Advertisement

Anonymous Context Based Role Activation Mechanism

  • Partha Das Chowdhury
  • Bruce Christianson
  • James Malcolm
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4631)

Abstract

Privacy is not an explicit goal of traditional authorisation mechanisms. The contribution of this paper is an authorisation mechanism which takes identity out of the trust management envelope. Our protocol supports weak versions of anonymity and is useful even if anonymity is not required, due to the ability to weaken trust assumptions.

Keywords

Ring Signature Access Control Policy Trading Server Role Base Access Control Administrative Server 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Belokosztolszki, A.: Role based access control policy administration. Technical Report 586, University of Cambridge (2004)Google Scholar
  2. 2.
    Beresnevichiene, Y.: A role and context based security model. Technical Report 558, University of Cambridge (2003)Google Scholar
  3. 3.
    Diffie, W., Hellman, M.: New Directions In Cryptography. IEEE Transactions on Information Theory 22, 472–492 (1976)CrossRefMathSciNetGoogle Scholar
  4. 4.
    Ferraiolo, D., Sandhu, R., Gavrilla, S., Kuhn, R., Chandramouli, R.: Proposed NIST Standard For Role Based Access Control. ACM Transactions on Information and Systems Security 4(3), 224–274Google Scholar
  5. 5.
    McKurley, K.: A Key Distribution System Equal to Factoring. Journal of Cryptology 1, 95–105 (1988)CrossRefGoogle Scholar
  6. 6.
    Neuman, B.C., Tso’s, T.: Kerberos: An Authentication Service For Computer Networks. IEEE Communications 32(9), 33–38Google Scholar
  7. 7.
    Rivest, R., Shamir, A., Tauman, Y.: How To Leak A Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Partha Das Chowdhury
    • 1
  • Bruce Christianson
    • 1
  • James Malcolm
    • 1
  1. 1.Computer Science Department, University of HertfordshireEngland

Personalised recommendations