Projects per year
The general idea of our approach is to automatically issue and revoke attributes based on already established identity management systems.
Our design enables organisations to rely on arbitrary identity and access management solutions across different security domain boundaries.
We, furthermore, tackle privacy concerns typically associated with outsourcing sensitive data to the cloud.
To demonstrate the feasibility and versatility of our approach, we evaluate our design by integrating both OAuth and the Austrian eID.
Besides, we present performance data.
The evaluation results clearly show that our proposed design suits the requirements imposed by the IIoT well.
|Title of host publication||Proceedings of the 17th International Joint Conference on e-Business and Telecommunications: SECRYPT|
|Publisher||SciTePress - Science and Technology Publications|
|Publication status||Published - 2020|
FingerprintDive into the research topics of 'Efficient Access-Control in the IIoT through Attribute-Based Encryption with Outsourced Decryption'. Together they form a unique fingerprint.
- 1 Active
Stranacher, K., Dominikus, S., Leitold, H., Marsalek, A., Teufl, P., Bauer, W., Aigner, M. J., Rössler, T., Neuherz, E., Dietrich, K., Zefferer, T., Mangard, S., Payer, U., Orthacker, C., Lipp, P., Reiter, A., Knall, T., Bratko, H., Bonato, M., Suzic, B., Zwattendorfer, B., Kreuzhuber, S., Oswald, M. E., Tauber, A., Posch, R., Bratko, D., Feichtner, J., Ivkovic, M., Reimair, F., Wolkerstorfer, J. & Scheibelhofer, K.
21/05/99 → 6/08/20
Project: Research area
- 1 Talk at conference or symposium
9 Jul 2020
Activity: Talk or presentation › Talk at conference or symposium › Science to science