Anonymous Context Based Role Activation Mechanism

(Transcript of Discussion)
  • Bruce Christianson
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4631)


I’m going to talk about some of the work that Partha has done for his PhD dissertation. There’s lots more in there, and if you want to read the hardback edition just get in touch with Partha, but what I’m going to talk about today is the bit concerned with anonymous context-based role activation, and anonymous delegation. The protocols we’ll be looking at use surrogates in various forms, but that’s not essential to the plot. I hope to convince you that doing these things anonymously is not only feasible, but can actually be done maintaining auditability and accountability. This approach allows us to separate identity management from trust management, which has the good consequence of allowing us to localise trust in the system infrastructure. That is a good thing — and therefore these mechanisms are useful — even when anonymity isn’t a requirement at all, and we all know perfectly well who everyone is.


Ring Signature Trust Management Drug Dealer Audit Trail Secret Society 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Bruce Christianson
    • 1
  1. 1.Computer Science Department, University of Hertfordshire 

Personalised recommendations