Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Attribute-based authentication“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Attribute-based authentication" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Attribute-based authentication"
Dolev, Shlomi, Łukasz Krzywiecki, Nisha Panwar und Michael Segal. „Dynamic attribute based vehicle authentication“. Wireless Networks 23, Nr. 4 (30.01.2016): 1045–62. http://dx.doi.org/10.1007/s11276-016-1203-5.
Der volle Inhalt der QuelleZhu, Xianwei, ChaoWen Chang, Qin Xi und ZhiBin Zuo. „Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking“. Security and Communication Networks 2020 (10.01.2020): 1–18. http://dx.doi.org/10.1155/2020/6302739.
Der volle Inhalt der QuelleLakshmiPraveena, T., V. Ramachandran und CH Rupa. „Attribute based Multifactor Authentication for Cloud Applications“. International Journal of Computer Applications 80, Nr. 17 (18.10.2013): 37–40. http://dx.doi.org/10.5120/13971-1474.
Der volle Inhalt der QuelleYoo, Hye-Joung. „Attribute-Based Authentication for Secure Cloud Computing“. Journal of Korean Institute of Information Technology 13, Nr. 1 (31.01.2015): 59. http://dx.doi.org/10.14801/jkiit.2015.13.1.59.
Der volle Inhalt der QuelleUsha, S., und P. Sangeetha. „Multiple Attribute Authority based Access Control and Anonymous Authentication in Decentralized Cloud“. Bonfring International Journal of Data Mining 6, Nr. 3 (30.06.2016): 24–29. http://dx.doi.org/10.9756/bijdm.7019.
Der volle Inhalt der QuelleSu Jeong, Yoon, Yong Tae Kim und Gil Cheol Park. „Attribute-based multiuser authentication scheme between IoT devices for 5G environment“. International Journal of Engineering & Technology 7, Nr. 2.12 (03.04.2018): 11. http://dx.doi.org/10.14419/ijet.v7i2.12.11026.
Der volle Inhalt der QuelleZhang, Zhiqiang, Suzhen Cao, Longbo Han und Xueyan Liu. „Attribute-Based Identity Authentication Scheme Based on Linear Codes“. Journal of Physics: Conference Series 1631 (September 2020): 012139. http://dx.doi.org/10.1088/1742-6596/1631/1/012139.
Der volle Inhalt der QuelleLi, Peng, Junzuo Lai und Yongdong Wu. „Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting“. Security and Communication Networks 2021 (04.08.2021): 1–17. http://dx.doi.org/10.1155/2021/6611518.
Der volle Inhalt der QuelleZeng, Yongbin, Hui Guang und Guangsong Li. „Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks“. Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/8470949.
Der volle Inhalt der QuelleLee, Ji-Seon, und Hyo-Dong Kim. „Attribute-based authentication scheme in IPTV broadcasting system“. Journal of Broadcast Engineering 14, Nr. 3 (30.05.2009): 280–87. http://dx.doi.org/10.5909/jbe.2009.14.3.280.
Der volle Inhalt der QuelleDissertationen zum Thema "Attribute-based authentication"
Khader, Dalia. „Attribute based authentication schemes“. Thesis, University of Bath, 2009. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.500716.
Der volle Inhalt der QuelleSchläger, Christian. „Attribute based infrastructures for authentication and authorisation /“. Lohmar ; Köln : Eul, 2008. http://d-nb.info/987834134/04.
Der volle Inhalt der QuelleStrakoš, Jan. „Atributová autentizace na platformě Android“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442393.
Der volle Inhalt der QuelleDzurenda, Petr. „Kryptografická ochrana digitální identity“. Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403859.
Der volle Inhalt der QuelleAu, Wai Ki Richard. „Agent-based one-shot authorisation scheme in a commercial extranet environment“. Queensland University of Technology, 2005. http://eprints.qut.edu.au/16708/.
Der volle Inhalt der QuelleKouicem, Djamel Eddine. „Sécurité de l’Internet des objets pour les systèmes de systèmes“. Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2518.
Der volle Inhalt der QuelleThe Internet of things (IoT) is a new technology that aims to connect billions of physical devices to the Internet. The components of IoT communicate and collaborate between each other in distributed and dynamic environments, which are facing several security challenges. In addition, the huge number of connected objects and the limitation of their resources make the security in IoT very difficult to achieve. In this thesis, we focus on the application of lightweight cryptographic approaches and blockchain technology to address security problems in IoT, namely : authentication and trust management. First, we were interested on some kind of IoT applications where we need to control remotely the execution of smart actuators using IoT devices. To solve this problem, we proposed an efficient and fine-grained access controlsolution, based on the Attribute Based Encryption (ABE) mechanism and oneway hash chains. Using formal security tools, we demonstrated the security of our scheme against malicious attacks. Second, we tackled the problem of authentication in IoT based fog computing environments. Existing authentication techniques do not consider latency constraints introduced in the context of fog computing architecture. In addition, some of them do not provide mutual authentication between devices and fog servers. To overcome these challenges, we proposed a novel, efficient and lightweight mutual authentication scheme based on blockchain technologyand secret sharing technique. We demonstrated the efficiency of our authentication scheme through extensive simulations. The third problem treated in this work is the trust management in IoT. Existing trust management protocols do not meet the new requirements introduced in IoT such as heterogeneity, mobility and scalability. To address these challenges, we proposed a new scalable trust management protocol based on consortium blockchain technology and fog computing paradigm, with mobility support. Our solution allows IoT devices to accurately assess and share trust recommendations about other devices in a scalable way without referring to any pre-trusted entity. We confirmed the efficiency of our proposal through theoretical analysis and extensive simulations. Finally, we showed that our protocol outperforms existing solutions especially in terms of scalability, mobility support, communication and computation
Imine, Youcef. „Cloud computing security“. Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2520.
Der volle Inhalt der QuelleThese last years, we are witnessing a real digital revolution of Internet where many innovative applications such as Internet of Things, autonomous cars, etc., have emerged. Consequently, adopting externalization technologies such as cloud and fog computing to handle this technological expansion seems to be an inevitable outcome. However, using the cloud or fog computing as a data repository opens many challenges in prospect. This thesis addresses security issues in cloud and fog computing which is a major challenge that need to be appropriately overcomed. Indeed, adopting these technologies means that the users lose control over their own data, which exposes it to several security threats. Therefore, we first investigated the main security issues facing the adoption of cloud and fog computing technologies. As one of the main challenges pointed in our investigation, access control is indeed a cornerstone of data security. An efficient access control mechanism must provide enforced and flexible access policies that ensure data protection, even from the service provider. Hence, we proposed a novel secure and efficient attribute based access control scheme for cloud data-storage applications. Our solution ensures flexible and fine-grained access control and prevents security degradations. Moreover, it performs immediate users and attributes revocation without any key regeneration. Authentication service in fog computing architecture is another issue that we have addressed in this thesis. Some traditional authentication schemes endure latency issues while others do not satisfy fog computing requirements such as mutual authentication between end-devices and fog servers. Thus, we have proposed a new, secure and efficient authentication scheme that ensures mutual authentication at the edge of the network and remedies to fog servers' misbehaviors.Finally, we tackled accountability and privacy-preserving challenges in information-sharing applications for which several proposals in the literature have treated privacy issues, but few of them have considered accountability service. Therefore, we have proposed a novel accountable privacy preserving solution for public information sharing in data externalization platforms. Externalization servers in our scheme authenticate any user in the system without violating its privacy. In case of misbehavior, our solution allows to trace malicious users thanks to an authority
Shih, Wei-Yao, und 施惟堯. „A4: An Authentication, Authorization and Access Control Scheme for Electronic Health Records using Attribute-based Encryption Algorithm“. Thesis, 2016. http://ndltd.ncl.edu.tw/handle/9222vz.
Der volle Inhalt der Quelle國立交通大學
電機工程學系
104
As the rapid development of cloud computing technologies, health records are stored in a cloud system for information sharing and ease access. The electronic health record system running on a cloud needs to preserve the confidentiality and integrity of the health records. Nevertheless, in the current design, a patient can only share his/her health records with a doctor in a single hospital. Therefore, the doctor who needs to refer to the patient's health records in other hospitals may fail to access the records crossing hospitals, and similar examinations need to be reconducted. In this thesis, we propose an Auth, Auz and Access control scheme using Attribute-based encryption (called A4) to secure the confidentiality of the electronic health records transmitted over the Internet. A4 leverages ciphertext-policy attribute-based proxy re-encryption (CP-ABPRE) algorithm to encrypt and decrypt the health records stored in the cloud. A4 is composed of seven phases including "Init", "Reg", "Appoint", "EHRReqI", "EHRReqII", "Condult" and "Diagnosis" phases. The seven phases is to fulfill the health record requests in different scenarios. A4 allows a doctor to access the medical data crossing the hospitals when the doctor has to refer to a patient's health records in a different hospital for better diagnosis. $A^4$ also provides the functionality that allows a doctor to consult with other doctors specializing in different ontologies. By using BAN logic, we demonstrate the $A^4$ is secure enough to fulfill the fundamental security requirements, such as parties authentication and message freshness, etc. We also prove that $A_4$ can resist common attacks, including Replay Attack, Man-in-the-middle Attack, Eavesdropping Attack and DDOS Attack.
(6620474), Denis A. Ulybyshev. „Data Protection in Transit and at Rest with Leakage Detection“. Thesis, 2019.
Den vollen Inhalt der Quelle findenIn service-oriented architecture, services can communicate and share data among themselves. This thesis presents a solution that allows detecting several types of data leakages made by authorized insiders to unauthorized services. My solution provides role-based and attribute-based access control for data so that each service can access only those data subsets for which the service is authorized, considering a context and service’s attributes such as security level of the web browser and trust level of service. My approach provides data protection in transit and at rest for both centralized and peer-to-peer service architectures. The methodology ensures confidentiality and integrity of data, including data stored in untrusted cloud. In addition to protecting data against malicious or curious cloud or database administrators, the capability of running a search through encrypted data, using SQL queries, and building analytics over encrypted data is supported. My solution is implemented in the “WAXEDPRUNE” (Web-based Access to Encrypted Data Processing in Untrusted Environments) project, funded by Northrop Grumman Cybersecurity Research Consortium. WAXEDPRUNE methodology is illustrated in this thesis for two use cases, including a Hospital Information System with secure storage and exchange of Electronic Health Records and a Vehicle-to-Everything communication system with secure exchange of vehicle’s and drivers’ data, as well as data on road events and road hazards.
To help with investigating data leakage incidents in service-oriented architecture, integrity of provenance data needs to be guaranteed. For that purpose, I integrate WAXEDPRUNE with IBM Hyperledger Fabric blockchain network, so that every data access, transfer or update is recorded in a public blockchain ledger, is non-repudiatable and can be verified at any time in the future. The work on this project, called “Blockhub,” is in progress.
Buchteile zum Thema "Attribute-based authentication"
Yang, Huihui, und Vladimir A. Oleshchuk. „A Dynamic Attribute-Based Authentication Scheme“. In Lecture Notes in Computer Science, 106–18. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18681-8_9.
Der volle Inhalt der QuelleCovington, Michael J., Manoj R. Sastry und Deepak J. Manohar. „Attribute-Based Authentication Model for Dynamic Mobile Environments“. In Security in Pervasive Computing, 227–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11734666_17.
Der volle Inhalt der QuelleBrunner, Clemens, Fabian Knirsch und Dominik Engel. „SPROOF: A Decentralized Platform for Attribute-Based Authentication“. In Communications in Computer and Information Science, 1–23. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49443-8_1.
Der volle Inhalt der QuelleYang, Huihui, und Vladimir A. Oleshchuk. „An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees“. In Secure IT Systems, 123–35. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26502-5_9.
Der volle Inhalt der QuelleCamenisch, Jan, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin und Franz-Stefan Preiss. „Concepts and Languages for Privacy-Preserving Attribute-Based Authentication“. In Policies and Research in Identity Management, 34–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37282-7_4.
Der volle Inhalt der QuelleSchläger, Christian, Manuel Sojer, Björn Muschall und Günther Pernul. „Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers“. In E-Commerce and Web Technologies, 132–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11823865_14.
Der volle Inhalt der QuelleZhu, Shuhua, Li Zhan, Hengchang Qiang, Danlong Fu, Wei Sun und Yong Tang. „A Fuzzy Attribute-Based Authentication Scheme on the Basis of Lagrange Polynomial Interpolation“. In Human Centered Computing, 685–92. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15554-8_57.
Der volle Inhalt der QuelleXu, YuHua, und ZhiXin Sun. „Achieving Data Security, Access Control and Authentication of Controllers in Hierarchical Software Defined Networking with Attribute Based Encryption“. In Cyberspace Safety and Security, 203–13. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5_16.
Der volle Inhalt der QuelleYang, Piyi, und Tanveer A. Zia. „An Efficient Attribute-Based Signature with Application to Secure Attribute-Based Messaging System“. In Theory and Practice of Cryptography Solutions for Secure Information Systems, 159–77. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-4030-6.ch007.
Der volle Inhalt der QuelleNamli, Tuncay, und Asuman Dogac. „Using SAML and XACML for Web Service Security&Privacy“. In Securing Web Services, 182–205. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-639-6.ch008.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Attribute-based authentication"
Dolev, Shlomi, Lukasz Krzywiecki, Nisha Panwar und Michael Segal. „Dynamic Attribute Based Vehicle Authentication“. In 2014 IEEE 13th International Symposium on Network Computing and Applications (NCA). IEEE, 2014. http://dx.doi.org/10.1109/nca.2014.5.
Der volle Inhalt der QuelleYun, Jong Pil, Hyoseung Kim und Dong Hoon Lee. „An Improved Fuzzy Attribute-Based Authentication“. In 2015 5th International Conference on IT Convergence and Security (ICITCS). IEEE, 2015. http://dx.doi.org/10.1109/icitcs.2015.7292946.
Der volle Inhalt der QuelleHongbin, Wang, und Ren Yan. „An Attribute-Based Anonymous Authentication Scheme“. In 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT). IEEE, 2013. http://dx.doi.org/10.1109/eidwt.2013.102.
Der volle Inhalt der QuelleHyun-A Park, Dong Hoon Lee und Justin Zhan. „Attribute-based access control using combined authentication technologies“. In 2008 IEEE International Conference on Granular Computing (GrC-2008). IEEE, 2008. http://dx.doi.org/10.1109/grc.2008.4664774.
Der volle Inhalt der QuelleSamangouei, Pouya, Vishal M. Patel und Rama Chellappa. „Attribute-based continuous user authentication on mobile devices“. In 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, 2015. http://dx.doi.org/10.1109/btas.2015.7358748.
Der volle Inhalt der QuelleAghapour, Saeed, Mohammad Hassan Ameri und Javad Mohajeri. „A multi sender attribute-based broadcast authentication scheme“. In 2016 8th International Symposium on Telecommunications (IST). IEEE, 2016. http://dx.doi.org/10.1109/istel.2016.7881787.
Der volle Inhalt der QuelleYang, Huihui, und Vladimir A. Oleshchuk. „Traceable hierarchical attribute-based authentication for the cloud“. In 2015 IEEE Conference on Communications and Network Security (CNS). IEEE, 2015. http://dx.doi.org/10.1109/cns.2015.7346888.
Der volle Inhalt der QuellePremarathne, Uthpala S. „PROAASEL: Prospect theory based continuous authentication attribute selection model“. In 2016 Moratuwa Engineering Research Conference (MERCon). IEEE, 2016. http://dx.doi.org/10.1109/mercon.2016.7480120.
Der volle Inhalt der QuellePonomarev, K. Y., und O. V. Nissenbaum. „Attribute-Based Encryption with Authentication Provider in FIWARE Platform“. In 2018 Dynamics of Systems, Mechanisms and Machines (Dynamics). IEEE, 2018. http://dx.doi.org/10.1109/dynamics.2018.8601461.
Der volle Inhalt der QuellePortnoi, Marcos, und Chien-Chung Shen. „Loc-Auth: Location-enabled authentication through attribute-based encryption“. In 2015 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2015. http://dx.doi.org/10.1109/iccnc.2015.7069321.
Der volle Inhalt der Quelle