Concept

Access Control List

Publications associées (62)

DISTINGUISHING “CROWDED” ORGANIZATIONS FROM GROUPS AND COMMUNITIES: IS THREE A CROWD?

Christopher Tucci, Gianluigi Viscusi

In conventional wisdom on crowdsourcing, the number of people define the crowd and maximizing this number is often assumed to be the goal of any crowdsourcing exercise. However, we propose that there are structural characteristics of the crowd that might b ...
SSRN2015

Privacy-Preserving Photo Sharing based on a Public Key Infrastructure

Touradj Ebrahimi, Lin Yuan, David Mc Nally

A significant number of pictures are posted to social media sites or exchanged through instant messaging and cloud-based sharing services. Most social media services offer a range of access control mechanisms to protect users privacy. As it is not in the b ...
Spie-Int Soc Optical Engineering2015

TOA: a tag-owner-assisting RFID authentication protocol toward access control and ownership transfer

Chen Zhang, Chao Wang, Qiang Wang, Lei Xie

This paper addresses radio frequency identification (RFID) authentication and ownership transfer in offline scenarios. Four typical related works are reviewed in detail. A series of shortcomings and vulnerabilities of them are pointed out. A new RFID authe ...
Wiley-Blackwell2014

Towards Secure Distance Bounding

Serge Vaudenay, Aikaterini Mitrokotsa

Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against many access control and payment schemes. In this work, we present distance-bounding protocols, how these can deter relay attacks, and the security models formalizin ...
2013

Solving Terminal Revocation in EAC by Augmenting Terminal Authentication

Rafik Chaabouni

In this paper we propose a solution to enable an accurate terminal revocation in the Extended Access Control (EAC). Chaabouni and Vaudenay in [CV09] pointed out the need for an accurate revocation procedure, but failed to provide a complete solution descri ...
Gesellschaft für Informatik2013

Deniable RSA Signature: The Raise and Fall of Ali Baba

Serge Vaudenay

The 40 thieves realize that the fortune in their cave is vanishing. A rumor says that Ali Baba has been granted access (in the form of a certificate) to the cave but they need evidence to get justice from the Caliph. On the other hand, Ali Baba wants to be ...
Springer2012

Optinal Source-Based Filtering of Malicious Traffic

In this paper, we consider the problem of blocking malicious traffic on the Internet via source-based filtering. In particular, we consider filtering via access control lists (ACLs): These are already available at the routers today, but are a scarce resour ...
2012

SenGuard: Passive User Identification on Smartphones Using Multiple Sensors

Jiangyan Yang, Feng Yang

User identification and access control have become a high demand feature on mobile devices because those devices are wildly used by employees in corporations and government agencies for business and store increasing amount of sensitive data. This paper des ...
2011

Enhancing Park and Ride with access control: A case study of Southampton

Implementing and promoting more sustainable forms of urban transport are key policies of Local Authorities throughout the UK. Park and Ride (P&R) is one such system implemented widely in the UK, especially in historic towns and cities with limited road and ...
Elsevier2011

PANACEA: Tunable Privacy for Access Controlled Data in Peer-to-Peer Systems

Karl Aberer

Peer-to-peer paradigm is increasingly employed for organizing distributed resources for various applications, e.g. content distribution, open storage grid etc. In open environments, even when proper access control mechanisms supervise the access to the res ...
EPFL Infoscience2010

Graph Chatbot

Chattez avec Graph Search

Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.

AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.