Sciweavers

6555 search results - page 5 / 1311
» Secure attribute-based systems
Sort
View
AFRICACRYPT
2009
Springer
15 years 4 months ago
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini
NDSS
2008
IEEE
15 years 4 months ago
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems
Patrick Traynor, Kevin R. B. Butler, William Enck,...
IJNSEC
2010
133views more  IJNSEC 2010»
14 years 4 months ago
Verifiable Attribute Based Encryption
In this paper, we construct two verifiable attribute-based encryption (VABE) schemes. One is with a single authority, and the other is with multi authorities. Not only our schemes ...
Qiang Tang, Dongyao Ji
ARESEC
2011
145views more  ARESEC 2011»
13 years 10 months ago
An Attribute Based Framework for Risk-Adaptive Access Control Models
—The concept of risk-based adaptive access control (RAdAC, pronounced Raid-ack) has been recently introduced in the literature. It seeks to automatically (or semi-automatically) ...
Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipat...