-
2
-
-
71849091813
-
Exploiting cryptography for privacy-enhanced access control
-
C. A. Ardagna, J. Camenisch, M. Kohlweiss, R. Leenes, G. Neven, B. Priem, P. Samarati, D. Sommer, and M. Verdicchio. Exploiting cryptography for privacy-enhanced access control. J. of Comput. Secur., 18(1), 2010.
-
(2010)
J. of Comput. Secur.
, vol.18
, Issue.1
-
-
Ardagna, C.A.1
Camenisch, J.2
Kohlweiss, M.3
Leenes, R.4
Neven, G.5
Priem, B.6
Samarati, P.7
Sommer, D.8
Verdicchio, M.9
-
3
-
-
48249091293
-
A privacy-aware access control system
-
C. A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati. A privacy-aware access control system. J. Comput. Secur., 16(4), 2008.
-
(2008)
J. Comput. Secur.
, vol.16
, Issue.4
-
-
Ardagna, C.A.1
Cremonini, M.2
De Capitani Di Vimercati, S.3
Samarati, P.4
-
7
-
-
77954948844
-
Design and semantics of a decentralized authorization language
-
M. Becker, C. Fournet, and A. Gordon. Design and semantics of a decentralized authorization language. IEEE CSF 2007.
-
(2007)
IEEE CSF
-
-
Becker, M.1
Fournet, C.2
Gordon, A.3
-
10
-
-
0036311802
-
A unified framework for regulating access and information release on the web
-
P. Bonatti and P. Samarati. A unified framework for regulating access and information release on the web. J. Comput. Secur., 10(3), 2002.
-
(2002)
J. Comput. Secur.
, vol.10
, Issue.3
-
-
Bonatti, P.1
Samarati, P.2
-
14
-
-
3142615452
-
Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes
-
J. Camenisch and I. Damga°rd. Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. ASIACRYPT 2000.
-
(2000)
ASIACRYPT
-
-
Camenisch, J.1
Damgard, I.2
-
16
-
-
77954901106
-
A language enabling privacy-preserving access control
-
J. Camenisch, S. Mödersheim, G. Neven, F.S. Preiss, and D. Sommer. A Language Enabling Privacy-Preserving Access Control. Technical report RZ 3762, IBM Research Zurich, 2009.
-
(2009)
Technical Report RZ 3762, IBM Research Zurich
-
-
Camenisch, J.1
Mödersheim, S.2
Neven, G.3
Preiss, F.S.4
Sommer, D.5
-
17
-
-
0013175080
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. EUROCRYPT 2001.
-
(2001)
EUROCRYPT
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
18
-
-
14844283355
-
Practical verifiable encryption and decryption of discrete logarithms
-
J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. CRYPTO 2003.
-
(2003)
CRYPTO
-
-
Camenisch, J.1
Shoup, V.2
-
19
-
-
0038687775
-
Design and implementation of the idemix anonymous credential system
-
J. Camenisch and E. Van Herreweghen. Design and implementation of the idemix anonymous credential system. ACM CCS 2002.
-
(2002)
ACM CCS
-
-
Camenisch, J.1
Herreweghen, E.V.2
-
20
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Commun. ACM, 28(10), 1985.
-
(1985)
Commun. ACM
, vol.28
, Issue.10
-
-
Chaum, D.1
-
24
-
-
33845466916
-
Automating privacy friendly information disclosure
-
K.U. Leuven
-
S. Gevers and B. De Decker. Automating privacy friendly information disclosure. Technical Report CW441, K.U. Leuven, 2006.
-
(2006)
Technical Report CW441
-
-
Gevers, S.1
De Decker, B.2
-
25
-
-
77954890834
-
DKAL: Distributed-knowledge authorization language
-
Y. Gurevich and I. Neeman. DKAL: Distributed-knowledge authorization language. IEEE CSF 2008.
-
(2008)
IEEE CSF
-
-
Gurevich, Y.1
Neeman, I.2
-
27
-
-
33745764834
-
Automated trust negotiation using cryptographic credentials
-
J. Li, N. Li, and W. Winsborough. Automated trust negotiation using cryptographic credentials. ACM CCS 2005.
-
(2005)
ACM CCS
-
-
Li, J.1
Li, N.2
Winsborough, W.3
-
28
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
N. Li, B. N. Grosof, and J. Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM TISSEC, 6(1), 2003.
-
(2003)
ACM TISSEC
, vol.6
, Issue.1
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
31
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
B. C. Neuman and T. Ts'o. Kerberos: An authentication service for computer networks. IEEE Commun., 32(9), 1994.
-
(1994)
IEEE Commun.
, vol.32
, Issue.9
-
-
Neuman, B.C.1
Ts'o, T.2
-
35
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Comput., 29(2), 1996.
-
(1996)
IEEE Comput.
, vol.29
, Issue.2
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
37
-
-
34147100714
-
A logic-based framework for attribute based access control
-
L. Wang, D. Wijesekera, and S. Jajodia. A logic-based framework for attribute based access control. ACM FMSE 2004.
-
(2004)
ACM FMSE
-
-
Wang, L.1
Wijesekera, D.2
Jajodia, S.3
-
39
-
-
70849094703
-
Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile
-
D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk. Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. IETF RFC 5280, 2008.
-
(2008)
IETF RFC
, vol.5280
-
-
Cooper, D.1
Santesson, S.2
Farrell, S.3
Boeyen, S.4
Housley, R.5
Polk, W.6
|