3,264 Hits in 2.9 sec

Attribute-Based Credentials for Trust (ABC4Trust) [chapter]

Ahmad Sabouri, Ioannis Krontiris, Kai Rannenberg
2012 Lecture Notes in Computer Science  
The interchangeability of Privacy-ABC techniques in ABC4Trust framework is the outcome of its layered architecture design.  ...  Finally the bottom layer CE is where the different realizations of Privacy-ABC technologies appear and provide their implementations for the required features.  ... 
doi:10.1007/978-3-642-32287-7_21 fatcat:sfkpnagdgzdbtmenli45xt3fje

ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life [chapter]

Ahmad Sabouri, Kai Rannenberg
2015 IFIP Advances in Information and Communication Technology  
Later in Section 6, we briefly describe the ABC4Trust architecture for Privacy-ABCs and then conclude the paper in Section 7.  ...  In this regard, the ABC4Trust EU Project 1 put considerable effort to foster adoption of such technologies by designing an architectural framework for Privacy-ABCs, implementing it, and trialling it in  ... 
doi:10.1007/978-3-319-18621-4_1 fatcat:xjhdl3g3mvflda5ifdtnsvgreu

Towards a Framework for Benchmarking Privacy-ABC Technologies [chapter]

Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri
2014 IFIP Advances in Information and Communication Technology  
In this paper, we present our efforts in defining a framework for benchmarking Privacy-ABC technologies, and identifying an extensive set of benchmarking criteria and factors impacting such benchmarks.  ...  In addition, we identify important challenges in the adoption of Privacy-ABC technologies, indicating directions for future research.  ...  In this paper, we provide results of an ongoing work towards a framework for benchmarking Privacy-ABC technologies, identifying an extensive set of criteria covering main aspects of Privacy-ABC technologies  ... 
doi:10.1007/978-3-642-55415-5_16 fatcat:huxxhnyhjbez5erkwnfowknyxi

Concepts Around Privacy-Preserving Attribute-Based Credentials [chapter]

Jan Camenisch
2014 IFIP Advances in Information and Communication Technology  
It then briefly discusses the cryptographic realisation of these concepts and describes an architecture implementing them.  ...  This article provides a short overview of the concepts around privacy-preserving attribute-based authentication.  ...  While in principle an issuer could first generate a credential and then send it to the user, e.g., by email, privacy-ABCs typically require an interactive issuance protocols to realise the enhanced privacy  ... 
doi:10.1007/978-3-642-55137-6_4 fatcat:2c666jtaonfrjetcmwm2p5rtj4

Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication [chapter]

Ronny Bjones, Ioannis Krontiris, Pascal Paillier, Kai Rannenberg
2014 Lecture Notes in Computer Science  
Then we study two approaches for integrating Privacy-ABCs with eID systems.  ...  As an authentication token, an eID card is a gateway to personal information and as such it is subject to privacy risks.  ...  Credentials for Trust (ABC4Trust).  ... 
doi:10.1007/978-3-642-54069-1_7 fatcat:r2bef2fnifaftbo32lzmiqpoei

Evaluation of Privacy-ABC Technologies - a Study on the Computational Efficiency [chapter]

Fatbardh Veseli, Jetzabel Serna
2016 IFIP Advances in Information and Communication Technology  
Privacy-enhancing attribute-based credential (Privacy-ABC) technologies use different cryptographic methods to enhance the privacy of the users.  ...  In this paper, we compare the computational efficiency of two prominent Privacy-ABC technologies, IBM's Idemix and Microsoft's U-Prove, covering all known Privacy-ABC features.  ...  and innovation programme under grant agreement no. 653454 for the project CREDENTIAL.  ... 
doi:10.1007/978-3-319-41354-9_5 fatcat:lrn3oirng5f5ln2ke2tmyian6e

New directions in IoT privacy using attribute-based authentication

Gergely Alpár, Lejla Batina, Lynn Batten, Veelasha Moonsamy, Anna Krasnova, Antoine Guellier, Iynkaran Natgunanathan
2016 Proceedings of the ACM International Conference on Computing Frontiers - CF '16  
This makes e cient data collection and processing possible, which can be beneficial from a business perspective, but has many ramifications for users privacy.  ...  IoT technologies often rely on centralised architectures that follow the current business models.  ...  In our opinion and that of the authors of [22] , in order for an IoT architecture to be sustainable, it must be decentralised and user-centric.  ... 
doi:10.1145/2903150.2911710 dblp:conf/cd/AlparBBMKGN16 fatcat:yvjwmrompbafnohfjkgrcqe3r4

The OLYMPUS Architecture—Oblivious Identity Management for Private User-Friendly Services

Rafael Torres Moreno, Jorge Bernal Bernabe, Jesús García García Rodríguez, Tore Kasper Frederiksen, Michael Stausholm, Noelia Martínez, Evangelos Sakkopoulos, Nuno Ponte, Antonio Skarmeta
2020 Sensors  
To address this issue, OLYMPUS EU project establishes an interoperable framework of technologies for a distributed privacy-preserving identity management based on cryptographic techniques that can be applied  ...  The architecture leverages PET technologies, such as distributed threshold-based signatures and privacy attribute-based credentials (p-ABC), so that the signed tokens and the ABC credentials are managed  ...  OLYMPUS architecture leverages actual privacy-Attribute Based Credentials (p-ABC) [7] solutions, so that the p-ABC credential issuing process between the IdPs and the user is performed in a distributed  ... 
doi:10.3390/s20030945 pmid:32050726 pmcid:PMC7038966 fatcat:ocild5srwndkrco6agnbzk4bru

Understanding the Determinants of Privacy-ABC Technologies Adoption by Service Providers [chapter]

Ahmad Sabouri
2015 Lecture Notes in Computer Science  
In this paper, we focus on an emerging type of digital certificates, known as Privacy-preserving Attribute-based Credentials (Privacy-ABCs), which allow privacy and security go hand-in-hand.  ...  So far, there has been no systematic study on the potential factors that have influence on the adoption of Privacy-ABCs by service providers.  ...  There have been standardization projects that are very relevant to Privacy-ABCs and the ABC4Trust architecture [12] .  ... 
doi:10.1007/978-3-319-25013-7_10 fatcat:trbigb5oxjaedhycllmgbjg2p4

Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities

J. M. de Fuentes, L. González-Manzano, J. Serna-Olvera, F. Veseli
2017 Personal and Ubiquitous Computing  
We assess which ABC techniques are suitable for this scenario, focusing on three representative ones-Idemix, U-Prove and VANETupdated Persiano systems.  ...  In this paper, we explore the use of ABCs in the vehicular context.  ...  Issuance and verification phases Fig. 4 4 Setup and issuance phases of ABC according to VANET architecture Fig. 5 5 Presentation phase of ABC according to VANET architecture Fig.  ... 
doi:10.1007/s00779-017-1057-6 fatcat:frqppgar3reyxablg3qviwsr4q

Achieving Security and Data Privacy for VANET using X.509 Certificates

Sowmyashree H, Sharmila K.P
2015 IJARCCE  
REACT faced a problem of delay, hence an enhanced version of REACT is proposed called M-REACT.  ...  Ensuring secure functioning is one of the prerequisites for deploying reliable VANETs.  ...  Sanjay Chitnis, Principal CMRIT for his valuable support.  ... 
doi:10.17148/ijarcce.2015.45147 fatcat:cfd7kthgdbhxdeva4y5upvzseu

Position paper

Stevan Coroller, Sophie Chabridon, Maryline Laurent, Denis Conan, Jean Leneutre
2018 Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things - M4IoT'18  
The recent enactment of the EU General Data Protection Regulation (GDPR) indeed emphasises the need for stronger security and privacy measures for personal data processing and free movement, including  ...  In this paper, we suggest an architecture to enforce end-to-end data usage control in Distributed Event-Based Systems (DEBS), from data producers to consumer services, taking into account some of the GDPR  ...  END-TO-END USAGE CONTROL ARCHITECTURE FOR PUB/SUB NETWORKS In this section, we detail our proposition: an end-to-end usage control architecture for broker-based DEBS.  ... 
doi:10.1145/3286719.3286727 dblp:conf/middleware/CorollerCLCL18 fatcat:pxvfpf2zengflmwo2lz2g6nwcy

Data Privacy Ontology for Ubiquitous Computing

Narmeen Zakaria, Zubair A.
2017 International Journal of Advanced Computer Science and Applications  
We propose an ontology based model for data privacy configuration in terms of producer and consumer. Producer is an IP entity who owns data, that is Data owner.  ...  Privacy is an ability to understand, choose, and regulate what personal data one shares, with whom, for how long and under what context.  ...  ACKNOWLEDGEMENTS The authors are grateful to the National University of Computer and Emerging Sciences, Karachi for providing support in carrying out this research.  ... 
doi:10.14569/ijacsa.2017.080120 fatcat:r7tfkpy6ovdipokvxv26wsmddu

Data Protection by Design in the Context of Smart Cities: A Consent and Access Control Proposal

Said Daoudagh, Eda Marchetti, Vincenzo Savarino, Jorge Bernal Bernabe, Jesús García-Rodríguez, Rafael Torres Moreno, Juan Antonio Martinez, Antonio F. Skarmeta
2021 Sensors  
Without accurate and verified management, they could become severe back-doors for security and privacy.  ...  In this paper, we propose a smart city infrastructure able to integrate a distributed privacy-preserving identity management solution based on attribute-based credentials (p-ABC), a user-centric Consent  ...  For this, we focused on an enhanced privacy-preserving system, based on p-ABCs, with integrated id proving and mobile eID (from eIDAS) that potentiates usability and trust across the SC services.  ... 
doi:10.3390/s21217154 pmid:34770462 pmcid:PMC8588184 fatcat:2pbapqwiunbtnogmnh6zp33eoq

A trusted approach for decentralised and privacy-preserving identity management

Rafael Torres Moreno, Jesus Garcia-Rodriguez, Jorge Bernal Bernabe, Antonio Skarmeta
2021 IEEE Access  
Revocation is an important issue and needs to be addressed to ensure full func- FIGURE 1 . 1 OLYMPUS dP-ABC architecture.  ...  The benefits provided by P-ABCs are mostly related to the privacy they bring to the user.  ...  He is also an Advisor to the Vice Rector of Research of the University of Murcia for international projects and Head of the International Research Project Office.  ... 
doi:10.1109/access.2021.3099837 fatcat:3ht7rgngk5crtp77h4grgoe52y
« Previous Showing results 1 — 15 out of 3,264 results