Show simple item record

dc.contributor.authorChristianson, B.
dc.contributor.authorDas Chowdhury, P.
dc.contributor.authorMalcolm, J.
dc.identifier.citationChristianson , B , Das Chowdhury , P & Malcolm , J 2005 , ' Auditable Anonymous Delegation ' , Lecture Notes in Computer Science (LNCS) , vol. 3803 , pp. 66-76 .
dc.identifier.otherdspace: 2299/3595
dc.identifier.otherORCID: /0000-0002-3777-7476/work/76728422
dc.description“The original publication is available at”. Copyright Springer. [Full text of this article is not available in the UHRA]
dc.description.abstractThe contribution of this paper is an alternative mechanism for delegation, whereby users can share their credentials in such a way that it is difficult for the delegatee to re-use credentials of the delegator. An auditor in our protocol can link actions to individuals from the audit records but cannot forge audit records. We do not greatly restrict the choice of the delegation model semantics which can be adopted. Although the primary aim of our protocol is to provide support for anonymous delegation, it is still useful even if anonymity is not required at all, because of the ability to weaken trust assumptions.en
dc.relation.ispartofLecture Notes in Computer Science (LNCS)
dc.titleAuditable Anonymous Delegationen
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionScience & Technology Research Institute
dc.description.statusPeer reviewed
rioxxterms.typeJournal Article/Review

Files in this item


There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record