Digital key management for access control of electronic records

被引:0
|
作者
Simpson, William R [1 ]
Iaeng, Member [1 ]
Foltz, Kevin E. [2 ]
机构
[1] Institute for Defense Analyses, United States
[2] Institute for Defense Analyses, 4850 Mark Center Drive, Alexandria,VA,22311, United States
关键词
Electronic document exchange - Copyrights - Records management;
D O I
暂无
中图分类号
学科分类号
摘要
Access control of electronic records involves establishing a common set of access requirements, binding those access requirements to the electronic records, and computing whether or not the criteria are met for allowing access. An electronic record can be an e-mail, a document, a spreadsheet, or a series of sensor readings. Records that need to be controlled are stored in an encrypted file, which is decrypted when access criteria are verified. The number of controlled electronic records is rising dramatically. Current methods of key management often group and segment objects by type to reduce the number of keys and the associated management overhead. This approach compromises a large number of content files when exploits manage to extract cryptographic keys. The proposed process uses a hybrid symmetric/asymmetric keying approach that provides a unique key for each electronic record while minimizing the key management requirements. This method reduces losses to individual electronic records when keys are compromised, but with a greatly reduced key management process that leverages PKI processes. © 2016, IAENG International Journal of Computer Science.
引用
收藏
页码:411 / 426
相关论文
共 50 条
  • [41] KTR: an efficient key management scheme for air access control
    Gu, QJ
    Liu, P
    Lee, WC
    Chu, CH
    PROCEEDINGS OF MOBIQUITOUS 2005, 2005, : 499 - 501
  • [42] A novel key management and access control scheme for mobile agent
    Pan, Jen-Yi
    Chen, Tzer-Long
    Chen, Tzer-Shyong
    COMPUTATIONAL INTELLIGENCE, PT 2, PROCEEDINGS, 2006, 4114 : 334 - 345
  • [43] A key management scheme for hierarchical access control in group communication
    Zhang, Qiong
    Wang, Yuke
    Jue, Jason P.
    International Journal of Network Security, 2008, 7 (03) : 323 - 334
  • [44] Comments on 'dynamic key management schemes for access control in a hierarchy'
    Lee, NY
    Hwang, T
    COMPUTER COMMUNICATIONS, 1999, 22 (01) : 87 - 89
  • [45] Efficient access control and key management schemes for mobile agents
    Lin, LC
    Ou, HH
    Hwang, MS
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (05) : 423 - 433
  • [46] An Efficient Key Management Scheme for Access Control in a User Hierarchy
    Zhang, Jianmin
    Li, Jian
    Liu, Xiande
    2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, VOL 1, PROCEEDINGS, 2009, : 550 - +
  • [47] Key management and access control for large dynamic multicast group
    Liu, J
    Zhou, MT
    WECWIS 2002: FOURTH IEEE INTERNATIONAL WORKSHOP ON ADVANCED ISSUES OF E-COMMERCE AND WEB-BASED INFORMATION SYSTEMS, PROCEEDINGS, 2002, : 121 - 128
  • [48] Efficient Key Management for Enforcing Access Control in Outsourced Scenarios
    Blundo, Carlo
    Cimato, Stelvio
    di Vimercati, Sabrina De Capitani
    De Santis, Alfredo
    Foresti, Sara
    Paraboschi, Stefano
    Samarati, Pierangela
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 364 - 375
  • [49] An improved key-management scheme for hierarchical access control
    Chao W.-Y.
    Tsai C.-Y.
    Hwang M.-S.
    International Journal of Network Security, 2017, 19 (04) : 639 - 643
  • [50] Key management and access control for large dynamic multicast groups
    Liu, Jing
    Zhou, Ming-Tian
    Ruan Jian Xue Bao/Journal of Software, 2002, 13 (02): : 291 - 297