Securing data accountability in decentralized systems

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We consider a decentralized setting in which agents exchange data along with usage policies. Agents may violate the intended usage policies, although later on auditing authorities may verify the agents' data accountability with respect to the intended policies. Using time-stamping and signature schemes, we design and analyze an efficient cryptographic protocol generating communication evidences, in such a way that an agent is accountable in our protocol only if the agent behaved honestly. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Corin, R., Galindo, D., & Hoepman, J. H. (2006). Securing data accountability in decentralized systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4277 LNCS-I, pp. 626–635). Springer Verlag. https://doi.org/10.1007/11915034_86

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free