<--- Back to Details
First PageDocument Content
Cryptography / Computer security / Computer access control / Identity management / Public-key cryptography / Federated identity / Cryptographic protocols / Digital credential / Authentication / Credential / Multi-factor authentication / Access control
Cryptography
Computer security
Computer access control
Identity management
Public-key cryptography
Federated identity
Cryptographic protocols
Digital credential
Authentication
Credential
Multi-factor authentication
Access control

Concepts and Languages for Privacy-Preserving Attribute-Based AuthenticationI,II Jan Camenischa,∗, Maria Dubovitskayaa,b , Robert R. Enderleina,b,∗∗, Anja Lehmanna , Gregory Nevena , Christian Paquinc , Franz-Stefa

Add to Reading List

Source URL: www.e7n.ch

Download Document from Source Website

File Size: 370,75 KB

Share Document on Facebook

Similar Documents

Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

DocID: 1voGj - View Document

Towards Accelerated Usage Control Based on Access Correlations Richard Gay, Jinwei Hu, Heiko Mantel, and Johannes Schickel Department of Computer Science, TU Darmstadt, Germany

Towards Accelerated Usage Control Based on Access Correlations Richard Gay, Jinwei Hu, Heiko Mantel, and Johannes Schickel Department of Computer Science, TU Darmstadt, Germany

DocID: 1vgjd - View Document

Access Control and Key Management for Mobile Agents Volker Roth 1 and Mehrdad Jalali-Sohi 2 Fraunhofer Institute for Computer Graphics, Rundeturmstr. 6, 64283 Darmstadt, Germany

Access Control and Key Management for Mobile Agents Volker Roth 1 and Mehrdad Jalali-Sohi 2 Fraunhofer Institute for Computer Graphics, Rundeturmstr. 6, 64283 Darmstadt, Germany

DocID: 1vfkA - View Document

Synthesising Verified Access Control Systems through Model Checking Nan Zhang, Mark Ryan∗ School of Computer Science University of Birmingham {nxz,mdr}@cs.bham.ac.uk

Synthesising Verified Access Control Systems through Model Checking Nan Zhang, Mark Ryan∗ School of Computer Science University of Birmingham {nxz,mdr}@cs.bham.ac.uk

DocID: 1uYGS - View Document

Verification of agent knowledge in dynamic access control policies∗ Masoud Koleini, Eike Ritter and Mark Ryan School of Computer Science The University of Birmingham Birmingham, B15 2TT, UK

Verification of agent knowledge in dynamic access control policies∗ Masoud Koleini, Eike Ritter and Mark Ryan School of Computer Science The University of Birmingham Birmingham, B15 2TT, UK

DocID: 1uPvL - View Document