Sciweavers

169 search results - page 3 / 34
» A Revocation Scheme Preserving Privacy
Sort
View
ACISP
2008
Springer
15 years 3 months ago
Advanced Permission-Role Relationship in Role-Based Access Control
Abstract. Permission-role assignment is an important issue in rolebased access control (RBAC). There are two types of problems that may arise in permission-role assignment. One is ...
Min Li, Hua Wang, Ashley W. Plank, Jianming Yong
CCS
2004
ACM
15 years 1 months ago
Group signatures with verifier-local revocation
Group signatures have recently become important for enabling privacy-preserving attestation in projects such as Microsoft's ngscb effort (formerly Palladium). Revocation is c...
Dan Boneh, Hovav Shacham
129
Voted
IEEEARES
2009
IEEE
15 years 4 months ago
Privacy-Preserving Collaborative Filtering Schemes
Hiroaki Kikuchi, Hiroyasu Kizawa, Minako Tada
ACISP
2005
Springer
15 years 3 months ago
Group Signature Schemes with Membership Revocation for Large Groups
Group signature schemes with membership revocation have been intensively researched. However, signing and/or verification of some existing schemes have computational costs of O(R)...
Toru Nakanishi, Fumiaki Kubooka, Naoto Hamada, Nob...
92
Voted
CCS
2004
ACM
15 years 2 months ago
Direct anonymous attestation
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the Trusted Computing Group as the method for remote authentication of a hardware mo...
Ernest F. Brickell, Jan Camenisch, Liqun Chen