@inproceedings{ebe033d900154bc782691ffc72a90198,
title = "Integration of data-minimising authentication into authorisation systems",
abstract = "Authentication and authorisation are essential ingredients for effective protection of data in distributed information systems. Currently, they are being treated as separate components with specified input and output relations. Traditional authorisation components require all of the users{\textquoteright} information that is possibly relevant to an authorisation decision and consequently the authentication components need to fully identify the users and collect all available information about them. This destroys all the potential privacy and security benefits of data-minimising authentication technologies such as private credential systems. In this paper, we discuss different ways to address this problem. More precisely, we sketch two possibilities of integrating data-minimising authentication into a traditional authorisation system such that the overall system becomes data-minimising.",
author = "D. Ayed and P. Bichsel and J. Camenisch and {Hartog, den}, J.I.",
year = "2014",
doi = "10.1007/978-3-319-08593-7_12",
language = "English",
isbn = "978-3-319-08592-0",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "179--187",
editor = "T. Holz and S. Ioannidis",
booktitle = "Trust and Trustworthy Computing (7th International Conference, TRUST 2014, Heraklion, Crete, June 30-July 2, 2014. Proceedings)",
address = "Germany",
note = "conference; 7th International Conference on Trust and Trustworthy Computing; 2014-06-30; 2014-07-02 ; Conference date: 30-06-2014 Through 02-07-2014",
}