Attribute-Based Access Control using Combined Authentication Technologies

被引:2
|
作者
Park, Hyun-A [1 ]
Lee, Dong Hoon [1 ]
Zhan, Justin [2 ]
机构
[1] Korea Univ, GSIMS, CIST, Anam 5 Ga, Seoul, South Korea
[2] Carnegie Mellon Univ, SION Lab, Pittsburgh, PA USA
关键词
D O I
10.1109/GRC.2008.4664774
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As NETWORK attackers become more and more sophisticated and wireless communications make the potential risks in data protection more serious, we come to need much stronger authentication and access control systems. In this paper we propose a combined authentication method including biometric and access control system based on attribute-wise encryption in wireless environment for ubiquitous computing era. It can accomplish both of the authentication of a user oneself and data retrieval by using one time padding in one round. Our access control method is flexible to dynamic policy or role changes.
引用
收藏
页码:518 / +
页数:2
相关论文
共 50 条
  • [41] An Attribute-based Access Control with Flexible Attribute Change in Open Systems
    Ye, Tao
    Cai, Yongquan
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON MECHATRONICS ENGINEERING AND INFORMATION TECHNOLOGY (ICMEIT 2017), 2017, 70 : 101 - 105
  • [42] Enabling Attribute-Based Access Control in NoSQL Databases
    Gupta, Eeshan
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2023, 11 (01) : 208 - 223
  • [43] Anonymity in Attribute-Based Access Control: Framework and Metric
    Zhang, Runnan
    Liu, Gang
    Kang, Hongzhaoning
    Wang, Quan
    Wan, Bo
    Luo, Nan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (01) : 463 - 475
  • [44] A New Attribute-Based Access Control Model for RDBMS
    Al-Saraireh, Jaafer
    Hassan, Majid
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2022, 22 (04) : 3 - 22
  • [45] On the Feasibility of Attribute-Based Access Control Policy Mining
    Chakraborty, Shuvra
    Sandhu, Ravi
    Krishnan, Ram
    2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 245 - 252
  • [46] An Improved Fuzzy Attribute-Based Authentication
    Yun, Jong Pil
    Kim, Hyoseung
    Lee, Dong Hoon
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [47] Attribute-Based Access Control for Layered Grid Resources
    Lang, Bo
    Li, Hangyu
    Ni, Wenting
    COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 31 - 40
  • [48] Levelled attribute-based encryption for hierarchical access control
    Le, Huy Quoc
    Le, Phi Thuong
    Trinh, Sy Tuan
    Susilo, Willy
    Trinh, Viet Cuong
    COMPUTER STANDARDS & INTERFACES, 2025, 93
  • [49] A Time and Mutable Attribute-Based Access Control Model
    Yang, Ran
    Lin, Chuang
    Feng, Fujun
    JOURNAL OF COMPUTERS, 2009, 4 (06) : 510 - 518
  • [50] Efficient Attribute-Based Comparable Data Access Control
    Wang, Zhijie
    Huang, Dijiang
    Zhu, Yan
    Li, Bing
    Chung, Chun-Jen
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (12) : 3430 - 3443