This paper addresses the problem of preserving privacy during security policy reconciliation. We introduce new protocols that meet the privacy requirements of ...
scholar.google.com › citations
Abstract: Organizations use security policies to regulate how they share and exchange information, e.g., under what conditions data can be exchanged, ...
Dec 15, 2017 · First, they typically require that at least one of the parties dicloses some of its information to other parties or some trusted entity in order ...
Applications of privacy-preserving reconciliation protocols include policy reconciliation, electronic voting, auctions, and scheduling applications. Within the ...
This paper addresses the problem of preserving privacy during security policy reconciliation. We introduce new protocols that meet the privacy requirements of ...
This paper addresses the problem of preserving privacy during security policy reconciliation. We introduce new protocols that meet the privacy requirements of ...
First, today's mechanisms require that at least one of the parties discloses all its information in order to allow for the reconciliation process to work.
In order to enable collaboration between different parties it is necessary that the partners reach an agreement on the policy rules that will govern their ...
The process of policy reconciliation allows multiple parties with possibly different policies to resolve differences in or-.
The main focus of the paper is to review two of our two-party protocols. We detail the protocols and provide a comprehensive theoretical performance analysis.