A comment on the Chen-Chung scheme for hierarchical access control
نویسندگان
چکیده
Consider an information system in which users are organized in a hierarchical structure for access control. In such a system, there are a number of disjoint security classes and each user belongs to one of the security classes. Each security class is assigned a key, used for encryption, identification, etc. Among the security classes, there is a partial order, ≤, where SC1 ≤ SC2 represents that security class SC1 is subordinate to SC2, and thus a user in SC2 has the privilege to access information possessed by SC1. (In this case, we say that SC2 is a predecessor of SC1, or SC1 is a successor of SC2) Typically, it is desirable to allow the user in a superior class to derive the key of a subordinating class. In other words, a user in SC2 should be able to derive the key of SC1 if SC1 ≤ SC2. In this way, users in a superior security class don’t need to keep the keys of all subordinating classes, but can still access the information possessed by these classes. On the other hand, for the purpose of security, a user should never be able to derive the key of a security class that is not subordinate to his own class.
منابع مشابه
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملNovel Hierarchical Control of VSI-based Microgrids Against Large-Signal Disturbances
This paper provides a novel hierarchical control for VSI-based microgrids. The advantage of the provided control scheme is to maintain the frequency and voltage stability and load sharing against large-signal disturbances. A hierarchical control, consisting of three levels, is described. A new control loop based on PI controller, is presented. The new control loop has a great impact on increasi...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملAn Id-based Access Control in a Hierarchical Key Management for Mobile Agent
The related techniques and applications on e-commerce have been concerned by a great number of researchers. The use of a mobile agent, in particular, is an important breakthrough on the e-commerce applications. With the abilities of higher autonomy and mobility, a mobile agent can move freely among different execution environments, can automatically detect its resided environment, and can react...
متن کاملWomen’s Education and World Peace: A Feminist Dream Comes True; Comment on “The Pill Is Mightier Than the Sword”
This commentary on Potts et al provides a critical view on their thesis that increasing the level of education among women is likely to reduce terrorism. Presence of a strong family planning program enables women to control family size resulting in women’s public participation more likely and facilitating the emergence of small birth cohorts who are less likely to become unemployed. In spite of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computers & Security
دوره 22 شماره
صفحات -
تاریخ انتشار 2003