Preventing Unofficial Information Propagation [chapter]

Zhengyi Le, Yi Ouyang, Yurong Xu, James Ford, Fillia Makedon
2007 Lecture Notes in Computer Science  
Digital copies are susceptible to theft and vulnerable to leakage, copying, or manipulation. When someone (or some group), who has stolen, leaked, copied, or manipulated digital documents propagates the documents over the Internet and/or distributes those through physical distribution channels many challenges arise which document holders must overcome in order to mitigate the impact to their privacy or business. This paper focuses on the propagation problem of digital credentials, which may
more » ... ain sensitive information about a credential holder. Existing work such as access control policies and the Platform for Privacy Preferences (P3P) assumes that qualified or certified credential viewers are honest and reliable. The proposed approach in this paper uses shortlived credentials based on reverse forward secure signatures to remove this assumption and mitigate the damage caused by a dishonest or honest but compromised viewer.
doi:10.1007/978-3-540-77048-0_9 fatcat:mum56frjifbndhjnkwdqarjvsu