Expressive Policy-Based Access Control for Resource-Constrained Devices
نویسندگان
چکیده
منابع مشابه
Typed static analysis for concurrent, policy-based, resource access control
We present a type and effect system for statically determining whether concurrent programs in a simple functional language adhere to a strict access control policy. Policy states are represented by automata states and are tracked, statically, by the type and effect system. We ensure that, per thread, all function calls are, independently, in accordance with policy with respect to the current st...
متن کاملMemory Access Pattern Protection for Resource-Constrained Devices
We propose a practice-oriented scheme for protecting RAM access pattern. We first consider an instance which relies on the use of a secure (trusted) hardware buffer; it achieves both security and performance levels acceptable in practice by adapting ideas from oblivious RAM mechanisms, yet without the expensive (re-)shuffling of buffers. Another instance requires no special hardware, but as a r...
متن کاملBlind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data
Oblivious transfer with access control is a protocol where data in the database server are protected with access control policies and users with credentials satisfying the access policies are allowed to access them, whereas the database server learns nothing about the data accessed by users or about her credentials.Our scheme has the advantages as follows: First, our scheme maintains the privac...
متن کاملSIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices
To provide better overall performance, identity (ID)-based signcryption (IBSC) has been constructed by combining ID-based signature (IBS) and ID-based encryption (IBE) in a secure manner. Undoubtedly, the IBSC fulfills the authentication and the confidentiality by signature and encryption, respectively. All the previously proposed IBSC schemes are inseparable in the sense that the two-layer sig...
متن کاملA Policy Based Framework for Access Control
This paper presents a policy-based framework for managing access control in distributed heterogeneous systems. This framework is based on the PDP/PEP approach. The PDP (Policy Decision Point) is a network policy server responsible for supplying policy information for network devices and applications. The PEP (Policy Enforcement Point) is the policy client (usually, a component of the network de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2018
ISSN: 2169-3536
DOI: 10.1109/access.2017.2730958