Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
In distributed systems users need to share sensitive objects with others based on the recipients' ability to satisfy a policy. Attribute-Based Encryption (ABE) is a new parad...
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Abstract: Biometric authentication is often considered to enhance identity verification. The use of biometrics also introduces new challenges to protect the privacy of the subjects...
Jeroen Breebaart, Christoph Busch, Justine Grave, ...