[go: up one dir, main page]

Bichsel et al., 2014 - Google Patents

An architecture for privacy-ABCs

Bichsel et al., 2014

Document ID
7074216142336068598
Author
Bichsel P
Camenisch J
Dubovitskaya M
Enderlein R
Krenn S
Krontiris I
Lehmann A
Neven G
Paquin C
Preiss F
Rannenberg K
Sabouri A
Publication year
Publication venue
Attribute-based Credentials for Trust: Identity in the Information Society

External Links

Snippet

One of the main objectives of the ABC4Trust project was to define a common, unified architecture for Privacy-ABC systems to allow comparing their respective features and combining them into common platforms. The chapter presents an overview of features and …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0807Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer

Similar Documents

Publication Publication Date Title
JP7083892B2 (en) Mobile authentication interoperability of digital certificates
CA3015695C (en) Systems and methods for distributed data sharing with asynchronous third-party attestation
Bertino et al. Identity management: Concepts, technologies, and systems
US8220035B1 (en) System and method for trusted embedded user interface for authentication
US8555078B2 (en) Relying party specifiable format for assertion provider token
US8353016B1 (en) Secure portable store for security skins and authentication information
Ghaffari et al. Identity and access management using distributed ledger technology: A survey
US20130125222A1 (en) System and Method for Vetting Service Providers Within a Secure User Interface
Bichsel et al. An architecture for privacy-ABCs
Mostafa et al. An identity management scheme for cloud computing: Review, challenges, and future directions
Yeoh et al. Fast {IDentity} Online with Anonymous Credentials ({{{{{FIDO-AC}}}}})
Shaik et al. Advanced Identity Access Management and Blockchain Integration: Techniques, Protocols, and Real-World Applications for Enhancing Security, Privacy, and Scalability in Modern Digital Infrastructures
Schaffner Analysis and evaluation of blockchain-based self-sovereign identity systems
Bichsel et al. D2. 2 Architecture for attribute-based credential technologies-final version
Alansari A blockchain-based approach for secure, transparent and accountable personal data sharing
Lagarde Security assessment of authentication and authorization mechanisms in ethereum, quorum, hyperledger fabric and corda
Dólera Tormo et al. Identity management in cloud systems
Polychronaki et al. Identity management in internet of things with blockchain
Abubakar-Sadiq Establishing secure and privacy preserving digital identity with self-sovereign identity
Li Context-aware attribute-based techniques for data security and access control in mobile cloud environment
Tiham et al. Decentralized identity verification: a blockchain-based framework for self-sovereign identity (SSI) with issuer trust registry
Pärni On Self-Sovereign Identity: Verifiable Credentials and Presentations with OpenID Connect
Mukta Privacy Preserving Identity and Credential Management: a blockchain-based solution
Vanella Evolution of Digital Identity in Europe: Experimenting with the eIDAS 2.0 Framework and the EU Digital Identity Wallet
Masmoudi Malleable privacy-enhancing-technologies for privacy-preserving identity management systems