Attribute-Based Access Control

Results: 39



#Item
21Cryptography / Public-key cryptography / Attribute-based encryption / RSA / Ciphertext indistinguishability / Encryption / Key / Authenticated encryption / PERMIS / Ciphertext

Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption ? Jan Camenisch1 , Maria Dubovitskaya1,2 , Robert R. Enderlein1,2 , and Gregory Neven1 2

Add to Reading List

Source URL: www.e7n.ch

Language: English
22

Anonymous Access Control with Attribute-Based Encryption Robert R. Enderlein School of Computer and Communication Sciences

Add to Reading List

Source URL: www.e7n.ch

Language: English
    23Role-based access control / PERMIS / Mandatory access control / EXPRESS / Variable and attribute / Database management system / First-order logic / Security / Computer security / Access control

    Paper Title (use style: paper title)

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2013-06-07 14:08:57
    24Access control / XACML / Authorization / OASIS / Radiant Logic / Universal controls / Security / Computer security / Identity management

    Access Sentinel Authorization Policy Server for Attribute Based Access Control ViewDS Access Sentinel

    Add to Reading List

    Source URL: www.viewds.com

    Language: English
    25RSA / Chosen-ciphertext attack / XTR / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Cipher

    Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†

    Add to Reading List

    Source URL: www.caida.org

    Language: English - Date: 2015-02-04 04:34:32
    26Risk management / Identity management / Actuarial science / XACML / Role-based access control / Risk / PERMIS / Mandatory access control / Discretionary access control / Security / Computer security / Access control

    Towards Attribute-based Access Control Policy Engineering Using Risk∗ Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica, Consiglio Nazionale delle R

    Add to Reading List

    Source URL: wwwold.iit.cnr.it

    Language: English - Date: 2014-09-19 11:36:58
    27XACML / Matrix / Role-based access control / PERMIS / Security / Computer security / Access control

    Towards Policy Engineering for Attribute-based Access Control⋆ Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, and Artsiom Yautsiukhin Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche

    Add to Reading List

    Source URL: wwwold.iit.cnr.it

    Language: English - Date: 2014-09-19 11:36:58
    28Cipher / Chosen-plaintext attack / Broadcast encryption / Chosen-ciphertext attack / RSA / Cramer–Shoup cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Ciphertext

    Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†

    Add to Reading List

    Source URL: research.microsoft.com

    Language: English - Date: 2012-05-29 07:38:50
    29Identity management / Data security / Role-based access control / XACML / Computer network security / Department of Defense Architecture Framework / Security controls / Authentication / Cloud computing / Security / Computer security / Access control

    Attribute Based Access Control (ABAC) Workshop Minutes from July 2013 Workshop

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2013-08-07 10:47:35
    30Access control / Federated identity / Security Assertion Markup Language / Authentication / XACML / Role-based access control / Electronic authentication / OpenID / Federated identity management / Security / Identity management / Computer security

    ATTRIBUTE BASED ACCESS CONTROL Draft February 21, 2014 [removed]

    Add to Reading List

    Source URL: nccoe.nist.gov

    Language: English - Date: 2014-06-30 15:11:20
    UPDATE