Using proxy re-encryption for secure data management in an ambient assisted living application
dc.contributor.author | Zach, Hannes | |
dc.contributor.author | Peinsold, Philip | |
dc.contributor.author | Winter, Johannes | |
dc.contributor.author | Danner, Peter | |
dc.contributor.author | Hatzl, Jakob | |
dc.contributor.editor | Hühnlein, Detlef | |
dc.contributor.editor | Roßnagel, Heiko | |
dc.contributor.editor | Kuhlisch, Raik | |
dc.contributor.editor | Ziesing, Jan | |
dc.date.accessioned | 2017-06-30T02:54:28Z | |
dc.date.available | 2017-06-30T02:54:28Z | |
dc.date.issued | 2015 | |
dc.description.abstract | Whenever applications process sensitive user data, secure storage and distribution plays a key role. This paper points out the security demands of an Ambient Assisted Living (AAL) application and demonstrates the usage of proxy re-encryption in order to fulfil its security requirements for storage and distribution of sensitive data. Because AAL systems often exhibit the same security needs as the application developed in the presented project, the described implementation can serve as a point of reference for similar projects. | en |
dc.identifier.isbn | 978-3-88579-645-9 | |
dc.identifier.pissn | 1617-5468 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Open Identity Summit 2015 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-251 | |
dc.title | Using proxy re-encryption for secure data management in an ambient assisted living application | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 83 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 71 | |
gi.conference.date | 10.-11. November 2015 | |
gi.conference.location | Berlin |
Dateien
Originalbündel
1 - 1 von 1