Title :
Design of a lattice-based access control scheme
Author :
Chiang, Chia-Chu ; Bayrak, Coskun ; Seker, Remzi ; Topaloglu, Umit ; Demirer, Murat ; Samadi, Nasrola ; Tek, Suleyman ; Jiang, Bian ; Zhou, GuangXu ; Wang, Xiaoran
Author_Institution :
Dept. of Comput. Sci., Univ. of Arkansas at Little Rock, Little Rock, AR, USA
Abstract :
We survey the literature for access control schemes in a user hierarchy. Some schemes have already been shown to be insecure or incorrect. Many schemes assume very restrictive subordinating relationships existing in a hierarchy where users are grouped into partially ordered relationships without taking resources into consideration. We believe that a practical access control scheme should support access control in a lattice where users and resources are both together grouped into partially ordered relationships. In this paper, we present a scheme to achieve this goal. We also study existing schemes for their efficiency and performance. Based on the results of the study, we design an efficient scheme to support dynamic key management.
Keywords :
authorisation; cryptography; cryptographic keys; dynamic key management; hierarchical access control; lattice-based access control; Access control; Algorithm design and analysis; Computer science; Cryptography; Cybernetics; Lattices; Permission; Resource management; USA Councils; Access Control; Cryptographic Keys; Cryptography; Dynamic Key Management; Hierarchical Access Control; Lattice; and Rekeying;
Conference_Titel :
Systems, Man and Cybernetics, 2009. SMC 2009. IEEE International Conference on
Conference_Location :
San Antonio, TX
Print_ISBN :
978-1-4244-2793-2
Electronic_ISBN :
1062-922X
DOI :
10.1109/ICSMC.2009.5346329