期刊文献+

一种基于密码的层次访问控制方案及其分析 被引量:2

An Efficient Cryptosystem Based Hierarchical Access Control Scheme and Its Analysis
下载PDF
导出
摘要 论文在研究现有访问控制方法的基础上,详细分析了文献[1]和文献[2]中利用密码技术实现层次访问控制的机制,指出了它们的优缺点。更重要的是,提出了一种新的简单而有效的利用密码技术实现层次访问控制的机制,通过与文献[1]和文献[2]中机制的比较,方案在存储和计算复杂度等方面都具有优越性。 This paper analyzes the schemes of [1] and [2] based on the research of access control methods,which propose hierarchical access control methods using cryptosystems,and sets forth relative merits of each method.More importantly,we present a simple yet powerful approach for hierarchical access control using hybrid cryptosystems in this paper.The comparison to the existing two schemes shows that our scheme is more superior to them in both storage and computational performances.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第33期7-10,共4页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(编号:60277027) 国家973基础研究规划资助项目(编号:TG1999035808)
关键词 层次访问控制 密码 非对称加密体制 hierarchical access control,cryptography,asymmetric key cryptosystem
  • 相关文献

参考文献5

  • 1I Ray,I Ray,N Narasimhamurthi.A Cryptographic Solution to Implement Access Control in a Hierarchy and More[C].In:Proc 7^th ACM Sympo, Access Control Models and Technologies(formerly,ACM Workshop on Role-based Access Control),2002:65-73.
  • 2X Zou ,B Ramamurthy, S Magliveras.Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communications[C]. In:Proc ICICS 2001,LNCS 2229,2001:381-385.
  • 33.D Ferraiolo,R Kuhn.Role-based Access Controls[C].In:Proc 15^th NIST- NCSC National Computer Security Conference,1992:554-563.
  • 4R S Sandhu,E J Coyne,H L Feinstein et al.Role-based Access Control Models[C].In:IEEE Computer Society,1996:38-47.
  • 5J A Buchmann.Introduction to Cryptography[M].Springer-Verlag,2001.

同被引文献27

  • 1张淼,徐国爱,胡正名,杨义先.可信计算环境下基于主机身份的一次性密钥交换协议[J].电子与信息学报,2007,29(6):1348-1351. 被引量:2
  • 2李凌.云计算服务中数据安全的若干问题研究[D].合肥:中国科学技术大学,2013.
  • 3WANG Q,WANG C,REN K.Enabling public auditability and datadynamics for storage security in cloud computing. IEEE Transac-tions on Parallel and Distributed Systems . 2011
  • 4GOYAL V,PANDEY O,SAHAI A,et al.Attribute based encryptionfor fine-grained access control of encrypted data. ACM conferenceon Computer and Communications Security . 2006
  • 5BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attrib-ute-based encryption. 2007 IEEE Symposium on Security and Pri-vacy (SP’’07) . 2007
  • 6KALLAHALLA M,RIEDEL E,SWAMINATHAN R,et al.Plutus:scalable secure file sharing on untrusted storage. 2nd USENIXConference on File and Storage Technologies (FAST’’03) . 2003
  • 7Ray I,Ray I,Narasimhamurthi N.A cryptographic solution to implementaccess control in a hierarchy and more. SACMAT’02: Proceedings of the seventhACM symposium on Access control models and technologies . 2002
  • 8Burr W E, Ferraiolo H,Waltermire D. NIST and computer security [ J ]. IT Professional, 2014,16 ( 2 ) : 31 - 37.
  • 9Presbrey J. Linked data platform for web applications [ D ]. Massachu- setts Institute of Technology,2014.
  • 10Hicks R. Stata and dropbox [ J ]. Stata Journal, 2014, 14 ( 3 ) : 693 - 696.

引证文献2

二级引证文献67

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部