loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Author: Mikko Kiviharju

Affiliation: Finnish Defence Forces Technical Research Centre, Finland

ISBN: 978-989-8565-24-2

Keyword(s): Cryptographic Access Control, CAC, Permissions, Access Control, CBIS.

Related Ontology Subjects/Areas/Topics: Access Control ; Applied Cryptography ; Cryptographic Techniques and Key Management ; Data and Application Security and Privacy ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Internet Technology ; Secure Cloud Computing ; Security in Distributed Systems ; Web Information Systems and Technologies

Abstract: Access control lies at the heart of any technical information security and information assurance system. Access control is traditionally enforced by reference monitors, which are assumed to be able to reliably monitor and mediate all traffic from users to objects. An alternative view to enforcement is cryptography, referred to as cryptographic access control (CAC). CAC has gained popularity with the emergence of distributed computing, especially cloud computing and “everything as a service”. CAC is not a formal model, but an enforcement paradigm. In this paper we propose an extension to the current CAC framework and discuss the limits, where it is in general feasible to extend CAC as a paradigm over reference monitors.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.93.75.242

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Kiviharju, M. (2012). Towards Pervasive Cryptographic Access Control Models.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012) ISBN 978-989-8565-24-2, pages 239-244. DOI: 10.5220/0004042502390244

@conference{secrypt12,
author={Mikko Kiviharju.},
title={Towards Pervasive Cryptographic Access Control Models},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)},
year={2012},
pages={239-244},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004042502390244},
isbn={978-989-8565-24-2},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2012)
TI - Towards Pervasive Cryptographic Access Control Models
SN - 978-989-8565-24-2
AU - Kiviharju, M.
PY - 2012
SP - 239
EP - 244
DO - 10.5220/0004042502390244

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.