DocumentCode :
3317888
Title :
Combining Authentication with Role-Based Access Control Based on IBS
Author :
Wang, Jin ; Yu, Jia ; Li, Daxing ; Jia, Zhongtian
Author_Institution :
Inst. or Inf. & Network Security, Shandong Univ., Jinan
Volume :
2
fYear :
2006
fDate :
3-6 Nov. 2006
Firstpage :
1475
Lastpage :
1480
Abstract :
Authentication and access control are crucial for information and system security. In this paper, we present a scheme to cryptographically provide authentication and role-based access control (RBAC) for large organizations using identity-based signature (IBS) technique. To achieve this, we first extend the elements user and role in RBAC model to cooperate with identity-based cryptography. Our scheme is derived from Cha-Cheon´s identity-based signature scheme based on bilinear pairings. In our scheme, both user authentication and role-based authorization can be verified simultaneously by a user´s signature, so the independent authentication procedure is eliminated. We also prove the security of the proposed scheme against adaptively chosen message and ID attack under the random oracle model
Keywords :
authorisation; digital signatures; private key cryptography; authentication; bilinear pairings; identity-based cryptography; identity-based signature; information security; random oracle model; role-based access control; system security; user signature; Access control; Authentication; Authorization; Educational institutions; Identity-based encryption; Information science; Information security; Permission; Public key; Public key cryptography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Security, 2006 International Conference on
Conference_Location :
Guangzhou
Print_ISBN :
1-4244-0605-6
Electronic_ISBN :
1-4244-0605-6
Type :
conf
DOI :
10.1109/ICCIAS.2006.295305
Filename :
4076211
Link To Document :
بازگشت