A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Guidelines for Secure Operation of Attribute Authorities and other issuers of access-granting statements
2018
Zenodo
These guidelines describe the minimum requirements and recommendations for the secure operation of Attribute Authorities and similar services providing statements for the purpose of obtaining access to ...
Stated compliance with these guidelines may help to establish trust between issuers and Relying Parties. ...
Guidelines for Secure Operation of Attribute Authorities and other issuers of access-granting statements (AARC-G048) ...
doi:10.5281/zenodo.3234925
fatcat:vxmay4cd3jeiladkenwt677hb4
Trust Issues for Vehicular Ad Hoc Networks
2008
VTC Spring 2008 - IEEE Vehicular Technology Conference
As basis for our considerations, we will describe a detailed automotive scenario, which relies on inter-vehicle communication for the exchange of safety relevant warning messages. ...
Characteristics and requirements of vehicular ad hoc networks (VANETs) differ quite significantly compared to standard ad hoc networks. ...
the above trust systems relied on a physically centralized trust system. ...
doi:10.1109/vetecs.2008.611
dblp:conf/vtc/WexBHLD08
fatcat:zlvh7ajj2vhe7ew7vsdww55wde
Electronic Identities Need Private Credentials
2012
IEEE Security and Privacy
The issuer then creates a verifiable token for the specific set of attributes required by the relying party. ...
In our paper-based world, attribute transfer and authentication are often folded into one mechanism. ...
doi:10.1109/msp.2012.7
fatcat:xf6t47z7sffyboumcta67xxhqm
Integrated Environment for Verifying and Running Distributed Components
[chapter]
2016
Lecture Notes in Computer Science
From this point, the user can automatically verify application properties using model-checking techniques. ...
The proposed approach starts from graphical specification formalisms allowing the architectural and behavioral description of component systems. ...
VerCors uses parametrized networks of asynchronous automata (pNets) as an intermediate format for behavior modeling and relies on CADP [2] model-checker to verify temporal properties. ...
doi:10.1007/978-3-662-49665-7_5
fatcat:fxmcskjuj5hdrmdvl2ualri6ze
A Formal Methodology Applied to Secure Over-the-Air Automotive Applications
2011
2011 IEEE Vehicular Technology Conference (VTC Fall)
To address the formal verification of safety properties, we have previously introduced the AVATAR UML profile whose methodology covers requirement, analysis, design, and formal verification stages [1] ...
The paper applies the extended AVATAR to an over-the-air protocol for trusted firmware updates of incar control units, with a special focus on design and formal verification stages. ...
MOTIVATION AND OUTLINE One promising avenue to decrease the number of fatal traffic accidents is to rely on V2X 1 communications [2] . ...
doi:10.1109/vetecf.2011.6093061
dblp:conf/vtc/PedrozaIAR11
fatcat:ckewqwsjqffpvkgu35xstrjmzm
emmy – Trust-Enhancing Authentication Library
2019
Zenodo
Some implementations exist, but either lack functionalities, rely on heavy computational machinery or are not available in open source. ...
Digital credentials can enable to transmit instantly verifiable claims about their name, date of birth, gender, location, accomplishments. ...
On the other hand, verifying identity is cumber-some and often relies on replicated versions of offline systems which are usually imperfect analogues to showing a physical credential to a human verifier ...
doi:10.5281/zenodo.3405858
fatcat:s5so6fn3ufhlnnwzipkksqspxu
A secure channel for attribute-based credentials
2013
Proceedings of the 2013 ACM workshop on Digital identity management - DIM '13
Moreover, as verifiers are not intrinsically authenticated, one can accidentally reveal attributes to the wrong party. ...
By directly applying attribute-disclosure protocols, the data is revealed not only to the verifier, but anyone who has access to the communication channel. ...
The adversary's goal is to win one of two games, i.e., to break one of the following two security properties of the system. ...
doi:10.1145/2517881.2517884
dblp:conf/dim/AlparH13
fatcat:d64hv4lc3ze5vawworkw5wh55u
User centricity
2006
Proceedings of the second ACM workshop on Digital identity management - DIM '06
the properties of a credential-focused FIM system. ...
We distinguish credentialfocused systems, which advocate offline identity providers and long-term credentials at a user's client, and relationship-focused systems, which rely on the relationships between ...
In the case of user-generated tokens, the user should be able to construct tokens which can be verified as valid based on signed attributes present in other user credentials. ...
doi:10.1145/1179529.1179531
dblp:conf/dim/Bhargav-SpantzelCGS06
fatcat:ggvtcqmh2rbzbdeoxae27bqoja
A Survey on Blockchain-based Identity Management and Decentralized Privacy for Personal Data
2020
2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)
The Self-sovereign Identity (SSI) concept, which includes the individual's consolidated digital identity and verified attributes, enables the users of data to exert their ownership and gain insights from ...
However, the current literature still lacks the comprehensive study on components of identity management as well as user privacy and data protection mechanisms in identity management architecture. ...
Self-key [50] and LifeID [51] and Identity systems additionally fulfill provable property of identity system which means the claims of user identity and identity attributes can be verified by collecting ...
doi:10.1109/brains49436.2020.9223312
dblp:conf/brains/GilaniBHC20
fatcat:bqud3palbncrxetmx7g444qrk4
PAAS: A Privacy-Preserving Attribute-Based Authentication System for eHealth Networks
2012
2012 IEEE 32nd International Conference on Distributed Computing Systems
Based on the security and efficiency analysis, we show our framework is better than existing eHealth systems in terms of privacy preservation and practicality. ...
Recently, eHealth systems have replaced paper based medical system due to its prominent features of convenience and accuracy. ...
However, purely relying on the distributed users' attributes cannot fulfill the requirement of verifiability of the isolated attributes. ...
doi:10.1109/icdcs.2012.45
dblp:conf/icdcs/GuoZSF12
fatcat:c6crutpikzc2javxphzirx2qbi
Using SAML to protect the session initiation protocol (SIP)
2006
IEEE Network
The Security Assertion Markup Language (SAML) standard supports the expression of security assertions such as authentication, role membership, or permissions. ...
The security of the SAML-based Web single-sign-on profiles is based on following model. A trust relationship exists between the asserting and relying parties. ...
Property (2) means that no parties faithfully implementing [5, 6] should be relying on SAML assertions (as specified in [5] ) as sufficient in and of themselves to allow access to resources. ...
doi:10.1109/mnet.2006.1705878
fatcat:ju4h2kwh75cfzk3te2wedd5nu4
Attribute-Based Signatures for Supporting Anonymous Certification
[chapter]
2016
Lecture Notes in Computer Science
Third, the derivation of certified attributes by the issuing authority relies on a non interactive protocol which provides an interesting communication overhead. ...
After identifying properties and core building blocks of anonymous certification schemes, we identify ABS limitations to fulfill AC properties, and we propose a new system model along with a concrete mathematical ...
System Model Our new privacy-preserving attribute based signature HABS relies on three procedures based on the following seven algorithms that might involve several users (i.e; signers). ...
doi:10.1007/978-3-319-45744-4_14
fatcat:ojriw23aujfwnd6ehxra3ycaly
An identity provider to manage reliable digital identities for SOA and the web
2010
Proceedings of the 9th Symposium on Identity and Trust on the Internet - IDTRUST '10
In this paper, we describe the implementation of our identity provider, based on open web service standards, which has been extended to distinguish between different qualities of identity attributes; therefore ...
enabling a relying party to distinguish between verified and unverified digital identities. ...
Finally, the identity selector is a piece of software on the user's system which handles the communication between the relying party and the identity provider and provides a consistent user interface to ...
doi:10.1145/1750389.1750393
dblp:conf/idtrust/ThomasM10
fatcat:ng7yscqs7zccves3ldo5tekyyq
Data-Minimizing Authentication Goes Mobile
[chapter]
2012
Lecture Notes in Computer Science
In this paper, we present data-minimizing mobile authentication, which is a kind of attribute-based authentication through the use of anonymous credentials, thereby revealing substantially less personal ...
The prototype uses the Identity Mixer anonymous credential system (Idemix) and realizes short-range communication between the smart phone and the terminal using visual channels over which QR codes are ...
Therefore, our system architecture realizes the attribute-based authentication protocols using visual short-range communication channels based on QRcodes. ...
doi:10.1007/978-3-642-32805-3_5
fatcat:bq2ckt45hnagjjq734dhapd4q4
Coop-DAAB: Cooperative Attribute Based Data Aggregation for Internet of Things Applications
[chapter]
2018
Lecture Notes in Computer Science
In this paper, we propose a Cooperative Data Aggregation solution based on a novel use of Attribute Based signcryption scheme (Coop-DAAB). ...
Thanks to the use of an attribute based signcryption scheme, authenticity of data collected by IoT devices is proved while protecting them from any unauthorized access. ...
Our proposal relies on the constant size attribute based signcryption proposed by Belguith et al. ...
doi:10.1007/978-3-030-02610-3_28
fatcat:jzjv3kela5h7jkxrwzvq42ulce
« Previous
Showing results 1 — 15 out of 157,913 results