Assessing the Solid Protocol in Relation to Security and Privacy Obligations.
Christian EspositoRoss HorneLivio RobaldoBart BuelensElfi GoesaertPublished in: Inf. (2023)
Keyphrases
- secure multiparty computation
- rfid systems
- authentication protocol
- mutual authentication
- privacy preserving
- cryptographic protocols
- security properties
- homomorphic encryption
- semi honest
- security issues
- security analysis
- security protocols
- security services
- trusted third party
- security concerns
- statistical databases
- privacy protection
- security mechanisms
- rfid tags
- sensitive data
- user privacy
- security requirements
- security and privacy issues
- encryption scheme
- data privacy
- key agreement protocol
- security measures
- smart card
- privacy preserving data mining
- key distribution
- privacy concerns
- security risks
- security problems
- key exchange protocol
- preserving privacy
- privacy issues
- electronic transactions
- security model
- rfid technology
- data sharing
- identity management
- vertically partitioned data
- private key
- communication protocols
- confidential information
- privacy requirements
- key management
- public key
- private information
- lightweight
- diffie hellman
- information security
- personal information
- data security
- sensitive information
- denial of service attacks
- deontic logic
- security threats
- private information retrieval
- privacy enhancing