Birgisson et al., 2014 - Google Patents
Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud.Birgisson et al., 2014
View PDF- Document ID
- 4854838404438771893
- Author
- Birgisson A
- Politz J
- Erlingsson U
- Taly A
- Vrable M
- Lentczner M
- Publication year
- Publication venue
- NDSS
External Links
Snippet
Controlled sharing is fundamental to distributed systems; yet, on the Web, and in the Cloud, sharing is still based on rudimentary mechanisms. More flexible, decentralized cryptographic authorization credentials have not been adopted, largely because their …
- 235000014510 cooky 0 title description 14
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Birgisson et al. | Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud. | |
Nordbotten | XML and web services security standards | |
US9397990B1 (en) | Methods and systems of generating and using authentication credentials for decentralized authorization in the cloud | |
Kapil et al. | Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective | |
US9129130B2 (en) | Systems and methods for data verification and replay prevention | |
Ghaffar et al. | An improved authentication scheme for remote data access and sharing over cloud storage in cyber-physical-social-systems | |
Fotiou et al. | Access control as a service for the Cloud | |
Ernest et al. | Privacy enhancement scheme (PES) in a blockchain-edge computing environment | |
Gilda et al. | None Shall Pass: A blockchain-based federated identity management system | |
Purushothama et al. | Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud | |
Piechotta et al. | A secure dynamic collaboration environment in a cloud context | |
Raghunathan et al. | Secure agent computation: X. 509 Proxy Certificates in a multi-lingual agent framework | |
Mythili et al. | Enhancing Role Based Access Control with Privacy in Cloud Computing. | |
Shehu et al. | Providing secured access delegation in identity management systems | |
Kumar et al. | Realization of threats and countermeasure in Semantic Web services | |
Fongen | Architecture patterns for a ubiquitous identity management system | |
Zhu et al. | Research on data security access model of cloud computing platform | |
Waizenegger | Data security in multi-tenant environments in the cloud | |
Myrland | Authentication and Authorization in Blind Data Miners | |
Teng et al. | Defending Against Attack on the Cloned: In-Band Active Man-in-the-Middle Detection for the Signal Protocol | |
Blessing | Securing End-to-End Encrypted Systems | |
Galibus et al. | Cloud Storage Security Mechanisms | |
Helmich et al. | Securing End-to-End Encrypted File Sharing Services with the Messaging Layer Security Protocol | |
Wilson | Towards Enhancing Security in Cloud Storage Environments | |
Helmich et al. | Layer Security Protocol |