Dikē: A Prototype for Secure Delegation of Statistical Data
نویسندگان
چکیده
The need for delegating statistical data arises when the data owner (e.g. statistical office) wants to have its data handled by an external party. If the external party is untrusted and data are confidential, delegation should be performed in a way that preserves security. A cryptographic solution to the secure delegation problem is outlined which provides data secrecy and computation verifiability. Also, the design principles of Dikē —an implementation allowing secure delegation of information over the Internet— are discussed in some detail.
منابع مشابه
An implementable scheme for secure delegation of computing and data
The need for delegating information arises when the data owner wants to have her data handled by an external party. If the external party is untrusted and data are confidential, delegation should be performed in a way that preserves security. Uses of delegation range from public administration to smart cards. In this paper, correctness and security requirements as well as protocols are specifie...
متن کاملAn Implementable Scheme for Secure
The need for delegating information arises when the data owner wants to have her data handled by an external party. If the external party is untrusted and data are conndential, delegation should be performed in a way that preserves security. Uses of delegation range from public administration to smart cards. In this paper, correctness and security requirements as well as protocols are speciied ...
متن کاملScalable Security for High Performance, Petascale Storage
Petabyte scale, high-performance parallel file systems often hold sensitive data and thus require security, but authentication and authorization have the potential to reduce performance dramatically because of the high number of clients and devices, data distribution across both clients and devices, and bursty and demanding workloads. Existing security protocols perform poorly in these environm...
متن کاملSecure Management by Delegation within the Internet Management Framework
This paper discusses the security aspects of the IETF Script MIB which integrates the Management by Delegation Model into the Internet Management Framework. The paper shows how SNMPv3 security mechanisms have been utilized to protect the Script MIB from unauthorized access. This paper also describes the security aspects of a prototype implementation which uses the Java virtual machine as a runt...
متن کاملLimited Delegation for Client-Side SSL
Delegation is the process wherein an entity Alice designates an entity Bob to speak on her behalf. In password-based security systems, delegation is easy: Alice gives Bob her password. In the real world, endusers find this feature rather useful. However, security officers find it infuriating: by sharing her password, Alice gives all of her privileges to Bob, who then becomes indistinguishable f...
متن کامل