Abstract
Privacy is not an explicit goal of traditional authorisation mechanisms. The contribution of this paper is an authorisation mechanism which takes identity out of the trust management envelope. Our protocol supports weak versions of anonymity and is useful even if anonymity is not required, due to the ability to weaken trust assumptions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Belokosztolszki, A.: Role based access control policy administration. Technical Report 586, University of Cambridge (2004)
Beresnevichiene, Y.: A role and context based security model. Technical Report 558, University of Cambridge (2003)
Diffie, W., Hellman, M.: New Directions In Cryptography. IEEE Transactions on Information Theory 22, 472–492 (1976)
Ferraiolo, D., Sandhu, R., Gavrilla, S., Kuhn, R., Chandramouli, R.: Proposed NIST Standard For Role Based Access Control. ACM Transactions on Information and Systems Security 4(3), 224–274
McKurley, K.: A Key Distribution System Equal to Factoring. Journal of Cryptology 1, 95–105 (1988)
Neuman, B.C., Tso’s, T.: Kerberos: An Authentication Service For Computer Networks. IEEE Communications 32(9), 33–38
Rivest, R., Shamir, A., Tauman, Y.: How To Leak A Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Das Chowdhury, P., Christianson, B., Malcolm, J. (2007). Anonymous Context Based Role Activation Mechanism. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2005. Lecture Notes in Computer Science, vol 4631. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77156-2_39
Download citation
DOI: https://doi.org/10.1007/978-3-540-77156-2_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77155-5
Online ISBN: 978-3-540-77156-2
eBook Packages: Computer ScienceComputer Science (R0)