Assessing the Solid Protocol in Relation to Security & Privacy Obligations.
Christian EspositoOlaf HartigRoss HorneChang SunPublished in: CoRR (2022)
Keyphrases
- secure multiparty computation
- rfid systems
- authentication protocol
- mutual authentication
- cryptographic protocols
- homomorphic encryption
- security properties
- privacy preserving
- security issues
- security analysis
- security protocols
- security services
- security concerns
- privacy protection
- trusted third party
- semi honest
- statistical databases
- security requirements
- security mechanisms
- privacy issues
- data sharing
- user privacy
- security and privacy issues
- data security
- rfid tags
- key agreement protocol
- preserving privacy
- smart card
- personal information
- security problems
- identity management
- electronic transactions
- security risks
- confidential information
- privacy requirements
- security model
- deontic logic
- access control
- lightweight
- rfid technology
- public key
- security threats
- key exchange protocol
- standard model
- privacy preserving data mining
- encryption scheme
- data privacy
- key management
- diffie hellman
- personal data
- provably secure
- privacy concerns
- security measures
- private information
- electronic commerce
- intrusion detection
- biometric template
- sensitive information
- privacy enhancing