Dynamic key management schemes for access control in a hierarchy

被引:66
作者
Lin, CH [1 ]
机构
[1] Tunghai Univ, Dept Comp & Informat Sci, Taichung 407, Taiwan
关键词
multilevel data security; partially ordered set; access control; key assignment; key management; cryptographic key; user hierarchy;
D O I
10.1016/S0140-3664(97)00100-X
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure access control in user hierarchy is designed such that users are authorized and classified into different privilege classes. A user belonging to a higher-privileged class will have access rights to messages created or owned by users in a lower-privileged class; while the opposite is not allowed. Methods for generating cryptographic keys to security classes can be categorized as the key assignment approach and the key management approach. In this paper, we shall propose a new hierarchical access control mechanism which possesses the advantages of the two approaches. Dynamic operations, such as class insertions or class deletions and key changes, etc., can be fulfilled efficiently. Resides, it is easy for an ancestor to deduce the key of his descendants which is positioned in a far-lower-privileged class. (C) 1997 Elsevier Science B.V.
引用
收藏
页码:1381 / 1385
页数:5
相关论文
共 22 条
[1]   CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY [J].
AKL, SG ;
TAYLOR, PD .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :239-248
[2]  
[Anonymous], 1982, CRYPTOGRAPHY DATA SE, DOI DOI 10.5555/539308
[3]   A SCHEME TO DETERMINE THE RELATIONSHIP BETWEEN 2 USERS IN A HIERARCHY [J].
CHANG, CC ;
JAN, JK ;
BUEHRER, DJ .
COMPUTERS & SECURITY, 1994, 13 (03) :255-261
[4]   ACCESS-CONTROL IN A HIERARCHY USING A ONE-WAY TRAP DOOR FUNCTION [J].
CHANG, CC ;
BUEHRER, DJ .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1993, 26 (05) :71-76
[5]   CRYPTOGRAPHIC KEY ASSIGNMENT SCHEME FOR ACCESS-CONTROL IN A HIERARCHY [J].
CHANG, CC ;
HWANG, RJ ;
WU, TC .
INFORMATION SYSTEMS, 1992, 17 (03) :243-247
[6]  
CHANG CC, 1994, T INFORMATION PROCES, V35, P2189
[7]   A DATABASE ENCRYPTION SYSTEM WITH SUBKEYS [J].
DAVIDA, GI ;
WELLS, DL ;
KAM, JB .
ACM TRANSACTIONS ON DATABASE SYSTEMS, 1981, 6 (02) :312-328
[8]  
Denning D. E., 1986, Proceedings of the 1986 IEEE Symposium on Security and Privacy (Cat. No.86CH2292-1), P156
[9]  
FRAIM LJ, 1983, IEEE COMPUTER JUL, P126
[10]  
Harn L., 1990, Computers & Security, V9, P539, DOI 10.1016/0167-4048(90)90132-D