13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007) 2007
DOI: 10.1109/rtcsa.2007.11
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 5 publications
0
10
0
Order By: Relevance
“…4 propose that pseudonyms should be changed within a MIX zone , in order to hide the identity of a user belonging to a group of users with similar characteristics. In another work 9, it is suggested that user's sensitive (context) data are encrypted by the user and stored at server side to ensure context privacy.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…4 propose that pseudonyms should be changed within a MIX zone , in order to hide the identity of a user belonging to a group of users with similar characteristics. In another work 9, it is suggested that user's sensitive (context) data are encrypted by the user and stored at server side to ensure context privacy.…”
Section: Related Workmentioning
confidence: 99%
“…Naturally, there is a tradeoff between user privacy and access control in PCEs 8, 9. From the user's point of view, a privacy adversary should not be able to: (a) trace the real identity of the user, (b) link different sessions between the user and the system, and (c) obtain context information (e.g., location, time and duration, and type of service).…”
Section: Introductionmentioning
confidence: 99%
“…Recently, a number of security protocols for privacy-preserving access control in PCEs have been proposed [9,26,1,10,27,28]. A representative scheme of this category is the RL scheme [1], which was the first attempt to provide a secure communication model for privacy-preserving access control in PCEs.…”
Section: Related Workmentioning
confidence: 99%
“…In [27,28] the RL scheme is tweaked to increase performance while in [28], an impersonation attack against the RL scheme was described and addressed. Finally, the work in [10] where non-unique temporal IDs are issued by the access point to system users, achieves authentication and unlikability against back-end authorities, but fails to establish accountability and untraceability against front-end entities.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation