Affiliation:
1. Royal Holloway, University of London, Egham, UK
Abstract
The enforcement of access control policies using cryptography has received considerable attention in recent years and the security of such enforcement schemes is increasingly well understood. Recent work in the area has considered the efficient enforcement of temporal and geo-spatial access control policies, and asymptotic results for the time and space complexity of efficient enforcement schemes have been obtained. However, for practical purposes, it is useful to have explicit bounds for the complexity of enforcement schemes.
In this article we consider interval-based access control policies, of which temporal and geo-spatial access control policies are special cases. We define enforcement schemes for interval-based access control policies for which it is possible, in almost all cases, to obtain exact values for the schemes' complexity, thereby subsuming a substantial body of work in the literature. Moreover, our enforcement schemes are more practical than existing schemes, in the sense that they operate in the same way as standard cryptographic enforcement schemes, unlike other efficient schemes in the literature. The main difference between our approach and earlier work is that we develop techniques that are specific to the cryptographic enforcement of interval-based access control policies, rather than applying generic techniques that give rise to complex constructions and asymptotic bounds.
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference27 articles.
1. Cryptographic solution to a problem of access control in a hierarchy
2. Alon N. and Schiebe R. B. 1987. Optimal preprocessing for answering on-line product queries. Tech. rep. TR 71/87 Institute of Computer Science Tel-Aviv University. Alon N. and Schiebe R. B. 1987. Optimal preprocessing for answering on-line product queries. Tech. rep. TR 71/87 Institute of Computer Science Tel-Aviv University.
3. Dynamic and Efficient Key Management for Access Hierarchies
4. Key management for non-tree access hierarchies
5. Efficient techniques for realizing geo-spatial access control
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献