We refer to a key-based protection environment featuring active subjects and protected objects. A subject that possesses a key for a given object is allowed to access this object to carry out actions that depend on the specific application. We propose a new key model, called multiple key, or m-key for short. In this model, an m-key consists of a name, a value and a map. The name specifies a set of objects, and the value is used to validate the m-key. Possession of a valid m-key is equivalent to possession of a key for all the objects specified by the m-key name, or for a subset of these objects, as is stated by the map. A subject that holds an m-key referencing a given set of objects can transform this m-key into a weaker m-key referencing ...
Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the ...
International audienceThis paper revisits Key-Policy Attribute-Based Encryption (KP-ABE), allowing d...
Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the ...
We refer to a key-based protection environment featuring active subjects and protected objects. A su...
We refer to an access control system based on subjects and objects. Subjects are active entities, e....
We consider the problem of access privilege management in a classical protection environment featuri...
With reference to a protection system featuring active subjects that attempt to access passive, type...
Public key management has received considerable attention from both the research and commercial comm...
With reference to a classic protection system featuring active subjects that reference protected obj...
Critical infrastructures require protection systems that are both flexible and efficient. Flexibilit...
This paper focuses on memory addressing environments that support the notion of a single address sp...
In this paper, we propose a revocable and decentralized attribute-based encryption (ABE) system that...
In this paper, we propose a revocable and decentralized attribute-based encryption (ABE) system that...
Traditional system in cryptography allows just sharing of keys between the sender and receiver, for ...
A central advantage of deploying cryptosystems is that the security of large high-sensitive data set...
Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the ...
International audienceThis paper revisits Key-Policy Attribute-Based Encryption (KP-ABE), allowing d...
Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the ...
We refer to a key-based protection environment featuring active subjects and protected objects. A su...
We refer to an access control system based on subjects and objects. Subjects are active entities, e....
We consider the problem of access privilege management in a classical protection environment featuri...
With reference to a protection system featuring active subjects that attempt to access passive, type...
Public key management has received considerable attention from both the research and commercial comm...
With reference to a classic protection system featuring active subjects that reference protected obj...
Critical infrastructures require protection systems that are both flexible and efficient. Flexibilit...
This paper focuses on memory addressing environments that support the notion of a single address sp...
In this paper, we propose a revocable and decentralized attribute-based encryption (ABE) system that...
In this paper, we propose a revocable and decentralized attribute-based encryption (ABE) system that...
Traditional system in cryptography allows just sharing of keys between the sender and receiver, for ...
A central advantage of deploying cryptosystems is that the security of large high-sensitive data set...
Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the ...
International audienceThis paper revisits Key-Policy Attribute-Based Encryption (KP-ABE), allowing d...
Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the ...