Minimizing Information Disclosure in Authentication Transactions with Attribute-Based Credentials

[1]  Bart De Decker,et al.  Automating privacy friendly information disclosure , 2006 .

[2]  Jan Camenisch,et al.  Anonymous yet accountable access control , 2005, WPES '05.

[3]  Sabrina De Capitani di Vimercati,et al.  A privacy-aware access control system , 2008, J. Comput. Secur..

[4]  Ernest F. Brickell,et al.  Direct anonymous attestation , 2004, CCS '04.

[5]  Lujo Bauer,et al.  A Linear Logic of Authorization and Knowledge , 2006, ESORICS.

[6]  Joan Feigenbaum,et al.  The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.

[7]  Joan Feigenbaum,et al.  Delegation logic: A logic-based approach to distributed authorization , 2003, TSEC.

[8]  Sebastian Mödersheim,et al.  A Formal Model of Identity Mixer , 2010, FMICS.

[9]  K.E. Seamons,et al.  Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[10]  N. Asokan,et al.  Optimistic fair exchange of digital signatures , 1998, IEEE Journal on Selected Areas in Communications.

[11]  Ninghui Li,et al.  Automated trust negotiation using cryptographic credentials , 2005, CCS '05.

[12]  Andrew W. Appel,et al.  Proof-carrying authentication , 1999, CCS '99.

[13]  Vijayalakshmi Atluri,et al.  Role-based Access Control , 1992 .

[14]  Pierangela Samarati,et al.  A Uniform Framework for Regulating Service Access and Information Release on the Web , 2002, J. Comput. Secur..

[15]  Andrew D. Gordon,et al.  Design and Semantics of a Decentralized Authorization Language , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).