We consider a decentralized setting in which agents exchange data along with usage policies. Agents may violate the intended usage policies, although later on auditing authorities may verify the agents’ data accountability with respect to the intended policies. Using timestamping and signature schemes, we design and analyze an efficient cryptographic protocol generating communication evidences which enable auditing authorities to validate the agents’ behaviour.
|Title of host publication||Proceedings of 1st International Workshop on Information Security, IS'06|
|Place of Publication||Berlin|
|Number of pages||10|
|Publication status||Published - 2006|
|Name||Lecture Notes in Computer Science|