Attribute-Based Access Control using Combined Authentication Technologies

被引:2
|
作者
Park, Hyun-A [1 ]
Lee, Dong Hoon [1 ]
Zhan, Justin [2 ]
机构
[1] Korea Univ, GSIMS, CIST, Anam 5 Ga, Seoul, South Korea
[2] Carnegie Mellon Univ, SION Lab, Pittsburgh, PA USA
关键词
D O I
10.1109/GRC.2008.4664774
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As NETWORK attackers become more and more sophisticated and wireless communications make the potential risks in data protection more serious, we come to need much stronger authentication and access control systems. In this paper we propose a combined authentication method including biometric and access control system based on attribute-wise encryption in wireless environment for ubiquitous computing era. It can accomplish both of the authentication of a user oneself and data retrieval by using one time padding in one round. Our access control method is flexible to dynamic policy or role changes.
引用
收藏
页码:518 / +
页数:2
相关论文
共 50 条
  • [21] Attribute-Based Access Control in Service Mesh
    Ponomarev, Kirill Yu.
    2019 DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2019,
  • [22] Authorization Recycling in Attribute-Based Access Control
    An Y.
    Helil N.
    Wireless Communications and Mobile Computing, 2023, 2023
  • [23] Monotonicity and completeness in attribute-based access control
    Crampton, Jason
    Morisset, Charles
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8743 : 33 - 48
  • [24] Supporting attribute-based access control with ontologies
    Priebe, Torsten
    Dobmeier, Wolfgang
    Kamprath, Nora
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 465 - +
  • [25] Attribute-Based Access Control in Web Applications
    Kauser, Sadia
    Rahman, Ayesha
    Khan, Asad Mohammed
    Ahmad, Tameem
    APPLICATIONS OF ARTIFICIAL INTELLIGENCE TECHNIQUES IN ENGINEERING, SIGMA 2018, VOL 1, 2019, 698 : 385 - 393
  • [26] Attribute-Based Access Control for NoSQL Databases
    Gupta, Eeshan
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21), 2021, : 317 - 319
  • [27] ANALYSIS OF THE METHODS FOR ATTRIBUTE-BASED ACCESS CONTROL
    Kalimoldayev, M. N.
    Biyashev, R. G.
    Rog, O. A.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2019, (44): : 43 - 57
  • [28] Attribute Expressions, Policy Tables and Attribute-Based Access Control
    Crampton, Jason
    Williams, Conrad
    PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 79 - 90
  • [29] Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing
    Li, Peng
    Lai, Junzuo
    Wu, Yongdong
    FRONTIERS OF COMPUTER SCIENCE, 2023, 17 (01)
  • [30] Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing
    Peng LI
    Junzuo LAI
    Yongdong WU
    Frontiers of Computer Science, 2023, 17 (01) : 203 - 216