메뉴 건너뛰기




Volumn , Issue , 2010, Pages 1090-1095

Enabling privacy-preserving credential-based access control with XACML and SAML

Author keywords

Access control; Anonymous credentials; Privacy; XACML

Indexed keywords

DATA PRIVACY; EMBEDDED SOFTWARE; EMBEDDED SYSTEMS;

EID: 78249253959     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIT.2010.199     Document Type: Conference Paper
Times cited : (23)

References (14)
  • 1
    • 0036311802 scopus 로고    scopus 로고
    • A unified framework for regulating access and information release on the web
    • P. Bonatti and P. Samarati, "A unified framework for regulating access and information release on the web," JCS, vol. 10, no. 3, 2002.
    • (2002) JCS , vol.10 , Issue.3
    • Bonatti, P.1    Samarati, P.2
  • 2
    • 33745764834 scopus 로고    scopus 로고
    • Automated trust negotiation using cryptographic credentials
    • J. Li, N. Li, and W. Winsborough, "Automated trust negotiation using cryptographic credentials," in ACM CCS 2005.
    • (2005) ACM CCS
    • Li, J.1    Li, N.2    Winsborough, W.3
  • 6
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • D. Chaum, "Security without identification: Transaction systems to make big brother obsolete," CACM, vol. 28, no. 10, 1985.
    • (1985) CACM , vol.28 , Issue.10
    • Chaum, D.1
  • 8
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • ser. LNCS, Springer
    • J. Camenisch and A. Lysyanskaya, "An efficient system for non-transferable anonymous credentials with optional anonymity revocation," in EUROCRYPT 2001, ser. LNCS, vol. 2045. Springer, 2001.
    • (2001) EUROCRYPT 2001 , vol.2045
    • Camenisch, J.1    Lysyanskaya, A.2
  • 9
    • 0001619596 scopus 로고    scopus 로고
    • Flexible support for multiple access control policies
    • S. Jajodia, P. Samarati, M. Sapino, and V. Subrahmanian, "Flexible support for multiple access control policies," ACM TODS, vol. 26, no. 2, 2001.
    • (2001) ACM TODS , vol.26 , Issue.2
    • Jajodia, S.1    Samarati, P.2    Sapino, M.3    Subrahmanian, V.4
  • 10
    • 0030698978 scopus 로고    scopus 로고
    • Assuring security and privacy for digital library transactions on the web: Client and server security policies
    • M. Winslett, N. Ching, V. Jones, and I. Slepchin, "Assuring security and privacy for digital library transactions on the web: Client and server security policies," in ADL 1997.
    • (1997) ADL
    • Winslett, M.1    Ching, N.2    Jones, V.3    Slepchin, I.4
  • 12
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • ser. LNCS, Springer
    • J. Camenisch and V. Shoup, "Practical verifiable encryption and decryption of discrete logarithms," in CRYPTO 2003, ser. LNCS, vol. 2729. Springer, 2003.
    • (2003) CRYPTO 2003 , vol.2729
    • Camenisch, J.1    Shoup, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.