Sciweavers

282 search results - page 23 / 57
» Private Policy Negotiation
Sort
View
CCS
2006
ACM
15 years 1 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
EUROPKI
2007
Springer
15 years 1 months ago
OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules
Abstract. The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need ass...
Jean Everson Martina, Túlio Cicero Salvaro ...
ICWS
2007
IEEE
14 years 11 months ago
Privacy-Aware Web Service Protocol Replaceability
Business protocols are becoming a necessary part of Web services description [4]. The work presented in [4] investigates mechanisms for analyzing the compatibility and the substit...
Nawal Guermouche, Salima Benbernou, Emmanuel Coque...
101
Voted
MEDES
2010
ACM
14 years 4 months ago
Negotiating and delegating obligations
In this paper, we describe a security model where users are allowed to control their obligations partially or totally, depending on the security policy. The main motivation of our...
Meriam Ben-Ghorbel-Talbi, Frédéric C...
ARGMAS
2008
Springer
14 years 11 months ago
A Dialogue Mechanism for Public Argumentation Using Conversation Policies
In this paper, we propose a flexible dialogue mechanism through which a set of agents can establish a coherent set of public beliefs. Flexibility and coherence are achieved by dec...
Yuqing Tang, Simon Parsons