Bichsel et al., 2014 - Google Patents
An architecture for privacy-ABCsBichsel et al., 2014
- Document ID
- 7074216142336068598
- Author
- Bichsel P
- Camenisch J
- Dubovitskaya M
- Enderlein R
- Krenn S
- Krontiris I
- Lehmann A
- Neven G
- Paquin C
- Preiss F
- Rannenberg K
- Sabouri A
- Publication year
- Publication venue
- Attribute-based Credentials for Trust: Identity in the Information Society
External Links
Snippet
One of the main objectives of the ABC4Trust project was to define a common, unified architecture for Privacy-ABC systems to allow comparing their respective features and combining them into common platforms. The chapter presents an overview of features and …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0807—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP7083892B2 (en) | Mobile authentication interoperability of digital certificates | |
| CA3015695C (en) | Systems and methods for distributed data sharing with asynchronous third-party attestation | |
| Bertino et al. | Identity management: Concepts, technologies, and systems | |
| US8220035B1 (en) | System and method for trusted embedded user interface for authentication | |
| US8555078B2 (en) | Relying party specifiable format for assertion provider token | |
| US8353016B1 (en) | Secure portable store for security skins and authentication information | |
| Ghaffari et al. | Identity and access management using distributed ledger technology: A survey | |
| US20130125222A1 (en) | System and Method for Vetting Service Providers Within a Secure User Interface | |
| Bichsel et al. | An architecture for privacy-ABCs | |
| Mostafa et al. | An identity management scheme for cloud computing: Review, challenges, and future directions | |
| Yeoh et al. | Fast {IDentity} Online with Anonymous Credentials ({{{{{FIDO-AC}}}}}) | |
| Shaik et al. | Advanced Identity Access Management and Blockchain Integration: Techniques, Protocols, and Real-World Applications for Enhancing Security, Privacy, and Scalability in Modern Digital Infrastructures | |
| Schaffner | Analysis and evaluation of blockchain-based self-sovereign identity systems | |
| Bichsel et al. | D2. 2 Architecture for attribute-based credential technologies-final version | |
| Alansari | A blockchain-based approach for secure, transparent and accountable personal data sharing | |
| Lagarde | Security assessment of authentication and authorization mechanisms in ethereum, quorum, hyperledger fabric and corda | |
| Dólera Tormo et al. | Identity management in cloud systems | |
| Polychronaki et al. | Identity management in internet of things with blockchain | |
| Abubakar-Sadiq | Establishing secure and privacy preserving digital identity with self-sovereign identity | |
| Li | Context-aware attribute-based techniques for data security and access control in mobile cloud environment | |
| Tiham et al. | Decentralized identity verification: a blockchain-based framework for self-sovereign identity (SSI) with issuer trust registry | |
| Pärni | On Self-Sovereign Identity: Verifiable Credentials and Presentations with OpenID Connect | |
| Mukta | Privacy Preserving Identity and Credential Management: a blockchain-based solution | |
| Vanella | Evolution of Digital Identity in Europe: Experimenting with the eIDAS 2.0 Framework and the EU Digital Identity Wallet | |
| Masmoudi | Malleable privacy-enhancing-technologies for privacy-preserving identity management systems |