Sciweavers

6555 search results - page 5 / 1311
» Secure attribute-based systems
Sort
View
AFRICACRYPT
2009
Springer
14 years 2 months ago
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini
NDSS
2008
IEEE
14 years 1 months ago
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems
Patrick Traynor, Kevin R. B. Butler, William Enck,...
IJNSEC
2010
133views more  IJNSEC 2010»
13 years 2 months ago
Verifiable Attribute Based Encryption
In this paper, we construct two verifiable attribute-based encryption (VABE) schemes. One is with a single authority, and the other is with multi authorities. Not only our schemes ...
Qiang Tang, Dongyao Ji
ARESEC
2011
145views more  ARESEC 2011»
12 years 7 months ago
An Attribute Based Framework for Risk-Adaptive Access Control Models
—The concept of risk-based adaptive access control (RAdAC, pronounced Raid-ack) has been recently introduced in the literature. It seeks to automatically (or semi-automatically) ...
Savith Kandala, Ravi S. Sandhu, Venkata Bhamidipat...