1,688 Hits in 3.3 sec

Cryptographic Approaches for Privacy Preservation in Location-Based Services

Emmanouil Magkos
2011 International Journal of Information Technologies and Systems Approach  
This paper surveys the current state of knowledge concerning the use of cryptographic primitives for privacy-preservation in LBS applications.  ...  Current research in location-based services (LBSs) highlights the importance of cryptographic primitives in privacy preservation for LBSs, and presents solutions that attempt to support the (apparently  ...  Based on the principle of identity-based public-key cryptography 1 , LBKs are later used to derive public keys and perform mutually authenticated key establishment with neighboring nodes, while security  ... 
doi:10.4018/jitsa.2011070104 fatcat:3avyvhgm5zhlbo3b47wkd56i6e

Reducing Dependency on Middleware for Pull Based Active Services in LBS Systems [chapter]

Saroj Kaushik, Shivendra Tiwari, Priti Goplani
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
The trusted middleware is used to generate the authentication certificates containing the Proxy Identity (also called Pseudonyms) to fulfill the authentication requirements at the LSP servers.  ...  The middleware is the most commonly used solution to address the location privacy.  ...  Here k is the key; ID is the user identity to be encrypted; and P is the pseudonym to be generated as an output.  ... 
doi:10.1007/978-3-642-29157-9_9 fatcat:r4u6jf4ifjfyvlrnfdmjgilg6q

Author Index Volume 14 (2006)

2006 Journal of Computer Security  
Gray, Secure pseudonym management using mediated identity-based encryption(3) 249 -267 Cimato, S., A. Cresti and P.  ...  Thomas, Performing real-time threat assessment of security incidents using data fusion of IDS logs (6) 513 -534 Braghin, C., D. Gorla and V.  ... 
doi:10.3233/jcs-2006-14606 fatcat:axbmi7c3mvf4hasij4yc3yug4y


Varsha Thanaji Mulik .
2016 International Journal of Research in Engineering and Technology  
In the previous cryptographic approach, network security is vigorously relied on user attribute based encryption, multiple authorities and cipher text policies to make it more sheltered to some extent.  ...  In this paper, both user attributes and data attributes are used as security credentials. File security is maintained by protecting data and its location.  ...  In proposed approach, mediator is added as kind of user which enhances the security by adding the level in encryption. It provides secured management of user rights through authorities.  ... 
doi:10.15623/ijret.2016.0506093 fatcat:lvhaxcwwsfdn7a65zxfdss4y7i

User-Centric Identity Management Using Trusted Modules [chapter]

Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens
2011 Lecture Notes in Computer Science  
This paper presents a new flexible approach for user-centric identity management, using trusted modules.  ...  Our approach combines several privacy features available in current federated identity management systems and offers extra functionality.  ...  The secure element is the mediator between identity providers and service providers.  ... 
doi:10.1007/978-3-642-22633-5_11 fatcat:juf5p6ydvzaopkumy65intuwvm

A Reputation-Based Identity Management Model for Cloud Computing

Lifa Wu, Shengli Zhou, Zhenji Zhou, Zheng Hong, Kangyu Huang
2015 Mathematical Problems in Engineering  
To solve these problems, we introduce a reputation mechanism and design a reputation-based identity management model for cloud computing.  ...  Meanwhile, malicious users can do harm to cloud providers through the use of pseudonyms.  ...  In this paper, we design a new identity management model based on user reputation, which is herein denoted as reputation-based identity management (RIM).  ... 
doi:10.1155/2015/238245 fatcat:4oxog2xw2re2tl5mvjiyfjuzwq

Privacy-enhancing identity management

Marit Hansen, Peter Berlich, Jan Camenisch, Sebastian Clauß, Andreas Pfitzmann, Michael Waidner
2004 Information Security Technical Report  
Since her diploma in 1995 she has been working on security and privacy aspects especially concerning the Internet, anonymity, pseudonymity, identity management, biometrics, multilateral security, and e-privacy  ...  Through the secure and authenticated use of pseudonyms, accountability of an individual for his or her actions can be achieved without giving away personal data.  ...  "browser chatter", or using encryption programmes.  ... 
doi:10.1016/s1363-4127(04)00014-7 fatcat:c6ga2thbtfdebi7lraonqgvk4i

5G-VRSec: Secure Video Reporting Service in 5G Enabled Vehicular Networks

Sang Guun Yoo
2017 Wireless Communications and Mobile Computing  
Despite an imminent arrival of the 5G communication technology, there are only a few research works done using such technology in the field of vehicular networks.  ...  In addition, it does not contemplate the management of multiple geographic/administrative regions (multiple trusted authorities) which is important in real implementations.  ...  This security mechanism will allow only LEA to manage the mapping of the unique identity of DV and 5G_ID DV .  ... 
doi:10.1155/2017/7256307 fatcat:ppclhhhtgver7czi5dtgagicey

Towards Detecting and Mitigating Conflicts for Privacy and Security Requirements

Duaa Alkubaisy, Karl Cox, Haralambos Mouratidis
2019 2019 13th International Conference on Research Challenges in Information Science (RCIS)  
By using patterns to describe the problem we can propose a solution for each conflict.  ...  We will focus in this study on identification and resolution of conflicts between security and privacy requirements.  ...  Both symmetric and asymmetric algorithms may be used to provide encryption. This kind of encryption works for security requirements (Confidentiality).  ... 
doi:10.1109/rcis.2019.8876999 dblp:conf/rcis/AlkubaisyCM19 fatcat:uctlgqzu6vcrralzirzanjnvz4

User-centric identity management using trusted modules

J. Vossaert, J. Lapon, B. De Decker, V. Naessens
2013 Mathematical and computer modelling  
This paper presents a new flexible approach for user-centric identity management, using trusted modules.  ...  Our approach combines several privacy features available in current federated identity management systems and offers extra functionality.  ...  The secure element is the mediator between identity providers and service providers.  ... 
doi:10.1016/j.mcm.2012.06.010 fatcat:angbjoejd5b67eieos5qyhllsm

An Intelligence Information System based on Service-Oriented Architecture: A Survey of Security Issues

Jugoslav Achkoski, Metodija Dojchinovski, Vladimir Trajkovik
2011 Information & Security An International Journal  
SOAbased systems are characterized with differences in security implementation as encryption, access control, security monitoring, security management through disparate domains etc.  ...  of information security considering authentication, authorization, privacy, integrity, trust, federated identities, confidentiality and more.  ...  An attribute gained from mediating security services can be used in accessing different web sites; • Authentication-based authorization -user attributes are embedded in SAML assertion.  ... 
doi:10.11610/isij.2710 fatcat:2o2n4a7jczekpntowlar4w24iu

A Smart Card Based Solution for User-Centric Identity Management [chapter]

Jan Vossaert, Pieter Verhaeghe, Bart De Decker, Vincent Naessens
2011 IFIP Advances in Information and Communication Technology  
This paper presents a prototype of a previously proposed user-centric identity management system using trusted modules.  ...  The trusted module, implemented using a smart card, can retrieve user attributes from identity providers and offer them to service providers, after authentication.  ...  This paper presents an implementation of a user-centric identity management system based on trusted modules, presented in [15] .  ... 
doi:10.1007/978-3-642-20769-3_14 fatcat:phudscbskzgodbcnttmeweugmm

Recognizing Your Digital Friends [chapter]

Patrik Bichsel, Jan Camenisch, Mario Verdicchio
2012 Security and Privacy in Social Networks  
identity.  ...  Personal relationships are more and more managed over digital communication media, and electronic social networks in particular.  ...  S and R agree on the terms under which the mediator is supposed to decrypt the encrypted attribute value. Verifiable encryption enables pseudonymous DiDs to be passed on.  ... 
doi:10.1007/978-1-4614-4139-7_3 fatcat:qhjc7mui2rck3febjq3itcfqsa

A Distributed Access Control System for Cloud Federations

Shorouq Alansari, Federica Paci, Vladimiro Sassone
2017 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)  
We propose a novel identity and access management system for cloud federations.  ...  It uses blockchain to ensure that users identity attributes and access control policies cannot be modified by a malicious user, while Intel SGX protects the integrity and confidentiality of the policy  ...  In this paper we present an identity and access management system for secure data sharing in cloud federations.  ... 
doi:10.1109/icdcs.2017.241 dblp:conf/icdcs/AlansariPS17 fatcat:pvgu2ui6kjfhzgsgfsz546s2s4

Towards a Collection of Security and Privacy Patterns

Manos Papoutsakis, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis, Konstantina Koloutsou
2021 Applied Sciences  
To this end, the identified patterns are organized using a hierarchical taxonomy that allows their classification based on provided property, context, and generality, while also showing the relationships  ...  the design of IoT solutions that are secure and privacy-aware by design.  ...  more Pseudo Domain(s), where the real identity is secret and pseudonyms are used.  ... 
doi:10.3390/app11041396 fatcat:hdxs2tza7nctdibrxicin6taii
« Previous Showing results 1 — 15 out of 1,688 results