期刊文献+

一种基于双因子加密的访问控制方法 被引量:1

下载PDF
导出
摘要 在大数据时代,由于云存储服务商提供商对数据保护或使用不当,导致出现大量的数据安全和隐私泄露的问题。提出了一种基于双因子加密的密文访问控制方法,将数据及其授权表分别作为因子,数据因子使用对称加密保证机密性,数据的用户授权表因子使用非对称加密,保证授权可靠性。在保证了数据的机密性的同时,有效避免了传统的密文访问控制方法中撤销用户授权会带来大量系统开销的问题。
出处 《科技与创新》 2022年第17期152-153,156,共3页 Science and Technology & Innovation
基金 国网山西省电力公司科技项目基金(编号:5205c0170006)。
  • 相关文献

参考文献3

二级参考文献39

  • 1Coyne E J. Role-engineerng [C] //Proc of the 1st ACM Workshop on Role-Based Access Control. New York: ACM, 1995:15-16.
  • 2Kern A, Kuhlmann M, Schaad A, et al. Observations on the role life-cycle in the context of enterprise security management [C] //Proc of the 7th ACM Syrup on Access Control Models and Technologies (SACMAT2002). New York: ACM, 2002:43-51.
  • 3Shin D, Ahn G J, Cho S, et al. On modeling system-centric information for role engineering [C] //Proe of the 8th ACM Symp on Access Control Models and Technologies (SACMAT2003). New York: ACM, 2003:169-178.
  • 4Kuhlmann M, Shohat D, Schimpf G. Role mining-revealing business roles for security administration using data mining technology [C] //Proc of the 8th ACM Syrup on Access Control Models and Technologies (SACMAT2003). New York: ACM, 2003:179-186.
  • 5Vaidya J, Atluri V, Guo Q. The role mining problem: Finding a minimal descriptive set of roles [C] //Proc of the 12th ACM Symp on Access Control Models and Technologies (SACMAT2007). New York: ACM, 2007:175-184.
  • 6Vaidya J, Atluri V, Guo Q. The role mining problem: A formal perspective[J]. ACM Trans on Information and System Security (TISSEC), 2010, 13(3) : 27:1-27:31.
  • 7Lu Haibing, Vaidya J, Atluri V. Optimal Boolean matrix decomposition: Application to role engineering [C] //Proc of IEEE 24th Int Conf on Data Engineering (ICDE'08). Los Alamitos, CA: IEEE Computer Society, 2008: 297-306.
  • 8Guo Q, Vaidya J, Atluri V. The role hierarchy mining problem. Discovery of optimal role hierarchies [C] //Proc of the 2008 Annual Computer Security Applications Conf (ACSAC'08). Los Alamitos, CA: IEEE Computer Society, 2008:237-246.
  • 9Frank M, Buhmann J M, Basin D. On the definition of role mining [C] //Proc of the 15th ACM Symp on Access Control Models and Technologies (SACMAT2010). New York: ACM, 2010:35-43.
  • 10Schlegelmilch J, Steffens U. Role mining with ORCA [C] // Proc of the 10th ACM Syrup on Access Control Models and Technologies (SACMAT2005). New York: ACM, 2005: 168-176.

共引文献79

同被引文献14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部