Sciweavers

282 search results - page 23 / 57
» Private Policy Negotiation
Sort
View
CCS
2006
ACM
13 years 11 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
EUROPKI
2007
Springer
13 years 11 months ago
OpenHSM: An Open Key Life Cycle Protocol for Public Key Infrastructure's Hardware Security Modules
Abstract. The private keys used in a PKI are its most important asset. Protect these keys from unauthorised use or disclosure is essential to secure a PKI. Relying parties need ass...
Jean Everson Martina, Túlio Cicero Salvaro ...
ICWS
2007
IEEE
13 years 8 months ago
Privacy-Aware Web Service Protocol Replaceability
Business protocols are becoming a necessary part of Web services description [4]. The work presented in [4] investigates mechanisms for analyzing the compatibility and the substit...
Nawal Guermouche, Salima Benbernou, Emmanuel Coque...
MEDES
2010
ACM
13 years 2 months ago
Negotiating and delegating obligations
In this paper, we describe a security model where users are allowed to control their obligations partially or totally, depending on the security policy. The main motivation of our...
Meriam Ben-Ghorbel-Talbi, Frédéric C...
ARGMAS
2008
Springer
13 years 9 months ago
A Dialogue Mechanism for Public Argumentation Using Conversation Policies
In this paper, we propose a flexible dialogue mechanism through which a set of agents can establish a coherent set of public beliefs. Flexibility and coherence are achieved by dec...
Yuqing Tang, Simon Parsons