2014
DOI: 10.1002/sec.971
|View full text |Cite
|
Sign up to set email alerts
|

A flexible hierarchical access control mechanism enforcing extension policies

Abstract: Some specific information or resources only can be accessed by authorized users. Discretionary access control (DAC), mandatory access control (MAC), and role‐based access control (RBAC) are three main classes of access control policies. MAC and RBAC are more secure than discretionary access control because a system instead of an object's owner determines the policy. MAC is appropriate for multilevel applications with high security requirements such as military ones, while RBAC provides security and business be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 35 publications
0
9
0
Order By: Relevance
“…It allows the data owner to temporarily delegate decryption rights of a security class SC i to another security class SC j in such a way that SC j can access data encrypted directly for SC i but cannot access data encrypted for any of SC i 's descendant security classes. For example in figure 1, class delegation with descendant(s) safety from SC 6 to SC 2 means that data intended directly for SC 6 is accessible to SC 2 and SC 1 . However, data intended for SC 7 is accessible to neither SC 2 nor SC 1 .…”
Section: Number Of Secrets Stored By a Security Class Is Constantmentioning
confidence: 99%
See 3 more Smart Citations
“…It allows the data owner to temporarily delegate decryption rights of a security class SC i to another security class SC j in such a way that SC j can access data encrypted directly for SC i but cannot access data encrypted for any of SC i 's descendant security classes. For example in figure 1, class delegation with descendant(s) safety from SC 6 to SC 2 means that data intended directly for SC 6 is accessible to SC 2 and SC 1 . However, data intended for SC 7 is accessible to neither SC 2 nor SC 1 .…”
Section: Number Of Secrets Stored By a Security Class Is Constantmentioning
confidence: 99%
“…However, their scheme [5] requires Oðn 2 Þ public storage and features inefficient dynamic update operations, which require public parameters corresponding to all ancestors as well as all descendants of the affected security class to be updated by the data owner. In 2015, Chang [6] proposed another flexible HKAS with the same motivation of enforcing explicit transitive and anti-symmetric exceptions in a traditional access hierarchy. The scheme in [6] uses ECC and efficient one-way hash functions to achieve constant key derivation cost.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Much of the prior work in this area was concerned with designing access control systems from basic cryptographic primitives [18,15,2,11,10,9,8] and/or designing new primitives tailored for the problem of access control [17,23,24,14]. For the most part, the security of cryptographic access control systems was only heuristically studied.…”
Section: Introductionmentioning
confidence: 99%