메뉴 건너뛰기




Volumn , Issue , 2010, Pages 119-128

A card requirements language enabling privacy-preserving access control

Author keywords

Access control; Anonymous credentials; Digital credentials; Policy languages; Privacy

Indexed keywords

ANONYMOUS CREDENTIAL; ANONYMOUS CREDENTIAL SYSTEMS; CONCRETE TECHNOLOGY; DIGITAL CREDENTIALS; DISTRIBUTED SYSTEMS; ONLINE RESOURCES; PERSONAL DATA; POLICY LANGUAGE; POLICY LANGUAGES; PRIVACY PRESERVING; PROBLEM OF PRIVACY; TECHNOLOGY ADOPTION;

EID: 77954923296     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1809842.1809863     Document Type: Conference Paper
Times cited : (17)

References (39)
  • 1
    • 0033281265 scopus 로고    scopus 로고
    • Proof-carrying authentication
    • A. W. Appel and E. W. Felten. Proof-carrying authentication. ACM CCS 1999.
    • (1999) ACM CCS
    • Appel, A.W.1    Felten, E.W.2
  • 7
    • 77954948844 scopus 로고    scopus 로고
    • Design and semantics of a decentralized authorization language
    • M. Becker, C. Fournet, and A. Gordon. Design and semantics of a decentralized authorization language. IEEE CSF 2007.
    • (2007) IEEE CSF
    • Becker, M.1    Fournet, C.2    Gordon, A.3
  • 10
    • 0036311802 scopus 로고    scopus 로고
    • A unified framework for regulating access and information release on the web
    • P. Bonatti and P. Samarati. A unified framework for regulating access and information release on the web. J. Comput. Secur., 10(3), 2002.
    • (2002) J. Comput. Secur. , vol.10 , Issue.3
    • Bonatti, P.1    Samarati, P.2
  • 11
    • 80052494019 scopus 로고    scopus 로고
    • Consumable credentials in linear-logic-based access-control systems
    • K. D. Bowers, L. Bauer, D. Garg, F. Pfenning, and M. K. Reiter. Consumable credentials in linear-logic-based access-control systems. NDSS 2007.
    • (2007) NDSS
    • Bowers, K.D.1    Bauer, L.2    Garg, D.3    Pfenning, F.4    Reiter, M.K.5
  • 14
    • 3142615452 scopus 로고    scopus 로고
    • Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes
    • J. Camenisch and I. Damga°rd. Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. ASIACRYPT 2000.
    • (2000) ASIACRYPT
    • Camenisch, J.1    Damgard, I.2
  • 17
    • 0013175080 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. EUROCRYPT 2001.
    • (2001) EUROCRYPT
    • Camenisch, J.1    Lysyanskaya, A.2
  • 18
    • 14844283355 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. CRYPTO 2003.
    • (2003) CRYPTO
    • Camenisch, J.1    Shoup, V.2
  • 19
    • 0038687775 scopus 로고    scopus 로고
    • Design and implementation of the idemix anonymous credential system
    • J. Camenisch and E. Van Herreweghen. Design and implementation of the idemix anonymous credential system. ACM CCS 2002.
    • (2002) ACM CCS
    • Camenisch, J.1    Herreweghen, E.V.2
  • 20
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Commun. ACM, 28(10), 1985.
    • (1985) Commun. ACM , vol.28 , Issue.10
    • Chaum, D.1
  • 24
    • 33845466916 scopus 로고    scopus 로고
    • Automating privacy friendly information disclosure
    • K.U. Leuven
    • S. Gevers and B. De Decker. Automating privacy friendly information disclosure. Technical Report CW441, K.U. Leuven, 2006.
    • (2006) Technical Report CW441
    • Gevers, S.1    De Decker, B.2
  • 25
    • 77954890834 scopus 로고    scopus 로고
    • DKAL: Distributed-knowledge authorization language
    • Y. Gurevich and I. Neeman. DKAL: Distributed-knowledge authorization language. IEEE CSF 2008.
    • (2008) IEEE CSF
    • Gurevich, Y.1    Neeman, I.2
  • 27
    • 33745764834 scopus 로고    scopus 로고
    • Automated trust negotiation using cryptographic credentials
    • J. Li, N. Li, and W. Winsborough. Automated trust negotiation using cryptographic credentials. ACM CCS 2005.
    • (2005) ACM CCS
    • Li, J.1    Li, N.2    Winsborough, W.3
  • 28
    • 0041524661 scopus 로고    scopus 로고
    • Delegation logic: A logic-based approach to distributed authorization
    • N. Li, B. N. Grosof, and J. Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM TISSEC, 6(1), 2003.
    • (2003) ACM TISSEC , vol.6 , Issue.1
    • Li, N.1    Grosof, B.N.2    Feigenbaum, J.3
  • 31
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • B. C. Neuman and T. Ts'o. Kerberos: An authentication service for computer networks. IEEE Commun., 32(9), 1994.
    • (1994) IEEE Commun. , vol.32 , Issue.9
    • Neuman, B.C.1    Ts'o, T.2
  • 37
    • 34147100714 scopus 로고    scopus 로고
    • A logic-based framework for attribute based access control
    • L. Wang, D. Wijesekera, and S. Jajodia. A logic-based framework for attribute based access control. ACM FMSE 2004.
    • (2004) ACM FMSE
    • Wang, L.1    Wijesekera, D.2    Jajodia, S.3
  • 39
    • 70849094703 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile
    • D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk. Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. IETF RFC 5280, 2008.
    • (2008) IETF RFC , vol.5280
    • Cooper, D.1    Santesson, S.2    Farrell, S.3    Boeyen, S.4    Housley, R.5    Polk, W.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.