Dynamic k-times anonymous authentication
    • ACNS, J. Ioannidis, A.D. Keromytis and M. Yung, eds
    • L. Nguyen and R. Safavi-Naini, Dynamic k-times anonymous authentication, in: ACNS, J. Ioannidis, A.D. Keromytis and M. Yung, eds, Lecture Notes in Computer Science, vol.3531, 2005, pp. 318- 333.
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 318-333
    • Nguyen, L.1    Safavi-Naini, R.2
  • 52
    • 35248872156 scopus 로고    scopus 로고
    • From privacy legislation to interface design: Implementing information privacy in human-computer interfaces
    • Dresden
    • A.S. Patrick and S. Kenny, From privacy legislation to interface design: Implementing information privacy in human-computer interfaces, in: PET2003, Dresden, 2003, pp. 107-124.
    • (2003) PET2003 , pp. 107-124
    • Patrick, A.S.1    Kenny, S.2
  • 53
    • 71849117337 scopus 로고    scopus 로고
    • PRIME Consortium Architecture v3, Deliverable D14.2.c 2008
    • PRIME Consortium, Architecture v3, Deliverable D14.2.c, 2008.
  • 54
    • 71849113696 scopus 로고    scopus 로고
    • PRIME Consortium, Framework v3, Deliverable D14.1.c, 2008
    • PRIME Consortium, Framework v3, Deliverable D14.1.c, 2008.
  • 55
    • 71849094653 scopus 로고    scopus 로고
    • PRIME Consortium Requirements for privacy enhancing tools (forthcoming) Deliverable 2008
    • PRIME Consortium, Requirements for privacy enhancing tools (forthcoming), Deliverable, 2008.
  • 56
    • 31544451561 scopus 로고    scopus 로고
    • Perspectives on "personal identity"
    • C.D. Raab, Perspectives on "personal identity", BT Technology Journal 23 (2005), 15-24.
    • (2005) BT Technology Journal , vol.23 , pp. 15-24
    • Raab, C.D.1
  • 58
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM 21(2) (1978), 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 63
    • 84937378505 scopus 로고    scopus 로고
    • The failure of privacy enhancing technologies (pets) and the voiding of privacy
    • F. Stalder, The failure of privacy enhancing technologies (pets) and the voiding of privacy, Sociological Research Online 7(2) (2002).
    • (2002) Sociological Research Online , vol.7 , pp. 2
    • Stalder, F.1
  • 64
    • 35048839792 scopus 로고    scopus 로고
    • K-times anonymous authentication (extended abstract)
    • ASIACRYPT, P.J. Lee, ed., Springer
    • I. Teranishi, J. Furukawa and K. Sako, k-times anonymous authentication (extended abstract), in: ASIACRYPT, P.J. Lee, ed., Lecture Notes in Computer Science, vol.3329, Springer, 2004, pp. 308- 322.
    • (2004) Lecture Notes in Computer Science , vol.3329 , pp. 308-322
    • Teranishi, I.1    Furukawa, J.2    Sako, K.3
  • 65
    • 77954408441 scopus 로고    scopus 로고
    • version 1.2
    • Trusted Computing Group, TCG TPM specification version 1.2, url: www.trustedcomputinggroup. org.
    • TCG TPM Specification
  • 67
    • 71849110077 scopus 로고    scopus 로고
    • Web services policy framework March
    • Web services policy framework, March 2006; http://www.ibm.com/ developerworks/webservices/ library/specification/ws-polfram/?S-TACT= 105AGX04&S-CMP=LP.
    • (2006)
  • 72
    • 0034449542 scopus 로고    scopus 로고
    • An efficient complete strategy for automated trust negotiation over the internet
    • Athens, Greece, November
    • T. Yu, X. Ma and M. Winslett, An efficient complete strategy for automated trust negotiation over the internet, in: Proc. of the 7th ACM Computer and Communication Security, Athens, Greece, November 2000, pp. 210-219.
    • (2000) Proc. of the 7th ACM Computer and Communication Security , pp. 210-219
    • Yu, T.1    Ma, X.2    Winslett, M.3
  • 73
    • 0038148412 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • Berkeley, CA, May
    • T. Yu and M. Winslett, A unified scheme for resource protection in automated trust negotiation, in: Proc. of the IEEE Symposium on Security and Privacy, Berkeley, CA, May 2003, pp. 110-122.
    • (2003) Proc. of the IEEE Symposium on Security and Privacy , pp. 110-122
    • Yu, T.1    Winslett, M.2
  • 75
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies trough interoperable strategies for automated trust
    • T. Yu,M.Winslett and K.E. Seamons, Supporting structured credentials and sensitive policies trough interoperable strategies for automated trust, ACM Transactions on Information and System Security (TISSEC), 6(1) (2003), 1-42.
    • (2003) ACM Transactions on Information and System Security (TISSEC) , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3
  • 76
    • 33645796029 scopus 로고    scopus 로고
    • Mine your own business!: Making the case for the implications of the data mining or personal information in the forum of public opinion
    • T. Zarsky, Mine your own business!: Making the case for the implications of the data mining or personal information in the forum of public opinion, Yale Journal of Law & Technology 5 (2002), 17-47.
    • (2002) Yale Journal of Law & Technology , vol.5 , pp. 17-47
    • Zarsky, T.1
  • 77
    • 71849096032 scopus 로고    scopus 로고
    • Desperately seeking solutions: Using implementation-based solutions for the troubles of information privacy in the age of data mining and the internet society
    • T. Zarsky, Desperately seeking solutions: Using implementation-based solutions for the troubles of information privacy in the age of data mining and the internet society, Maine Law Review 56 (2004), 14-59.
    • (2004) Maine Law Review , vol.56 , pp. 14-59
    • Zarsky, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.