Privacy Preserving Attribute Aggregation Method without Shared Identifier Binding

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Privacy-preserving Attribute Aggregation in Federated eID Systems

In: S. España, M. Ivanović, M. Savić (eds.): Proceedings of the CAiSE’16 Forum at the 28th International Conference on Advanced Information Systems Engineering, Ljubljana, Slovenia, 13-17.6.2016, published at http://ceur-ws.org Abstract. During the past years, achieving interoperability, i.e. creating identity federations, between different eID systems has gained relevance. A key problem of ide...

متن کامل

Privacy-Preserving Network Aggregation

Consider the scenario where information about a large network is distributed across several different parties (examples may include Facebook social networks or email communications networks). Intuitively, we would expect that the aggregate network formed by combining the individual private networks would be a more faithful representation of the underlying network as a whole. Thus, it would be u...

متن کامل

Privacy-preserving Attribute Based Searchable Encryption

Attribute Based Encryption (ABE) is a promising public-key cryptographic primitive that can be used for cryptographically enforced access control in untrusted storage. Storing data on untrusted storage not only requires data security for data owners but also poses data protection from untrusted storage server. To address this important requirement, Anonymous Attribute Based Encryption (AABE) is...

متن کامل

Privacy-Preserving Auditing for Attribute-Based Credentials

Privacy-enhancing attribute-based credentials (PABCs) allow users to authenticate to verifiers in a data-minimizing way, in the sense that users are unlinkable between authentications and only disclose those attributes from their credentials that are relevant to the verifier. We propose a practical scheme to apply the same data minimization principle when the verifiers’ authentication logs are ...

متن کامل

Preserving privacy in shared provenance data

Provenance management still lacks robust models for sharing provenance data between multiple parties while keeping parts of it private to the owner. This limits the potential for provenance dissemination, which is a critical step in enabling data sharing amongst partners with limited a priori mutual trust. In turn, this has a negative impact on data-intensive science and its associated research...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Processing

سال: 2014

ISSN: 1882-6652

DOI: 10.2197/ipsjjip.22.472