Cryptographically enforced personalized role-based access control

被引:0
|
作者
Petkovic, Milan [1 ]
Conrado, Claudine [1 ]
Hammoutene, Malik [1 ]
机构
[1] Philips Res, Informat & Syst Secur, High Tech Campus 34,MS 61, NL-5656 AE Eindhoven, Netherlands
来源
SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS | 2006年 / 201卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The present paper addresses privacy and security enhancements to a basic role-based access control system. The contribution is twofold. First, the paper presents an approach to personalized access control, i.e. a combination of role-based access control and user-managed access control. Second, the proposed access control approach is cryptographically enforced and an efficient key management method for the personalized role-based access control is described. ne proposed solutions are discussed in the context of a system architecture for secure management of Electronic Health Records.
引用
收藏
页码:364 / +
页数:2
相关论文
共 50 条
  • [1] Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases
    Shalabi, Yossif
    Gudes, Ehud
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 : 3 - 19
  • [2] User-Friendly Design of Cryptographically-Enforced Hierarchical Role-based Access Control Models
    Yu, Xiaoyuan
    Haakenson, Brandon
    Phillips, Tyler
    Zou, Xukai
    2020 29TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2020), 2020,
  • [3] Cryptographically Enforced Access Control in Blockchain-Based Platforms
    Ghaffaripour, Shadan
    Miri, Ali
    2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [4] Cryptographically Enforced Orthogonal Access Control at Scale
    Wall, Bob
    Walsh, Patrick
    SCC'18: PROCEEDINGS OF THE 6TH INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2018, : 57 - 65
  • [5] Efficient key management for cryptographically enforced access control
    Zych, Anna
    Petkovic, Milan
    Jonker, Willem
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (06) : 410 - 417
  • [6] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [7] Cryptographically-enforced hierarchical access control with multiple keys
    Crampton, Jason
    JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2009, 78 (08): : 690 - 700
  • [8] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [9] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    2001, Association for Computing Machinery (35):
  • [10] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    COMPUTER, 2012, 45 (06) : 81 - 88