Virtual organizations are dynamic, interorganizational collaborations that involve systems and services belonging to different security domains. Several solutions have been proposed to guarantee the enforcement of the access control policies protecting the information exchanged in a distributed system, but none of them addresses the dynamicity characterizing virtual organizations. In this paper we propose a dynamic hierarchical attribute-based encryption (D-HABE)scheme that allows the institutions in a virtual organization to encrypt information according to a policy in such a way that only users with appropriate attributes can decrypt it. In addition, we introduce a key management scheme that determines which user is entitled to receive wh...
In several distributed systems a user should only be able to access data if a user posses a certain ...
Enabling hybrid authorisations to enforce dynamic access control policy from single-domain to cross-...
Abstract. Access control is a fundamental concern in any sys-tem that manages resources, e.g., opera...
Virtual organizations are dynamic, interorganizational collaborations that involve systems and servi...
Virtual organizations are dynamic, inter-organizational collaborations that involve systems and serv...
In several distributed systems a user should only be able to access data if a user posses a certain ...
International audienceIn several distributed systems a user should only be able to access data if a ...
Cloud computing refers to the application and service that run on a distributed system using virtual...
Attribute-based encryption scheme is a promising mechanism to realize one-to-many fine-grained acces...
As more businesses engage in globalization, inter-organizational collaborative computing grows in im...
Access control is a fundamental concern in any system that manages resources, e.g., operating system...
In the IT industry cloud computing is considered as one of the most important paradigms. In cloud co...
Abstract- Cloud Computing, an emerging computing paradigm, requires additional security which is pro...
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional ...
Enabling hybrid authorisations to enforce dynamic access control policy from single-domain to cross-...
In several distributed systems a user should only be able to access data if a user posses a certain ...
Enabling hybrid authorisations to enforce dynamic access control policy from single-domain to cross-...
Abstract. Access control is a fundamental concern in any sys-tem that manages resources, e.g., opera...
Virtual organizations are dynamic, interorganizational collaborations that involve systems and servi...
Virtual organizations are dynamic, inter-organizational collaborations that involve systems and serv...
In several distributed systems a user should only be able to access data if a user posses a certain ...
International audienceIn several distributed systems a user should only be able to access data if a ...
Cloud computing refers to the application and service that run on a distributed system using virtual...
Attribute-based encryption scheme is a promising mechanism to realize one-to-many fine-grained acces...
As more businesses engage in globalization, inter-organizational collaborative computing grows in im...
Access control is a fundamental concern in any system that manages resources, e.g., operating system...
In the IT industry cloud computing is considered as one of the most important paradigms. In cloud co...
Abstract- Cloud Computing, an emerging computing paradigm, requires additional security which is pro...
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional ...
Enabling hybrid authorisations to enforce dynamic access control policy from single-domain to cross-...
In several distributed systems a user should only be able to access data if a user posses a certain ...
Enabling hybrid authorisations to enforce dynamic access control policy from single-domain to cross-...
Abstract. Access control is a fundamental concern in any sys-tem that manages resources, e.g., opera...