Sciweavers

169 search results - page 3 / 34
» A Revocation Scheme Preserving Privacy
Sort
View
ACISP
2008
Springer
15 years 11 months ago
Advanced Permission-Role Relationship in Role-Based Access Control
Abstract. Permission-role assignment is an important issue in rolebased access control (RBAC). There are two types of problems that may arise in permission-role assignment. One is ...
Min Li, Hua Wang, Ashley W. Plank, Jianming Yong
CCS
2004
ACM
15 years 8 months ago
Group signatures with verifier-local revocation
Group signatures have recently become important for enabling privacy-preserving attestation in projects such as Microsoft's ngscb effort (formerly Palladium). Revocation is c...
Dan Boneh, Hovav Shacham
IEEEARES
2009
IEEE
15 years 12 months ago
Privacy-Preserving Collaborative Filtering Schemes
Hiroaki Kikuchi, Hiroyasu Kizawa, Minako Tada
ACISP
2005
Springer
15 years 10 months ago
Group Signature Schemes with Membership Revocation for Large Groups
Group signature schemes with membership revocation have been intensively researched. However, signing and/or verification of some existing schemes have computational costs of O(R)...
Toru Nakanishi, Fumiaki Kubooka, Naoto Hamada, Nob...
CCS
2004
ACM
15 years 10 months ago
Direct anonymous attestation
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the Trusted Computing Group as the method for remote authentication of a hardware mo...
Ernest F. Brickell, Jan Camenisch, Liqun Chen