Cryptographically Protected Objects
نویسنده
چکیده
منابع مشابه
Increasing Privacy in Mobile Communication Systems Using Cryptographically Protected Objects
Conndential information contained in the transactional data created in mobile communication systems is not very well protected. We present an approach to protect entire objects against manipulation and disclosure, which allows to retain some control over information handed to a diierent entity or can be used to prevent reverse engineering of an object to obtain its original source. The approach...
متن کاملUsing Sparse Capabilities in a Distributed Operating System
Dept. of Mathematics and Computer Science Vrije Universiteit Amsterdam, The Netherlands Most distributed operating systems constructed to date have lacked a unifying mechanism for naming and protection. In this paper we discuss a system, Amoeba, that uses capabilities for naming and protecting objects. In contrast to traditional, centralized operating systems, in which capabilities are managed ...
متن کاملCryptographically-enforced hierarchical access control with multiple keys
Hierarchical access control policies, in which users and objects are associated with nodes in a hierarchy, can be enforced using cryptographic mechanisms. Protected data is encrypted and authorized users are given the appropriate keys. Lazy re-encryption techniques and temporal hierarchical access control policies require that multiple keys may be associated with a node in the hierarchy. In thi...
متن کاملCryptographically secure multiparty evaluation of system reliability
The precise design of a system may be considered a trade secret which should be protected, whilst at the same time component manufacturers are sometimes reluctant to release full test data (perhaps only providing mean time to failure data). In this situation it seems impractical to both produce an accurate reliability assessment and satisfy all parties’ privacy requirements. However, we present...
متن کاملCryptographically Protected Prefixes for Location Privacy in IPv6
There is a growing concern with preventing unauthorized agents from discovering the geographical location of Internet users, a kind of security called location privacy. The typical deployments of IPv6 in mobile networks allow a correspondent host and any passive eavesdroppers to infer the user’s rough geographical location from the IPv6 address. We present a scheme called Cryptographically Prot...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997