Traditional access control mechanisms rely on a reference monitor to mediate access to protected resources. Reference monitors are inherently centralized and existing attempts to distribute the functionality of the reference monitor suffer from problems of scalability. Cryptographic access control is a new distributed access control paradigm designed for a global federation of information systems. It defines an implicit access control mechanism, which relies exclusively on cryptography to provide confidentiality and integrity of data managed by the system. It is particularly designed to operate in untrusted environments where the lack of global knowledge and control are defining characteristics. The propose
iii iv Traditional access control models which rely on a centralized reference monitor are not well ...
Decentralization is an important feature both for security and for reliability as it reduces the r...
This paper presents an architecture of a Personal Information Management System, in which individual...
Access control is a fundamental concern in any system that manages resources, e.g., operating system...
The Internet enables global sharing of data across organizational boundaries. Traditional access con...
Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote ser...
Abstract. We model networked storage systems with distributed, cryptographically enforced file-acces...
Abstract. Access control is a fundamental concern in any sys-tem that manages resources, e.g., opera...
Context Data usage control is an extension of access control that is concerned with how data may or ...
Cryptographic access control promises to offer easily distributed trust and broader applicability, w...
We study some of the concepts, protocols, and algorithms for access control in distributed systems, ...
As distributed computing systems grow in size, complexity and variety of application, the problem of...
Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so t...
Access control is an important component in the security of communication systems. While cryptograph...
The copy of record is available at IET Digital Library. [Full text of this article is not available ...
iii iv Traditional access control models which rely on a centralized reference monitor are not well ...
Decentralization is an important feature both for security and for reliability as it reduces the r...
This paper presents an architecture of a Personal Information Management System, in which individual...
Access control is a fundamental concern in any system that manages resources, e.g., operating system...
The Internet enables global sharing of data across organizational boundaries. Traditional access con...
Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote ser...
Abstract. We model networked storage systems with distributed, cryptographically enforced file-acces...
Abstract. Access control is a fundamental concern in any sys-tem that manages resources, e.g., opera...
Context Data usage control is an extension of access control that is concerned with how data may or ...
Cryptographic access control promises to offer easily distributed trust and broader applicability, w...
We study some of the concepts, protocols, and algorithms for access control in distributed systems, ...
As distributed computing systems grow in size, complexity and variety of application, the problem of...
Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so t...
Access control is an important component in the security of communication systems. While cryptograph...
The copy of record is available at IET Digital Library. [Full text of this article is not available ...
iii iv Traditional access control models which rely on a centralized reference monitor are not well ...
Decentralization is an important feature both for security and for reliability as it reduces the r...
This paper presents an architecture of a Personal Information Management System, in which individual...