Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Adaptive Cryptographic Access Control (eBook)

eBook Download: PDF
2010 | 2010
XIV, 138 Seiten
Springer US (Verlag)
978-1-4419-6655-1 (ISBN)

Lese- und Medienproben

Adaptive Cryptographic Access Control - Anne V. D. M. Kayem, Selim G. Akl, Patrick Martin
Systemvoraussetzungen
96,29 inkl. MwSt
(CHF 93,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access control will benefit companies, governments and the military where structured access to information is essential.

The purpose of this book is to highlight the need for adaptability in cryptographic access control schemes that are geared for dynamic environments, such as the Internet. Adaptive Cryptographic Access Control presents the challenges of designing hierarchical cryptographic key management algorithms to implement Adaptive Access Control in dynamic environments and suggest solutions that will overcome these challenges.

Adaptive Cryptographic Access Control is a cutting-edge book focusing specifically on this topic in relation to security and cryptographic access control. Both the theoretical and practical aspects and approaches of cryptographic access control are introduced in this book. Case studies and examples are provided throughout this book.


Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access control will benefit companies, governments and the military where structured access to information is essential.The purpose of this book is to highlight the need for adaptability in cryptographic access control schemes that are geared for dynamic environments, such as the Internet. Adaptive Cryptographic Access Control presents the challenges of designing hierarchical cryptographic key management algorithms to implement Adaptive Access Control in dynamic environments and suggest solutions that will overcome these challenges.Adaptive Cryptographic Access Control is a cutting-edge book focusing specifically on this topic in relation to security and cryptographic access control. Both the theoretical and practical aspects and approaches of cryptographic access control are introduced in this book. Case studies and examples are provided throughout this book.

Foreword 8
Preface 10
Acknowledgements 10
Contents 12
Chapter 1 Introduction 16
1.1 Motivation 16
1.2 What is Autonomic Computing? 17
1.3 From Manually Managed to Adaptive Access Control 18
1.4 Aim of this Monograph 20
1.5 How to read this Monograph 23
Chapter 2 A Presentation of Access Control Methods 25
2.1 Distributed Access Control’s Beginnings 25
2.2 Terminology 26
2.3 General Access Control Models 27
2.3.1 Discretionary Access Control 27
2.3.2 Mandatory Access Control 29
2.3.3 Role-Based Access Control 30
2.3.4 Multilevel Access Control 32
2.3.4.1 The BLP and BIBA models 32
2.3.4.2 The Chinese Wall Model 32
2.3.4.3 The Clark-Wilson (CLW) Model 33
2.4 Cryptographic Access Control 33
2.4.1 Key Management Models 34
2.4.2 One-Way Function Schemes 35
2.4.3 Time-Bound Schemes 42
2.4.4 Other CKM Schemes 43
2.5 Other Access Control Paradigms 44
2.5.1 Overview 44
2.5.2 Cookies 45
2.5.3 XML Access Control and Limitations 46
2.5.4 Anti-Viruses, Intrusion Detection, and Firewalls 48
2.6 Controlling Access to Outsourced Data 50
2.7 Autonomic Access Control 51
2.7.1 The Autonomic Security Model 52
2.7.2 Perspectives and Discussions 53
Chapter 3 Efficient Key Management: Heuristics 55
3.1 Overview 55
3.2 An Overview of the CAT Scheme 56
3.3 Exponent Assignment Algorithm 57
3.3.1 Algorithm 59
3.3.2 Exponent Assignment Example 60
3.4 Enforcing Hierarchy Updates 62
3.4.1 Replacement, Insertion, and Deletion: Algorithm 62
3.4.2 Insertion, Deletion and Replacement: Example 64
3.5 Analysis 66
3.5.1 Security Analysis 66
3.5.2 Complexity Analysis 67
3.6 Experimental Setup and Results 67
3.6.1 Implementation and Experimental Setup 68
3.6.2 Cost of Key Generation 69
3.6.3 Cost of Data Encryption 70
3.6.4 Cost of Key Replacement 71
3.6.5 Window of Vulnerability 71
3.7 Discussions 72
Chapter 4 Timestamped Key Management 74
4.1 On Timestamps and Key Updates 74
4.2 Timestamped Key Assignment 76
4.3 Timestamped Rekey Scheme - Algorithm 78
4.4 Analysis 79
4.4.1 Security Analysis 79
4.4.2 Complexity Analysis 79
4.5 Experimental Setup and Results 80
4.5.1 Implementation and Experimental Setup 80
4.5.2 Timestamped Key Generation - Server Cost 82
4.5.3 Timestamped Rekeying - Server Cost 83
4.5.4 Window of Vulnerability 84
4.6 Discussion 85
Chapter 5 Controlling Access to Outsourced Data 88
5.1 88
5.1.1 Securing Outsourced Data 89
5.1.2 Combining CKM and RBAC 91
5.1.3 Handling Key Updates 93
5.2 Discussion 95
Chapter 6 Self-Protecting Key Management 97
6.1 Overview 97
6.2 Self-Protecting Cryptographic Key Management (SPCKM) Framework 98
6.2.1 Mathematical Model Supporting Framework 100
6.2.2 An Example 104
6.3 Implementation and Experimental Setup 105
6.3.1 Experimental Setup 105
6.3.2 Prototype Description 106
6.3.3 Performance Criteria 107
6.3.4 Experimental Results 108
6.4 Discussions 111
6.4.1 Contributions of the SPCKM Framework 111
6.4.2 Some Challenges in Adaptive Rekeying 113
6.4.3 The Adaptive Rekey Scheduling Problem 114
Chapter 7 Collusion Detection and Resolution 116
7.1 Overview 116
7.2 On Detecting Collusion Possibilities 117
7.2.1 The DCFK problem 118
7.3 An Adaptive Framework for Collusion Detection and Resolution (ACDR) 119
7.3.1 Some Basic Assumptions 120
7.3.2 Collusion Verification 122
7.3.3 Example of Collusion Detection 123
7.3.4 Collusion Resolution Algorithm 124
7.3.5 Example of Collusion Resolution 125
7.4 Experimental Setup and Results 127
7.4.1 Implementation and Experimental Setup 127
7.4.2 Cost of Collusion Detection 127
7.4.3 Cost of Collusion Resolution 128
7.4.4 Cost of Key Generation 129
7.4.5 Cost of Key Generation and Data Encryption 130
7.5 Discussions 130
Chapter 8 Conclusions 132
8.1 Synopsis 132
8.2 Critique 133
8.3 Potential Extensions 136
8.3.1 Internal Violations 136
8.3.2 Adaptive Rekeying 137
8.3.3 Key Selection 138
References 139
Index 146

Erscheint lt. Verlag 5.8.2010
Reihe/Serie Advances in Information Security
Advances in Information Security
Zusatzinfo XIV, 138 p.
Verlagsort New York
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Datenbanken
Informatik Netzwerke Sicherheit / Firewall
Informatik Office Programme Access
Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Kryptologie
Schlagworte ACCESS • Access Control • Complexity • Computer • Computer Science • cryptography • currentjm • Data Availability • data confidentiality • Data Integrity • Data Security • Encryption • hierarchical key management • Identity Management • Information Security • outsourced data security • shared data access • Trust
ISBN-10 1-4419-6655-2 / 1441966552
ISBN-13 978-1-4419-6655-1 / 9781441966551
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 4,4 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
CHF 48,75