Computer Science ›› 2012, Vol. 39 ›› Issue (Z11): 33-35.
Previous Articles Next Articles
Online:
Published:
Abstract: Nowadays, the privacy protection is one of the most concerned problems. More and more users want to strengthen their own privacy preservation and hope that they can access the resources without providing personal sensi- five informations. An anonymous access control scheme is proposed which is based on PKI/PMI certificates. The trusted third party is introduced between users and the service provider. The role stated-attribute certificate(R}AC) and role assigned attribute certificate(RA-AC) are used to implement the anonymous authentication. Theoretical analysis shows that this solution provides the security,anonymity and no relevance.
Key words: Privacy protection, hrustcd third party, Anonymity, R}AC, RA-AC
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2012/V39/IZ11/33
Cited