Nothing Special   »   [go: up one dir, main page]

Yao et al., 2008 - Google Patents

Private information: To reveal or not to reveal

Yao et al., 2008

Document ID
9336518866426242435
Author
Yao D
Frikken K
Atallah M
Tamassia R
Publication year
Publication venue
ACM Transactions on Information and System Security (TISSEC)

External Links

Snippet

This article studies the notion of quantitative policies for trust management and gives protocols for realizing them in a disclosure-minimizing fashion. Specifically, Bob values each credential with a certain number of points, and requires a minimum total threshold of points …
Continue reading at dl.acm.org (other versions)

Similar Documents

Publication Publication Date Title
Androulaki et al. Privacy-preserving auditable token payments in a permissioned blockchain system
Bertino et al. Identity management: Concepts, technologies, and systems
JP4639084B2 (en) Encryption method and encryption apparatus for secure authentication
Azad et al. M2m-rep: Reputation system for machines in the internet of things
Petrlic et al. Privacy-preserving reputation management
Paquin U-prove technology overview v1. 1
Yao et al. Private information: To reveal or not to reveal
Adams Achieving non‐transferability in credential systems using hidden biometrics
Maganis et al. Opaak: using mobile phones to limit anonymous identities online
Huang et al. Privacy-preserving public auditing for non-manager group shared data
Xia et al. Cryptanalysis and improvement of a group authentication scheme with multiple trials and multiple authentications
Zhang et al. Revocable and linkable ring signature
Guo et al. Using blockchain to control access to cloud data
ElGayyar et al. Blockchain-based federated identity and auditing
Tang et al. Privacy-preserving authentication scheme based on zero trust architecture
Jan An improved lightweight privacy preserving authentication scheme for SIP-Based-VoIP using smart card
US7222362B1 (en) Non-transferable anonymous credentials
Bichsel et al. An architecture for privacy-ABCs
Pennino et al. Binding of endpoints to identifiers by on-chain proofs
Yao et al. Point-based trust: Define how much privacy is worth
Hölzl et al. Real-world identification: towards a privacy-aware mobile eID for physical and offline verification
Yao et al. Private distributed scalar product protocol with application to privacy-preserving computation of trust
Rehman et al. Securing cloud storage by remote data integrity check with secured key generation
Shin et al. AAnA: Anonymous authentication and authorization based on short traceable signatures
Boshrooyeh et al. Inonymous: anonymous invitation-based system