Sciweavers

115 search results - page 2 / 23
» Hidden access control policies with hidden credentials
Sort
View
CCS
2009
ACM
14 years 6 months ago
Hidden credential retrieval from a reusable password
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access ...
Xavier Boyen
CSFW
2010
IEEE
13 years 9 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
USENIX
2003
13 years 7 months ago
Secure and Flexible Global File Sharing
Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...
IFIP
2004
Springer
13 years 11 months ago
An Interactive Trust Management and Negotiation Scheme
Interactive access control allows a server to compute and communicate on the fly the missing credentials to a client and to adapt its responses on the basis of presented and decli...
Hristo Koshutanski, Fabio Massacci
IEEECIT
2010
IEEE
13 years 4 months ago
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML
—In this paper we describe extensions to the access control industry standards XACML and SAML to enable privacy-preserving and credential-based access control. Rather than assumi...
Claudio Agostino Ardagna, Sabrina De Capitani di V...