3,225 Hits in 6.3 sec

A First Approach to Provide Anonymity in Attribute Certificates [chapter]

Vicente Benjumea, Javier Lopez, Jose A. Montenegro, Jose M. Troya
2004 Lecture Notes in Computer Science  
In this work we propose a solution to enhance the X.509 attribute certificate in such a way that it becomes a conditionally anonymous attribute certificate.  ...  This paper focus on two security services for internet applications: authorization and anonymity.  ...  = DA publ (SA (m)) ] / [ms ≡ (m , SA (m))] z = NSK () Create new symmetric key z A = NAK () Create new asymmetric key pair for A is the fair blind signature of X over message m under the private pseudonym  ... 
doi:10.1007/978-3-540-24632-9_29 fatcat:jcx4r6zwg5gqnbcvxl6vc2t2g4

E-Voting System Using Hyperledger Fabric Blockchain and Smart Contracts

Javier Díaz-Santiso, Paula Fraga-Lamas
2021 Engineering Proceedings  
The emergence of the current pandemic has led to a new reality in which bureaucratic formalities have been affected in terms of health security, procedures, resource management, among others.  ...  Hyperledger Fabric blockchain and smart contracts are used to cast votes, which are then recorded in an immutable way, giving voters anonymity and trust in the fairness of the election process.  ...  In addition, the blockchain implemented through Fabric ensures the integrity of transactions through TLS 1.2 certificates for communication between nodes and PKI-based X.509 certificates for node and user  ... 
doi:10.3390/engproc2021007011 fatcat:t6cd3ftebjc7pltzfyuxvfukja

Architecting Adaptable Security Infrastructures for Pervasive Networks through Components [chapter]

Marc Lacoste
2009 Communications in Computer and Information Science  
Security management in pervasive networks should be fundamentally flexible.  ...  This is possible with component-based security architecture. We illustrate the benefits of this approach by presenting AMISEC, an integrated authentication and authorization middleware.  ...  X.509 ACs are extended into anonymous attribute certificates (AAC), the link between identities and attributes being based on pseudonyms.  ... 
doi:10.1007/978-3-642-10844-0_34 fatcat:2g3trfavdffyhbmh4iiuw7yoh4

Shaping the research agenda for security in e-commerce

R. Oppliger
1999 Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99  
This is particularly true for the requirements that address the complexity and availability of cryptographic applications, the anonymity of participating peers, the autonomy of mobile code, the manageability  ...  Based on these additional requirements, we point out some areas for further study and propose a corresponding research agenda for security in ecommerce.  ...  In particular, there are two competing philosophies: • The ITU-T recommendation X.509 and the IETF Public Key Infrastructure X.509 (PKIX) WG assume the existance of a global name space; • The proponents  ... 
doi:10.1109/dexa.1999.795287 dblp:conf/dexaw/Oppliger99 fatcat:nanhipjsjvb2rcm3ypjxt73gfi

Anonymous, Yet Trustworthy Auctions [chapter]

Prasit Bikash Chanda, Vincent Naessens, Bart De Decker
2009 IFIP Advances in Information and Communication Technology  
Finally, the auction's fair proceedings and outcome can be verified by everyone.  ...  An auction is an inevitable market mechanism to setup prices of goods or services in a competitive and dynamic environment.  ...  The TTP can use an aging mechanism to make sure that some accumulating values remain accurate: new = α × old + evidence, with α < 1.  ... 
doi:10.1007/978-3-642-04280-5_19 fatcat:dsddwtinrzgxzhycsvbe3ro2bu

(p+, α)-sensitive k-anonymity: A new enhanced privacy protection model

Xiaoxun Sun, Hua Wang, Jiuyong Li, Traian Marius Truta, Ping Li
2008 2008 8th IEEE International Conference on Computer and Information Technology  
al l C Co on nf fe er re en nc ce e o on n C Co om mp pu ut te er r a an nd d I In nf fo or rm ma at ti io on n T Te ec ch hn no ol lo og gy y CIT 2008 SPONSORS We wish to thank the following sponsors for  ...  to Enhance Customer Trust in the Security of Remote Transactions Sun, Luo 809 A Context Representation and Management Mechanism Towards Ubiquitous Intelligence Sun, Weiwei 509 Optimizations for Query  ...  C D E F G H I J K L M N O P Q R S T U V W X Y Z Novel Formal Framework for Secure Dynamic Services Composition Xu, Guangyou 809 A Context Representation and Management Mechanism Towards Ubiquitous Intelligence  ... 
doi:10.1109/cit.2008.4594650 dblp:conf/IEEEcit/SunWLTL08 fatcat:nerbfs4yhbbt3iw2kdkoakbgle

A Novel NFC based Secure Protocol for Merchant Transactions

Shaik Shakeel Ahamad
2021 IEEE Access  
To address these issues, we propose a secure framework incorporating a defense-in-depth approach for Near Field Communication (NFC) based mobile payment frameworks.  ...  We have proposed a NFC based Secure Protocol for Mobile Transaction (NSPMT) protocol and successfully verified a mobile payment protocol with BAN (Burrows, Abadi, and Needham) logic and Scyther tool, and  ...  PPA is protected by PIN and biometric. [1] proposes a cloud-based mobile payment mechanism, it claims security, anonymity, fairness, and the reduction of computational cost.  ... 
doi:10.1109/access.2021.3139065 fatcat:qzskxxbpgrb27btkxgjxcec4mi

Trust Management in Distributed Systems

Huaizhi Li, Mukesh Singhal
2007 Computer  
A flexible and general-purpose trust management system can maintain current and consistent trustworthiness information for the different entities in a distributed system.  ...  In e-commerce, for example, a trust-management system lets a buyer and seller become acquainted with each other and estimate the risk of participating in a transaction, thus minimizing the loss.  ...  Acknowledgments We're grateful to the anonymous reviewers whose valuable comments helped us improve this article. This research was partially supported by grant no.  ... 
doi:10.1109/mc.2007.76 fatcat:jwbmkmwyavbt7gnmgn6ydbjbwa

Identity Deployment and Management in Wireless Mesh Networks [chapter]

Leonardo A. Martucci, Albin Zuccato, Simone Fischer-Hübner
2008 The Future of Identity in the Information Society  
We present a set of non-functional requirements for a privacy-friendly identity management (IdM) system suitable for wireless mesh networks and derive another set of security and privacy properties for  ...  Identity Deployment and Management in Wireless Mesh Networks 225 14.  ...  Acknowledgements This research was partially funded by the European Network of Excellence Future of Identity in the Information Society (FIDIS), under the 6 th Framework Program for Research and Technological  ... 
doi:10.1007/978-0-387-79026-8_15 dblp:conf/ifip9-6/MartucciZF07 fatcat:xtwkluduojevxdru4rq7i3obwi

Development of a Secure Electronic Marketplace for Europe [chapter]

Michael Waidner
1996 Lecture Notes in Computer Science  
The goal of Project SEMPER (Secure Electronic Marketplace for Europe) is to provide the first open and comprehensive solutions for secure commerce over the Internet and other public information networks  ...  The basic trials will use IBM's iKP and DigiCash's ecash for electronic payments, GMD's SecuDE toolkit for X.509 certificates, and crypto toolkits developed by Cryptomathic and GMD for statements.  ...  Archive Service Block Communication Service Block Cryptographic Service Block Preferences Service Block X Manager Adapter Implementation Module for Service X, Type n Adapter Implementation  ... 
doi:10.1007/3-540-61770-1_24 fatcat:ra6vsy35jrbkregsxocszplmb4

Trust Issues for Vehicular Ad Hoc Networks

Philipp Wex, Jochen Breuer, Albert Held, Tim Leinmuller, Luca Delgrossi
2008 VTC Spring 2008 - IEEE Vehicular Technology Conference  
As basis for our considerations, we will describe a detailed automotive scenario, which relies on inter-vehicle communication for the exchange of safety relevant warning messages.  ...  The complexity of X.500 motivated Rivest and Lampson to think of other approaches for the management of public keys and names resulting in an alternative mechanism for binding names to public keys locally  ...  In X.509 Version 3, additional fields within the certificates (e.g. access rights) can be defined.  ... 
doi:10.1109/vetecs.2008.611 dblp:conf/vtc/WexBHLD08 fatcat:zlvh7ajj2vhe7ew7vsdww55wde

Solving identity delegation problem in the e-government environment

Sergio Sánchez García, Ana Gómez Oliva, Emilia Pérez Belleboni, Iván Pau de la Cruz
2011 International Journal of Information Security  
Implications for theory and practice and suggestions for future research are discussed.  ...  However, if the interaction takes place through the Internet, only primitive mechanisms of representation are available, and these are mainly based on nondynamic offline processes that do not enable quick  ...  Acknowledgments This paper is part of the work being conducted by the authors in the project ADMISSION (TSI2006-4864), Telematic platform for e-Government based on a choreography of services, supported  ... 
doi:10.1007/s10207-011-0140-7 fatcat:qtmb425c3bcjddxbadtxghy2sm

The e-Government digital credentials

Flavio Corradini, Eleonora Paganelli, Alberto Polzonetti
2007 International Journal of Electronic Governance  
Digital identities, profiles and their management enable online interactions and transactions among people, enterprises, service providers and government institutions.  ...  We also discuss how an identity management framework, composed by shared and standardised services supporting authentication procedures, can change within the e-Government domain.  ...  The X.509 standard also addresses the format of attribute certificates. • Digital documents.  ... 
doi:10.1504/ijeg.2007.014341 fatcat:zlniyd657fdejn3lrg6nh4kqea

Identity Management and Control for Clouds [chapter]

Raghu Yeluri, Enrique Castro-Leon
2014 Building the Infrastructure for Cloud Security  
Identity management thus constitutes an essential capability for attaining trusted clouds.  ...  In this scenario, the technology for digital identity management (IdM) is fundamental in customizing the user experience, underpinning accountability in the transactions, and  ...  ... 
doi:10.1007/978-1-4302-6146-9_7 fatcat:7rqnbfyfxbhrdkh2zgnfeupihy

AAnA: Anonymous authentication and authorization based on short traceable signatures

Sooyeon Shin, Taekyoung Kwon
2014 International Journal of Information Security  
Meanwhile, an authorization mechanism that controls access rights of users to services or resources is frequently needed in various real-world applications but does not favor anonymity.  ...  The efficiency of our method comes from atomizing authorization within a group and issuing multiple authorization values for a group membership.  ...  [2] introduced the first approach to provide anonymity in X.509 attribute certificates, transferring a fair blind signature scheme to those certificates.  ... 
doi:10.1007/s10207-014-0227-z fatcat:qji4qilpznc5hafcpbqprhv3bm
« Previous Showing results 1 — 15 out of 3,225 results