We consider a decentralized setting in which agents exchange data along with usage policies. Agents may violate the intended usage policies, although later on auditing authorities may verify the agents’ data accountability with respect to the intended policies. Using timestamping and signature schemes, we design and analyze an efficient cryptographic protocol generating communication evidences which enable auditing authorities to validate the agents’ behaviour.
|Lecture Notes in Computer Science
|Proceedings of 1st International Workshop on Information Security, IS'06
|30/10/06 → 3/11/06
|30 Oct - 3 Nov 2006