An Authentication Federation Proxy Which Conceals Attributes and Authorization Policies Each Other.
Yasuo OkabeTakaaki KomuraHiroyuki SatoKazutsuna YamajiMotonori NakamuraPublished in: COMPSAC Workshops (2016)
Keyphrases
- access control
- role based access control
- access control policies
- security requirements
- fine grained
- security mechanisms
- trust negotiation
- attribute values
- optimal policy
- automated trust negotiation
- biometric authentication
- trusted third party
- multi attribute
- security analysis
- heterogeneous database systems
- security policies
- data sources
- authentication scheme
- identity management
- fragile watermarking
- trust relationships
- image authentication
- security properties