Regulating service access and information release on the Web
Proceedings of the 7th ACM conference on Computer and communications security
IEEE Internet Computing
Protecting sensitive attributes in automated trust negotiation
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Generalized Secret Sharing and Monotone Functions
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
A Unified Scheme for Resource Protection in Automated Trust Negotiation
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Secret Handshakes from Pairing-Based Key Agreements
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Oblivious signature-based envelope
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Policy migration for sensitive credentials in trust negotiation
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Content-triggered trust negotiation
ACM Transactions on Information and System Security (TISSEC)
Hidden access control policies with hidden credentials
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Concealing complex policies with hidden credentials
Proceedings of the 11th ACM conference on Computer and communications security
k-anonymous secret handshakes with reusable credentials
Proceedings of the 11th ACM conference on Computer and communications security
Proceedings of the 11th ACM conference on Computer and communications security
Privacy-preserving credit checking
Proceedings of the 6th ACM conference on Electronic commerce
Policy-hiding access control in open environment
Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
Preventing attribute information leakage in automated trust negotiation
Proceedings of the 12th ACM conference on Computer and communications security
Automated trust negotiation using cryptographic credentials
Proceedings of the 12th ACM conference on Computer and communications security
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach
IEEE Transactions on Dependable and Secure Computing
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Oblivious signature-based envelope
Distributed Computing
Attribute-Based Access Control with Hidden Policies and Hidden Credentials
IEEE Transactions on Computers
Safety in automated trust negotiation
ACM Transactions on Information and System Security (TISSEC)
OACerts: Oblivious Attribute Certificates
IEEE Transactions on Dependable and Secure Computing
Establishment of Ad-Hoc Communities through Policy-Based Cryptography
Electronic Notes in Theoretical Computer Science (ENTCS)
Harvesting credentials in trust negotiation as an honest-but-curious adversary
Proceedings of the 2007 ACM workshop on Privacy in electronic society
The Traust Authorization Service
ACM Transactions on Information and System Security (TISSEC)
Achieving simultaneous distribution control and privacy protection for Internet media delivery
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Security and privacy system architecture for an e-hospital environment
Proceedings of the 7th symposium on Identity and trust on the Internet
Private Information: To Reveal or not to Reveal
ACM Transactions on Information and System Security (TISSEC)
Secure and Efficient Trust Negotiation
Computational Intelligence and Security
A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Compact and Anonymous Role-Based Authorization Chain
ACM Transactions on Information and System Security (TISSEC)
Minimal credential disclosure in trust negotiations
Proceedings of the 4th ACM workshop on Digital identity management
Building Key-Private Public-Key Encryption Schemes
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Automated trust negotiation using cryptographic credentials
ACM Transactions on Information and System Security (TISSEC)
Oblivious enforcement of hidden information release policies
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Privacy-preserving credentials upon trusted computing augmented servers
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
A RT0-based compliance checker model for automated trust negotiation
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Attribute-based authentication for multi-agent systems with dynamic groups
Computer Communications
Oblivious transfer with hidden access control policies
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Frontiers of Computer Science in China
Collusion-Free policy-based encryption
ISC'06 Proceedings of the 9th international conference on Information Security
Secure cryptographic workflow in the standard model
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
A construction for general and efficient oblivious commitment based envelope protocols
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Point-based trust: define how much privacy is worth
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Virtual fingerprinting as a foundation for reputation in open systems
iTrust'06 Proceedings of the 4th international conference on Trust Management
Policy-based cryptography and applications
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Efficient oblivious transfers with access control
Computers & Mathematics with Applications
OACerts: oblivious attribute certificates
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Certificateless public key encryption without pairing
ISC'05 Proceedings of the 8th international conference on Information Security
A new approach to hide policy for automated trust negotiation
IWSEC'06 Proceedings of the 1st international conference on Security
Anonymity in attribute-based group signatures
ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
Fine-grained access control for cloud computing
International Journal of Grid and Utility Computing
Reference-based importance assessment model of identity information
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend on fulfillment of policies described by monotonic boolean formulae can take place in a single round of messages. We further show how credentials that are never revealed can be used to retrieve sensitive resources.