PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Algebraic Framework for the Specification and Analysis of Cryptographic-Key Distribution

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Several organizations generate and store a wide range of information in what is commonly referred to as data stores. To access the information within these data stores, two main architectures are widely adopted. The first architecture gives access to information through a trusted server that enforces established confidentiality policies. The second one allows the information to be public but in its encrypted form. Then through a scheme for the distribution of cryptographic keys, each user is provided with the keys needed to decrypt only the part of the information she is authorized to access. This paper relates to the latter architecture. We introduce an algebraic framework that takes into consideration a new perspective in tackling the key-distribution problem. We use the proposed framework to analyze key-distribution schemes that are representative of the ones found in the literature. The framework enables the specification and the verification of key-distribution policies. We also point to several other applications related to measures ensuring information confidentiality.
Wydawca
Rocznik
Strony
305--335
Opis fizyczny
Bibliogr. 21 poz., tab., wykr.
Twórcy
autor
autor
Bibliografia
  • [1] Akl, S., Taylor, P.: Cryptographic solution to a problem of access control in a hierarchy, ACM Transaction on Computer Systems, 1(3), 1983, 239-248, ISSN 0734-2071.
  • [2] Atallah, M. J., Blanton, M., Fazio, N., Frikken, K. B.: Dynamic and efficient key management for access hierarchies, ACM Transactions on Information and System Security (TISSEC), 12(3), 2009, 1-43, ISSN 1094-9224.
  • [3] Birget, J.-C., Zou, X., Noubir, G., Ramamurthy, B.: Hierarchy-based access control in distributed environments, IEEE International Conference on Communications, Helsinki, Finland, June 2001.
  • [4] Boyd, C.: Some applications of multiple key ciphers, Proceedings of Advances in Cryptology (EUROCRYPT' 88), 330, Springer-Verlag New York, Inc., New York, NY, USA, May 1988, ISBN 0-387-50251-3.
  • [5] Carbone, M., Honda, K., Yoshida, N.: Structured Communication-Centred Programming for Web Services, Proceedings of the Programming Languages and Systems (R. D. Nicola, Ed.), 4421, Springer, 2007, ISBN 978-3-540-71314-2.
  • [6] Crampton, J.: Applying hierarchical and role-based access control to XML documents, Proceedings of the 2004 workshop on Secure web service (SWS '04), ACM, Fairfax, Virginia, USA, 2004, ISBN 1-58113-973-X.
  • [7] Hebisch, U., Weinert, H. J.: Semirings algebraic theory and applications in computer science, World Scientific Publishing Co. Pte. Ltd., 1993.
  • [8] Höfner, P., Khedri, R., Möller, B.: Feature algebra, Proceedings of the 14th International Symposium on Formal Methods (J. Misra, T. Nipkow, E. Sekerinski, Eds.), 4085, Springer, Hamilton, ON, Canada, August 2006.
  • [9] Hungerford, T. W.: Algebra, vol. 73 of Graduate Texts in Mathematics, Springer, 1974.
  • [10] Lang, S.: Algebra, vol. 211 of Graduate Texts in Mathematics, Revised third edition edition, Springer, 2002.
  • [11] Liaw, H.-T., Lei, C.-L.: An optimal algorithm to assign cryptographic keys in a tree structure for access control, BIT Numerical Mathematics, 33(1), March 1993, 46-56.
  • [12] Lowe, G., Roscoe, B.: Using CSP to detect errors in the TMN protocol, IEEE Transactions on Software Engineering, 23(10), October 1997, 659-669.
  • [13] Mao, W.: Modern cryptography: theory and practice, Prentice Hall, 2004.
  • [14] McCune, W.: Prover9 and Mace4, Http://www.cs.unm.edu/ mccune/prover9/.
  • [15] Meadows, C.: Analysis of the internet key exchange protocol using the NRL protocol analyzer, Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society, May 1999.
  • [16] Miklau, G., Suciu, D.: Controlling access to published data using cryptography, Proceedings of the 29th international conference on Very large data bases (VLDB'2003), VLDB Endowment, 2003, ISBN 0-12-722442-4.
  • [17] Naor, M., Shamir, A.: Visual cryptography, Proceedings of the Advances in Cryptology (EUROCRYPT'94), 950, Springer, 1994.
  • [18] Ray, I., Ray, I., Narasimhamurthi, N.: A cryptographic solution to implement access control in a hierarchy and more, Proceedings of the seventh ACM symposium on Access control models and technologies (SACMAT '02), ACM, Monterey, California, USA, 2002, ISBN 1-58113-496-7.
  • [19] Sabri, K. E.: Algebraic framework for the verification of confidentiality properties, Ph.D. Thesis, McMaster University, 2010.
  • [20] Sabri, K. E., Khedri, R., Jaskolka, J.: Verification of information flow in agent-based systems, Proceedings of the 4th MCETECH Conference on e-Technologies (G. Babin, P. Kropf, M. Weiss, Eds.), 26, Springer-Verlag Berlin Heidelberg, Ottawa, Canada, May 2009.
  • [21] Shamir, A.: How to share a secret, Communications of the ACM, 22(11), November 1979, 612-613, ISSN 0001-0782.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS8-0022-0061
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.