Security Protocols
DOI: 10.1007/978-3-540-77156-2_39
|View full text |Cite
|
Sign up to set email alerts
|

Anonymous Context Based Role Activation Mechanism

Abstract: ???The original publication is available at www.springerlink.com???. Copyright Springer. [Full text of this article is not available in the UHRA]Privacy is not an explicit goal of traditional authorisation mechanisms. The contribution of this paper is an authorisation mechanism which takes identity out of the trust management envelope. Our protocol supports weak versions of anonymity and is useful even if anonymity is not required, due to the ability to weaken trust assumptions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 5 publications
(6 reference statements)
0
1
0
Order By: Relevance
“…As argued before [12,11,13,15], institutionalised approaches to security often compel users to enter unwillingly into a trust relationship with large parts of the system infrastructure. In consequence, the user is left without any means to control the risks to which they are exposed.…”
Section: Examining Realised Effectsmentioning
confidence: 99%
“…As argued before [12,11,13,15], institutionalised approaches to security often compel users to enter unwillingly into a trust relationship with large parts of the system infrastructure. In consequence, the user is left without any means to control the risks to which they are exposed.…”
Section: Examining Realised Effectsmentioning
confidence: 99%