A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2024; you can also visit the original URL.
The file type is application/pdf
.
Filters
Cyber Security using Data Structures
[article]
2024
Zenodo
Introduction to Cyber security and Data Structures 2. Fundamentals of Data Structures 3. Cryptography and Data Structures 4. Access Control with Trees and Graphs 5. Secure Data Storage 6. ...
Bloom Filters for Malware Detection 9. Trie Data Structure for IP Lookup 10. Priority Queues in Intrusion Detection 11. Case Studies and Practical Applications 12. ...
Hierarchical Access Control Hierarchical Access Control (HAC) is an access control model that organizes and enforces access permissions in a hierarchical structure. ...
doi:10.5281/zenodo.10528754
fatcat:m4zeprqphjhjphnfqadjwzshmq
Hierarchical key assignment without public-key cryptography
2001
Computers & security
In this paper, we present a solution, suitable for a low cost chip, to the hierarchical control problem.The proposed scheme has promising characteristics such as high computational efficiency, little required ...
Controlling access in a hierarchy is an interesting research topic in computer security. ...
Acknowledgement: The author would like to thank the anonymous referees for comments and suggestion on this paper. ...
doi:10.1016/s0167-4048(01)00711-8
fatcat:jnqstarqpzgm5kgkjkfibyqlzi
Attribute-based Encryption for Electronic Health Records in a Cloud Computing Environment
2015
International Journal of Cloud-Computing and Super-Computing
Attribute-based encryption schemes have the potential to minimise communication cost of the Internet, and also provide a fine-grained access control system for EHR in a cloud computing environment. ...
In this paper, an analysis of ABE systems is discussed with their types (CP-ABE, KP-ABE, HABE and DABE) and suggestions are given for their improvement for EHR in a cloud computing environment. ...
With a high number of dynamic users in these ubiquitous computing environments, implementing cryptographic methods with access control mechanisms would guarantee optimum security for Electronic Health ...
doi:10.21742/ijcs.2015.2.2.01
fatcat:5n3jcceifjfabfkxs35yn2whhm
Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities
2004
Conference on Privacy, Security and Trust
Both schemes are designed to support information access control in hierarchically structured communities of users whose access privileges change very dynamically. ...
This paper presents the first mediated hierarchical identity-based encryption and signature schemes. ...
structured communities of users whose access privileges change very dynamically. ...
dblp:conf/pst/NaliMA04
fatcat:io6zbccocfeeddid44byzzl67a
Coordination of security levels for Internet architectures
1999
Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99
Several mechanisms are needed for a comprehensive defense but this incurs in the problem of their lack of coordination, which can be exploited for attacks. ...
We propose a way to coordinate different mechanisms based on a unified object-oriented modeling approach and a hierarchical architecture whose layers define the scope of each security mechanism. ...
We end with some conclusions and ideas for future work.
2.Architectural levels and security mechanisms It is possible to visualize the structure of a computer system as a hierarchic set of layers or ...
doi:10.1109/dexa.1999.795291
dblp:conf/dexaw/Fernandez99
fatcat:g2tl7dgbkngrleorkgcsbxxnue
A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT
2021
Security and Communication Networks
Hierarchical key assignment scheme is an efficient cryptographic method for hierarchical access control, in which the encryption keys of lower classes can be derived by the higher classes. ...
In this paper, we propose a hierarchical key assignment scheme based on multilinear map to solve the multigroup access control in Internet of Things data markets. ...
Tsudik, “Simple and fault-tolerant
cryptographic key assignment schemes for dynamic access key agreement for dynamic collaborative groups,” in Pro-
control in a user hierarchy,” ...
doi:10.1155/2021/6174506
fatcat:q2qn7o3yznbdfn45h6nw4qjrtm
A Review on Access Control Policy and Key Generation in Data Sharing
2019
International Journal of Advanced Engineering Research and Science
The layered access structures are integrated into a single access structure, and then the hierarchical files are encrypted with the integrated access structure. ...
FH-CP-ABE extends typical CPABE with a hierarchical structure of access policy, so as to achieve simple, flexible and fine-grained access control Moreover, the proposed scheme is proved to be secure under ...
doi:10.22161/ijaers.6.2.6
fatcat:jghs5et6lbhxxjgd7e2c2d2cve
Cryptographic role-based security mechanisms based on role-key hierarchy
2010
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security - ASIACCS '10
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the resource level. ...
With the help of rich algebraic structure of elliptic curve, we introduce a rolebased cryptosystem construction to verify the rationality and validity of our proposed model. ...
control and dynamic cryptographic technology; • Changing users' access privileges by dynamically converging the information of users' decryption keys to generate one-time role-based encryption keys; and ...
doi:10.1145/1755688.1755728
dblp:conf/ccs/ZhuAHW10
fatcat:axrmjqfakfeenowiemry66e2nm
The Principle and Progress of Dynamically Reconfigurable Computing Technologies
2020
Chinese journal of electronics
Dynamically reconfigurable computing architecture, which has the both characteristics, is one of the most promising architectures for future processors. ...
The technologies of dynamically reconfigurable computing are continually evolving, and some cheering results of application have been achieved. ...
Ref. [39] proposed a transaction programming model for dynamic data structures. ...
doi:10.1049/cje.2020.05.002
fatcat:drwvb2el4zbc3mge4ytqtdx7z4
Encryption Based Access Control Model In Cloud: A Survey
2015
Journal of Telematics and Informatics
In this paper we will be reviewing various encryption based access control model for enhancing cloud security along with their limitations. ...
We will be concluding with a proposed access control model to enhance cloud security. ...
The system model of the cryptographic based access control is shown in Figure 1 . ...
doi:10.12928/jti.v3i1.15-21
fatcat:62as2xyhvze45gbj4x7deljt3u
Attribute based Access Control Scheme in Cloud Storage System
2018
International Journal of Engineering & Technology
Here we noticed secure access controlling is the prime objective for sensitive data management.in this regards we have been used ABE (Attribute based encryption) for the above objective. ...
But cloud is semi honest in nature due to not reveled storage and security structure thus while storing and sharing cloud data , its suppose to honest and secured. ...
Character-based access control data has privacy, which is not reliable to server, detailed control and approval of problematic largescale dynamics for traditional access control light. ...
doi:10.14419/ijet.v7i4.6.20228
fatcat:y3xs327bxndcvmehx6eu2ipzra
Securing Private Keys in Electronic Health Records Using Session-Based Hierarchical Key Encryption
2017
Journal of Applied Security Research
In this article, a sessionbased hierarchical key encryption system was developed that allows patient to have full control over certain nodes of their health records. ...
Health records were organized in a hierarchical structure with records further broken down into subcategories. Cryptography was used to encrypt the health records in their different subcategories. ...
Using hierarchy (Access Table ACCESS ) and Diffie-Hellman based key generation scheme, Zych, Petkovic, and Jonker (2008) presented a key management scheme for cryptographic enforcement of access control ...
doi:10.1080/19361610.2017.1354272
fatcat:63k3ttakfratleip4tobtrh75q
A Cryptographic Solution for General Access Control
[chapter]
2005
Lecture Notes in Computer Science
In this paper, we propose a cryptographic solution for general access control based on Chinese Remainder Theorem. Our solution has two categories: data based solution and key based solution. ...
In particular, hierarchical encryption, as an alternate solution of access control in a hierarchy, has been intensively studied. ...
That is, besides supporting access control policies following the hierarchical structure of an organization, RRN system also supports access control policies that do not follow the hierarchical structure ...
doi:10.1007/11556992_33
fatcat:nerqg36dsvgcrfh7eedzomtv5a
A Review on RSA Encryption Algorithm
2016
International Journal Of Engineering And Computer Science
This work is focused on the use of dynamic keys for securing the data and for securing data transmission. ...
The principle of confidentially specifies that only the sender and the intended recipient should be able to access the contents of a message. ...
[12] worked on hierarchical attribute based solution for flexible and scalable access control in cloud computing. ...
doi:10.18535/ijecs/v5i7.07
fatcat:6cvgarxgsvfjbazzdaf3572udm
An Improved Key-Management Scheme for Hierarchical Access Control
2017
International Journal of Network Security
Therefore, accessing data should strictly control to avoid unauthorized access. In this paper, we propose the more efficient key management scheme for hierarchical access control than Odelu et al.' ...
Finally, we show the dynamic key management.
Key Generation Phase Like Odelu et al.'s scheme, CA builds the hierarchical structure for access control. ...
Key Generation Phase Firstly, CA builds the hierarchical structure for controlling access among the security classes. ...
dblp:journals/ijnsec/ChaoTH17
fatcat:eogvpothrnbdph4ggkzx2ljemm
« Previous
Showing results 1 — 15 out of 7,142 results