메뉴 건너뛰기




Volumn , Issue , 2010, Pages 139-148

Privacy-preserving trust verification

Author keywords

Compliance checking; Privacy; Trust negotiation

Indexed keywords

ACCESS DECISION; COMMUNICATION COST; COMPLIANCE CHECKING; DIGITAL CREDENTIALS; OPEN ENVIRONMENT; PRIVACY PRESERVING; RESOURCE OWNERS; SECURITY POLICY; TREE STRUCTURES; TRUST NEGOTIATIONS;

EID: 77954936499     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1809842.1809865     Document Type: Conference Paper
Times cited : (4)

References (26)
  • 3
    • 24144485861 scopus 로고    scopus 로고
    • Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries
    • C.-K. Chu and W.-G. Tzeng. Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries. In Public Key Cryptography - PKC 2005, pages 172 - 183, 2005.
    • (2005) Public Key Cryptography - PKC 2005 , pp. 172-183
    • Chu, C.-K.1    Tzeng, W.-G.2
  • 4
    • 0001470602 scopus 로고    scopus 로고
    • Referee: Trust management for web applications
    • Papers from the Sixth International World Wide Web Conference
    • Y.-H. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, and M. Strauss. Referee: trust management for web applications. Computer Networks and ISDN Systems, 29(8-13):953 - 964, 1997. Papers from the Sixth International World Wide Web Conference.
    • (1997) Computer Networks and ISDN Systems , vol.29 , Issue.8-13 , pp. 953-964
    • Chu, Y.-H.1    Feigenbaum, J.2    LaMacchia, B.3    Resnick, P.4    Strauss, M.5
  • 5
    • 84867553981 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of paillier's probabilistic public-key system
    • K. Kim, editor, volume 1992 of Lecture Notes in Computer Science, Cheju Island, Korea
    • I. Damgard and M. Jurik. A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In K. Kim, editor, Public Key Cryptography, volume 1992 of Lecture Notes in Computer Science, pages 119-136, Cheju Island, Korea, 2001.
    • (2001) Public Key Cryptography , pp. 119-136
    • Damgard, I.1    Jurik, M.2
  • 9
    • 33748485156 scopus 로고    scopus 로고
    • Attribute-based access control with hidden policies and hidden credentials
    • Oct.
    • K. Frikken, M. Atallah, and J. Li. Attribute-based access control with hidden policies and hidden credentials. Computers, IEEE Transactions on, 55(10):1259-1270, Oct. 2006.
    • (2006) Computers, IEEE Transactions on , vol.55 , Issue.10 , pp. 1259-1270
    • Frikken, K.1    Atallah, M.2    Li, J.3
  • 12
    • 33645593031 scopus 로고    scopus 로고
    • The foundations of cryptography
    • chapter, Cambridge University Press, Cambridge, UK
    • O. Goldreich. The Foundations of Cryptography, volume 2, chapter General Cryptographic Protocols, pages 599-764. Cambridge University Press, Cambridge, UK, 2004.
    • (2004) General Cryptographic Protocols , vol.2 , pp. 599-764
    • Goldreich, O.1
  • 17
    • 72449173381 scopus 로고    scopus 로고
    • Automated trust negotiation using cryptographic credentials
    • J. Li, N. Li, and W. H. Winsborough. Automated trust negotiation using cryptographic credentials. ACM Trans. Inf. Syst. Secur., 13(1):1-35, 2009.
    • (2009) ACM Trans. Inf. Syst. Secur. , vol.13 , Issue.1 , pp. 1-35
    • Li, J.1    Li, N.2    Winsborough, W.H.3
  • 19
    • 84942550998 scopus 로고    scopus 로고
    • Public key cryptosystems based on composite degree residuosity classes
    • LNCS 1592, Springer-Verlag
    • P. Paillier. Public key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology - Eurocrypt'99 Proceedings, LNCS 1592, pages 223-238. Springer-Verlag, 1999.
    • (1999) Advances in Cryptology - Eurocrypt'99 Proceedings , pp. 223-238
    • Paillier, P.1
  • 20
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120-126, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 26
    • 0038148412 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • Washington, DC, USA, IEEE Computer Society
    • T. Yu and M. Winslett. A unified scheme for resource protection in automated trust negotiation. In SP'03: Proceedings of the 2003 IEEE Symposium on Security and Privacy, page 110, Washington, DC, USA, 2003. IEEE Computer Society.
    • (2003) SP'03: Proceedings of the 2003 IEEE Symposium on Security and Privacy , pp. 110
    • Yu, T.1    Winslett, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.