Regulating service access and information release on the Web
Proceedings of the 7th ACM conference on Computer and communications security
Interoperable strategies in automated trust negotiation
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Certificate chain discovery in SPKI?SDSI
Journal of Computer Security
Protecting sensitive attributes in automated trust negotiation
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Distributed credential chain discovery in trust management
Journal of Computer Security
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Towards Practical Automated Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
A Practically Implementable and Tractable Delegation Logic
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Delegation logic: a logic-based approach to distributed authorization
Delegation logic: a logic-based approach to distributed authorization
Xen and the art of virtualization
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Automated trust establishment in open systems
Automated trust establishment in open systems
Protecting privacy during on-line trust negotiation
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Hi-index | 0.00 |
Privacy disclosure of forward direction credentials and backward direction credentials is an important security defect in existing trust management systems. In this paper, a novel distributed privacy preserving scheme for trust management credentials is proposed to solve this problem. Based on the trusted computing technology, the scheme provides the sealed protection for the credentials with privacy sensitive information and guarantees all the Deduced Composite Credential Constructing Units running in participant platforms untampered. In the process of collecting credentials, the deduced composite of multiple credentials replaces the single credential as the irreducible constituent to prevent the uncontrolled disclosure of privacy attributes. By modifying the traditional privacy preserving pattern, our scheme avoids the inadvertent disclosure of credential privacy attributes and provides a reliable solution for many privacy sensitive fields such as medical, business, and so on.