Sciweavers

1663 search results - page 25 / 333
» Privacy and Identity Management
Sort
View
WPES
2003
ACM
15 years 7 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
101
Voted
ACISP
2000
Springer
15 years 6 months ago
PKI Seeks a Trusting Relationship
All human co-operation is based on trust, meaning that we choose co-operation partners and make commitment decisions based on how much we trust the other party. Digital certificat...
Audun Jøsang, Ingar Glenn Pedersen, Dean Po...
CCS
2001
ACM
15 years 6 months ago
Privacy Engineering for Digital Rights Management Systems
Joan Feigenbaum, Michael J. Freedman, Tomas Sander...
CSFW
2006
IEEE
15 years 8 months ago
Managing Policy Updates in Security-Typed Languages
Nikhil Swamy, Michael Hicks, Stephen Tse, Steve Zd...
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
15 years 7 months ago
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management
Ninghui Li, William H. Winsborough, John C. Mitche...