Access control is a fundamental concern in any system that manages resources, e.g., operating systems, file systems, databases and communications systems. The problem we address is how to specify, enforce, and implement access control in distributed environments. Starting from an access relation between users and resources, we derive a user hierarchy, a resource hierarchy, and a unified hierarchy. The unified hierarchy is then used to specify the access relation in a way that is compact and that allows efficient queries. It is also used in cryptographic schemes that enforce access rights. We introduce three specific cryptography-based hierarchical access schemes, which can effectively enforce and implement access control and are designed fo...
Enforcing access control in an organization has been an important research area in computer security...
Virtual organizations are dynamic, interorganizational collaborations that involve systems and servi...
The special needs for cryptography, of both wired and wireless networks, have attracted the research...
Abstract. Access control is a fundamental concern in any sys-tem that manages resources, e.g., opera...
All organizations share data in a carefully managed fashion by using access control mechanisms. We f...
Access control ensures that only the authorized users of a system are allowed to access certain reso...
Abstract. All organizations share data in a carefully managed fashion by using access control mechan...
‘Secure group communications’ (SGC) refers to a scenario in which a group of participants can receiv...
A scheme based on cryptography is proposed for access control in a system where hierarchy is represe...
Access control to confidential information in pervasive computing environments is challenging for mu...
In a hierarchical access control system, users are partitioned into a number of classes—called secur...
AbstractOften a security system groups users into a hierarchy, with user classes on top having acces...
[[abstract]]In a traditional key assignment scheme, an access control policy is used to solve the ac...
In many multi-user information systems, the users are organized as a hierarchy. Each user is a subo...
A formal definition and analysis on the hierarchical key management is presented for permission mana...
Enforcing access control in an organization has been an important research area in computer security...
Virtual organizations are dynamic, interorganizational collaborations that involve systems and servi...
The special needs for cryptography, of both wired and wireless networks, have attracted the research...
Abstract. Access control is a fundamental concern in any sys-tem that manages resources, e.g., opera...
All organizations share data in a carefully managed fashion by using access control mechanisms. We f...
Access control ensures that only the authorized users of a system are allowed to access certain reso...
Abstract. All organizations share data in a carefully managed fashion by using access control mechan...
‘Secure group communications’ (SGC) refers to a scenario in which a group of participants can receiv...
A scheme based on cryptography is proposed for access control in a system where hierarchy is represe...
Access control to confidential information in pervasive computing environments is challenging for mu...
In a hierarchical access control system, users are partitioned into a number of classes—called secur...
AbstractOften a security system groups users into a hierarchy, with user classes on top having acces...
[[abstract]]In a traditional key assignment scheme, an access control policy is used to solve the ac...
In many multi-user information systems, the users are organized as a hierarchy. Each user is a subo...
A formal definition and analysis on the hierarchical key management is presented for permission mana...
Enforcing access control in an organization has been an important research area in computer security...
Virtual organizations are dynamic, interorganizational collaborations that involve systems and servi...
The special needs for cryptography, of both wired and wireless networks, have attracted the research...