Bruce Christianson (auth.), Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe (eds.)3540409254, 9783540409250
Table of contents :
Front Matter….Pages –
Introduction: Authentic Privacy….Pages 1-3
Limits to Anonymity When Using Credentials….Pages 4-12
Limits to Anonymity When Using Credentials (Transcript of Discussion)….Pages 13-19
A Cryptographic Framework for the Controlled Release of Certified Data….Pages 20-42
A Cryptographic Framework for the Controlled Release of Certified Data (Transcript of Discussion)….Pages 43-50
One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA….Pages 51-64
One User, Many Hats; and Sometimes, No Hat (Transcript of Discussion)….Pages 65-67
Authentication Components: Engineering Experiences and Guidelines….Pages 68-77
Authentication Components: Engineering Experiences and Guidelines (Transcript of Discussion)….Pages 78-82
Accountable Privacy….Pages 83-95
Accountable Privacy (Transcript of Discussion)….Pages 96-105
Toward a Broader View of Security Protocols….Pages 106-120
Toward a Broader View of Security Protocols (Transcript of Discussion)….Pages 121-132
Privacy, Control and Internet Mobility….Pages 133-145
Privacy, Control and Internet Mobility (Transcript of Discussion)….Pages 146-150
Controlling Who Tracks Me….Pages 151-154
Controlling Who Tracks Me (Transcript of Discussion)….Pages 155-162
BLIND: A Complete Identity Protection Framework for End-Points….Pages 163-176
BLIND: A Complete Identity Protection Framework for End-Points (Transcript of Discussion)….Pages 177-178
Privacy Is Linking Permission to Purpose….Pages 179-191
Privacy is Linking Permission to Purpose (Transcript of Discussion)….Pages 192-198
Establishing Trust with Privacy….Pages 199-209
Establishing Trust with Privacy (Transcript of Discussion)….Pages 210-212
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System….Pages 213-220
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System (Transcript of Discussion)….Pages 221-230
The Dancing Bear: A New Way of Composing Ciphers….Pages 231-238
The Dancing Bear: A New Way of Composing Ciphers (Transcript of Discussion)….Pages 239-245
Identity and Location….Pages 246-250
Identity and Location (Transcript of Discussion)….Pages 251-255
Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion)….Pages 256-266
Pseudonymity in the Light of Evidence-Based Trust….Pages 267-274
Pseudonymity in the Light of Evidence-Based Trust (Transcript of Discussion)….Pages 275-275
Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection….Pages 276-286
Secure Processor Consistent with Both Foreign Software Protection and User Privacy Protection (Transcript of Discussion)….Pages 287-290
Why Are We Authenticating (Transcript of Discussion)….Pages 291-298
Anonymous Authentication….Pages 299-305
Anonymous Authentication (Transcript of Discussion)….Pages 306-311
Towards a Mechanism for Discretionary Overriding of Access Control….Pages 312-319
Towards a Mechanism for Discretionary Overriding of Access Control (Transcript of Discussion)….Pages 320-323
Last Orders….Pages 324-324
Back Matter….Pages –
Reviews
There are no reviews yet.