Anonymous authentication

Das Chowdhury, P., Malcolm, J. and Christianson, B. (2006) Anonymous authentication. Lecture Notes in Computer Science (LNCS) (Securi). pp. 299-305. ISSN 0302-9743
Copy

The contribution of this paper is a mechanism which links authentication to audit using weak identities and takes identity out of the trust management envelope. Although our protocol supports weaker versions of anonymity it is still useful even if anonymity is not required, due to the ability to reduce trust assumptions which it provides. We illustrate the protocol with an example of authorization in a role based access mechanism.

Full text not available from this repository.

EndNote BibTeX Reference Manager Refer Atom Dublin Core RIOXX2 XML MODS OPENAIRE ASCII Citation METS Data Cite XML OpenURL ContextObject in Span HTML Citation OpenURL ContextObject MPEG-21 DIDL
Export

Downloads