Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Claudine Viegas Conrado is active.

Publication


Featured researches published by Claudine Viegas Conrado.


database and expert systems applications | 2003

Privacy in an identity-based DRM system

Claudine Viegas Conrado; Frank Kamperman; Geert Jan Schrijen; Willem Jonker

The present paper addresses privacy issues in electronic audio/video content distribution. It introduces an identity-based rights distribution and management system that enables users to access content anytime, anywhere, and on any device by means of authorization certificates issued by a content provider. These certificates openly link the identity of the users to the content that they are entitled to access. This fact, together with the availability of the certificates everywhere in the network, raises user privacy issues. A solution is proposed which deals with these issues and still allows the device to securely check the users entitlement to the content.


very large data bases | 2004

Privacy-Preserving Digital Rights Management

Claudine Viegas Conrado; Milan Petkovic; Willem Jonker

DRM systems provide a means for protecting digital content, but at the same time they violate the privacy of users in a number of ways. This paper addresses privacy issues in DRM systems. The main challenge is how to allow a user to interact with the system in an anonymous/pseudonymous way, while preserving all security requirements of usual DRM systems. To achieve this goal, the paper proposes a set of protocols and methods for managing user identities and interactions with the system during the process of acquiring and consuming digital content. Furthermore, a method that supports anonymous transfer of licenses is discussed. It allows a user to transfer a piece of content to another user without the content provider being able to link the two users. Finally, the paper demonstrates how to extend the rights of a given user to a group of users in a privacy preserving way. The extension hides the group structure from the content provider and at the same time provides privacy among the members of the group.


RFID Security : Techniques, Protocols and System-on-Chip Design | 2008

RFID Security: Cryptography and Physics Perspectives

Jorge Guajardo; Pim Tuyls; Neil C. Bird; Claudine Viegas Conrado; Stefan Maubach; Geert-Jan Schrijen; Boris Skoric; Anton M. H. Tombeur; Peter Thueringer

In this chapter, we provide an overview of mechanisms that are cheap to implement or integrate into RFID tags and that at the same time enhance their security and privacy properties. We emphasize solutions that make use of existing (or expected) functionality on the tag or that are inherently cheap and thus enhance the privacy friendliness of the technology “almost” for free. Technologies described include the use of environmental information (presence of light, temperature, humidity, etc.) to disable or enable the RFID tag, the use of delays to reveal parts of a secret key at different moments in time (this key is used to later establish a secure communication channel), and the idea of a “sticky tag,” which can be used to re-enable a disabled (or killed) tag whenever the user considers it to be safe. We discuss the security and describe usage scenarios for all solutions. Finally, we summarize previous works that use physical principles to provide security and privacy in RFID systems and the security-related functionality in RFID standards.


information security conference | 2006

Cryptographically Enforced Personalized Role-Based Access Control

Milan Petkovic; Claudine Viegas Conrado; Malik Hammoutene

The present paper addresses privacy and security enhancements to a basic role-based access control system. The contribution is twofold. First, the paper presents an approach to personalized access control, i.e. a combination of role-based access control and user-managed access control. Second, the proposed access control approach is cryptographically enforced and an efficient key management method for the personalized role-based access control is described. The proposed solutions are discussed in the context of a system architecture for secure management of Electronic Health Records.


Security, Privacy, and Trust in Modern Data Management | 2007

Enhancing Privacy for Digital Rights Management

Milan Petkovic; Claudine Viegas Conrado; Geert Jan Schrijen; Willem Jonker

This chapter addresses privacy issues in DRM systems. These systems provide a means of protecting digital content, but may violate the privacy of users in that the content they purchase and their actions in the system can be linked to specific users. The chapter proposes a privacy-preserving DRM system in which users interact with the system in an pseudonymous way, while preserving all security requirements of usual DRM systems. To achieve this goal, a set of protocols and methods is proposed for managing user identities and interactions with the basic system during acquisition and consumption of digital content. Privacy-enhancing extensions are also proposed. Unlinkable purchase of content, which prevents content providers from linking all content purchased by a given user, is discussed. Moreover, a method which allows a user to transfer content rights to another user without the two users being linked by the content provider is provided.


Archive | 2007

Role-based access control

Malik Hammoutene; Milan Petkovic; Claudine Viegas Conrado


Archive | 2006

Private and Controlled Ownership Sharing

Claudine Viegas Conrado; Geert Jan Schrijen; Milan Petkovic


Archive | 2006

Cryptographic Role-Based Access Control

Malik Hammoutene; Milan Petkovic; Claudine Viegas Conrado


Archive | 2007

Controlling data access to and from an RFID device

Jorge Guajardo Merchan; Claudine Viegas Conrado


Archive | 2005

License Management in a Privacy Preserving Information Distribution System

Claudine Viegas Conrado; Milan Petkovic; Willem Jonker

Collaboration


Dive into the Claudine Viegas Conrado's collaboration.

Researchain Logo
Decentralizing Knowledge