|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 777 occurrences of 334 keywords
|
|
|
Results
Found 976 publication records. Showing 976 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
128 | Mohamed Layouni, Hans Vangheluwe |
Anonymous k -Show Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 181-192, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Privacy-preserving digital credentials, multiple-show credentials, anonymity |
121 | Yanjiang Yang, Robert H. Deng, Feng Bao 0001 |
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, pp. 177-192, 2007, Springer, 978-3-540-72159-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
91 | Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li 0001 |
Attribute-Based Access Control with Hidden Policies and Hidden Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 55(10), pp. 1259-1270, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Electronic commerce-security, hidden credentials, privacy, authentication, access control, trust negotiation, security and protection, management of computing and information systems |
91 | Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li 0001 |
Hidden access control policies with hidden credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004, pp. 27, 2004, ACM, 1-58113-968-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
hidden credentials, privacy, access control, secure multi-party computation, trust negotiation |
83 | Amir Herzberg, Yosi Mass |
Relying Party Credentials Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings, pp. 328-343, 2001, Springer, 3-540-41898-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
74 | William H. Winsborough, Ninghui Li |
Protecting sensitive attributes in automated trust negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, November 21, 2002, pp. 41-51, 2002, ACM, 1-58113-633-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
trust management, trust negotiation, attribute-based access control, digital credentials |
74 | Gang Yin, Huaimin Wang, Jian-quan Ouyang, Ning Zhou, Dian-xi Shi |
Towards Role Based Trust Management without Distributed Searching of Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 222-237, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
74 | Amir Herzberg, Yosi Mass |
Relying Party Credentials Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commer. Res. ![In: Electron. Commer. Res. 4(1-2), pp. 23-39, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
72 | Kari Kostiainen, Jan-Erik Ekberg, N. Asokan, Aarne Rantala |
On-board credentials with open provisioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 104-115, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
provisioning protocols, trusted computing, credentials, secure hardware |
72 | Jan-Erik Ekberg, N. Asokan, Kari Kostiainen, Aarne Rantala |
Scheduling execution of credentials in constrained secure environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008, pp. 61-70, 2008, ACM, 978-1-60558-295-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
onboard credentials, secure execution environments, trusted hardware, scheduling |
72 | Jiangtao Li 0001, Ninghui Li, William H. Winsborough |
Automated trust negotiation using cryptographic credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 46-57, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, access control, automated trust negotiation, digital credentials |
64 | Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham |
Randomizable Proofs and Delegatable Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 108-125, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
64 | Jan Camenisch |
Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 135-147, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
64 | Daniele Gorla, Matthew Hennessy, Vladimiro Sassone |
Inferring dynamic credentials for rôle-based trust management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPDP ![In: Proceedings of the 8th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, July 10-12, 2006, Venice, Italy, pp. 213-224, 2006, ACM, 1-59593-388-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
logic programming with negation, rôle-based access control, trust-management, inference systems |
64 | Jan Camenisch, Anna Lysyanskaya |
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding, pp. 93-118, 2001, Springer, 3-540-42070-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
pseudonym system, circular encryption, key-oblivious encryption, Privacy protection, blind signatures, e-cash, credential system |
63 | Shouhuai Xu, Moti Yung |
k-anonymous secret handshakes with reusable credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 158-167, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privacy-preserving authentication, reusable credentials, anonymity, unlinkability, secret handshake, credential systems |
63 | Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons |
Concealing complex policies with hidden credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 146-157, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privacy, authentication, secret sharing, identity based encryption, credentials, trust negotiation |
63 | Ting Yu 0001, Marianne Winslett, Kent E. Seamons |
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 6(1), pp. 1-42, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
interoperable strategies, access control, Automated trust negotiation, digital credentials |
63 | Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons, Hilarie K. Orman |
Hidden Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003, pp. 1-8, 2003, ACM, 1-58113-776-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
privacy, authentication, identity based encryption, credentials, trust negotiation |
63 | Russell Impagliazzo, Sara Miner More |
Anonymous credentials with biometrically-enforced non-transferability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003, pp. 60-71, 2003, ACM, 1-58113-776-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
non-transferability, subliminal-freeness, biometrics, revocation, anonymous credentials |
57 | Jaideep Vaidya, Vijayalakshmi Atluri, Basit Shafiq, Nabil R. Adam |
Privacy-preserving trust verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings, pp. 139-148, 2010, ACM, 978-1-4503-0049-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, trust negotiation, compliance checking |
57 | Jianxin Li 0002, Dacheng Zhang, Jinpeng Huai, Jie Xu 0007 |
Context-aware trust negotiation in peer-to-peer service collaborations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Netw. Appl. ![In: Peer-to-Peer Netw. Appl. 2(2), pp. 164-177, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Peer-to-peer access control, Security policy, Privacy preservation, Credential, Trust establishment |
57 | Sultan Almuhammadi, Nien T. Sui |
Safe Credential-Based Trust Protocols: A Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence ![In: 2006 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2006), 18-22 December 2006, Hong Kong, China, pp. 949-952, 2006, IEEE Computer Society, 0-7695-2747-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Trust protocols, semantic web, agents, zero-knowledge proofs |
57 | Fuchun Guo, Zhide Chen, Yi Mu 0001, Li Xu 0002, Shengyuan Zhang |
Secure and Efficient Trust Negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 374-384, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Daniel Kouril, Jim Basney |
A credential renewal service for long-running jobs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 6th IEEE/ACM International Conference on Grid Computing (GRID 2005), November 13-14, 2005, Seattle, Washington, USA, Proceedings, pp. 63-68, 2005, IEEE Computer Society, 0-7803-9493-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
55 | N. Asokan, Jan-Erik Ekberg |
A Platform for OnBoard Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 318-320, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Zhide Chen, Li Xu 0002 |
Anti-Collusion Anonymous Credentials Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Sixth International Conference on Computer and Information Technology (CIT 2006), 20-22 September 2006, Seoul, Korea, pp. 150, 2006, IEEE Computer Society, 0-7695-2687-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Jan Camenisch, Markulf Kohlweiss, Claudio Soriente |
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 481-500, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
revocation, anonymous credentials, dynamic accumulators |
50 | Marit Hansen, Hannah Obersteller, Kai Rannenberg, Fatbardh Veseli |
Establishment and Prospects of Privacy-ABCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Attribute-based Credentials for Trust ![In: Attribute-based Credentials for Trust: Identity in the Information Society, pp. 345-360, 2015, Springer, 978-3-319-14438-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Michael Østergaard Pedersen, Gert Læssøe Mikkelsen, Fatbardh Veseli, Ahmad Sabouri, Tsvetoslava Vateva-Gurova |
Comparison of Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Attribute-based Credentials for Trust ![In: Attribute-based Credentials for Trust: Identity in the Information Society, pp. 109-141, 2015, Springer, 978-3-319-14438-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Kai Rannenberg, Welderufael Tesfay, Ahmad Sabouri |
Introduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Attribute-based Credentials for Trust ![In: Attribute-based Credentials for Trust: Identity in the Information Society, pp. 1-9, 2015, Springer, 978-3-319-14438-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Yannis C. Stamatiou, Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vasiliki Liagkou, Apostolos Pyrgelis, Welderufael Tesfay |
Course Evaluation in Higher Education: the Patras Pilot of ABC4Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Attribute-based Credentials for Trust ![In: Attribute-based Credentials for Trust: Identity in the Information Society, pp. 197-239, 2015, Springer, 978-3-319-14438-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Anja Lehmann, Gregory Neven, Franz-Stefan Preiss |
Cryptographic Protocols Underlying Privacy-ABCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Attribute-based Credentials for Trust ![In: Attribute-based Credentials for Trust: Identity in the Information Society, pp. 79-108, 2015, Springer, 978-3-319-14438-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss, Kai Rannenberg, Ahmad Sabouri |
An Architecture for Privacy-ABCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Attribute-based Credentials for Trust ![In: Attribute-based Credentials for Trust: Identity in the Information Society, pp. 11-78, 2015, Springer, 978-3-319-14438-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Joerg Abendroth, Marit Hansen, Ioannis Krontiris, Ahmad Sabouri, Eva Schlehahn, Robert Seidl, Harald Zwingelberg |
Privacy-ABC Usage Scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Attribute-based Credentials for Trust ![In: Attribute-based Credentials for Trust: Identity in the Information Society, pp. 319-343, 2015, Springer, 978-3-319-14438-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Gert Læssøe Mikkelsen, Kasper Damgård, Hans Guldager, Jonas Lindstrøm Jensen, Jesus Luna Garcia, Janus Dam Nielsen, Pascal Paillier, Giancarlo Pellegrino, Michael Bladt Stausholm, Neeraj Suri, Heng Zhang 0009 |
Technical Implementation and Feasibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Attribute-based Credentials for Trust ![In: Attribute-based Credentials for Trust: Identity in the Information Society, pp. 255-317, 2015, Springer, 978-3-319-14438-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Ahmad Sabouri, Souheil Bcheri, Jimm Lerch, Eva Schlehahn, Welderufael Tesfay |
School Community Interaction Platform: the Soderhamn Pilot of ABC4Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Attribute-based Credentials for Trust ![In: Attribute-based Credentials for Trust: Identity in the Information Society, pp. 163-195, 2015, Springer, 978-3-319-14438-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Norbert Götze, Daniel Deibler, Robert Seidl |
Experiences and Feedback from the Pilots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Attribute-based Credentials for Trust ![In: Attribute-based Credentials for Trust: Identity in the Information Society, pp. 241-254, 2015, Springer, 978-3-319-14438-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Marit Hansen, Felix Bieker, Daniel Deibler, Hannah Obersteller, Eva Schlehahn, Harald Zwingelberg |
Legal Data Protection Considerations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Attribute-based Credentials for Trust ![In: Attribute-based Credentials for Trust: Identity in the Information Society, pp. 143-161, 2015, Springer, 978-3-319-14438-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
50 | Kai Rannenberg, Jan Camenisch, Ahmad Sabouri, Welderufael Tesfay |
Further Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Attribute-based Credentials for Trust ![In: Attribute-based Credentials for Trust: Identity in the Information Society, pp. 361-367, 2015, Springer, 978-3-319-14438-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
47 | Daisuke Mashima, Mustaque Ahamad, Swagath Kannan |
User-Centric Handling of Identity Agent Compromise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 19-36, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia |
Private Information: To Reveal or not to Reveal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(1), pp. 6:1-6:27, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authorization, policies, secure multi-party computation |
47 | Kristof Verslype, Bart De Decker |
Ubiquitous Privacy-Preserving Identity Managment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 589-603, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Yan He 0001, Miaoliang Zhu, Chunying Zheng |
An Efficient and Minimum Sensitivity Cost Negotiation Strategy in Automated Trust Negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 182-185, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Zhensong Liao, Hai Jin 0001, Deqing Zou |
A Hidden Credential Based Oblivious Automated Trust Negotiation Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEBE ![In: Proceedings of ICEBE 2007, IEEE International Conference on e-Business Engineering and the Workshops SOAIC 2007, SOSE 2007, SOKM 2007, 24-26 October, 2007, Hong Kong, China, pp. 247-253, 2007, IEEE Computer Society, 0-7695-3003-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Elena Ferrari, Indrakshi Ray |
Trust Negotiations with Customizable Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAT Workshops ![In: Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology - Workshops, Hong Kong, China, 18-22 December 2006, pp. 69-72, 2006, IEEE Computer Society, 0-7695-2749-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia |
Point-Based Trust: Define How Much Privacy Is Worth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 190-209, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
private multi-party computation, Trust management, knapsack problem |
47 | William H. Winsborough, Jay Jacobs |
Automated Trust Negotiation in Attribute-based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (2) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 252-, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
46 | Shouhuai Xu, Moti Yung |
K-Anonymous Multi-party Secret Handshakes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 72-87, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy-preserving authentication, reusable credentials, multiple personality prevention, anonymity, unlinkability, secret handshake, credential systems |
46 | Walid Bagga, Refik Molva |
Collusion-Free Policy-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 233-245, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Policy, Credentials, Pairing-Based Cryptography |
46 | Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini |
X-TNL: An XML-based Language for Trust Negotiations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 4-6 June 2003, Lake Como, Italy, pp. 81-84, 2003, IEEE Computer Society, 0-7695-1933-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
disclosure policies, XML, trust negotiation, digital credentials |
45 | Ke Zeng |
Access with Fast Batch Verifiable Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 65-80, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
fine-grained revocation, pairing, batch verification, anonymous credential |
45 | Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum |
Counting Abuses Using Flexible Off-line Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, pp. 548-559, 2005, Springer, 3-540-26547-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Ting Yu 0001, Marianne Winslett |
Policy migration for sensitive credentials in trust negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003, pp. 9-20, 2003, ACM, 1-58113-776-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
policy migration, trust negotiation |
38 | David W. Chadwick |
FileSpace: an alternative to CardSpace that supports multiple token authorisation and portability between devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2009, Proceedings of the 8th Symposium on Identity and Trust on the Internet, April 14-16, 2009, Gaithersburg, Maryland, USA, pp. 94-102, 2009, ACM, 978-1-60558-474-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
information cards, authorisation, federated identity management, X.509 certificates, CardSpace |
38 | Adam J. Lee, Marianne Winslett |
Towards an efficient and language-agnostic compliance checker for trust negotiation systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 228-239, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
compliance checker, satisfying sets, policy, trust negotiation |
38 | Oluwafemi O. Ajayi, Richard O. Sinnott, Anthony Stell |
Dynamic trust negotiation for flexible e-health collaborations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mardi Gras Conference ![In: Proceedings of the 15th ACM Mardi Gras conference: From lightweight mash-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities, Baton Rouge, Louisiana, USA, January 29 - February 3, 2008, pp. 8, 2008, ACM, 978-1-59593-835-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control, e-health, trust negotiation |
38 | Deholo Nali, Paul C. van Oorschot |
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 130-145, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Chuan Yue, Haining Wang |
Anti-Phishing in Offense and Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 345-354, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Oluwafemi O. Ajayi, Richard O. Sinnott, Anthony Stell |
Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 3-10, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Yan He 0001, Miaoliang Zhu |
A complete and efficient strategy based on petri net in automated trust negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Proceedings of the 2nf International Conference on Scalable Information Systems, Infoscale 2007, Suzhou, China, June 6-8, 2007, pp. 75, 2007, ACM, 978-1-59593-757-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
negotiation petri net, automated trust negotiation, negotiation strategy |
38 | Mingchu Li, Hongyan Yao, Jianbo Ma |
Recovery Mechanism of Online Certification Chain in Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 558-562, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Certifucate Chain, Double signature, Grid security, Proxy certificate |
38 | Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Gross 0001, Dieter Sommer |
User centricity: a taxonomy and open issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006, pp. 1-10, 2006, ACM, 1-59593-547-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, privacy, taxonomy, delegation, user centric, user control, identity management systems |
38 | Giuseppe Persiano, Ivan Visconti |
An Efficient and Usable Multi-show Non-transferable Anonymous Credential System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers, pp. 196-211, 2004, Springer, 3-540-22420-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Marko Niinimäki, John White, Wim Som de Cerff, Joni Hahkala, Tapio Niemi, Mikko Pitkänen |
Using Virtual Organizations Membership System with EDG's Grid Security and Database Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August - 3 September 2004, Zaragoza, Spain, pp. 517-522, 2004, IEEE Computer Society, 0-7695-2195-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
databases, Grid, virtual organizations |
38 | Markus Lorch, Jim Basney, Dennis G. Kafura |
A hardware-secured credential repository for Grid PKIs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004), April 19-22, 2004, Chicago, Illinois, USA, pp. 640-647, 2004, IEEE Computer Society, 0-7803-8430-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Xiangli Qu, Xuejun Yang, Guang Xiang, Haifang Zhou |
Credential Trustworthiness-Based Trust Evaluation in Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing - GCC 2004 Workshops: GCC 2004 International Workshops, IGKG, SGT, GISS, AAC-GEVO, and VVS, Wuhan, China, October 21-24, 2004. Proceedings, pp. 554-562, 2004, Springer, 3-540-23578-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Bryan Smith, Kent E. Seamons, Michael D. Jones |
Responding to Policies at Runtime in TrustBuilder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 7-9 June 2004, Yorktown Heights, NY, USA, pp. 149-158, 2004, IEEE Computer Society, 0-7695-2141-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Hristo Koshutanski, Fabio Massacci |
An Interactive Trust Management and Negotiation Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 115-128, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Interactive Trust Management, Interactive Access Control, Credential-Based Systems, Logics for Access Control, Trust Management, Internet Computing, Trust Negotiation |
38 | Ilanit Moodahi, Ehud Gudes, Oz Lavee, Amnon Meisels |
A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 171-186, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Kent E. Seamons, Marianne Winslett, Ting Yu 0001, Lina Yu, Ryan Jarvis |
Protecting Privacy during On-Line Trust Negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, pp. 129-143, 2002, Springer, 3-540-00565-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
38 | Ting Yu 0001, Marianne Winslett, Kent E. Seamons |
Interoperable strategies in automated trust negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 146-155, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
38 | Matt Blaze, John Ioannidis, Angelos D. Keromytis |
Offline Micropayments without Trusted Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings, pp. 21-40, 2001, Springer, 3-540-44079-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Microbilling, Risk Management, Trust Management, Payments, Digital Cash |
38 | Matt Blaze, Joan Feigenbaum, Martin Strauss 0001 |
Compliance Checking in the PolicyMaker Trust Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings, pp. 254-274, 1998, Springer, 3-540-64951-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
37 | Adam J. Lee, Marianne Winslett |
Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(2), pp. 8:1-8:33, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
distributed proving, consistency, credentials, trust negotiation |
37 | William H. Winsborough, Ninghui Li |
Safety in automated trust negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 9(3), pp. 352-390, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Access control, safety, strategy, credentials, attribute-based access control, automated trust negotiation |
37 | Ian T. Foster, Veronika Nefedova, Mehran Ahsant, Rachana Ananthakrishnan, Lee Liming, Ravi K. Madduri, Olle Mulmo, Laura Pearlman, Frank Siebenlist |
Streamlining Grid Operations: Definition and Deployment of a Portal-based User Registration Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Grid Comput. ![In: J. Grid Comput. 4(2), pp. 135-144, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
portal security, user registration, Grid, certificate, credentials, public key, Grid security, certificate authority |
37 | David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen |
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, pp. 67-86, 2006, Springer, 3-540-47820-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Delegation of Authority, Policies, XACML, Attributes, Credentials, PDP |
37 | Lan Nguyen |
Efficient Dynamic k-Times Anonymous Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VIETCRYPT ![In: Progressin Cryptology - VIETCRYPT 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers, pp. 81-98, 2006, Springer, 3-540-68799-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
dynamic k-times anonymous authentication, k-show anonymous credentials, e-tag, privacy, anonymity |
37 | Nidal Aboudagga, M. Tamer Refaei, Mohamed Eltoweissy, Luiz A. DaSilva, Jean-Jacques Quisquater |
Authentication protocols for ad hoc networks: taxonomy and research issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'05 - Proceedings of the First ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Montreal, Quebec, Canada, October 13, 2005, pp. 96-104, 2005, ACM, 1-59593-241-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
protocol taxonomy, ad hoc networks, authentication, network security, credentials, identity verification |
37 | Matt Blaze, John Ioannidis, Angelos D. Keromytis |
Trust management for IPsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 5(2), pp. 95-118, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
network security, policy, trust management, IPsec, Credentials, KeyNote |
37 | Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean |
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 298-307, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
mobile policies, electronic commerce applications, business-to-consumer applications, business-to-business applications, data access requests, distributed data representation, application-specific policies, user credentials, policy-to-data mapping context, middle tier, user management, application-specific control specification, fine-grained information, security principles, high-level definition language, mobile computing, electronic commerce, specification languages, data management, certification, message authentication, system administration, distributed computing environments, attribute certificates, multi-tier architecture |
37 | Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf 0001 |
Pseudonym Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings, pp. 184-199, 1999, Springer, 3-540-67185-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
nyms, credential transfer, Anonymity, credentials, pseudonyms, unlinkability |
36 | Emerson Ribeiro de Mello, Michelle S. Wangham, Joni da Silva Fraga, Edson Tavares de Camargo, Davi da Silva Böger |
A Model for Authentication Credentials Translation in Service Oriented Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Comput. Sci. ![In: Transactions on Computational Science IV, Special Issue on Security in Computing, pp. 68-86, 2009, Springer, 978-3-642-01003-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security, Web Services, Single Sign-on |
36 | Fred Dushin, Eric Newcomer |
Handling Multiple Credentials in a Heterogeneous SOA Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(5), pp. 80-82, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Lars E. Olson 0001, Michael J. Rosulek, Marianne Winslett |
Harvesting credentials in trust negotiation as an honest-but-curious adversary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007, pp. 64-67, 2007, ACM, 978-1-59593-883-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, protocol, vulnerability, trust negotiation |
36 | David Chaum |
Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '85, Workshop on the Theory and Application of of Cryptographic Techniques, Linz, Austria, April 1985, Proceedings, pp. 241-244, 1985, Springer, 3-540-16468-5. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
35 | Jan Camenisch, Sebastian Mödersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer |
A card requirements language enabling privacy-preserving access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings, pp. 119-128, 2010, ACM, 978-1-4503-0049-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, access control, policy languages, anonymous credentials, digital credentials |
34 | Aditi Yoganand Athavale, Kuldip Singh, Sandeep K. Sood |
Design of a Private Credentials Scheme Based on Elliptic Curve Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICSyN ![In: First International Conference on Computational Intelligence, Communication Systems and Networks, CICSYN 2009, Indore, India, 23-25 July, 2009, pp. 332-335, 2009, IEEE Computer Society, 978-0-7695-3743-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy, Elliptic Curve Cryptography, Credentials |
34 | Padmasheela Kiiskilä, Arttu Kukkonen, Henri Pirkkalainen |
Are Micro-Credentials Valuable for Students? Perspective on Verifiable Digital Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 4(4), pp. 366, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
34 | Pamela A. Lemoine, Michael D. Richardson |
Micro-Credentials, Nano Degrees, and Digital Badges: New Credentials for Global Higher Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Technol. Educ. Mark. ![In: Int. J. Technol. Educ. Mark. 5(1), pp. 36-49, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
34 | Jan Camenisch |
Concepts Around Privacy-Preserving Attribute-Based Credentials - Making Authentication with Anonymous Credentials Practical. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy and Identity Management ![In: Privacy and Identity Management for Emerging Services and Technologies - 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers, pp. 53-63, 2013, Springer, 978-3-642-55136-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
34 | Jim McAlear |
Compartmentalization architectures for protection of Internet credentials and transactions from CPU resident malware: Providing foolproof protection for critical credentials and transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 60-65, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
34 | Franz-Stefan Preiss |
Minimizing Information Disclosure in Authentication Transactions with Attribute-Based Credentials (Minimalisatie van vrijgegeven informatie in authenticatietransacties met behulp van attribuut-gebaseerde credentials). (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2012 |
RDF |
|
28 | Gregory Neven |
Privacy-enhanced access control in primelife. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 6th Workshop on Digital Identity Management, Chicago, Illinois, USA, October 8, 2010, pp. 1-2, 2010, ACM, 978-1-4503-0090-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Xiangxi Li, Yu Zhang, Yuxin Deng |
Verifying Anonymous Credential Systems in Applied Pi Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 209-225, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Hristo Koshutanski, Fabio Massacci |
Interactive access control for autonomic systems: From theory to implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Auton. Adapt. Syst. ![In: ACM Trans. Auton. Adapt. Syst. 3(3), pp. 9:1-9:31, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Interactive access control, nonmonotonic policy, logic programming, autonomic systems, abduction, disclosure control |
28 | Rachna Dhamija, Lisa Dusseault |
The Seven Flaws of Identity Management: Usability and Security Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(2), pp. 24-29, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Oluwafemi O. Ajayi, Richard O. Sinnott, Anthony Stell |
Towards Decentralised Security Policies for e-Health Collaborations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 165-172, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Jemal H. Abawajy |
An Online Credential Management Service for InterGrid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 101-106, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 976 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|