Show simple item record

dc.contributor.authorChristianson, B.
dc.contributor.authorDas Chowdhury, P.
dc.contributor.authorMalcolm, J.
dc.date.accessioned2009-06-17T09:01:50Z
dc.date.available2009-06-17T09:01:50Z
dc.date.issued2005
dc.identifier.citationChristianson , B , Das Chowdhury , P & Malcolm , J 2005 , ' Auditable Anonymous Delegation ' , Lecture Notes in Computer Science (LNCS) , vol. 3803 , pp. 66-76 . https://doi.org/10.1007/11593980_5
dc.identifier.issn0302-9743
dc.identifier.otherdspace: 2299/3595
dc.identifier.otherORCID: /0000-0002-3777-7476/work/76728422
dc.identifier.urihttp://hdl.handle.net/2299/3595
dc.description“The original publication is available at www.springerlink.com”. Copyright Springer. [Full text of this article is not available in the UHRA]
dc.description.abstractThe contribution of this paper is an alternative mechanism for delegation, whereby users can share their credentials in such a way that it is difficult for the delegatee to re-use credentials of the delegator. An auditor in our protocol can link actions to individuals from the audit records but cannot forge audit records. We do not greatly restrict the choice of the delegation model semantics which can be adopted. Although the primary aim of our protocol is to provide support for anonymous delegation, it is still useful even if anonymity is not required at all, because of the ability to weaken trust assumptions.en
dc.language.isoeng
dc.relation.ispartofLecture Notes in Computer Science (LNCS)
dc.titleAuditable Anonymous Delegationen
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionScience & Technology Research Institute
dc.description.statusPeer reviewed
rioxxterms.versionofrecord10.1007/11593980_5
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record