Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies 2017
DOI: 10.1145/3078861.3078868
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for the Cryptographic Enforcement of Information Flow Policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…As a fundamental security service, the authorization mechanism becomes increasingly important in modern smart system. The hierarchical key assignment techniques [43,44,45,46] were presented, which can provide fine-grained authentication and access control for the user. In order to mitigate the potential vulnerabilities and protect the user’s privacy, Tang et al [24] integrated the fine-grained authorization mechanism into PKE-ET.…”
Section: Related Workmentioning
confidence: 99%
“…As a fundamental security service, the authorization mechanism becomes increasingly important in modern smart system. The hierarchical key assignment techniques [43,44,45,46] were presented, which can provide fine-grained authentication and access control for the user. In order to mitigate the potential vulnerabilities and protect the user’s privacy, Tang et al [24] integrated the fine-grained authorization mechanism into PKE-ET.…”
Section: Related Workmentioning
confidence: 99%
“…In fact, the attack can easily be carried out in the constructions proposed in [4,3]. Interestingly, some recently proposed constructions of cryptographic access control systems pose a similar security concern [1,8,11], though they have been proven to securely enforce the corresponding access control policies within their individual frameworks.…”
Section: Introductionmentioning
confidence: 99%