The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
O controle de acesso desempenha um papel importante na área de segurança da informação, garantindo que qualquer acesso aos dados seja autorizado. Controle de acesso hierárquico é um modelo especial de controle de acesso em ambiente distribuído, no qual cada usuário protege seus dados locais através de uma chave secreta; além disso, para quaisquer dois usuários relacionados ui e uj, ui pode acessar ujdados de se, e somente se, uiA prioridade de é maior que uj. Portanto, deveria haver uma maneira de ui para obter a chave secreta de uj if uiA prioridade de é maior que uj. Este artigo apresenta uma solução eficiente para o problema. Um tipo especial de função chamada filtro seguro é usado como o bloco de construção da solução proposta. Na solução, um usuário autorizado pode adquirir as chaves corretas de forma eficiente e segura por meio de filtros seguros. A solução proposta também é bem executada ao inserir/excluir usuários, injetar/remover relações e alterar chaves secretas. Principalmente, apenas a exclusão de usuários e a remoção de relações alterarão algumas chaves do sistema, outras operações podem ser realizadas livremente sem afetar outras chaves do sistema; apenas filtros seguros precisam ser modificados nesses casos.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copiar
Kuen-Pin WU, Shanq-Jang RUAN, Chih-Kuang TSENG, Feipei LAI, "Hierarchical Access Control Using the Secure Filter" in IEICE TRANSACTIONS on Information,
vol. E84-D, no. 6, pp. 700-708, June 2001, doi: .
Abstract: Access control plays an important role in the area of information security, which guarantees that any access to data is authorized. Hierarchical access control is a special access control model in distributed environment, in which each user protects his local data using a secret key; moreover, for any two related users ui and uj, ui can access uj's data if, and only if, ui's priority is higher than uj. Therefore, there should be a way for ui to obtain the secret key of uj if ui's priority is higher than uj. This paper presents an efficient solution to the problem. A special kind of function called secure filter is used as the building block of the proposed solution. In the solution, an authorized user can acquire correct keys efficiently and securely via secure filters. The proposed solution is also well-performed while inserting/deleting users, injecting/removing relations, and changing secret keys. Especially, only deleting users and removing relations will change some keys in the system, other operations can be performed freely without affecting other keys in the system; only secure filters need to be modified in these cases.
URL: https://global.ieice.org/en_transactions/information/10.1587/e84-d_6_700/_p
Copiar
@ARTICLE{e84-d_6_700,
author={Kuen-Pin WU, Shanq-Jang RUAN, Chih-Kuang TSENG, Feipei LAI, },
journal={IEICE TRANSACTIONS on Information},
title={Hierarchical Access Control Using the Secure Filter},
year={2001},
volume={E84-D},
number={6},
pages={700-708},
abstract={Access control plays an important role in the area of information security, which guarantees that any access to data is authorized. Hierarchical access control is a special access control model in distributed environment, in which each user protects his local data using a secret key; moreover, for any two related users ui and uj, ui can access uj's data if, and only if, ui's priority is higher than uj. Therefore, there should be a way for ui to obtain the secret key of uj if ui's priority is higher than uj. This paper presents an efficient solution to the problem. A special kind of function called secure filter is used as the building block of the proposed solution. In the solution, an authorized user can acquire correct keys efficiently and securely via secure filters. The proposed solution is also well-performed while inserting/deleting users, injecting/removing relations, and changing secret keys. Especially, only deleting users and removing relations will change some keys in the system, other operations can be performed freely without affecting other keys in the system; only secure filters need to be modified in these cases.},
keywords={},
doi={},
ISSN={},
month={June},}
Copiar
TY - JOUR
TI - Hierarchical Access Control Using the Secure Filter
T2 - IEICE TRANSACTIONS on Information
SP - 700
EP - 708
AU - Kuen-Pin WU
AU - Shanq-Jang RUAN
AU - Chih-Kuang TSENG
AU - Feipei LAI
PY - 2001
DO -
JO - IEICE TRANSACTIONS on Information
SN -
VL - E84-D
IS - 6
JA - IEICE TRANSACTIONS on Information
Y1 - June 2001
AB - Access control plays an important role in the area of information security, which guarantees that any access to data is authorized. Hierarchical access control is a special access control model in distributed environment, in which each user protects his local data using a secret key; moreover, for any two related users ui and uj, ui can access uj's data if, and only if, ui's priority is higher than uj. Therefore, there should be a way for ui to obtain the secret key of uj if ui's priority is higher than uj. This paper presents an efficient solution to the problem. A special kind of function called secure filter is used as the building block of the proposed solution. In the solution, an authorized user can acquire correct keys efficiently and securely via secure filters. The proposed solution is also well-performed while inserting/deleting users, injecting/removing relations, and changing secret keys. Especially, only deleting users and removing relations will change some keys in the system, other operations can be performed freely without affecting other keys in the system; only secure filters need to be modified in these cases.
ER -