메뉴 건너뛰기




Volumn , Issue , 2010, Pages 305-312

Universal identity management model based on anonymous credentials

Author keywords

Identity management; Identity metasystem; Privacy concerns of service oriented solutions; Privilege delegation

Indexed keywords

ANONYMOUS CREDENTIAL; COMPOSITE SERVICES; IDENTITY INFORMATION; IDENTITY MANAGEMENT; METASYSTEM; PRIVACY CONCERNS OF SERVICE-ORIENTED SOLUTIONS; PRIVILEGE DELEGATION; USER-CENTRIC; USER-CENTRIC IDENTITY;

EID: 77957890452     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SCC.2010.46     Document Type: Conference Paper
Times cited : (10)

References (33)
  • 3
    • 84930331022 scopus 로고    scopus 로고
    • Identity-management. Liberty alliance project. http://www.projectliberty. org.
    • Identity-Management
  • 5
    • 34249874298 scopus 로고    scopus 로고
    • User centricity: A taxonomy and open issues
    • The Second ACM Workshop on Digita; Identity Management - DIM 2006
    • A. Bhargav-Spantzel, J. Camenisch. User Centricity: A Taxonomy and Open Issues. In The Second ACM Workshop on Digital Identity Management - DIM 2006, pages 493-527, 2007. (Pubitemid 47182338)
    • (2007) Journal of Computer Security , vol.15 , Issue.5 , pp. 493-527
    • Bhargav-Spantzel, A.1    Camenisch, J.2    Gross, T.3    Sommer, D.4
  • 6
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • D. Chaum. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM, 28(10), pages 1030-1044, 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 7
    • 33749578123 scopus 로고    scopus 로고
    • On signatures of knowledge
    • Cynthia Dwork, editor, volume 4117 of LNCS
    • M. Chase and A. Lysyanskaya. On signatures of knowledge. In Cynthia Dwork, editor, CRYPTO 2006, volume 4117 of LNCS, pages 78-96, 2006.
    • (2006) CRYPTO 2006 , pp. 78-96
    • Chase, M.1    Lysyanskaya, A.2
  • 9
    • 25144470629 scopus 로고    scopus 로고
    • IBM, Microsoft, Actional, BEA, Computer Associates, Layer 7, Oblix, Open Network, Ping Identity, Reactivity, and Verisign. February
    • IBM, Microsoft, Actional, BEA, Computer Associates, Layer 7, Oblix, Open Network, Ping Identity, Reactivity, and Verisign. Web Services Trust Language (WS-Trust). February 2005.
    • (2005) Web Services Trust Language (WS-Trust)
  • 10
    • 57749094662 scopus 로고    scopus 로고
    • Microsoft's vision for an identity metasystem
    • May, http://zoo.cs.yale.edu/classes/cs457/tsui-digital-identity-managemen t.doc
    • Microsoft organization. Microsoft's Vision for an Identity Metasystem. Microsoft Whitepaper, May 2005. http://msdn2.microsoft.com/en-us/library/ ms996422.aspx http://zoo.cs.yale.edu/classes/cs457/tsui-digital-identity- managemen t.doc.
    • (2005) Microsoft Whitepaper
  • 11
    • 70349938925 scopus 로고    scopus 로고
    • Introducing windows cardspace
    • April
    • D. Chappell. Introducing Windows CardSpace. Windows Vista Technical Articles, April 2006 http://msdn2.microsoft.com/en-us/library/aa480189.aspx.
    • (2006) Windows Vista Technical Articles
    • Chappell, D.1
  • 12
    • 84874004570 scopus 로고    scopus 로고
    • CodeIdol.com. InfoCard Architecture and Security http://codeidol.com/ csharp/indigo/InfoCard/InfoCard-Architecture-and-Security/.
    • InfoCard Architecture and Security
  • 13
    • 77957913739 scopus 로고    scopus 로고
    • Novell corp.
    • Novell corp. Bandit project http://www.bandit-project.org/index.php/ Welcome-to-Bandit.
    • Bandit Project
  • 18
    • 79952416277 scopus 로고    scopus 로고
    • A delegation solution for universal identity management in SOA
    • 10.1109/TSC.2010.9
    • Y. Zhang, J.L. Chen. A Delegation Solution for Universal Identity Management in SOA. IEEE Transaction on Services Computing, 3, 2010, 10.1109/TSC.2010.9 .
    • (2010) IEEE Transaction on Services Computing , vol.3
    • Zhang, Y.1    Chen, J.L.2
  • 19
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • J. Camenisch, V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. In Advances in Cryptology-RYPTO, pp. 126-144, 2003.
    • (2003) Advances in Cryptology-RYPTO , pp. 126-144
    • Camenisch, J.1    Shoup, V.2
  • 21
    • 34247496096 scopus 로고    scopus 로고
    • Liberty Alliance Project. Version 1.2, November
    • Liberty Alliance Project. Liberty ID-FF Protocols and Schema Specification. Version 1.2, November 2003. http://www.projectliberty.org/specs.
    • (2003) Liberty ID-FF Protocols and Schema Specification
  • 24
    • 84957800809 scopus 로고    scopus 로고
    • KeyNote: Trust management for public-key infrastructures (position paper)
    • M. Blaze, J. Feigenbaum, A.D. Keromytis. KeyNote: Trust management for public-key infrastructures (position paper). Lecture Notes in Computer Science 1550 (1999), pp. 59-63, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1550 , Issue.1999 , pp. 59-63
    • Blaze, M.1    Feigenbaum, J.2    Keromytis, A.D.3
  • 26
    • 79251590715 scopus 로고
    • A secure and privacy-protecting protocol for transmitting personal information between organizations
    • D. Chaum and J.H. Evertse. A secure and privacy-protecting protocol for transmitting personal information between organizations. In Advances in Cryptology-CRYPTO'86, pp. 118-167, 1986.
    • (1986) Advances in Cryptology-CRYPTO'86 , pp. 118-167
    • Chaum, D.1    Evertse, J.H.2
  • 27
    • 85031802442 scopus 로고
    • Payment systems and credential mechanisms with provable security against abuse by individuals
    • I.B. Damgard. Payment systems and credential mechanisms with provable security against abuse by individuals. Advances in Cryptology-CRYPTO'88, pp. 328-335, 1988.
    • (1988) Advances in Cryptology-CRYPTO'88 , pp. 328-335
    • Damgard, I.B.1
  • 30
    • 84945135810 scopus 로고    scopus 로고
    • Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
    • Birgit Pfitzmann, editor, volume 2045 of LNCS, Springer Verlag
    • J. Camenisch and A. Lysyanskaya. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In Birgit Pfitzmann, editor, EUROCRYPT 2001, volume 2045 of LNCS, pp. 93-118. Springer Verlag, 2001.
    • (2001) EUROCRYPT 2001 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 31
    • 35248839965 scopus 로고    scopus 로고
    • A signature scheme with efficient protocols
    • volume 2576 of LNCS
    • J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In SCN 2002, volume 2576 of LNCS, pp. 268-289, 2002.
    • (2002) SCN 2002 , pp. 268-289
    • Camenisch, J.1    Lysyanskaya, A.2
  • 32
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • volume 3152 of LNCS
    • J. Camenisch and A. Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In CRYPTO 2004, volume 3152 of LNCS, pp. 56-72, 2004.
    • (2004) CRYPTO 2004 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.