Sciweavers

461 search results - page 3 / 93
» Privacy Enhancing Credentials
Sort
View
ACISP
2006
Springer
13 years 11 months ago
Graphical Representation of Authorization Policies for Weighted Credentials
Isaac Agudo, Javier Lopez, José A. Monteneg...
WPES
2004
ACM
13 years 10 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
13 years 11 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
CCS
2009
ACM
14 years 6 months ago
On-board credentials with open provisioning
Kari Kostiainen, Jan-Erik Ekberg, N. Asokan, Aarne...
CCS
2001
ACM
13 years 10 months ago
Distributed credential chain discovery in trust management: extended abstract
Ninghui Li, William H. Winsborough, John C. Mitche...