AUSCRYPT '90 Proceedings of the international conference on cryptology on Advances in cryptology
The intrusion detection system AID—architecture, and experiences in automated audit analysis
Proceedings of the IFIP TC6/TC11 international conference on Communications and multimedia security II
Computer security
Unlinkable serial transactions: protocols and applications
ACM Transactions on Information and System Security (TISSEC)
On secure and pseudonymous client-relationships with multiple servers
ACM Transactions on Information and System Security (TISSEC)
Anomaly-based intrusion detection: privacy concerns and other problems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on recent advances in intrusion detection systems
Identity management based on P3P
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
PyTHIA: towards anonymity in authentication
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Identity management and its support of multilateral security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
A User Authentication Scheme with Identity and Location Privacy
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Digital Payment Systems with Passive Anonymity-Revoking Trustees
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Secure Anonymous Signature-Based Transactions
ESORICS '00 Proceedings of the 6th European Symposium on Research in Computer Security
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Internet Anonymity: Problems and Solutions
IFIP/Sec '01 Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Multilateral Security: Enabling Technologies and Their Evaluation
Informatics - 10 Years Back. 10 Years Ahead.
Anonymity Control in E-Cash Systems
FC '97 Proceedings of the First International Conference on Financial Cryptography
Anonymous Authentication of Membership in Dynamic Groups
FC '99 Proceedings of the Third International Conference on Financial Cryptography
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Authentic Attributes with Fine-Grained Anonymity Protection
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Resource-Efficient Anonymous Group Identification
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Unlinkable Electronic Coupon Protocol with Anonymity Control
ISW '99 Proceedings of the Second International Workshop on Information Security
On Privacy Issues of Internet Access Services via Proxy Servers
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Privacy-enhancing technologies for the Internet
COMPCON '97 Proceedings of the 42nd IEEE International Computer Conference
A high-level programming environment for packet trace anonymization and transformation
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Privacy-enhancing technologies for the internet, II: five years later
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Privacy enhancing service architectures
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Privacy enhanced technologies: methods – markets – misuse
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
A multilateral secure payment system for wireless LAN hotspots
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Hi-index | 0.00 |
Even more than in our physical world, in our digital world we need systems that meet the security objective of service providers and users in equal measure. This paper investigates the requirements of secure authorizations with respect to accountability and privacy in the context of surveillance for misuse detection during service utilization. We develop a model of system architectures for secure and privacy-respecting authorizations that allows to derive and compare the properties of available technology. It is shown how the model maps to existing authorization architectures.