A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Attribute-Based Credentials for Trust (ABC4Trust)
[chapter]
2012
Lecture Notes in Computer Science
The interchangeability of Privacy-ABC techniques in ABC4Trust framework is the outcome of its layered architecture design. ...
Finally the bottom layer CE is where the different realizations of Privacy-ABC technologies appear and provide their implementations for the required features. ...
doi:10.1007/978-3-642-32287-7_21
fatcat:sfkpnagdgzdbtmenli45xt3fje
ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life
[chapter]
2015
IFIP Advances in Information and Communication Technology
Later in Section 6, we briefly describe the ABC4Trust architecture for Privacy-ABCs and then conclude the paper in Section 7. ...
In this regard, the ABC4Trust EU Project 1 put considerable effort to foster adoption of such technologies by designing an architectural framework for Privacy-ABCs, implementing it, and trialling it in ...
doi:10.1007/978-3-319-18621-4_1
fatcat:xjhdl3g3mvflda5ifdtnsvgreu
Towards a Framework for Benchmarking Privacy-ABC Technologies
[chapter]
2014
IFIP Advances in Information and Communication Technology
In this paper, we present our efforts in defining a framework for benchmarking Privacy-ABC technologies, and identifying an extensive set of benchmarking criteria and factors impacting such benchmarks. ...
In addition, we identify important challenges in the adoption of Privacy-ABC technologies, indicating directions for future research. ...
In this paper, we provide results of an ongoing work towards a framework for benchmarking Privacy-ABC technologies, identifying an extensive set of criteria covering main aspects of Privacy-ABC technologies ...
doi:10.1007/978-3-642-55415-5_16
fatcat:huxxhnyhjbez5erkwnfowknyxi
Concepts Around Privacy-Preserving Attribute-Based Credentials
[chapter]
2014
IFIP Advances in Information and Communication Technology
It then briefly discusses the cryptographic realisation of these concepts and describes an architecture implementing them. ...
This article provides a short overview of the concepts around privacy-preserving attribute-based authentication. ...
While in principle an issuer could first generate a credential and then send it to the user, e.g., by email, privacy-ABCs typically require an interactive issuance protocols to realise the enhanced privacy ...
doi:10.1007/978-3-642-55137-6_4
fatcat:2c666jtaonfrjetcmwm2p5rtj4
Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication
[chapter]
2014
Lecture Notes in Computer Science
Then we study two approaches for integrating Privacy-ABCs with eID systems. ...
As an authentication token, an eID card is a gateway to personal information and as such it is subject to privacy risks. ...
Credentials for Trust (ABC4Trust). ...
doi:10.1007/978-3-642-54069-1_7
fatcat:r2bef2fnifaftbo32lzmiqpoei
Evaluation of Privacy-ABC Technologies - a Study on the Computational Efficiency
[chapter]
2016
IFIP Advances in Information and Communication Technology
Privacy-enhancing attribute-based credential (Privacy-ABC) technologies use different cryptographic methods to enhance the privacy of the users. ...
In this paper, we compare the computational efficiency of two prominent Privacy-ABC technologies, IBM's Idemix and Microsoft's U-Prove, covering all known Privacy-ABC features. ...
and innovation programme under grant agreement no. 653454 for the project CREDENTIAL. ...
doi:10.1007/978-3-319-41354-9_5
fatcat:lrn3oirng5f5ln2ke2tmyian6e
New directions in IoT privacy using attribute-based authentication
2016
Proceedings of the ACM International Conference on Computing Frontiers - CF '16
This makes e cient data collection and processing possible, which can be beneficial from a business perspective, but has many ramifications for users privacy. ...
IoT technologies often rely on centralised architectures that follow the current business models. ...
In our opinion and that of the authors of [22] , in order for an IoT architecture to be sustainable, it must be decentralised and user-centric. ...
doi:10.1145/2903150.2911710
dblp:conf/cd/AlparBBMKGN16
fatcat:yvjwmrompbafnohfjkgrcqe3r4
The OLYMPUS Architecture—Oblivious Identity Management for Private User-Friendly Services
2020
Sensors
To address this issue, OLYMPUS EU project establishes an interoperable framework of technologies for a distributed privacy-preserving identity management based on cryptographic techniques that can be applied ...
The architecture leverages PET technologies, such as distributed threshold-based signatures and privacy attribute-based credentials (p-ABC), so that the signed tokens and the ABC credentials are managed ...
OLYMPUS architecture leverages actual privacy-Attribute Based Credentials (p-ABC) [7] solutions, so that the p-ABC credential issuing process between the IdPs and the user is performed in a distributed ...
doi:10.3390/s20030945
pmid:32050726
pmcid:PMC7038966
fatcat:ocild5srwndkrco6agnbzk4bru
Understanding the Determinants of Privacy-ABC Technologies Adoption by Service Providers
[chapter]
2015
Lecture Notes in Computer Science
In this paper, we focus on an emerging type of digital certificates, known as Privacy-preserving Attribute-based Credentials (Privacy-ABCs), which allow privacy and security go hand-in-hand. ...
So far, there has been no systematic study on the potential factors that have influence on the adoption of Privacy-ABCs by service providers. ...
There have been standardization projects that are very relevant to Privacy-ABCs and the ABC4Trust architecture [12] . ...
doi:10.1007/978-3-319-25013-7_10
fatcat:trbigb5oxjaedhycllmgbjg2p4
Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities
2017
Personal and Ubiquitous Computing
We assess which ABC techniques are suitable for this scenario, focusing on three representative ones-Idemix, U-Prove and VANETupdated Persiano systems. ...
In this paper, we explore the use of ABCs in the vehicular context. ...
Issuance and verification phases
Fig. 4 4 Setup and issuance phases of ABC according to VANET architecture
Fig. 5 5 Presentation phase of ABC according to VANET architecture
Fig. ...
doi:10.1007/s00779-017-1057-6
fatcat:frqppgar3reyxablg3qviwsr4q
Achieving Security and Data Privacy for VANET using X.509 Certificates
2015
IJARCCE
REACT faced a problem of delay, hence an enhanced version of REACT is proposed called M-REACT. ...
Ensuring secure functioning is one of the prerequisites for deploying reliable VANETs. ...
Sanjay Chitnis, Principal CMRIT for his valuable support. ...
doi:10.17148/ijarcce.2015.45147
fatcat:cfd7kthgdbhxdeva4y5upvzseu
Position paper
2018
Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things - M4IoT'18
The recent enactment of the EU General Data Protection Regulation (GDPR) indeed emphasises the need for stronger security and privacy measures for personal data processing and free movement, including ...
In this paper, we suggest an architecture to enforce end-to-end data usage control in Distributed Event-Based Systems (DEBS), from data producers to consumer services, taking into account some of the GDPR ...
END-TO-END USAGE CONTROL ARCHITECTURE FOR PUB/SUB NETWORKS In this section, we detail our proposition: an end-to-end usage control architecture for broker-based DEBS. ...
doi:10.1145/3286719.3286727
dblp:conf/middleware/CorollerCLCL18
fatcat:pxvfpf2zengflmwo2lz2g6nwcy
Data Privacy Ontology for Ubiquitous Computing
2017
International Journal of Advanced Computer Science and Applications
We propose an ontology based model for data privacy configuration in terms of producer and consumer. Producer is an IP entity who owns data, that is Data owner. ...
Privacy is an ability to understand, choose, and regulate what personal data one shares, with whom, for how long and under what context. ...
ACKNOWLEDGEMENTS The authors are grateful to the National University of Computer and Emerging Sciences, Karachi for providing support in carrying out this research. ...
doi:10.14569/ijacsa.2017.080120
fatcat:r7tfkpy6ovdipokvxv26wsmddu
Data Protection by Design in the Context of Smart Cities: A Consent and Access Control Proposal
2021
Sensors
Without accurate and verified management, they could become severe back-doors for security and privacy. ...
In this paper, we propose a smart city infrastructure able to integrate a distributed privacy-preserving identity management solution based on attribute-based credentials (p-ABC), a user-centric Consent ...
For this, we focused on an enhanced privacy-preserving system, based on p-ABCs, with integrated id proving and mobile eID (from eIDAS) that potentiates usability and trust across the SC services. ...
doi:10.3390/s21217154
pmid:34770462
pmcid:PMC8588184
fatcat:2pbapqwiunbtnogmnh6zp33eoq
A trusted approach for decentralised and privacy-preserving identity management
2021
IEEE Access
Revocation is an important issue and needs to be addressed to ensure full func- FIGURE 1 . 1 OLYMPUS dP-ABC architecture. ...
The benefits provided by P-ABCs are mostly related to the privacy they bring to the user. ...
He is also an Advisor to the Vice Rector of Research of the University of Murcia for international projects and Head of the International Research Project Office. ...
doi:10.1109/access.2021.3099837
fatcat:3ht7rgngk5crtp77h4grgoe52y
« Previous
Showing results 1 — 15 out of 3,264 results