Staff View for: Attribute-based credentials for trust :

 Staff view

You must be logged in to Tag Records

Attribute-based credentials for trust : identity in the information society /

Kai Rannenberg, Jan Camenisch, Ahmad Sabouri, editors.

Book Cover
Names: Rannenberg, Kai, | Camenisch, Jan, | Sabouri, Ahmad,
Published: Cham, Switzerland : Springer, [2014]
Topics: Data protection. | Data encryption (Computer science) | Data protection - Law and legislation - European Union countries.
Regions: Europe - European Union countries.
Genres: Electronic books.
Tags: Add


Spaces will separate tags.
Use quotes for multi-word tags.


000 05679cam a2200541 i 4500
001 15001830
005 20160817192850.0
006 m o d
007 cr cnu|||unuuu
008 141229t20142015sz a ob 000 0 eng d
019 |a908083398
020 |a9783319144399|qelectronic bk.
020 |a3319144391|qelectronic bk.
020 |z9783319144382
035 |a(OCoLC)ocn898892854
035 |a(SICdb)2854976
040 |aN$T|beng|erda|epn|cN$T|dGW5XE|dN$T|dOCLCF|dBTCTA|dIDEBK|dCDX|dEBLCP|dILL|dSICdb
049 |aILLA
050 4|aQA76.9.A25
072 7|aCOM|x053000|2bisacsh
082 04|a005.8|223
245 00|aAttribute-based credentials for trust :|bidentity in the information society /|cKai Rannenberg, Jan Camenisch, Ahmad Sabouri, editors.
264 1|aCham, Switzerland :|bSpringer,|c[2014]
264 4|c©2015
300 |a1 online resource (xv, 391 pages) :|billustrations
336 |atext|btxt|2rdacontent
337 |acomputer|bc|2rdamedia
338 |aonline resource|bcr|2rdacarrier
504 |aIncludes bibliographical references.
505 0 |aForeword; Preface; Contents; 1 Introduction; 1.1 Identity Management and its Privacy Issues; 1.2 Privacy-ABCs for Privacy Enhanced Identity Management; 1.3 The ABC4Trust Project Goals; 1.4 Overview of the Pilots; 1.4.1 Online Course Evaluation; 1.4.2 School Community Interaction Platform; References; 2 An Architecture for Privacy-ABCs; 2.1 Concepts and Features of Privacy-ABCs; 2.1.1 User Attributes; 2.1.2 Existing Solutions; 2.1.3 Basic Concepts of Privacy-ABCs; 2.1.3.1 Credentials; 2.1.3.2 Presentation; 2.1.3.3 Key Binding; 2.1.3.4 Pseudonyms; 2.1.3.5 Inspection; 2.1.3.6 Credential Issuance
505 8 |a2.1.3.7 Revocation2.1.4 Security and Privacy Features; 2.1.4.1 Basic Presentation; 2.1.4.2 Key Binding; 2.1.4.3 Advanced Issuance; 2.1.4.4 Pseudonyms; 2.1.4.5 Inspection; 2.1.4.6 Revocation; 2.2 Architecture Highlights; 2.3 Architectural Design; 2.3.1 Overview of the Components; 2.3.1.1 Application Layer; 2.3.1.2 ABCE Layer; 2.3.1.3 Crypto Layer; 2.3.1.4 Storage & Communication Components; 2.4 Deployment of the Architecture; 2.4.1 Setup and Storage; 2.4.2 Presentation of a Token; 2.4.3 Issuance of a Credential; 2.4.3.1 Simple Issuance; 2.4.3.2 Advanced Issuance; 2.4.4 Inspection
505 8 |a2.4.5 Revocation2.5 Language Framework; 2.5.1 Example Scenario; 2.5.2 Credential Specification; 2.5.3 Issuer, Revocation, and System Parameters; 2.5.4 Presentation Policy with Basic Features; 2.5.5 Presentation and Issuance Token; 2.5.6 Presentation Policy with Extended Features; 2.5.7 Interaction with the User Interface; 2.6 Applicability to Existing Identity Infrastructures; 2.6.1 WS-*; 2.6.2 SAML; 2.6.3 OpenID; 2.6.4 OAuth; 2.6.4.1 Authorization grant; 2.6.4.2 Access token; 2.6.5 X.509 PKI; 2.6.6 Integration Summary; 2.7 Trust Relationships in the Ecosystem of Privacy-ABCs
505 8 |a2.7.1 The Meaning of Trust2.7.2 Related Work; 2.7.3 Trust Relationships; 2.7.3.1 Assumptions; 2.7.3.2 Trust by all the parties; 2.7.3.3 Users' Perspective; 2.7.3.4 Verifiers' Perspective; 2.7.3.5 Issuers' Perspective; 2.7.3.6 Inspectors' Perspective; 2.7.3.7 Revocation Authorities' Perspective; 2.8 Policy-based View of the Architecture; References; 3 Cryptographic Protocols Underlying Privacy-ABCs; 3.1 Overview of Cryptographic Architecture; 3.1.1 Key Generation Orchestration; 3.1.2 Presentation Orchestration; 3.1.3 Verification Orchestration; 3.1.4 Issuance Orchestration
505 8 |a3.1.5 Building Blocks3.1.5.1 Proof Interfaces and ZkModules; 3.1.6 Proof Engine; 3.2 Cryptographic Primitives; 3.2.1 Algebraic Background; 3.2.1.1 Groups; 3.2.1.2 Hardness Assumptions; 3.2.2 Zero-Knowledge Proofs of Knowledge; 3.2.2.1 Four Square Range Proof; 3.2.3 Commitment Schemes; 3.2.3.1 Pedersen/Damg˚ard-Fujisaki Commitments; 3.2.4 Blind Signature Schemes; 3.2.4.1 CL-Signatures; 3.2.4.2 Brands Signatures; 3.2.5 Verifiable Encryption; 3.2.5.1 The Camenisch-Shoup Encryption Scheme; 3.2.6 Scope-Exclusive Pseudonyms; 3.2.6.1 Efficient Scope Exclusive Pseudonyms; 3.2.7 Revocation
520 |aThe need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are elegant techniques to provide secure yet privacy-respecting access control. This book addresses the federation and interchangeability of Privacy-ABC technologies. It defines a common, unified architecture for Privacy-ABC systems that allows their respective features to be compared and combined Further, this book presents open reference implementations of selected Privacy-ABC systems and explains how to deploy them i.
588 0 |aOnline resource; title from PDF title page (SpringerLink, viewed January 7, 2015).
650 0|aData protection.
650 0|aData encryption (Computer science)
650 0|aData protection|xLaw and legislation|zEuropean Union countries.
651 7|aEurope|zEuropean Union countries.|2fast|0(OCoLC)fst01269470
655 0|aElectronic books.
700 1 |aRannenberg, Kai,|eeditor.
700 1 |aCamenisch, Jan,|eeditor.
700 1 |aSabouri, Ahmad,|eeditor.
776 08|iPrint version:|aRannenberg, Kai|tAttribute-based Credentials for Trust : Identity in the Information Society|dCham : Springer International Publishing,c2014|z9783319144382
856 40|3SpringerLink|uhttp://proxy.lib.siu.edu/login?url=http://link.springer.com/10.1007/978-3-319-14439-9|zAvailable to current SIUC students, faculty, and staff.
945 |aSpringerLink|bSpringer English/International eBooks 2015 - Full Set
994 |a92|bILL

Staff View for: Attribute-based credentials for trust :