Hierarchical Access Control Using the Secure Filter
スポンサーリンク
概要
- 論文の詳細を見る
Access control plays an important role in the area of information security, which guarantees that any access to data is authorized. Hierarchical access control is a special access control model in distributed environment, in which each user protects his local data using a secret key;moreover, for any two related users u_i and u_j, u_i can access u_j's data if, and only if, u_i's priority is higher than u_j. Therefore, there should be a way for u_i to obtain the secret key of u_j if u_i's priority is higher than u_j. This paper presents an efficient solution to the problem. A special kind of function called secure filter is used as the building block of the proposed solution. In the solution, an authorized user can acquire correct keys efficiently and securely via secure filters. The proposed solution is also well-performed while inserting/deleting users, injecting/removing relations, and changing secret keys. Especially, only deleting users and removing relations will change some keys in the system, other operations can be performed freely without affecting other keys in the system;only secure filters need to be modified in these cases.
- 社団法人電子情報通信学会の論文
- 2001-06-01
著者
-
LAI Feipei
the Department of Computer Science and Information Engineering, National Taiwan University
-
Wu Kuen-pin
The Archi Lab. Department Of Electrical Engineering National Taiwan University
-
Ruan S‐j
National Taiwan Univ. Sci. And Technol. Taipei Twn
-
RUAN Shanq-Jang
The Archi Lab., Department of Electrical Engineering, National Taiwan University
-
TSENG Chih-Kuang
The Archi Lab., Department of Electrical Engineering, National Taiwan University
-
Tseng Chih-kuang
The Archi Lab. Department Of Electrical Engineering National Taiwan University
-
Lai Feipei
The Department Of Electrical Engineering And Department Of Computer Science And Information Engineer
関連論文
- Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy
- Modified Cryptographic Key Assignment Scheme for a Group-Oriented User Hierarchy
- Fast, Robust Block Motion Estimation Using Simulated Annealing
- Adsmith: An Object-Based Distributed Shared Memory System for Networks of Workstations
- Hierarchical Access Control Using the Secure Filter
- Multicriteria Codesign Optimization for Embedded Multimedia Communication System (Special Section on VLSI Design and CAD Algorithms)