• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 750
Next 10 →

Localization of Credential Information to Address . . .

by Mohammad Mannan, P. C. van Oorschot , 2008
"... Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from databases that store online and/or on-site user transaction data. Collected ID numbers and supporting personal information e ..."
Abstract - Add to MetaCart
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from databases that store online and/or on-site user transaction data. Collected ID numbers and supporting personal information

Localization of Credential Information to Address Increasingly . . .

by Mohammad Mannan, P. C. van Oorschot , 2008
"... Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from databases that store online and/or on-site user transaction data. Collected ID numbers and supporting personal information e ..."
Abstract - Add to MetaCart
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from databases that store online and/or on-site user transaction data. Collected ID numbers and supporting personal information

Information Flow in Credential Systems

by Moritz Y Becker - IEEE Computer Security Foundations Symposium (CSF , 2010
"... Abstract-This paper proposes a systematic study of information flow in credential-based declarative authorization policies. It argues that a treatment in terms of information flow is needed to adequately describe, analyze and mitigate a class of probing attacks which allow an adversary to infer any ..."
Abstract - Cited by 5 (2 self) - Add to MetaCart
Abstract-This paper proposes a systematic study of information flow in credential-based declarative authorization policies. It argues that a treatment in terms of information flow is needed to adequately describe, analyze and mitigate a class of probing attacks which allow an adversary to infer

Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation

by Ting Yu, Marianne Winslett, Kent E. Seamons - ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY , 2003
"... ... this paper we provide the formal underpinnings for that goal, by formalizing the concepts of negotiation protocols, strategies, and interoperation. We show how to model the information flow of a negotiation, for use in analyzing strategy interoperation. We also present two large sets of strategi ..."
Abstract - Cited by 156 (22 self) - Add to MetaCart
... this paper we provide the formal underpinnings for that goal, by formalizing the concepts of negotiation protocols, strategies, and interoperation. We show how to model the information flow of a negotiation, for use in analyzing strategy interoperation. We also present two large sets

Securely Available Credentials (SACRED)- Credential Server Framework

by D. Gustafson, M. Just, M. Nystrom , 2004
"... Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2004). All Rights Reserved. As the number, and more particularly the numbe ..."
Abstract - Add to MetaCart
Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2004). All Rights Reserved. As the number, and more particularly

Automated trust negotiation

by William H. Winsborough, Ninghui Li - In DARPA Information Survivability Conference and Exposition, volume I , 2000
"... Exchange of attribute credentials is a means to establish mutual trust between strangers wishing to share resources or conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the exchange of sensitive information during this process. It treats credentials as poten ..."
Abstract - Cited by 241 (18 self) - Add to MetaCart
Exchange of attribute credentials is a means to establish mutual trust between strangers wishing to share resources or conduct business transactions. Automated Trust Negotiation (ATN) is an approach to regulate the exchange of sensitive information during this process. It treats credentials

Privacy-Enhanced Credential Services

by Alex Iliev, Sean Smith , 2003
"... The use of credential directories in PKI and authorization systems such as Shibboleth introduces a new privacy risk: an insider at the directory can learn much about otherwise protected interactions by observing who makes queries, and what they ask for. Recent advances in Practical Private Inform ..."
Abstract - Cited by 13 (6 self) - Add to MetaCart
Information Retrieval provide promising countermeasures. In this paper, we extend this technology to solve this new privacy problem, and present a design and preliminary prototype for a LDAP-based credential service that can prevent even an insider from learning anything more than the fact a query was made

Anonymous k-Show Credentials

by Mohamed Layouni, Hans Vangheluwe
"... Abstract. Privacy-preserving digital credentials are cryptographic tools that allow a user to prove a predicate about his/her identity or qualifications, without the verifying party learning additional information beyond the status of that predicate. The Identity Mixer (Idemix) [CL01] is a framework ..."
Abstract - Add to MetaCart
Abstract. Privacy-preserving digital credentials are cryptographic tools that allow a user to prove a predicate about his/her identity or qualifications, without the verifying party learning additional information beyond the status of that predicate. The Identity Mixer (Idemix) [CL01] is a

AUTOMATED TRUST NEGOTIATION USING CRYPTOGRAPHIC CREDENTIALS

by Jiangtao Li, Ninghui Li, William H. Winsborough , 2005
"... In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Because the information in question is often sensitive, credentials are protected according to access control policies. In ..."
Abstract - Cited by 61 (3 self) - Add to MetaCart
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Because the information in question is often sensitive, credentials are protected according to access control policies

and the Authorized Designee for Credential Recommendations Summary

by unknown authors
"... With the implementation of the Commission’s Credential Web Interface Project (CWIP), all institutions (colleges, universities, school districts and county offices of education) will transition from the current online recommendation process to the new system in early 2012. To transition to the new on ..."
Abstract - Add to MetaCart
). The Authorized Submitter(s) Form CL-897 is available on the Credential Information Guide in the “What’s New ” section. An example of how to complete this form is also attached for your reference. The Authorized Designee must email the completed form using his or her work email address to the Commission
Next 10 →
Results 1 - 10 of 750
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University