Abstract:
An approach is provided for reducing communication traffic/cost and protecting content by applying recipient criteria in identity-based encryption. A criterion application of a querier causes, at least in part, transmission of a query associated with a first user described according to a first set of criteria. Based on the query, the criterion application of the querier receives one or more second sets of criteria associated with respective second users, wherein the second sets of criteria are matched, at least in part, to the first set of criteria, and wherein at least one of the second sets of criteria is used as a public key for encrypting data according to an identity-based encryption scheme. A criterion application of an information store receives the query associated with the first user, and matches one or more second sets of criteria with all or part of the first set of criteria.
Abstract:
An approach is provided for authenticating services at a device. An authentication request from a services platform is received at a device. Local credentials to authenticate access to a storage are retrieved. The access to the storage is authenticated based, at least in part, on the local credentials. If authenticated, it is determined that account information for the services platform is in the storage. The account information includes authentication credentials associated with the services platform, a security policy associated with the services platform, or a combination thereof. A response to the authentication request is generated based, at least in part, on the account information.