Sciweavers

464 search results - page 1 / 93
» Authorisation Using Attributes from Multiple Authorities
Sort
View
WETICE
2006
IEEE
13 years 10 months ago
Authorisation Using Attributes from Multiple Authorities
This paper presents the results of a survey of requirements for attribute aggregation in authorisation systems, gathered from an international community of security professionals....
David W. Chadwick
CMS
2006
164views Communications» more  CMS 2006»
13 years 6 months ago
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains
In this paper we describe how we have added support for dynamic delegation of authority that is enacted via the issuing of credentials from one user to another, to the XACML model ...
David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen
JCDL
2005
ACM
116views Education» more  JCDL 2005»
13 years 10 months ago
Name disambiguation in author citations using a K-way spectral clustering method
An author may have multiple names and multiple authors may share the same name simply due to name abbreviations, identical names, or name misspellings in publications or bibliogra...
Hui Han, Hongyuan Zha, C. Lee Giles
IEEEARES
2006
IEEE
13 years 10 months ago
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID ...
Christian Schläger, Thomas Nowey, José...
TCC
2007
Springer
114views Cryptology» more  TCC 2007»
13 years 11 months ago
Multi-authority Attribute Based Encryption
Abstract. In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in whic...
Melissa Chase