Projects per year
Abstract
The general idea of our approach is to automatically issue and revoke attributes based on already established identity management systems.
Our design enables organisations to rely on arbitrary identity and access management solutions across different security domain boundaries.
We, furthermore, tackle privacy concerns typically associated with outsourcing sensitive data to the cloud.
To demonstrate the feasibility and versatility of our approach, we evaluate our design by integrating both OAuth and the Austrian eID.
Besides, we present performance data.
The evaluation results clearly show that our proposed design suits the requirements imposed by the IIoT well.
Original language | English |
---|---|
Title of host publication | Proceedings of the 17th International Joint Conference on e-Business and Telecommunications: SECRYPT |
Publisher | SciTePress - Science and Technology Publications |
Pages | 547-552 |
Volume | 3 |
ISBN (Print) | 978-989-758-446-6 |
DOIs | |
Publication status | Published - 2020 |
Projects
- 1 Active
-
A-SIT - Secure Information Technology Center Austria
Stranacher, K., Dominikus, S., Leitold, H., Marsalek, A., Teufl, P., Bauer, W., Aigner, M. J., Rössler, T., Neuherz, E., Dietrich, K., Zefferer, T., Mangard, S., Payer, U., Orthacker, C., Lipp, P., Reiter, A., Knall, T., Bratko, H., Bonato, M., Suzic, B., Zwattendorfer, B., Kreuzhuber, S., Oswald, M. E., Tauber, A., Posch, R., Bratko, D., Feichtner, J., Ivkovic, M., Reimair, F., Wolkerstorfer, J. & Scheibelhofer, K.
21/05/99 → 6/08/20
Project: Research area
Activities
- 1 Talk at conference or symposium
-
Efficient Access-Control in the IIoT through Attribute-Based Encryption with Outsourced Decryption
Dominik Ziegler (Speaker), Alexander Marsalek (Contributor), Bernd Prünster (Contributor) & Josef Sabongui (Contributor)
9 Jul 2020Activity: Talk or presentation › Talk at conference or symposium › Science to science