CRYPTOGRAPHIC ACCESS CONTROL FOR MANDATORY SECURITY POLICIES USING ATTRIBUTE-BASED ENCRYPTION

被引:0
|
作者
Plecan, Daniel [1 ]
机构
[1] Alexandru Ioan Cuza Univ, Dept Comp Sci, Iasi, Romania
关键词
Cryptographic access control; attribute-based encryption; mandatory policies; access trees lattice structures;
D O I
暂无
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
This paper proposes a solution for enforcing mandatory access control policies through cryptography as an alternative to the continuous mediation of access operations by a reference monitor. Attribute-based encryption is used to model the lattice structures underlying this type of policies through techniques of constructing and distributing access trees and public key parameters.
引用
收藏
页码:413 / 429
页数:17
相关论文
共 50 条
  • [1] Combining Mandatory and Attribute-based Access Control
    Kerr, Lawrence
    Alves-Foss, Jim
    PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 2616 - 2623
  • [2] Attribute-based Encryption for Access Control Using Elementary Operations
    Crampton, Jason
    Pinto, Alexandre
    2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, : 125 - 139
  • [3] Mining Attribute-Based Access Control Policies
    Davari, Maryam
    Zulkernine, Mohammad
    INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
  • [4] Mining Attribute-Based Access Control Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 533 - 545
  • [5] Levelled attribute-based encryption for hierarchical access control
    Le, Huy Quoc
    Le, Phi Thuong
    Trinh, Sy Tuan
    Susilo, Willy
    Trinh, Viet Cuong
    COMPUTER STANDARDS & INTERFACES, 2025, 93
  • [6] An Access Control Model for Cloud Storage Using Attribute-Based Encryption
    Sukhodolskiy, Ilya A.
    Zapechnikov, Sergey V.
    PROCEEDINGS OF THE 2017 IEEE RUSSIA SECTION YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING CONFERENCE (2017 ELCONRUS), 2017, : 578 - 581
  • [7] On the Feasibility of Attribute-Based Encryption for WLAN Access Control
    Pisa, Claudio
    Dargahi, Tooska
    Caponi, Alberto
    Bianchi, Giuseppe
    Blefari-Melazzi, Nicola
    2017 IEEE 13TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2017, : 783 - 790
  • [8] A Role-Based Access Control System Using Attribute-Based Encryption
    Wang, Yong
    Ma, Yuan
    Xiang, Keyu
    Liu, Zhenyan
    Li, Ming
    2018 INTERNATIONAL CONFERENCE ON BIG DATA AND ARTIFICIAL INTELLIGENCE (BDAI 2018), 2018, : 128 - 133
  • [9] Deconflicting policies in attribute-based access control systems
    Yahiaoui, Mohamed
    Zinedine, Ahmed
    Harti, Mostafa
    2018 IEEE 5TH INTERNATIONAL CONGRESS ON INFORMATION SCIENCE AND TECHNOLOGY (IEEE CIST'18), 2018, : 130 - 136
  • [10] Attribute-based access control policies composition algebra
    Lin, Li
    Huai, Jin-Peng
    Li, Xian-Xian
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (02): : 403 - 414