Login / Signup
Oblivious Transfer with Hidden Access Control Policies.
Jan Camenisch
Maria Dubovitskaya
Gregory Neven
Gregory M. Zaverucha
Published in:
Public Key Cryptography (2011)
Keyphrases
</>
access control policies
access control
conflict resolution
access control systems
distributed environment
security policies
extended logic programs
fine grained
trust negotiation
security mechanisms
database
incomplete information
security issues
defeasible logic
access requests