1 resultado para Private matching
em Universidad Politécnica de Madrid
Filtro por publicador
- Aberystwyth University Repository - Reino Unido (3)
- AMS Tesi di Dottorato - Alm@DL - Università di Bologna (1)
- Aquatic Commons (8)
- Archive of European Integration (13)
- Archivo Digital para la Docencia y la Investigación - Repositorio Institucional de la Universidad del País Vasco (3)
- Avian Conservation and Ecology - Eletronic Cientific Hournal - Écologie et conservation des oiseaux: (1)
- Biblioteca Digital da Câmara dos Deputados (1)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP) (1)
- Biblioteca Digital de la Universidad Católica Argentina (1)
- Boston University Digital Common (6)
- Brock University, Canada (8)
- Cambridge University Engineering Department Publications Database (49)
- CentAUR: Central Archive University of Reading - UK (84)
- Center for Jewish History Digital Collections (2)
- Chinese Academy of Sciences Institutional Repositories Grid Portal (26)
- Cochin University of Science & Technology (CUSAT), India (6)
- Comissão Econômica para a América Latina e o Caribe (CEPAL) (12)
- CORA - Cork Open Research Archive - University College Cork - Ireland (2)
- CUNY Academic Works (2)
- Dalarna University College Electronic Archive (2)
- Department of Computer Science E-Repository - King's College London, Strand, London (42)
- DI-fusion - The institutional repository of Université Libre de Bruxelles (1)
- Digital Archives@Colby (2)
- Digital Commons @ Winthrop University (1)
- DigitalCommons - The University of Maine Research (1)
- DRUM (Digital Repository at the University of Maryland) (1)
- Duke University (6)
- eResearch Archive - Queensland Department of Agriculture; Fisheries and Forestry (4)
- Greenwich Academic Literature Archive - UK (20)
- Helda - Digital Repository of University of Helsinki (24)
- Indian Institute of Science - Bangalore - Índia (25)
- Instituto Politécnico do Porto, Portugal (1)
- Lume - Repositório Digital da Universidade Federal do Rio Grande do Sul (1)
- Massachusetts Institute of Technology (10)
- Ministerio de Cultura, Spain (7)
- Plymouth Marine Science Electronic Archive (PlyMSEA) (2)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (140)
- Queensland University of Technology - ePrints Archive (185)
- Repositório digital da Fundação Getúlio Vargas - FGV (71)
- Repositório Digital da UNIVERSIDADE DA MADEIRA - Portugal (3)
- Repositório Institucional da Universidade de Aveiro - Portugal (1)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (10)
- Repositorio Institucional Universidad EAFIT - Medelin - Colombia (1)
- Research Open Access Repository of the University of East London. (2)
- RUN (Repositório da Universidade Nova de Lisboa) - FCT (Faculdade de Cienecias e Technologia), Universidade Nova de Lisboa (UNL), Portugal (14)
- School of Medicine, Washington University, United States (2)
- SerWisS - Server für Wissenschaftliche Schriften der Fachhochschule Hannover (1)
- South Carolina State Documents Depository (1)
- Universidad Autónoma de Nuevo León, Mexico (1)
- Universidad del Rosario, Colombia (4)
- Universidad Politécnica de Madrid (1)
- Universitat de Girona, Spain (3)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (8)
- Université de Lausanne, Switzerland (5)
- Université de Montréal, Canada (6)
- WestminsterResearch - UK (6)
Resumo:
Establishing trust while preserving privacy is a challenging research problem. In this paper we introduce lambda -congenial secret groups which allow users to recognize trusted partners based on common attributes while preserving their anonymity and privacy. Such protocols are different from authentication protocols, since the latter are based on identities, while the former are based on attributes. Introducing attributes in trust establishment allows a greater flexibility but also brings up several issues. In this paper, we investigate the problem of building trust with attributes by presenting motivating examples, analyzing the security requirements and giving an informal definition. We also survey one of the most related techniques, namely private matching, and finally present solutions based on it.