Cryptographically Protected Objects

نویسنده

  • Uwe G. Wilhelm
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Increasing Privacy in Mobile Communication Systems Using Cryptographically Protected Objects

Conndential information contained in the transactional data created in mobile communication systems is not very well protected. We present an approach to protect entire objects against manipulation and disclosure, which allows to retain some control over information handed to a diierent entity or can be used to prevent reverse engineering of an object to obtain its original source. The approach...

متن کامل

Using Sparse Capabilities in a Distributed Operating System

Dept. of Mathematics and Computer Science Vrije Universiteit Amsterdam, The Netherlands Most distributed operating systems constructed to date have lacked a unifying mechanism for naming and protection. In this paper we discuss a system, Amoeba, that uses capabilities for naming and protecting objects. In contrast to traditional, centralized operating systems, in which capabilities are managed ...

متن کامل

Cryptographically-enforced hierarchical access control with multiple keys

Hierarchical access control policies, in which users and objects are associated with nodes in a hierarchy, can be enforced using cryptographic mechanisms. Protected data is encrypted and authorized users are given the appropriate keys. Lazy re-encryption techniques and temporal hierarchical access control policies require that multiple keys may be associated with a node in the hierarchy. In thi...

متن کامل

Cryptographically secure multiparty evaluation of system reliability

The precise design of a system may be considered a trade secret which should be protected, whilst at the same time component manufacturers are sometimes reluctant to release full test data (perhaps only providing mean time to failure data). In this situation it seems impractical to both produce an accurate reliability assessment and satisfy all parties’ privacy requirements. However, we present...

متن کامل

Cryptographically Protected Prefixes for Location Privacy in IPv6

There is a growing concern with preventing unauthorized agents from discovering the geographical location of Internet users, a kind of security called location privacy. The typical deployments of IPv6 in mobile networks allow a correspondent host and any passive eavesdroppers to infer the user’s rough geographical location from the IPv6 address. We present a scheme called Cryptographically Prot...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997