Cryptographic Role-Based Access Control, Reconsidered

被引:2
作者
Liu, Bin [1 ]
Michalas, Antonis [1 ,2 ]
Warinschi, Bogdan [3 ,4 ]
机构
[1] Tampere Univ, Tampere, Finland
[2] RISE Res Inst Sweden, Gothenburg, Sweden
[3] DFINITY, Zurich, Switzerland
[4] Univ Bristol, Bristol, Avon, England
来源
PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022 | 2022年 / 13600卷
关键词
D O I
10.1007/978-3-031-20917-8_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we follow the line of existing study on cryptographic enforcement of Role-Based Access Control (RBAC). Inspired by the study of the relation between the existing security definitions for such system, we identify two different types of attacks which cannot be captured by the existing ones. Therefore, we propose two new security definitions towards the goal of appropriately modelling cryptographic enforcement of Role-Based Access Control policies and study the relation between our new definitions and the existing ones. In addition, we show that the cost of supporting dynamic policy update is inherently expensive by presenting two lower bounds for such systems which guarantee correctness and secure access.
引用
收藏
页码:282 / 289
页数:8
相关论文
共 14 条
[1]   A Framework for the Cryptographic Enforcement of Information Flow Policies [J].
Alderman, James ;
Crampton, Jason ;
Farley, Naomi .
PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, :143-154
[2]  
Iii WCG, 2016, Arxiv, DOI arXiv:1602.09069
[3]  
Clear Michael, 2013, Progress in Cryptology - AFRICACRYPT 2013. 6th International Conference on Crytology in Africa. Proceedings, P61, DOI 10.1007/978-3-642-38553-7_4
[4]   Policy Privacy in Cryptographic Access Control [J].
Ferrara, Anna Lisa ;
Fuchsbauer, Georg ;
Liu, Bin ;
Warinschi, Bogdan .
2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015, 2015, :46-60
[5]   Cryptographically Enforced RBAC [J].
Ferrara, Anna Lisa ;
Fuchsbauer, Georg ;
Warinschi, Bogdan .
2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2013, :115-129
[6]  
Halevi S., 2005, IACR Cryptology ePrint Archive, P169
[7]  
Ibraimi Luan., 2011, Cryptographically enforced distributed data access control
[8]  
Jahid S., 2011, ASIACCS, P411
[9]  
Jie Huang, 2012, 2012 41st International Conference on Parallel Processing Workshops (ICPPW 2012), P279, DOI 10.1109/ICPPW.2012.42
[10]   Universally Composable Cryptographic Role-Based Access Control [J].
Liu, Bin ;
Warinschi, Bogdan .
PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 :61-80