157,913 Hits in 7.5 sec

Guidelines for Secure Operation of Attribute Authorities and other issuers of access-granting statements

David L. Groep, David Kelsey, Hannah Short, Mischa Sallé, Uros Stevanovic, Stefan Paetow, Maarten Kremers
2018 Zenodo  
These guidelines describe the minimum requirements and recommendations for the secure operation of Attribute Authorities and similar services providing statements for the purpose of obtaining access to  ...  Stated compliance with these guidelines may help to establish trust between issuers and Relying Parties.  ...  Guidelines for Secure Operation of Attribute Authorities and other issuers of access-granting statements (AARC-G048)  ... 
doi:10.5281/zenodo.3234925 fatcat:vxmay4cd3jeiladkenwt677hb4

Trust Issues for Vehicular Ad Hoc Networks

Philipp Wex, Jochen Breuer, Albert Held, Tim Leinmuller, Luca Delgrossi
2008 VTC Spring 2008 - IEEE Vehicular Technology Conference  
As basis for our considerations, we will describe a detailed automotive scenario, which relies on inter-vehicle communication for the exchange of safety relevant warning messages.  ...  Characteristics and requirements of vehicular ad hoc networks (VANETs) differ quite significantly compared to standard ad hoc networks.  ...  the above trust systems relied on a physically centralized trust system.  ... 
doi:10.1109/vetecs.2008.611 dblp:conf/vtc/WexBHLD08 fatcat:zlvh7ajj2vhe7ew7vsdww55wde

Electronic Identities Need Private Credentials

J. Camenisch, A. Lehmann, G. Neven
2012 IEEE Security and Privacy  
The issuer then creates a verifiable token for the specific set of attributes required by the relying party.  ...  In our paper-based world, attribute transfer and authentication are often folded into one mechanism.  ... 
doi:10.1109/msp.2012.7 fatcat:xf6t47z7sffyboumcta67xxhqm

Integrated Environment for Verifying and Running Distributed Components [chapter]

Ludovic Henrio, Oleksandra Kulankhina, Siqi Li, Eric Madelaine
2016 Lecture Notes in Computer Science  
From this point, the user can automatically verify application properties using model-checking techniques.  ...  The proposed approach starts from graphical specification formalisms allowing the architectural and behavioral description of component systems.  ...  VerCors uses parametrized networks of asynchronous automata (pNets) as an intermediate format for behavior modeling and relies on CADP [2] model-checker to verify temporal properties.  ... 
doi:10.1007/978-3-662-49665-7_5 fatcat:fxmcskjuj5hdrmdvl2ualri6ze

A Formal Methodology Applied to Secure Over-the-Air Automotive Applications

Gabriel Pedroza, Muhammad Sabir Idrees, Ludovic Apvrille, Yves Roudier
2011 2011 IEEE Vehicular Technology Conference (VTC Fall)  
To address the formal verification of safety properties, we have previously introduced the AVATAR UML profile whose methodology covers requirement, analysis, design, and formal verification stages [1]  ...  The paper applies the extended AVATAR to an over-the-air protocol for trusted firmware updates of incar control units, with a special focus on design and formal verification stages.  ...  MOTIVATION AND OUTLINE One promising avenue to decrease the number of fatal traffic accidents is to rely on V2X 1 communications [2] .  ... 
doi:10.1109/vetecf.2011.6093061 dblp:conf/vtc/PedrozaIAR11 fatcat:ckewqwsjqffpvkgu35xstrjmzm

emmy – Trust-Enhancing Authentication Library

Miha Stopar, Manca Bizjak, Jolanda Modic, Jan Hartman, Anže Žitnik, Tilen Marc
2019 Zenodo  
Some implementations exist, but either lack functionalities, rely on heavy computational machinery or are not available in open source.  ...  Digital credentials can enable to transmit instantly verifiable claims about their name, date of birth, gender, location, accomplishments.  ...  On the other hand, verifying identity is cumber-some and often relies on replicated versions of offline systems which are usually imperfect analogues to showing a physical credential to a human verifier  ... 
doi:10.5281/zenodo.3405858 fatcat:s5so6fn3ufhlnnwzipkksqspxu

A secure channel for attribute-based credentials

Gergely Alpár, Jaap-Henk Hoepman
2013 Proceedings of the 2013 ACM workshop on Digital identity management - DIM '13  
Moreover, as verifiers are not intrinsically authenticated, one can accidentally reveal attributes to the wrong party.  ...  By directly applying attribute-disclosure protocols, the data is revealed not only to the verifier, but anyone who has access to the communication channel.  ...  The adversary's goal is to win one of two games, i.e., to break one of the following two security properties of the system.  ... 
doi:10.1145/2517881.2517884 dblp:conf/dim/AlparH13 fatcat:d64hv4lc3ze5vawworkw5wh55u

User centricity

Abhilasha Bhargav-Spantzely, Jan Camenisch, Thomas Gross, Dieter Sommer
2006 Proceedings of the second ACM workshop on Digital identity management - DIM '06  
the properties of a credential-focused FIM system.  ...  We distinguish credentialfocused systems, which advocate offline identity providers and long-term credentials at a user's client, and relationship-focused systems, which rely on the relationships between  ...  In the case of user-generated tokens, the user should be able to construct tokens which can be verified as valid based on signed attributes present in other user credentials.  ... 
doi:10.1145/1179529.1179531 dblp:conf/dim/Bhargav-SpantzelCGS06 fatcat:ggvtcqmh2rbzbdeoxae27bqoja

A Survey on Blockchain-based Identity Management and Decentralized Privacy for Personal Data

Komal Gilani, Emmanuel Bertin, Julien Hatin, Noel Crespi
2020 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)  
The Self-sovereign Identity (SSI) concept, which includes the individual's consolidated digital identity and verified attributes, enables the users of data to exert their ownership and gain insights from  ...  However, the current literature still lacks the comprehensive study on components of identity management as well as user privacy and data protection mechanisms in identity management architecture.  ...  Self-key [50] and LifeID [51] and Identity systems additionally fulfill provable property of identity system which means the claims of user identity and identity attributes can be verified by collecting  ... 
doi:10.1109/brains49436.2020.9223312 dblp:conf/brains/GilaniBHC20 fatcat:bqud3palbncrxetmx7g444qrk4

PAAS: A Privacy-Preserving Attribute-Based Authentication System for eHealth Networks

Linke Guo, Chi Zhang, Jinyuan Sun, Yuguang Fang
2012 2012 IEEE 32nd International Conference on Distributed Computing Systems  
Based on the security and efficiency analysis, we show our framework is better than existing eHealth systems in terms of privacy preservation and practicality.  ...  Recently, eHealth systems have replaced paper based medical system due to its prominent features of convenience and accuracy.  ...  However, purely relying on the distributed users' attributes cannot fulfill the requirement of verifiability of the isolated attributes.  ... 
doi:10.1109/icdcs.2012.45 dblp:conf/icdcs/GuoZSF12 fatcat:c6crutpikzc2javxphzirx2qbi

Using SAML to protect the session initiation protocol (SIP)

H. Tschofenig, R. Falk, J. Peterson, J. Hodges, D. Sicker, J. Polk
2006 IEEE Network  
The Security Assertion Markup Language (SAML) standard supports the expression of security assertions such as authentication, role membership, or permissions.  ...  The security of the SAML-based Web single-sign-on profiles is based on following model. A trust relationship exists between the asserting and relying parties.  ...  Property (2) means that no parties faithfully implementing [5, 6] should be relying on SAML assertions (as specified in [5] ) as sufficient in and of themselves to allow access to resources.  ... 
doi:10.1109/mnet.2006.1705878 fatcat:ju4h2kwh75cfzk3te2wedd5nu4

Attribute-Based Signatures for Supporting Anonymous Certification [chapter]

Nesrine Kaaniche, Maryline Laurent
2016 Lecture Notes in Computer Science  
Third, the derivation of certified attributes by the issuing authority relies on a non interactive protocol which provides an interesting communication overhead.  ...  After identifying properties and core building blocks of anonymous certification schemes, we identify ABS limitations to fulfill AC properties, and we propose a new system model along with a concrete mathematical  ...  System Model Our new privacy-preserving attribute based signature HABS relies on three procedures based on the following seven algorithms that might involve several users (i.e; signers).  ... 
doi:10.1007/978-3-319-45744-4_14 fatcat:ojriw23aujfwnd6ehxra3ycaly

An identity provider to manage reliable digital identities for SOA and the web

Ivonne Thomas, Christoph Meinel
2010 Proceedings of the 9th Symposium on Identity and Trust on the Internet - IDTRUST '10  
In this paper, we describe the implementation of our identity provider, based on open web service standards, which has been extended to distinguish between different qualities of identity attributes; therefore  ...  enabling a relying party to distinguish between verified and unverified digital identities.  ...  Finally, the identity selector is a piece of software on the user's system which handles the communication between the relying party and the identity provider and provides a consistent user interface to  ... 
doi:10.1145/1750389.1750393 dblp:conf/idtrust/ThomasM10 fatcat:ng7yscqs7zccves3ldo5tekyyq

Data-Minimizing Authentication Goes Mobile [chapter]

Patrik Bichsel, Jan Camenisch, Bart De Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer
2012 Lecture Notes in Computer Science  
In this paper, we present data-minimizing mobile authentication, which is a kind of attribute-based authentication through the use of anonymous credentials, thereby revealing substantially less personal  ...  The prototype uses the Identity Mixer anonymous credential system (Idemix) and realizes short-range communication between the smart phone and the terminal using visual channels over which QR codes are  ...  Therefore, our system architecture realizes the attribute-based authentication protocols using visual short-range communication channels based on QRcodes.  ... 
doi:10.1007/978-3-642-32805-3_5 fatcat:bq2ckt45hnagjjq734dhapd4q4

Coop-DAAB: Cooperative Attribute Based Data Aggregation for Internet of Things Applications [chapter]

Sana Belguith, Nesrine Kaaniche, Mohamed Mohamed, Giovanni Russello
2018 Lecture Notes in Computer Science  
In this paper, we propose a Cooperative Data Aggregation solution based on a novel use of Attribute Based signcryption scheme (Coop-DAAB).  ...  Thanks to the use of an attribute based signcryption scheme, authenticity of data collected by IoT devices is proved while protecting them from any unauthorized access.  ...  Our proposal relies on the constant size attribute based signcryption proposed by Belguith et al.  ... 
doi:10.1007/978-3-030-02610-3_28 fatcat:jzjv3kela5h7jkxrwzvq42ulce
« Previous Showing results 1 — 15 out of 157,913 results