Design of a Lattice-based Access Control Scheme

被引:1
|
作者
Chiang, Chia-Chu [1 ]
Bayrak, Coskun [1 ]
Seker, Remzi [1 ]
Topaloglu, Umit [2 ]
Demirer, Murat [1 ,3 ]
Samadi, Nasrola [1 ]
Tek, Suleyman [1 ]
Jiang, Bian [1 ]
Zhou, GuangXu [1 ]
Wang, Xiaoran [1 ]
机构
[1] Univ Arkansas, Dept Comp Sci, 2801 South Univ Ave, Little Rock, AR 72204 USA
[2] UAMS, Little Rock, AR 72205 USA
[3] Kultur Univ, Fac Sci & Letters, Comp Sci Dept, Istanbul, Turkey
关键词
Access Control; Cryptographic Keys; Cryptography; Dynamic Key Management; Hierarchical Access Control; Lattice; Rekeying; KEY MANAGEMENT SCHEMES; ASSIGNMENT SCHEME;
D O I
10.1109/ICSMC.2009.5346329
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We survey the literature for access control schemes in a user hierarchy. Some schemes have already been shown to be insecure or incorrect. Many schemes assume very restrictive subordinating relationships existing in a hierarchy where users are grouped into partially ordered relationships without taking resources into consideration. We believe that a practical access control scheme should support access control in a lattice where users and resources are both together grouped into partially ordered relationships. In this paper, we present a scheme to achieve this goal. We also study existing schemes for their efficiency and performance. Based on the results of the study, we design an efficient scheme to support dynamic key management.
引用
收藏
页码:68 / +
页数:2
相关论文
共 50 条
  • [1] LATTICE-BASED ACCESS-CONTROL MODELS
    SANDHU, RS
    COMPUTER, 1993, 26 (11) : 9 - 19
  • [2] Lattice-based access authentication scheme for quantum communication networks
    Min WANG
    GuiLu LONG
    Science China(Information Sciences), 2024, 67 (12) : 311 - 317
  • [3] Lattice-based access authentication scheme for quantum communication networks
    Wang, Min
    Long, Gui-Lu
    SCIENCE CHINA-INFORMATION SCIENCES, 2024, 67 (12)
  • [4] A Lattice-based Access Control Model for Social Networks
    Zhang, Yingjun
    Chen, Kai
    Liu, Yuling
    Lian, Yifeng
    2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016, 2016, : 54 - 61
  • [5] On the Design and Security of a Lattice-Based Threshold Secret Sharing Scheme
    Khorasgani, Hamidreza Amini
    Asaad, Saba
    Pilaram, Hossein
    Eghlidos, Taraneh
    Aref, Mohammad Reza
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 8 (01): : 25 - 38
  • [6] A Lattice-Based Batch Identification Scheme
    Silva, Rosemberg
    Cayrel, Pierre-Louis
    Lindner, Richard
    2011 IEEE INFORMATION THEORY WORKSHOP (ITW), 2011,
  • [7] A simple lattice-based PKE scheme
    Zhou, Limin
    Hu, Zhengming
    Lv, Fengju
    SPRINGERPLUS, 2016, 5
  • [8] Lattice-based certificateless encryption scheme
    Jiang, Mingming
    Hu, Yupu
    Lei, Hao
    Wang, Baocang
    Lai, Qiqi
    FRONTIERS OF COMPUTER SCIENCE, 2014, 8 (05) : 828 - 836
  • [9] Lattice-based certificateless encryption scheme
    Mingming Jiang
    Yupu Hu
    Hao Lei
    Baocang Wang
    Qiqi Lai
    Frontiers of Computer Science, 2014, 8 : 828 - 836
  • [10] LAA: Lattice-Based Access Authentication Scheme for IoT in Space Information Networks
    Ma, Ruhui
    Cao, Jin
    Feng, Dengguo
    Li, Hui
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04): : 2791 - 2805