Integration of data-minimising authentication into authorisation systems

D. Ayed, P. Bichsel, J. Camenisch, J.I. Hartog, den

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Abstract

Authentication and authorisation are essential ingredients for effective protection of data in distributed information systems. Currently, they are being treated as separate components with specified input and output relations. Traditional authorisation components require all of the users’ information that is possibly relevant to an authorisation decision and consequently the authentication components need to fully identify the users and collect all available information about them. This destroys all the potential privacy and security benefits of data-minimising authentication technologies such as private credential systems. In this paper, we discuss different ways to address this problem. More precisely, we sketch two possibilities of integrating data-minimising authentication into a traditional authorisation system such that the overall system becomes data-minimising.
Original languageEnglish
Title of host publicationTrust and Trustworthy Computing (7th International Conference, TRUST 2014, Heraklion, Crete, June 30-July 2, 2014. Proceedings)
EditorsT. Holz, S. Ioannidis
Place of PublicationBerlin
PublisherSpringer
Pages179-187
ISBN (Print)978-3-319-08592-0
DOIs
Publication statusPublished - 2014
Eventconference; 7th International Conference on Trust and Trustworthy Computing; 2014-06-30; 2014-07-02 -
Duration: 30 Jun 20142 Jul 2014

Publication series

NameLecture Notes in Computer Science
Volume8564
ISSN (Print)0302-9743

Conference

Conferenceconference; 7th International Conference on Trust and Trustworthy Computing; 2014-06-30; 2014-07-02
Period30/06/142/07/14
Other7th International Conference on Trust and Trustworthy Computing

Fingerprint

Dive into the research topics of 'Integration of data-minimising authentication into authorisation systems'. Together they form a unique fingerprint.

Cite this