Information flow control (IFC) mechanisms regulate where information is allowed to travel. To enhance IFC, access control encryption (ACE) was proposed where both the no write-down rule and the no read-up rule are supported. Nevertheless, there are still two issues: (1) how to determine whether a communication request should be permitted or denied was not considered; (2) the commutation cost is linear with the number of receivers. Attribute-based system (ABS) can implement one-to-many communication and fine-grained access policies. In this paper, a new IFC scheme is proposed by combing ACE with ABS. Our scheme provides the following features: (1) IFC policies are defined over a universe set of attributes; (2) the computation cost to determ...
Logic access control enforces who can read and write data; the enforcement is typically performed by...
The notion of attribute-based encryption (ABE)was proposed as an economical alternative to public-ke...
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional ...
Information flow control (IFC) mechanisms regulate where information is allowed to travel. To enhanc...
© 2019 The Author(s) 2019. Published by Oxford University Press on behalf of The British Computer So...
International audienceIn several distributed systems a user should only be able to access data if a ...
In several distributed systems a user should only be able to access data if a user posses a certain ...
In an attribute-based system (ABS), users are identified by various attributes, instead of their ide...
In several distributed systems a user should only be able to access data if a user posses a certain ...
Sharing of information is fundamental to modern computing environments across many application domai...
Abstract An access control system is needed to ensure only authorized users can access a sensitive r...
[[abstract]]In Attribute-based Encryption (ABE) scheme, attributes play a very important role. Attri...
The notion of attribute-based encryption (ABE) was proposed as an economical alternative to public-k...
A ciphertext policy-attribute based encryption(CP-ABE) scheme can be used to realize access control ...
The sharing of data is becoming increasingly important for the process and manufacturing industries ...
Logic access control enforces who can read and write data; the enforcement is typically performed by...
The notion of attribute-based encryption (ABE)was proposed as an economical alternative to public-ke...
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional ...
Information flow control (IFC) mechanisms regulate where information is allowed to travel. To enhanc...
© 2019 The Author(s) 2019. Published by Oxford University Press on behalf of The British Computer So...
International audienceIn several distributed systems a user should only be able to access data if a ...
In several distributed systems a user should only be able to access data if a user posses a certain ...
In an attribute-based system (ABS), users are identified by various attributes, instead of their ide...
In several distributed systems a user should only be able to access data if a user posses a certain ...
Sharing of information is fundamental to modern computing environments across many application domai...
Abstract An access control system is needed to ensure only authorized users can access a sensitive r...
[[abstract]]In Attribute-based Encryption (ABE) scheme, attributes play a very important role. Attri...
The notion of attribute-based encryption (ABE) was proposed as an economical alternative to public-k...
A ciphertext policy-attribute based encryption(CP-ABE) scheme can be used to realize access control ...
The sharing of data is becoming increasingly important for the process and manufacturing industries ...
Logic access control enforces who can read and write data; the enforcement is typically performed by...
The notion of attribute-based encryption (ABE)was proposed as an economical alternative to public-ke...
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional ...