{"id":61463,"date":"2018-03-09T22:49:18","date_gmt":"2018-03-09T22:49:18","guid":{"rendered":"https:\/\/www.deberes.net\/tesis\/sin-categoria\/anonymous-credential-systems-based-on-signature-schemes-and-standard-certification-infrastructures\/"},"modified":"2018-03-09T22:49:18","modified_gmt":"2018-03-09T22:49:18","slug":"anonymous-credential-systems-based-on-signature-schemes-and-standard-certification-infrastructures","status":"publish","type":"post","link":"https:\/\/www.deberes.net\/tesis\/ciencia-de-los-ordenadores\/anonymous-credential-systems-based-on-signature-schemes-and-standard-certification-infrastructures\/","title":{"rendered":"Anonymous credential systems based on signature schemes and standard certification infrastructures"},"content":{"rendered":"<h2>Tesis doctoral de <strong> Vicente Benjumea Garcia <\/strong><\/h2>\n<p>Este trabajo se centra en dos servicios de seguridad para aplicaciones de internet: autorizaci\u00f3n y anonimato. Los enfoques tradicionales de la autorizaci\u00f3n no resultan adecuados para muchas aplicaciones de internet; sin embargo, los certificados de clave p\u00fablica y de atributos propuestos por itu-t parecen m\u00e1s adecuados y proporcionan soluciones mejor adaptadas. Por otra parte, se debe poner especial atenci\u00f3n al hecho de que muchas de las operaciones y transacciones realizadas a trav\u00e9s de internet pueden ser f\u00e1cilmente recolectadas y relacionadas, constituyendo una severa amenaza para la privacidad de los individuos. Por lo tanto, el anonimato en las transacciones puede ser considerado como una caracter\u00edstica deseable en muchas de ellas.  este trabajo analiza diversos esquemas criptogr\u00e1ficos basados en firmas digitales que proporcionen un mecanismo adecuado para soportar autenticaci\u00f3n y autorizaci\u00f3n an\u00f3nima, as\u00ed como su inclusi\u00f3n en infraestructuras est\u00e1ndares de certificaci\u00f3n. As\u00ed, dise\u00f1a un nuevo esquema criptogr\u00e1fico de firma digital que proporcione un adecuado soporte al anonimato, define los mecanismos adecuados para su inclusi\u00f3n en el est\u00e1ndar x.509 y proporciona la infraestructura necesaria para soportar autorizaci\u00f3n an\u00f3nima basada en privilegios. El sistema introduce, adem\u00e1s, mecanismos para poder revertir el anonimato en circunstancias especiales, tales como comportamiento deshonesto o mandato judicial, bajo la supervisi\u00f3n de autoridades de control. As\u00ed mismo, tambi\u00e9n define una m\u00e9trica para modelar y analizar dichos sistemas.<\/p>\n<p>&nbsp;<\/p>\n<h3>Datos acad\u00e9micos de la tesis doctoral \u00ab<strong>Anonymous credential systems based on signature schemes and standard certification infrastructures<\/strong>\u00ab<\/h3>\n<ul>\n<li><strong>T\u00edtulo de la tesis:<\/strong>\u00a0 Anonymous credential systems based on signature schemes and standard certification infrastructures <\/li>\n<li><strong>Autor:<\/strong>\u00a0 Vicente Benjumea Garcia <\/li>\n<li><strong>Universidad:<\/strong>\u00a0 M\u00e1laga<\/li>\n<li><strong>Fecha de lectura de la tesis:<\/strong>\u00a0 22\/11\/2007<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Direcci\u00f3n y tribunal<\/h3>\n<ul>\n<li><strong>Director de la tesis<\/strong>\n<ul>\n<li>Javier Lopez Mu\u00f1oz<\/li>\n<\/ul>\n<\/li>\n<li><strong>Tribunal<\/strong>\n<ul>\n<li>Presidente del tribunal: Carlos Delgado kloos <\/li>\n<li>Miguel Soriano ib\u00e1\u00f1ez (vocal)<\/li>\n<li>mario Piattini velthuis (vocal)<\/li>\n<li>claudia Diaz Martinez (vocal)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tesis doctoral de Vicente Benjumea Garcia Este trabajo se centra en dos servicios de seguridad para aplicaciones de internet: autorizaci\u00f3n [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[1890,12796,7834],"tags":[30894,135767,56106,16486,53254,135766],"class_list":["post-61463","post","type-post","status-publish","format-standard","hentry","category-ciencia-de-los-ordenadores","category-dispositivos-de-transmision-de-datos","category-malaga","tag-carlos-delgado-kloos","tag-claudia-diaz-Martinez","tag-javier-lopez-munoz","tag-mario-piattini-velthuis","tag-miguel-soriano-ibanez","tag-vicente-benjumea-garcia"],"_links":{"self":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/61463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/comments?post=61463"}],"version-history":[{"count":0,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/61463\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/media?parent=61463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/categories?post=61463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/tags?post=61463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}