Attribute-Based Access Control

Results: 39



#Item
21Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption ? Jan Camenisch1 , Maria Dubovitskaya1,2 , Robert R. Enderlein1,2 , and Gregory Neven1 2

Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption ? Jan Camenisch1 , Maria Dubovitskaya1,2 , Robert R. Enderlein1,2 , and Gregory Neven1 2

Add to Reading List

Source URL: www.e7n.ch

Language: English
22Anonymous Access Control with Attribute-Based Encryption Robert R. Enderlein  School of Computer and Communication Sciences

Anonymous Access Control with Attribute-Based Encryption Robert R. Enderlein School of Computer and Communication Sciences

Add to Reading List

Source URL: www.e7n.ch

Language: English
    23Paper Title (use style: paper title)

    Paper Title (use style: paper title)

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2013-06-07 14:08:57
    24Access Sentinel Authorization Policy Server for Attribute Based Access Control  ViewDS Access Sentinel

    Access Sentinel Authorization Policy Server for Attribute Based Access Control ViewDS Access Sentinel

    Add to Reading List

    Source URL: www.viewds.com

    Language: English
    25Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†

    Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†

    Add to Reading List

    Source URL: www.caida.org

    Language: English - Date: 2015-02-04 04:34:32
    26Towards Attribute-based Access Control Policy Engineering Using Risk∗ Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica, Consiglio Nazionale delle R

    Towards Attribute-based Access Control Policy Engineering Using Risk∗ Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica, Consiglio Nazionale delle R

    Add to Reading List

    Source URL: wwwold.iit.cnr.it

    Language: English - Date: 2014-09-19 11:36:58
    27Towards Policy Engineering for Attribute-based Access Control⋆ Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche

    Towards Policy Engineering for Attribute-based Access Control⋆ Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche

    Add to Reading List

    Source URL: wwwold.iit.cnr.it

    Language: English - Date: 2014-09-19 11:36:58
    28Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†

    Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†

    Add to Reading List

    Source URL: research.microsoft.com

    Language: English - Date: 2012-05-29 07:38:50
    29Attribute Based Access Control (ABAC) Workshop Minutes from July 2013 Workshop

    Attribute Based Access Control (ABAC) Workshop Minutes from July 2013 Workshop

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2013-08-07 10:47:35
    30ATTRIBUTE BASED ACCESS CONTROL Draft February 21, 2014 [removed]

    ATTRIBUTE BASED ACCESS CONTROL Draft February 21, 2014 [removed]

    Add to Reading List

    Source URL: nccoe.nist.gov

    Language: English - Date: 2014-06-30 15:11:20