Attribute-Based Access Control using Combined Authentication Technologies

被引:2
|
作者
Park, Hyun-A [1 ]
Lee, Dong Hoon [1 ]
Zhan, Justin [2 ]
机构
[1] Korea Univ, GSIMS, CIST, Anam 5 Ga, Seoul, South Korea
[2] Carnegie Mellon Univ, SION Lab, Pittsburgh, PA USA
关键词
D O I
10.1109/GRC.2008.4664774
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As NETWORK attackers become more and more sophisticated and wireless communications make the potential risks in data protection more serious, we come to need much stronger authentication and access control systems. In this paper we propose a combined authentication method including biometric and access control system based on attribute-wise encryption in wireless environment for ubiquitous computing era. It can accomplish both of the authentication of a user oneself and data retrieval by using one time padding in one round. Our access control method is flexible to dynamic policy or role changes.
引用
收藏
页码:518 / +
页数:2
相关论文
共 50 条
  • [1] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [2] Supporting attribute-based access control in authorization and authentication infrastructures with ontologies
    Priebe, Torsten
    Dobmeier, Wolfgang
    Schläger, Christian
    Kamprath, Nora
    Journal of Software, 2007, 2 (01) : 27 - 38
  • [3] Authentication-enabled attribute-based access control for smart homes
    Burakgazi Bilgen, Melike
    Abul, Osman
    Bicakci, Kemal
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (02) : 479 - 495
  • [4] Authentication-enabled attribute-based access control for smart homes
    Melike Burakgazi Bilgen
    Osman Abul
    Kemal Bicakci
    International Journal of Information Security, 2023, 22 : 479 - 495
  • [5] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    COMPUTER, 2015, 48 (02) : 85 - 88
  • [6] Hierarchical Attribute-based Access Control with Authentication for Outsourced Data in Cloud Computing
    Liu, Xuejiao
    Xia, Yingjie
    Jiang, Shasha
    Xia, Fubiao
    Wang, Yanbo
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 477 - 484
  • [7] Extending Attribute-Based Access Control Model with Authentication Information for Internet of Things
    Bilgen, Melike Burakgazi
    Bicakci, Kemal
    2020 INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCTURKEY 2020), 2020, : 48 - 55
  • [8] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [9] Attribute-based access control and authentication mechanism using smart cards for cloud-based IoT applications
    Gupta, B. B.
    Quamara, Megha
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2020, 13 (01) : 40 - 49
  • [10] An Attribute-Based Access Control using chaincode in RFID systems
    Figueroa, Santiago
    Anorga, Javier
    Arrizabalaga, Saioa
    Irigoyen, Inigo
    Monterde, Mario
    2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,