CRYPTOGRAPHIC ACCESS CONTROL FOR MANDATORY SECURITY POLICIES USING ATTRIBUTE-BASED ENCRYPTION

被引:0
|
作者
Plecan, Daniel [1 ]
机构
[1] Alexandru Ioan Cuza Univ, Dept Comp Sci, Iasi, Romania
关键词
Cryptographic access control; attribute-based encryption; mandatory policies; access trees lattice structures;
D O I
暂无
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
This paper proposes a solution for enforcing mandatory access control policies through cryptography as an alternative to the continuous mediation of access operations by a reference monitor. Attribute-based encryption is used to model the lattice structures underlying this type of policies through techniques of constructing and distributing access trees and public key parameters.
引用
收藏
页码:413 / 429
页数:17
相关论文
共 50 条
  • [21] Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates
    Decat, Maarten
    Moeys, Jasper
    Lagaisse, Bert
    Joosen, Wouter
    ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 196 - 210
  • [22] Secure access privilege delegation using attribute-based encryption
    Panda, Suryakanta
    Mondal, Samrat
    Das, Ashok Kumar
    Susilo, Willy
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1261 - 1276
  • [23] Secure access privilege delegation using attribute-based encryption
    Suryakanta Panda
    Samrat Mondal
    Ashok Kumar Das
    Willy Susilo
    International Journal of Information Security, 2023, 22 : 1261 - 1276
  • [24] Mining Attribute-Based Access Control Policies from Logs
    Xu, Zhongyuan
    Stoller, Scott D.
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 276 - 291
  • [25] Specification and Analysis of Attribute-Based Access Control Policies: An Overview
    Xu, Dianxiang
    Zhang, Yunpeng
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 41 - 49
  • [26] Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls
    Zhao, Yang
    Ke, Xing-Yu
    Pang, Yu-Wei
    Xiong, Hu
    Zhu, Guo-Bin
    Yeh, Kuo-Hui
    BIG DATA TECHNOLOGIES AND APPLICATIONS, EAI INTERNATIONAL CONFERENCE, BDTA 2023, 2024, 555 : 79 - 94
  • [27] Attribute-based access control with hidden policies and hidden credentials
    Frikken, Keith
    Atallah, Mikhail
    Li, Jiangtao
    IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (10) : 1259 - 1270
  • [28] VisMAP: Visual Mining of Attribute-Based Access Control Policies
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    Rigoll, Gerhard
    INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 79 - 98
  • [29] Polisma - A Framework for Learning Attribute-Based Access Control Policies
    Abu Jabal, Amani
    Bertino, Elisa
    Lobo, Jorge
    Law, Mark
    Russo, Alessandra
    Calo, Seraphin
    Verma, Dinesh
    COMPUTER SECURITY - ESORICS 2020, PT I, 2020, 12308 : 523 - 544
  • [30] Attribute-based encryption with Hidden access structures
    Wang, Hai-Bin
    Chen, Shao-Zhen
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2012, 34 (02): : 457 - 461