Role-Based Access Control Models
Computer
Multilateral security a concept and examples for balanced security
Proceedings of the 2000 workshop on New security paradigms
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Mix and Match: Secure Function Evaluation via Ciphertexts
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
On the Security of ElGamal Based Encryption
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
The Decision Diffie-Hellman Problem
ANTS-III Proceedings of the Third International Symposium on Algorithmic Number Theory
A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology for Privacy in Health Care
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
Attributed Based Access Control (ABAC) for Web Services
ICWS '05 Proceedings of the IEEE International Conference on Web Services
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Using Attribute-Based Access Control to Enable Attribute-Based Messaging
ACSAC '06 Proceedings of the 22nd Annual Computer Security Applications Conference
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Geo-encryption protocol for mobile networks
Computer Communications
Securing First Response Coordination with Dynamic Attribute-Based Encryption
CONGRESS '09 Proceedings of the 2009 World Congress on Privacy, Security, Trust and the Management of e-Business
Harnessing Pseudonyms with Implicit Attributes for Privacy-Respecting Mission Log Analysis
INCOS '09 Proceedings of the 2009 International Conference on Intelligent Networking and Collaborative Systems
Attribute-Based Messaging: Access Control and Confidentiality
ACM Transactions on Information and System Security (TISSEC)
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Attribute-Based encryption with break-glass
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Multilaterally secure pervasive cooperation
Journal of Ambient Intelligence and Smart Environments
Hi-index | 0.00 |
Efficient emergency communication is of high practical importance, but has specific challenges: unpredictable local emergency situations harden the establishment of communication structures, legal requirements dictate the use of end-to-end secure and documentable approaches, while users demand ease-of-use and privacy protection. Dealing with these challenges, the contribution of this paper is four-fold: first, together with emergency practioners we define realistic security requirements and patterns for ubiquitous emergency communication. Second, we devise techniques for privacy-respecting re-identificaton of pseudonymous receivers. Third, we propose a new hybrid encryption technique for expressive policies, which combines ciphertext-policy attribute-based encryption with location-based encryption. Fourth, building on the new techniques, we introduce MundoMessage, our approach to multilaterally end-to-end secure, user-friendly attribute-based messaging for emergency communication. Finally, we analyze our approach.