Hidden Access Control Policies with Hidden Credentials
Download
Author
K.Frikken, M. Atallah, J. Li
Tech report number
CERIAS TR 2004-78
Entry type
inproceedings
Abstract
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather than the identity) of the requester, via digital credentials: Access is granted if Alice
Download
Date
2004 – 10 – 28
Journal
WPES '04
Key alpha
Frikken
Publisher
ACM
Publication Date
2004-10-28
Contents
1. INTRODUCTION
2. MODEL AND PROBLEM DEFINITION
3. OUR PROTOCOL
4. CONCLUSION
5. ACKNOWLEDGEMENTS
6. REFERENCES
Copyright
2004 ACM
Keywords
Secure multi-party computation, access control, trust negotiation, hidden credentials, privacy
Language
English
Location
A hard-copy of this is in the CERIAS Library
Subject
Secure multi-party computation, access control, trust negotiation, hidden credentials, privacy

