We demonstrate that symmetric-key cryptography can be used for both read and write access control. One-time write access can be granted by handing over an encryption key, and our encryption framework allows the revocation of previously granted rights. The number of keys to be managed explicitly grows linearly with the number of access control policies a user defines, making security manageable. The framework is used in the Pesto distributed storage system. In Pesto, policies can be stored the same as other data and the same mechanism can be used to control access to them. Delegation of authority over policies concerning different tasks can then be performed. Separating the different tasks of the system, allows for different tasks to be assi...
International audienceSeveral distributed storage solutions that do not rely on a central server hav...
International audienceConfidential data stored on mass storage devices is at risk to be disclosed to...
The notion of attribute-based encryption (ABE) was proposed as an economical alternative to public-k...
Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote ser...
Cryptographic access control offers selective accessto encrypted data via a combination of key manag...
Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the ...
We present the design of a new symmetric key management API for cryptographic devices intended to im...
Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the ...
A popular cryptographic option to implement Hierarchical Access Control in organizations is to combi...
Cryptographic access control promises to offer easily distributed trust and broader applicability, w...
Current access control models typically assume that resources are under the strict custody of a trus...
Abstract:- In this paper a new approach is presented for key management access and sharing secret ke...
Abstract An access control system is needed to ensure only authorized users can access a sensitive r...
With reference to a distributed system consisting of nodes connected by a local area network, we pre...
With reference to a distributed system consisting of nodes connected by a local area network, we pr...
International audienceSeveral distributed storage solutions that do not rely on a central server hav...
International audienceConfidential data stored on mass storage devices is at risk to be disclosed to...
The notion of attribute-based encryption (ABE) was proposed as an economical alternative to public-k...
Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote ser...
Cryptographic access control offers selective accessto encrypted data via a combination of key manag...
Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the ...
We present the design of a new symmetric key management API for cryptographic devices intended to im...
Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the ...
A popular cryptographic option to implement Hierarchical Access Control in organizations is to combi...
Cryptographic access control promises to offer easily distributed trust and broader applicability, w...
Current access control models typically assume that resources are under the strict custody of a trus...
Abstract:- In this paper a new approach is presented for key management access and sharing secret ke...
Abstract An access control system is needed to ensure only authorized users can access a sensitive r...
With reference to a distributed system consisting of nodes connected by a local area network, we pre...
With reference to a distributed system consisting of nodes connected by a local area network, we pr...
International audienceSeveral distributed storage solutions that do not rely on a central server hav...
International audienceConfidential data stored on mass storage devices is at risk to be disclosed to...
The notion of attribute-based encryption (ABE) was proposed as an economical alternative to public-k...