Author:
Marillonnet Paul,Laurent Maryline,Ates Mikaël
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Science Applications,Hardware and Architecture,Theoretical Computer Science,Software
Reference43 articles.
1. Paverd A, Martin A, Brown I. Modelling and automatically analysing privacy properties for honest-but-curious adversaries. Technical Report, University of Oxford, 2014. https://www.cs.ox.ac.uk/people/andrew.paverd/casper/casperprivacy-report.pdf, Nov. 2020.
2. De Capitani di Vimercati S, Foresti S, Samarati P. Authorization and access control. In Security, Privacy, and Trust in Modern Data Management, Petković M, Jonker W (eds.), Springer Berlin Heidelberg, 2007, pp.39-53. DOI: https://doi.org/10.1007/978-3-540-69861-6_4.
3. Grassi P A, Galluzzo R, Piccarreta B M, Nadeau E M, Lefkovitz N B, Dinh A T. Attribute metadata: A proposed schema for evaluating federated attributes. Technical Report, NIST Computer Security Resource Center, 2018. https://csrc.nist.gov/publications/detail/nistir/8112/nal,Nov. 2020.
4. Nuñez D, Agudo I. BlindIdM: A privacy-preserving approach for identity management as a service. International Journal of Information Security, 2014. 13(2): 1615-5270. DOI: https://doi.org/10.1007/s10207-014-0230-4.
5. De Montjoye Y A, Shmueli E, Wang S S, Pentland A S. openPDS: Protecting the privacy of metadata through SafeAnswers. PLoS ONE, 2014, 9(7): Article No. e98790. DOI: 10.1371/journal.pone.0098790.