Modern access control models, developed for protecting data from accesses across the Internet, require to verify the identity of users in order to make sure that users have the required permissions for accessing the data. User\u27s identity consists of data, referred to as identity attributes, that encode relevant-security properties of the users. Because identity attributes often convey sensitive information about users, they have to be protected. The Oblivious Commitment-Based Envelope (OCBE) protocols address the protection requirements of both users and service providers. The OCBE protocols makes it possible for a party, referred as sender, to send an encrypted message to a receiver such that the receiver can open the message if and onl...
There is an acceleration of adoption of cloud computing among enterprises. However, moving the infra...
Attribute-based credentials (ABCs) are building blocks for user-centric identity management. They en...
The invention of the Ciphertext-Policy Attribute-Based Encryption scheme opened a new perspective fo...
Modern access control models, developed for protecting data from accesses across the Internet, requi...
Logic access control enforces who can read and write data; the enforcement is typically performed by...
Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data pr...
To ensure the security of sensitive data, people need to encrypt them before uploading them to the p...
Messages addressed to specific users can be decrypted by Key Generation Centre (KGC) by generating t...
The notion of attribute-based encryption (ABE) was proposed as an economical alternative to public-k...
Attribute-based encryption (ABE) cryptographically implements fine-grained access control on data. A...
Abstract—In an open environment such as the Internet, the decision to collaborate with a stranger (e...
In automated trust negotiation, two parties exchange digitally signed credentials that contain attri...
This thesis examines a new approach to attribute-based access control with hidden policies and hidde...
In this paper, we propose an accountable privacy preserving attribute-based framework, called Ins-PA...
Sharing of information is fundamental to modern computing environments across many application domai...
There is an acceleration of adoption of cloud computing among enterprises. However, moving the infra...
Attribute-based credentials (ABCs) are building blocks for user-centric identity management. They en...
The invention of the Ciphertext-Policy Attribute-Based Encryption scheme opened a new perspective fo...
Modern access control models, developed for protecting data from accesses across the Internet, requi...
Logic access control enforces who can read and write data; the enforcement is typically performed by...
Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data pr...
To ensure the security of sensitive data, people need to encrypt them before uploading them to the p...
Messages addressed to specific users can be decrypted by Key Generation Centre (KGC) by generating t...
The notion of attribute-based encryption (ABE) was proposed as an economical alternative to public-k...
Attribute-based encryption (ABE) cryptographically implements fine-grained access control on data. A...
Abstract—In an open environment such as the Internet, the decision to collaborate with a stranger (e...
In automated trust negotiation, two parties exchange digitally signed credentials that contain attri...
This thesis examines a new approach to attribute-based access control with hidden policies and hidde...
In this paper, we propose an accountable privacy preserving attribute-based framework, called Ins-PA...
Sharing of information is fundamental to modern computing environments across many application domai...
There is an acceleration of adoption of cloud computing among enterprises. However, moving the infra...
Attribute-based credentials (ABCs) are building blocks for user-centric identity management. They en...
The invention of the Ciphertext-Policy Attribute-Based Encryption scheme opened a new perspective fo...