Sciweavers

5119 search results - page 174 / 1024
» Security Privacy
Sort
View
IEEEARES
2007
IEEE
15 years 10 months ago
Effects of Architectural Decisions in Authentication and Authorisation Infrastructures
AAIs – Infrastructures for Authentication and Authorisation provide services for service providers on the Internet. Especially if combined with an attribute infrastructure these...
Christian Schläger, Monika Ganslmayer
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
15 years 10 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
CCS
2000
ACM
15 years 8 months ago
Threshold-based identity recovery for privacy enhanced applications
ÈÖ Ú Ý Ò ÓÙÒØ Ð ØÝ Ö ÔÓØ ÒØ ÐÐÝ ÓÒ Ø Ò ÓÖ ¹ Ò Þ Ø ÓÒ Ð Ò Ð Ð Ö ÕÙ Ö Ñ ÒØ× Û Ò ÔÔÖÓ Ý ÐÐÓÛ Ò Ù× Ö× ØÓ Ø Ô× Ù ÓÒ...
Joachim Biskup, Ulrich Flegel
ESORICS
2004
Springer
15 years 9 months ago
A Formalization of Anonymity and Onion Routing
The use of formal methods to verify security protocols with respect to secrecy and authentication has become standard practice. In contrast, the formalization of other security goa...
Sjouke Mauw, Jan Verschuren, Erik P. de Vink
CSFW
2006
IEEE
15 years 10 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee