TY - GEN
T1 - Cryptographic role-based security mechanisms based on role-key hierarchy
AU - Zhu, Yan
AU - Ahn, Gail-Joon
AU - Hu, Hongxin
AU - Wang, Huaixi
N1 - Copyright:
Copyright 2010 Elsevier B.V., All rights reserved.
PY - 2010
Y1 - 2010
N2 - Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the resource level. In this paper, we propose a practical cryptographic RBAC model, called role-key hierarchy model, to support various security features including signature and encryption based on role-key hierarchy. With the help of rich algebraic structure of elliptic curve, we introduce a role-based cryptosystem construction to verify the rationality and validity of our proposed model. Also, a proof-of-concept prototype implementation and performance evaluation are discussed to demonstrate the feasibility and efficiency of our mechanisms.
AB - Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the resource level. In this paper, we propose a practical cryptographic RBAC model, called role-key hierarchy model, to support various security features including signature and encryption based on role-key hierarchy. With the help of rich algebraic structure of elliptic curve, we introduce a role-based cryptosystem construction to verify the rationality and validity of our proposed model. Also, a proof-of-concept prototype implementation and performance evaluation are discussed to demonstrate the feasibility and efficiency of our mechanisms.
KW - access control
KW - pairing-based cryptosystem
KW - role-based cryptosystem
KW - role-key hierarchy
UR - http://www.scopus.com/inward/record.url?scp=77954464328&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77954464328&partnerID=8YFLogxK
U2 - 10.1145/1755688.1755728
DO - 10.1145/1755688.1755728
M3 - Conference contribution
AN - SCOPUS:77954464328
SN - 9781605589367
T3 - Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
SP - 314
EP - 319
BT - Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
T2 - 5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010
Y2 - 13 April 2010 through 16 April 2010
ER -