Auswahl der wissenschaftlichen Literatur zum Thema „Attribute-based authentication“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Attribute-based authentication" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Attribute-based authentication"

1

Dolev, Shlomi, Łukasz Krzywiecki, Nisha Panwar, and Michael Segal. "Dynamic attribute based vehicle authentication." Wireless Networks 23, no. 4 (2016): 1045–62. http://dx.doi.org/10.1007/s11276-016-1203-5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Zhu, Xianwei, ChaoWen Chang, Qin Xi, and ZhiBin Zuo. "Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking." Security and Communication Networks 2020 (January 10, 2020): 1–18. http://dx.doi.org/10.1155/2020/6302739.

Der volle Inhalt der Quelle
Annotation:
Software-defined networking (SDN) decouples the control plane from the data plane, offering flexible network configuration and management. Because of this architecture, some security features are missing. On the one hand, because the data plane only has the packet forwarding function, it is impossible to effectively authenticate the data validity. On the other hand, OpenFlow can only match based on network characteristics, and it is impossible to achieve fine-grained access control. In this paper, we aim to develop solutions to guarantee the validity of flow in SDN and present Attribute-Guard,
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

LakshmiPraveena, T., V. Ramachandran, and CH Rupa. "Attribute based Multifactor Authentication for Cloud Applications." International Journal of Computer Applications 80, no. 17 (2013): 37–40. http://dx.doi.org/10.5120/13971-1474.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Yoo, Hye-Joung. "Attribute-Based Authentication for Secure Cloud Computing." Journal of Korean Institute of Information Technology 13, no. 1 (2015): 59. http://dx.doi.org/10.14801/jkiit.2015.13.1.59.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Usha, S., and P. Sangeetha. "Multiple Attribute Authority based Access Control and Anonymous Authentication in Decentralized Cloud." Bonfring International Journal of Data Mining 6, no. 3 (2016): 24–29. http://dx.doi.org/10.9756/bijdm.7019.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Su Jeong, Yoon, Yong Tae Kim, and Gil Cheol Park. "Attribute-based multiuser authentication scheme between IoT devices for 5G environment." International Journal of Engineering & Technology 7, no. 2.12 (2018): 11. http://dx.doi.org/10.14419/ijet.v7i2.12.11026.

Der volle Inhalt der Quelle
Annotation:
Background/Objectives: Due to the development of mobile communication technology, infrastructure construction from 4G to 5G service, which is currently being serviced, is actively under way. In particular, as the types and functions of mobile phones and IoT devices using 5G services are diversified, mutual authentication technology among multiple users is required.Methods/Statistical analysis: In this paper, we propose a multi - user authentication scheme which can efficiently mutually authenticate different types of mobile phones and IoT devices that are provided with 5G service. The proposed
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Zhang, Zhiqiang, Suzhen Cao, Longbo Han, and Xueyan Liu. "Attribute-Based Identity Authentication Scheme Based on Linear Codes." Journal of Physics: Conference Series 1631 (September 2020): 012139. http://dx.doi.org/10.1088/1742-6596/1631/1/012139.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Li, Peng, Junzuo Lai, and Yongdong Wu. "Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting." Security and Communication Networks 2021 (August 4, 2021): 1–17. http://dx.doi.org/10.1155/2021/6611518.

Der volle Inhalt der Quelle
Annotation:
Numerous anonymous authentication schemes are designed to provide efficient authentication services while preserving privacy. Such schemes may easily neglect access control and accountability, which are two requirements that play an important role in some particular environments and applications. Prior designs of attribute-based anonymous authentication schemes did not concentrate on providing full anonymity while at the same time holding public traceability. To address this problem, we formally define and present a new primitive called traceable attribute-based anonymous authentication (TABAA
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Zeng, Yongbin, Hui Guang, and Guangsong Li. "Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks." Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/8470949.

Der volle Inhalt der Quelle
Annotation:
Mobile wireless networks are widely used in our daily lives. Seamless handover occurs frequently and how to guarantee security and efficiency during handover procedure is a major challenge. A handover authentication protocol with nice properties can achieve goals. Protocols proposed in recent years more or less have some security vulnerability. In this paper, we outline security requirements for handover authentication protocols and then propose an anonymous protocol based on a new attribute-based signature scheme. The proposed protocol realizes conditional privacy preserving, user revocation,
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Lee, Ji-Seon, and Hyo-Dong Kim. "Attribute-based authentication scheme in IPTV broadcasting system." Journal of Broadcast Engineering 14, no. 3 (2009): 280–87. http://dx.doi.org/10.5909/jbe.2009.14.3.280.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Attribute-based authentication"

1

Khader, Dalia. "Attribute based authentication schemes." Thesis, University of Bath, 2009. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.500716.

Der volle Inhalt der Quelle
Annotation:
This thesis' major contribution is to propose an attribute based authentication scheme (AAS). An A AS scheme is a new cryptosystem that extends the field of public key cryptography and more precisely digital signatures. An AAS scheme allows a verifier lo decide on the set ol' attributes (b)he would like the signer to possess. The verifier sends the request to a group of possible signers as a monotone boolean expression. Any member with sufficient attributes can sign.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Schläger, Christian. "Attribute based infrastructures for authentication and authorisation /." Lohmar ; Köln : Eul, 2008. http://d-nb.info/987834134/04.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Strakoš, Jan. "Atributová autentizace na platformě Android." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442393.

Der volle Inhalt der Quelle
Annotation:
This master’s thesis focuses on implementation of ABC (Anonymous attribute-based credential) pilot system on the Android platform. The support for attribute authentication on the Android platform is very weak in terms of the number of implementations and needs a special attention. The theoretical part of the thesis describes the cryptographic support on the Android platform, the use of the Android Native Development Kit (NDK) and the Host-Card Emulation (HCE) service. The theoretical part of the thesis also includes a description of attribute authentication schemes, including a pilot RKVAC sys
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Dzurenda, Petr. "Kryptografická ochrana digitální identity." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403859.

Der volle Inhalt der Quelle
Annotation:
Dizertační práce se zabývá kryptografickými schématy zvyšující ochranu soukromí uživatelů v systémech řízení přístupu a sběru dat. V současnosti jsou systémy fyzického řízení přístupu na bázi čipových karet využívány téměř dennodenně většinou z nás, například v zaměstnání, ve veřejné dopravě a v hotelech. Tyto systémy však stále neposkytují dostatečnou kryptografickou ochranu a tedy bezpečnost. Uživatelské identifikátory a klíče lze snadno odposlechnout a padělat. Funkce, které by zajišťovaly ochranu soukromí uživatele, téměř vždy chybí. Proto je zde reálné riziko možného sledovaní lidí, jejic
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Au, Wai Ki Richard. "Agent-based one-shot authorisation scheme in a commercial extranet environment." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16708/.

Der volle Inhalt der Quelle
Annotation:
The enormous growth of the Internet and the World Wide Web has provided the opportunity for an enterprise to extend its boundaries in the global business environment. While commercial functions can be shared among a variety of strategic allies - including business partners and customers, extranets appear to be the cost-effective solution to providing global connectivity for different user groups. Because extranets allow third-party users into corporate networks, they need to be extremely secure and external access needs to be highly controllable. Access control and authorisation mechanisms
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Kouicem, Djamel Eddine. "Sécurité de l’Internet des objets pour les systèmes de systèmes." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2518.

Der volle Inhalt der Quelle
Annotation:
L'internet des objets (IoT) est une nouvelle technologie qui vise à connecter des milliards d'objets physiques à Internet. Ces objets peuvent être engagés dans des relations complexes, notamment la composition et la collaboration avec d'autres systèmes indépendants et hétérogènes, afin de fournir de nouvelles fonctionnalités, conduisant ainsi à ce que l'on appelle les systèmes de systèmes (SoS). Les composants de l'IoT communiquent et collaborent dans des environnements distribués et dynamiques, confrontés à plusieurs problèmes de sécurité de grande ampleur. La sécurité es tconsidérée parmi le
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Imine, Youcef. "Cloud computing security." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2520.

Der volle Inhalt der Quelle
Annotation:
Ces dernières années, nous assistons à une immense révolution numérique de l’internet où de nombreuses applications, innovantes telles que l’internet des objets, les voitures autonomes, etc., ont émergé. Par conséquent, l’adoption des technologies d’externalisations des données, telles que le cloud ou le fog computing, afin de gérer cette expansion technologique semble inévitable. Cependant, l’utilisation du cloud ou du fog computing en tant que plateforme d’externalisation pour le stockage ou le partage des données crée plusieurs défis scientifiques. En effet, externaliser ses données signifi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Shih, Wei-Yao, and 施惟堯. "A4: An Authentication, Authorization and Access Control Scheme for Electronic Health Records using Attribute-based Encryption Algorithm." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/9222vz.

Der volle Inhalt der Quelle
Annotation:
碩士<br>國立交通大學<br>電機工程學系<br>104<br>As the rapid development of cloud computing technologies, health records are stored in a cloud system for information sharing and ease access. The electronic health record system running on a cloud needs to preserve the confidentiality and integrity of the health records. Nevertheless, in the current design, a patient can only share his/her health records with a doctor in a single hospital. Therefore, the doctor who needs to refer to the patient's health records in other hospitals may fail to access the records crossing hospitals, and similar examinations need
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

(6620474), Denis A. Ulybyshev. "Data Protection in Transit and at Rest with Leakage Detection." Thesis, 2019.

Den vollen Inhalt der Quelle finden
Annotation:
<p>In service-oriented architecture, services can communicate and share data among themselves. This thesis presents a solution that allows detecting several types of data leakages made by authorized insiders to unauthorized services. My solution provides role-based and attribute-based access control for data so that each service can access only those data subsets for which the service is authorized, considering a context and service’s attributes such as security level of the web browser and trust level of service. My approach provides data protection in transit and at rest for both centralized
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Attribute-based authentication"

1

Yang, Huihui, and Vladimir A. Oleshchuk. "A Dynamic Attribute-Based Authentication Scheme." In Lecture Notes in Computer Science. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18681-8_9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Covington, Michael J., Manoj R. Sastry, and Deepak J. Manohar. "Attribute-Based Authentication Model for Dynamic Mobile Environments." In Security in Pervasive Computing. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11734666_17.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Brunner, Clemens, Fabian Knirsch, and Dominik Engel. "SPROOF: A Decentralized Platform for Attribute-Based Authentication." In Communications in Computer and Information Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49443-8_1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Yang, Huihui, and Vladimir A. Oleshchuk. "An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees." In Secure IT Systems. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26502-5_9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Camenisch, Jan, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, and Franz-Stefan Preiss. "Concepts and Languages for Privacy-Preserving Attribute-Based Authentication." In Policies and Research in Identity Management. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37282-7_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Schläger, Christian, Manuel Sojer, Björn Muschall, and Günther Pernul. "Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers." In E-Commerce and Web Technologies. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11823865_14.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Zhu, Shuhua, Li Zhan, Hengchang Qiang, Danlong Fu, Wei Sun, and Yong Tang. "A Fuzzy Attribute-Based Authentication Scheme on the Basis of Lagrange Polynomial Interpolation." In Human Centered Computing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15554-8_57.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Xu, YuHua, and ZhiXin Sun. "Achieving Data Security, Access Control and Authentication of Controllers in Hierarchical Software Defined Networking with Attribute Based Encryption." In Cyberspace Safety and Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5_16.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Yang, Piyi, and Tanveer A. Zia. "An Efficient Attribute-Based Signature with Application to Secure Attribute-Based Messaging System." In Theory and Practice of Cryptography Solutions for Secure Information Systems. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-4030-6.ch007.

Der volle Inhalt der Quelle
Annotation:
A set of attributes instead of a single string to represent the signer’s identity is a challenging problem under standard cryptographic assumption in the standard model. Therefore, designing a fully secure (adaptive-predicate unforgeable and perfectly private) Attribute-Based Signature (ABS) that allows a signer to choose a set of attributes is vital. Existing schemes are either too complicated or have only been proved in the generic group model. In this chapter, the authors present an efficient fully secure ABS scheme in the standard model based on q-parallel BDHE assumption, which is more practical than the generic group model used in the previous schemes. The proposed scheme is highly expressive since it allows any signer to specify claim-predicates in terms of any predicate consisting of AND, OR, and Threshold gates over the attributes in the system. ABS has found many important applications in secure communications, such as anonymous authentication systems and attribute-based messaging systems.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Namli, Tuncay, and Asuman Dogac. "Using SAML and XACML for Web Service Security&Privacy." In Securing Web Services. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-639-6.ch008.

Der volle Inhalt der Quelle
Annotation:
Web service technology changes the way of conducting business by opening their services to the whole business world over the networks. This property of Web services makes the security and privacy issues more important since the access to the services becomes easier. Many Web service standards are emerging to make Web services secure and privacy protected. This chapter discusses two of them; SAML (OASIS, 2005) and XACML (OASIS, 2005). SAML is an XML-based framework for communicating user authentication, entitlement, and attribute information. In other words, SAML handles the user authentication and also carries attribute information for authorization (access control). XACML is the complementary standard of OASIS to make the access control decisions. This work is realized within the scope of the IST 027074 SAPHIRE Project which is an intelligent healthcare monitoring and decision support system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Attribute-based authentication"

1

Dolev, Shlomi, Lukasz Krzywiecki, Nisha Panwar, and Michael Segal. "Dynamic Attribute Based Vehicle Authentication." In 2014 IEEE 13th International Symposium on Network Computing and Applications (NCA). IEEE, 2014. http://dx.doi.org/10.1109/nca.2014.5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Yun, Jong Pil, Hyoseung Kim, and Dong Hoon Lee. "An Improved Fuzzy Attribute-Based Authentication." In 2015 5th International Conference on IT Convergence and Security (ICITCS). IEEE, 2015. http://dx.doi.org/10.1109/icitcs.2015.7292946.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Hongbin, Wang, and Ren Yan. "An Attribute-Based Anonymous Authentication Scheme." In 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT). IEEE, 2013. http://dx.doi.org/10.1109/eidwt.2013.102.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Hyun-A Park, Dong Hoon Lee, and Justin Zhan. "Attribute-based access control using combined authentication technologies." In 2008 IEEE International Conference on Granular Computing (GrC-2008). IEEE, 2008. http://dx.doi.org/10.1109/grc.2008.4664774.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Samangouei, Pouya, Vishal M. Patel, and Rama Chellappa. "Attribute-based continuous user authentication on mobile devices." In 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, 2015. http://dx.doi.org/10.1109/btas.2015.7358748.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Aghapour, Saeed, Mohammad Hassan Ameri, and Javad Mohajeri. "A multi sender attribute-based broadcast authentication scheme." In 2016 8th International Symposium on Telecommunications (IST). IEEE, 2016. http://dx.doi.org/10.1109/istel.2016.7881787.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Yang, Huihui, and Vladimir A. Oleshchuk. "Traceable hierarchical attribute-based authentication for the cloud." In 2015 IEEE Conference on Communications and Network Security (CNS). IEEE, 2015. http://dx.doi.org/10.1109/cns.2015.7346888.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Premarathne, Uthpala S. "PROAASEL: Prospect theory based continuous authentication attribute selection model." In 2016 Moratuwa Engineering Research Conference (MERCon). IEEE, 2016. http://dx.doi.org/10.1109/mercon.2016.7480120.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Ponomarev, K. Y., and O. V. Nissenbaum. "Attribute-Based Encryption with Authentication Provider in FIWARE Platform." In 2018 Dynamics of Systems, Mechanisms and Machines (Dynamics). IEEE, 2018. http://dx.doi.org/10.1109/dynamics.2018.8601461.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Portnoi, Marcos, and Chien-Chung Shen. "Loc-Auth: Location-enabled authentication through attribute-based encryption." In 2015 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2015. http://dx.doi.org/10.1109/iccnc.2015.7069321.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!