Vote Delegation and Malicious Parties.
Hans GersbachAkaki MamageishviliManvir SchneiderPublished in: IEEE ICBC (2020)
Keyphrases
- access control
- privacy preserving
- malicious behavior
- conflict resolution
- access control systems
- voting schemes
- malicious users
- detect malicious
- security policies
- private data
- role based access control
- semi honest
- cross domain
- partitioned data
- adjustable autonomy
- trust relationships
- insider threat
- malicious attacks
- special case
- pre determined
- management system