Digital key management for access control of electronic records

被引:0
|
作者
Simpson, William R [1 ]
Iaeng, Member [1 ]
Foltz, Kevin E. [2 ]
机构
[1] Institute for Defense Analyses, United States
[2] Institute for Defense Analyses, 4850 Mark Center Drive, Alexandria,VA,22311, United States
关键词
Electronic document exchange - Copyrights - Records management;
D O I
暂无
中图分类号
学科分类号
摘要
Access control of electronic records involves establishing a common set of access requirements, binding those access requirements to the electronic records, and computing whether or not the criteria are met for allowing access. An electronic record can be an e-mail, a document, a spreadsheet, or a series of sensor readings. Records that need to be controlled are stored in an encrypted file, which is decrypted when access criteria are verified. The number of controlled electronic records is rising dramatically. Current methods of key management often group and segment objects by type to reduce the number of keys and the associated management overhead. This approach compromises a large number of content files when exploits manage to extract cryptographic keys. The proposed process uses a hybrid symmetric/asymmetric keying approach that provides a unique key for each electronic record while minimizing the key management requirements. This method reduces losses to individual electronic records when keys are compromised, but with a greatly reduced key management process that leverages PKI processes. © 2016, IAENG International Journal of Computer Science.
引用
收藏
页码:411 / 426
相关论文
共 50 条
  • [21] Context-Based, Predictive Access Control to Electronic Health Records
    Psarra, Evgenia
    Apostolou, Dimitris
    Verginadis, Yiannis
    Patiniotakis, Ioannis
    Mentzas, Gregoris
    ELECTRONICS, 2022, 11 (19)
  • [22] A blockchain-based privacy-preserving and access-control framework for electronic health records management
    Jakhar A.K.
    Singh M.
    Sharma R.
    Viriyasitavat W.
    Dhiman G.
    Goel S.
    Multimedia Tools and Applications, 2024, 83 (36) : 84195 - 84229
  • [23] Digital signatures and electronic records
    Boudrez, Filip
    ARCHIVAL SCIENCE, 2007, 7 (02) : 179 - 193
  • [24] Efficient key management for cryptographically enforced access control
    Zych, Anna
    Petkovic, Milan
    Jonker, Willem
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (06) : 410 - 417
  • [25] A centralized key management scheme for hierarchical access control
    Zhang, Q
    Wang, YK
    GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2067 - 2071
  • [26] Key management for access control in trusted cloud storages
    Song, W. (songwei@whu.edu.cn), 1613, Science Press (50):
  • [27] Dynamic key management schemes for access control in a hierarchy
    Lin, CH
    COMPUTER COMMUNICATIONS, 1997, 20 (15) : 1381 - 1385
  • [28] Electronic records management
    Gilliland-Swetland, A
    ANNUAL REVIEW OF INFORMATION SCIENCE AND TECHNOLOGY, 2005, 39 : 219 - 253
  • [29] Key observations in terms of management of electronic health records from a mHealth perspective
    Gurupur, Varadraj P.
    MHEALTH, 2022, 8 (02)
  • [30] Control and Management of Electronic Records of Information of Agricultural Products Circulation
    Ma, Ai-Jin
    Zhao, Hai-Zhen
    2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED EDUCATION AND MANAGEMENT (ICAEM 2016), 2016, : 600 - 604