Dikē: A Prototype for Secure Delegation of Statistical Data

نویسندگان

  • Javier Castilla
  • Josep Domingo-Ferrer
  • Ricardo X. Sánchez del Castillo
چکیده

The need for delegating statistical data arises when the data owner (e.g. statistical office) wants to have its data handled by an external party. If the external party is untrusted and data are confidential, delegation should be performed in a way that preserves security. A cryptographic solution to the secure delegation problem is outlined which provides data secrecy and computation verifiability. Also, the design principles of Dikē —an implementation allowing secure delegation of information over the Internet— are discussed in some detail.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An implementable scheme for secure delegation of computing and data

The need for delegating information arises when the data owner wants to have her data handled by an external party. If the external party is untrusted and data are confidential, delegation should be performed in a way that preserves security. Uses of delegation range from public administration to smart cards. In this paper, correctness and security requirements as well as protocols are specifie...

متن کامل

An Implementable Scheme for Secure

The need for delegating information arises when the data owner wants to have her data handled by an external party. If the external party is untrusted and data are conndential, delegation should be performed in a way that preserves security. Uses of delegation range from public administration to smart cards. In this paper, correctness and security requirements as well as protocols are speciied ...

متن کامل

Scalable Security for High Performance, Petascale Storage

Petabyte scale, high-performance parallel file systems often hold sensitive data and thus require security, but authentication and authorization have the potential to reduce performance dramatically because of the high number of clients and devices, data distribution across both clients and devices, and bursty and demanding workloads. Existing security protocols perform poorly in these environm...

متن کامل

Secure Management by Delegation within the Internet Management Framework

This paper discusses the security aspects of the IETF Script MIB which integrates the Management by Delegation Model into the Internet Management Framework. The paper shows how SNMPv3 security mechanisms have been utilized to protect the Script MIB from unauthorized access. This paper also describes the security aspects of a prototype implementation which uses the Java virtual machine as a runt...

متن کامل

Limited Delegation for Client-Side SSL

Delegation is the process wherein an entity Alice designates an entity Bob to speak on her behalf. In password-based security systems, delegation is easy: Alice gives Bob her password. In the real world, endusers find this feature rather useful. However, security officers find it infuriating: by sharing her password, Alice gives all of her privileges to Bob, who then becomes indistinguishable f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004