Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








7,142 Hits in 3.8 sec

Cyber Security using Data Structures [article]

S. R. Jena, Dileep Kumar M.
2024 Zenodo  
Introduction to Cyber security and Data Structures 2. Fundamentals of Data Structures 3. Cryptography and Data Structures 4. Access Control with Trees and Graphs 5. Secure Data Storage 6.  ...  Bloom Filters for Malware Detection 9. Trie Data Structure for IP Lookup 10. Priority Queues in Intrusion Detection 11. Case Studies and Practical Applications 12.  ...  Hierarchical Access Control Hierarchical Access Control (HAC) is an access control model that organizes and enforces access permissions in a hierarchical structure.  ... 
doi:10.5281/zenodo.10528754 fatcat:m4zeprqphjhjphnfqadjwzshmq

Hierarchical key assignment without public-key cryptography

Chu-Hsing Lin
2001 Computers & security  
In this paper, we present a solution, suitable for a low cost chip, to the hierarchical control problem.The proposed scheme has promising characteristics such as high computational efficiency, little required  ...  Controlling access in a hierarchy is an interesting research topic in computer security.  ...  Acknowledgement: The author would like to thank the anonymous referees for comments and suggestion on this paper.  ... 
doi:10.1016/s0167-4048(01)00711-8 fatcat:jnqstarqpzgm5kgkjkfibyqlzi

Attribute-based Encryption for Electronic Health Records in a Cloud Computing Environment

Emmanuel Kusi Achampong, Clement Dzidonu
2015 International Journal of Cloud-Computing and Super-Computing  
Attribute-based encryption schemes have the potential to minimise communication cost of the Internet, and also provide a fine-grained access control system for EHR in a cloud computing environment.  ...  In this paper, an analysis of ABE systems is discussed with their types (CP-ABE, KP-ABE, HABE and DABE) and suggestions are given for their improvement for EHR in a cloud computing environment.  ...  With a high number of dynamic users in these ubiquitous computing environments, implementing cryptographic methods with access control mechanisms would guarantee optimum security for Electronic Health  ... 
doi:10.21742/ijcs.2015.2.2.01 fatcat:5n3jcceifjfabfkxs35yn2whhm

Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities

Deholo Nali, Ali Miri, Carlisle M. Adams
2004 Conference on Privacy, Security and Trust  
Both schemes are designed to support information access control in hierarchically structured communities of users whose access privileges change very dynamically.  ...  This paper presents the first mediated hierarchical identity-based encryption and signature schemes.  ...  structured communities of users whose access privileges change very dynamically.  ... 
dblp:conf/pst/NaliMA04 fatcat:io6zbccocfeeddid44byzzl67a

Coordination of security levels for Internet architectures

E.B. Fernandez
1999 Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99  
Several mechanisms are needed for a comprehensive defense but this incurs in the problem of their lack of coordination, which can be exploited for attacks.  ...  We propose a way to coordinate different mechanisms based on a unified object-oriented modeling approach and a hierarchical architecture whose layers define the scope of each security mechanism.  ...  We end with some conclusions and ideas for future work. 2.Architectural levels and security mechanisms It is possible to visualize the structure of a computer system as a hierarchic set of layers or  ... 
doi:10.1109/dexa.1999.795291 dblp:conf/dexaw/Fernandez99 fatcat:g2tl7dgbkngrleorkgcsbxxnue

A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT

Xiaoyu Li, Min Ye, Jiahui Chen, Jianhui Chen, Yeh-Cheng Chen, Xingsi Xue
2021 Security and Communication Networks  
Hierarchical key assignment scheme is an efficient cryptographic method for hierarchical access control, in which the encryption keys of lower classes can be derived by the higher classes.  ...  In this paper, we propose a hierarchical key assignment scheme based on multilinear map to solve the multigroup access control in Internet of Things data markets.  ...  Tsudik, “Simple and fault-tolerant cryptographic key assignment schemes for dynamic access key agreement for dynamic collaborative groups,” in Pro- control in a user hierarchy,”  ... 
doi:10.1155/2021/6174506 fatcat:q2qn7o3yznbdfn45h6nw4qjrtm

A Review on Access Control Policy and Key Generation in Data Sharing

Mr. Mangnale Gajanan K., Prof. Korde A. L., Dr R K Patil, Dr R K Sawant
2019 International Journal of Advanced Engineering Research and Science  
The layered access structures are integrated into a single access structure, and then the hierarchical files are encrypted with the integrated access structure.  ...  FH-CP-ABE extends typical CPABE with a hierarchical structure of access policy, so as to achieve simple, flexible and fine-grained access control Moreover, the proposed scheme is proved to be secure under  ... 
doi:10.22161/ijaers.6.2.6 fatcat:jghs5et6lbhxxjgd7e2c2d2cve

Cryptographic role-based security mechanisms based on role-key hierarchy

Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
2010 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security - ASIACCS '10  
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the resource level.  ...  With the help of rich algebraic structure of elliptic curve, we introduce a rolebased cryptosystem construction to verify the rationality and validity of our proposed model.  ...  control and dynamic cryptographic technology; • Changing users' access privileges by dynamically converging the information of users' decryption keys to generate one-time role-based encryption keys; and  ... 
doi:10.1145/1755688.1755728 dblp:conf/ccs/ZhuAHW10 fatcat:axrmjqfakfeenowiemry66e2nm

The Principle and Progress of Dynamically Reconfigurable Computing Technologies

Shaojun Wei, Yan'an Lu
2020 Chinese journal of electronics  
Dynamically reconfigurable computing architecture, which has the both characteristics, is one of the most promising architectures for future processors.  ...  The technologies of dynamically reconfigurable computing are continually evolving, and some cheering results of application have been achieved.  ...  Ref. [39] proposed a transaction programming model for dynamic data structures.  ... 
doi:10.1049/cje.2020.05.002 fatcat:drwvb2el4zbc3mge4ytqtdx7z4

Encryption Based Access Control Model In Cloud: A Survey

Rachana Chavda, Rajanikanth Aluvalu
2015 Journal of Telematics and Informatics  
In this paper we will be reviewing various encryption based access control model for enhancing cloud security along with their limitations.  ...  We will be concluding with a proposed access control model to enhance cloud security.  ...  The system model of the cryptographic based access control is shown in Figure 1 .  ... 
doi:10.12928/jti.v3i1.15-21 fatcat:62as2xyhvze45gbj4x7deljt3u

Attribute based Access Control Scheme in Cloud Storage System

Banoth SeethaRamulu, H. Balaji, Bashetty Suman
2018 International Journal of Engineering & Technology  
Here we noticed secure access controlling is the prime objective for sensitive data management.in this regards we have been used ABE (Attribute based encryption) for the above objective.  ...  But cloud is semi honest in nature due to not reveled storage and security structure thus while storing and sharing cloud data , its suppose to honest and secured.  ...  Character-based access control data has privacy, which is not reliable to server, detailed control and approval of problematic largescale dynamics for traditional access control light.  ... 
doi:10.14419/ijet.v7i4.6.20228 fatcat:y3xs327bxndcvmehx6eu2ipzra

Securing Private Keys in Electronic Health Records Using Session-Based Hierarchical Key Encryption

Adebayo Omotosho, Justice Emuoyibofarhe, Alice Oke
2017 Journal of Applied Security Research  
In this article, a sessionbased hierarchical key encryption system was developed that allows patient to have full control over certain nodes of their health records.  ...  Health records were organized in a hierarchical structure with records further broken down into subcategories. Cryptography was used to encrypt the health records in their different subcategories.  ...  Using hierarchy (Access Table ACCESS ) and Diffie-Hellman based key generation scheme, Zych, Petkovic, and Jonker (2008) presented a key management scheme for cryptographic enforcement of access control  ... 
doi:10.1080/19361610.2017.1354272 fatcat:63k3ttakfratleip4tobtrh75q

A Cryptographic Solution for General Access Control [chapter]

Yibing Kong, Jennifer Seberry, Janusz R. Getta, Ping Yu
2005 Lecture Notes in Computer Science  
In this paper, we propose a cryptographic solution for general access control based on Chinese Remainder Theorem. Our solution has two categories: data based solution and key based solution.  ...  In particular, hierarchical encryption, as an alternate solution of access control in a hierarchy, has been intensively studied.  ...  That is, besides supporting access control policies following the hierarchical structure of an organization, RRN system also supports access control policies that do not follow the hierarchical structure  ... 
doi:10.1007/11556992_33 fatcat:nerqg36dsvgcrfh7eedzomtv5a

A Review on RSA Encryption Algorithm

Shaina Garg
2016 International Journal Of Engineering And Computer Science  
This work is focused on the use of dynamic keys for securing the data and for securing data transmission.  ...  The principle of confidentially specifies that only the sender and the intended recipient should be able to access the contents of a message.  ...  [12] worked on hierarchical attribute based solution for flexible and scalable access control in cloud computing.  ... 
doi:10.18535/ijecs/v5i7.07 fatcat:6cvgarxgsvfjbazzdaf3572udm

An Improved Key-Management Scheme for Hierarchical Access Control

Wan-Yu Chao, Cheng-Yi Tsai, Min-Shiang Hwang
2017 International Journal of Network Security  
Therefore, accessing data should strictly control to avoid unauthorized access. In this paper, we propose the more efficient key management scheme for hierarchical access control than Odelu et al.'  ...  Finally, we show the dynamic key management. Key Generation Phase Like Odelu et al.'s scheme, CA builds the hierarchical structure for access control.  ...  Key Generation Phase Firstly, CA builds the hierarchical structure for controlling access among the security classes.  ... 
dblp:journals/ijnsec/ChaoTH17 fatcat:eogvpothrnbdph4ggkzx2ljemm
« Previous Showing results 1 — 15 out of 7,142 results