[go: up one dir, main page]

Birgisson et al., 2014 - Google Patents

Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud.

Birgisson et al., 2014

View PDF
Document ID
4854838404438771893
Author
Birgisson A
Politz J
Erlingsson U
Taly A
Vrable M
Lentczner M
Publication year
Publication venue
NDSS

External Links

Snippet

Controlled sharing is fundamental to distributed systems; yet, on the Web, and in the Cloud, sharing is still based on rudimentary mechanisms. More flexible, decentralized cryptographic authorization credentials have not been adopted, largely because their …
Continue reading at dev.ndss-symposium.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Birgisson et al. Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud.
Nordbotten XML and web services security standards
US9397990B1 (en) Methods and systems of generating and using authentication credentials for decentralized authorization in the cloud
Kapil et al. Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective
US9129130B2 (en) Systems and methods for data verification and replay prevention
Ghaffar et al. An improved authentication scheme for remote data access and sharing over cloud storage in cyber-physical-social-systems
Fotiou et al. Access control as a service for the Cloud
Ernest et al. Privacy enhancement scheme (PES) in a blockchain-edge computing environment
Gilda et al. None Shall Pass: A blockchain-based federated identity management system
Purushothama et al. Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud
Piechotta et al. A secure dynamic collaboration environment in a cloud context
Raghunathan et al. Secure agent computation: X. 509 Proxy Certificates in a multi-lingual agent framework
Mythili et al. Enhancing Role Based Access Control with Privacy in Cloud Computing.
Shehu et al. Providing secured access delegation in identity management systems
Kumar et al. Realization of threats and countermeasure in Semantic Web services
Fongen Architecture patterns for a ubiquitous identity management system
Zhu et al. Research on data security access model of cloud computing platform
Waizenegger Data security in multi-tenant environments in the cloud
Myrland Authentication and Authorization in Blind Data Miners
Teng et al. Defending Against Attack on the Cloned: In-Band Active Man-in-the-Middle Detection for the Signal Protocol
Blessing Securing End-to-End Encrypted Systems
Galibus et al. Cloud Storage Security Mechanisms
Helmich et al. Securing End-to-End Encrypted File Sharing Services with the Messaging Layer Security Protocol
Wilson Towards Enhancing Security in Cloud Storage Environments
Helmich et al. Layer Security Protocol