Attribute-Based Encryption with Break-Glass

被引:0
作者
Brucker, Achim D. [1 ]
Petritsch, Helmut [1 ]
Weber, Stefan G. [2 ]
机构
[1] SAP Res, Vincenz Priessnitz Str 1, D-76131 Karlsruhe, Germany
[2] Tech Univ Darmstadt, Telecooperat Grp, D-64289 Darmstadt, Germany
来源
INFORMATION SECURITY THEORY AND PRACTICES: SECURITY AND PRIVACY OF PERVASIVE SYSTEMS AND SMART DEVICES | 2010年 / 6033卷
关键词
Access control; break-glass; attribute-based encryption; disaster management; trusted computing platform;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based Encryption (ABE) allows for implementing One-grained decentralized access control based on properties or attributes a user has. Thus, there is no need for writing detailed, user-based policies in advance. This makes A BE in particular interesting for implementing security mechanisms in dynamic environments such as ubiquitous computing, disaster management, or health-care. For supporting the latter two application areas, common ABE approaches lack one important feature: break-glass, e., the controlled overriding of access control restrictions. In this paper we present an integration of break-glass into an approach for end-to-end secure information sharing using ABE techniques.
引用
收藏
页码:237 / +
页数:2
相关论文
共 16 条
[1]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[2]  
BRUCKER AD, 2010, INT C AV REL SEC ARE
[3]  
BRUCKER AD, 2009, ACM S ACC CONTR MOD, P197
[4]   How to break access control in a controlled manner [J].
Ferreira, A. ;
Cruz-Correia, R. ;
Antunes, L. ;
Farinha, P. ;
Oliveira-Palhares, E. ;
Chadwick, D. W. ;
Costa-Pereira, A. .
19TH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS, PROCEEDINGS, 2006, :847-+
[5]   Deployment Control of Spinning Space Webs [J].
Gardsback, Mattias ;
Tibert, Gunnar .
JOURNAL OF GUIDANCE CONTROL AND DYNAMICS, 2009, 32 (01) :40-50
[6]  
GENTRY C, 2006, HDB INFORM SECURITY, V2, P575
[7]   ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks [J].
Huang, Dijiang ;
Verma, Mayank .
AD HOC NETWORKS, 2009, 7 (08) :1526-1535
[8]  
Johnson R, 2007, AUSTRALAS I MIN MET, V2007, P1
[9]  
Joint NEMA/COCIR/JIRA Security and Privacy Committee (SPC), 2004, BREAK GLASS APPR GRA
[10]  
LACHNER J, 1974, LNBIP, V5, P213