dc.contributor.author | Das Chowdhury, P. | |
dc.contributor.author | Christianson, B. | |
dc.contributor.author | Malcolm, J. | |
dc.date.accessioned | 2009-06-17T11:15:02Z | |
dc.date.available | 2009-06-17T11:15:02Z | |
dc.date.issued | 2005 | |
dc.identifier.citation | Das Chowdhury , P , Christianson , B & Malcolm , J 2005 , ' Anonymous Context Based Role Activation Mechanism ' , Lecture Notes in Computer Science (LNCS) , pp. 315-321 . https://doi.org/10.1007/978-3-540-77156-2_39 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.other | dspace: 2299/3602 | |
dc.identifier.other | ORCID: /0000-0002-3777-7476/work/76728329 | |
dc.identifier.uri | http://hdl.handle.net/2299/3602 | |
dc.description | “The original publication is available at www.springerlink.com”. Copyright Springer. [Full text of this article is not available in the UHRA] | |
dc.description.abstract | Privacy is not an explicit goal of traditional authorisation mechanisms. The contribution of this paper is an authorisation mechanism which takes identity out of the trust management envelope. Our protocol supports weak versions of anonymity and is useful even if anonymity is not required, due to the ability to weaken trust assumptions. | en |
dc.language.iso | eng | |
dc.relation.ispartof | Lecture Notes in Computer Science (LNCS) | |
dc.title | Anonymous Context Based Role Activation Mechanism | en |
dc.contributor.institution | School of Computer Science | |
dc.contributor.institution | Science & Technology Research Institute | |
dc.contributor.institution | Centre for Computer Science and Informatics Research | |
dc.contributor.institution | School of Physics, Engineering & Computer Science | |
dc.description.status | Peer reviewed | |
rioxxterms.versionofrecord | 10.1007/978-3-540-77156-2_39 | |
rioxxterms.type | Journal Article/Review | |
herts.preservation.rarelyaccessed | true | |