CRYPTOGRAPHIC ACCESS CONTROL FOR MANDATORY SECURITY POLICIES USING ATTRIBUTE-BASED ENCRYPTION

被引:0
|
作者
Plecan, Daniel [1 ]
机构
[1] Alexandru Ioan Cuza Univ, Dept Comp Sci, Iasi, Romania
关键词
Cryptographic access control; attribute-based encryption; mandatory policies; access trees lattice structures;
D O I
暂无
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
This paper proposes a solution for enforcing mandatory access control policies through cryptography as an alternative to the continuous mediation of access operations by a reference monitor. Attribute-based encryption is used to model the lattice structures underlying this type of policies through techniques of constructing and distributing access trees and public key parameters.
引用
收藏
页码:413 / 429
页数:17
相关论文
共 50 条
  • [31] Accountable specific attribute-based encryption scheme for cloud access control
    Nayudu, P. Prathap
    Sekhar, Krovi Raja
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022,
  • [32] Implementing Access Control in Chaincodes on Hyperledger Fabric with Attribute-Based Encryption
    Okano, Takumi
    Kojima, Hideharu
    Yanai, Naoto
    Tsuchiya, Tatsuhiro
    2022 IEEE 19TH INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE COMPANION (ICSA-C 2022), 2022, : 193 - 196
  • [33] A survey on attribute-based encryption schemes of access control in cloud environments
    Hwang, M.-S. (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (15):
  • [34] MicroSCOPE: Enabling Access Control in Searchable Encryption with the Use of Attribute-Based Encryption and SGX
    Michalas, Antonis
    Bakas, Alexandros
    Dang, Hai-Van
    Zalitko, Alexandr
    SECURE IT SYSTEMS, NORDSEC 2019, 2019, 11875 : 254 - 270
  • [35] Smart Supply Chain Management with Attribute-Based Encryption Access Control
    Shittu, Habeeb
    Nabil, Mahmoud
    2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 198 - 204
  • [36] Secure Attribute-Based Encryption With Access Control to Data Medical Records
    Fitri, Novi Aryani
    Al Rasyid, M. Udin Harun
    Sudarsono, Amang
    2018 INTERNATIONAL ELECTRONICS SYMPOSIUM ON KNOWLEDGE CREATION AND INTELLIGENT COMPUTING (IES-KCIC), 2018, : 105 - 111
  • [37] Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things
    Zhang, Yuanyu
    Nakanishi, Ruka
    Sasabe, Masahiro
    Kasahara, Shoji
    SENSORS, 2021, 21 (15)
  • [38] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    COMPUTER, 2015, 48 (02) : 85 - 88
  • [39] Efficient Revocable Attribute-Based Encryption with Hidden Policies
    Ziegler, Dominik
    Marsalek, Alexander
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1638 - 1645
  • [40] Attribute-Based Encryption with Partially Hidden Ciphertext Policies
    Nishide, Takashi
    Yoneyama, Kazuki
    Ohta, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (01) : 22 - 32