Yao et al., 2008 - Google Patents
Private information: To reveal or not to revealYao et al., 2008
- Document ID
- 9336518866426242435
- Author
- Yao D
- Frikken K
- Atallah M
- Tamassia R
- Publication year
- Publication venue
- ACM Transactions on Information and System Security (TISSEC)
External Links
Snippet
This article studies the notion of quantitative policies for trust management and gives protocols for realizing them in a disclosure-minimizing fashion. Specifically, Bob values each credential with a certain number of points, and requires a minimum total threshold of points …
- 239000011159 matrix material 0 description 12
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Androulaki et al. | Privacy-preserving auditable token payments in a permissioned blockchain system | |
Bertino et al. | Identity management: Concepts, technologies, and systems | |
JP4639084B2 (en) | Encryption method and encryption apparatus for secure authentication | |
Azad et al. | M2m-rep: Reputation system for machines in the internet of things | |
Petrlic et al. | Privacy-preserving reputation management | |
Paquin | U-prove technology overview v1. 1 | |
Yao et al. | Private information: To reveal or not to reveal | |
Adams | Achieving non‐transferability in credential systems using hidden biometrics | |
Maganis et al. | Opaak: using mobile phones to limit anonymous identities online | |
Huang et al. | Privacy-preserving public auditing for non-manager group shared data | |
Xia et al. | Cryptanalysis and improvement of a group authentication scheme with multiple trials and multiple authentications | |
Zhang et al. | Revocable and linkable ring signature | |
Guo et al. | Using blockchain to control access to cloud data | |
ElGayyar et al. | Blockchain-based federated identity and auditing | |
Tang et al. | Privacy-preserving authentication scheme based on zero trust architecture | |
Jan | An improved lightweight privacy preserving authentication scheme for SIP-Based-VoIP using smart card | |
US7222362B1 (en) | Non-transferable anonymous credentials | |
Bichsel et al. | An architecture for privacy-ABCs | |
Pennino et al. | Binding of endpoints to identifiers by on-chain proofs | |
Yao et al. | Point-based trust: Define how much privacy is worth | |
Hölzl et al. | Real-world identification: towards a privacy-aware mobile eID for physical and offline verification | |
Yao et al. | Private distributed scalar product protocol with application to privacy-preserving computation of trust | |
Rehman et al. | Securing cloud storage by remote data integrity check with secured key generation | |
Shin et al. | AAnA: Anonymous authentication and authorization based on short traceable signatures | |
Boshrooyeh et al. | Inonymous: anonymous invitation-based system |