Results 1 - 10
of
750
Localization of Credential Information to Address . . .
, 2008
"... Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from databases that store online and/or on-site user transaction data. Collected ID numbers and supporting personal information e ..."
Abstract
- Add to MetaCart
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from databases that store online and/or on-site user transaction data. Collected ID numbers and supporting personal information
Localization of Credential Information to Address Increasingly . . .
, 2008
"... Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from databases that store online and/or on-site user transaction data. Collected ID numbers and supporting personal information e ..."
Abstract
- Add to MetaCart
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from databases that store online and/or on-site user transaction data. Collected ID numbers and supporting personal information
Information Flow in Credential Systems
- IEEE Computer Security Foundations Symposium (CSF
, 2010
"... Abstract-This paper proposes a systematic study of information flow in credential-based declarative authorization policies. It argues that a treatment in terms of information flow is needed to adequately describe, analyze and mitigate a class of probing attacks which allow an adversary to infer any ..."
Abstract
-
Cited by 5 (2 self)
- Add to MetaCart
Abstract-This paper proposes a systematic study of information flow in credential-based declarative authorization policies. It argues that a treatment in terms of information flow is needed to adequately describe, analyze and mitigate a class of probing attacks which allow an adversary to infer
Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation
- ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY
, 2003
"... ... this paper we provide the formal underpinnings for that goal, by formalizing the concepts of negotiation protocols, strategies, and interoperation. We show how to model the information flow of a negotiation, for use in analyzing strategy interoperation. We also present two large sets of strategi ..."
Abstract
-
Cited by 156 (22 self)
- Add to MetaCart
... this paper we provide the formal underpinnings for that goal, by formalizing the concepts of negotiation protocols, strategies, and interoperation. We show how to model the information flow of a negotiation, for use in analyzing strategy interoperation. We also present two large sets
Securely Available Credentials (SACRED)- Credential Server Framework
, 2004
"... Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2004). All Rights Reserved. As the number, and more particularly the numbe ..."
Abstract
- Add to MetaCart
Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2004). All Rights Reserved. As the number, and more particularly
Automated trust negotiation
- In DARPA Information Survivability Conference and Exposition, volume I
, 2000
"... Exchange of attribute credentials is a means to establish mutual trust between strangers wishing to share resources or conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the exchange of sensitive information during this process. It treats credentials as poten ..."
Abstract
-
Cited by 241 (18 self)
- Add to MetaCart
Exchange of attribute credentials is a means to establish mutual trust between strangers wishing to share resources or conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the exchange of sensitive information during this process. It treats credentials
Privacy-Enhanced Credential Services
, 2003
"... The use of credential directories in PKI and authorization systems such as Shibboleth introduces a new privacy risk: an insider at the directory can learn much about otherwise protected interactions by observing who makes queries, and what they ask for. Recent advances in Practical Private Inform ..."
Abstract
-
Cited by 13 (6 self)
- Add to MetaCart
Information Retrieval provide promising countermeasures. In this paper, we extend this technology to solve this new privacy problem, and present a design and preliminary prototype for a LDAP-based credential service that can prevent even an insider from learning anything more than the fact a query was made
Anonymous k-Show Credentials
"... Abstract. Privacy-preserving digital credentials are cryptographic tools that allow a user to prove a predicate about his/her identity or qualifications, without the verifying party learning additional information beyond the status of that predicate. The Identity Mixer (Idemix) [CL01] is a framework ..."
Abstract
- Add to MetaCart
Abstract. Privacy-preserving digital credentials are cryptographic tools that allow a user to prove a predicate about his/her identity or qualifications, without the verifying party learning additional information beyond the status of that predicate. The Identity Mixer (Idemix) [CL01] is a
AUTOMATED TRUST NEGOTIATION USING CRYPTOGRAPHIC CREDENTIALS
, 2005
"... In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Because the information in question is often sensitive, credentials are protected according to access control policies. In ..."
Abstract
-
Cited by 61 (3 self)
- Add to MetaCart
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Because the information in question is often sensitive, credentials are protected according to access control policies
and the Authorized Designee for Credential Recommendations Summary
"... With the implementation of the Commission’s Credential Web Interface Project (CWIP), all institutions (colleges, universities, school districts and county offices of education) will transition from the current online recommendation process to the new system in early 2012. To transition to the new on ..."
Abstract
- Add to MetaCart
). The Authorized Submitter(s) Form CL-897 is available on the Credential Information Guide in the “What’s New ” section. An example of how to complete this form is also attached for your reference. The Authorized Designee must email the completed form using his or her work email address to the Commission
Results 1 - 10
of
750