Home > Publications
Home University of Twente
Prospective Students
Intranet (internal)

EEMCS EPrints Service

13262 A Key Management Method for Cryptographically Enforced Access Control
Home Policy Brochure Browse Search User Area Contact Help

Zych, A.K. and Petkovic, M. and Jonker, W. (2007) A Key Management Method for Cryptographically Enforced Access Control. In: 5th International Workshop on Security in Information Systems (WoSIS), Funchal, Madeira. pp. 9-22. INSTICC Press. ISBN 978-972-8865-96-2

Full text not available from this repository.

Exported to Metis


Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is capable of efficiently calculating appropriate keys needed to access requested data. The proposed scheme does not require to encrypt the same data (key) multiple times with the keys of different users or groups of users. It is designed especially for the purpose of access control. Thanks to that, the space needed for storing public parameters is significantly reduced. Furthermore, the proposed method supports flexible updates when users access rights change.

Item Type:Conference or Workshop Paper (Full Paper, Talk)
Research Group:EWI-DB: Databases
Research Program:CTIT-ISTRICE: Integrated Security and Privacy in a Networked World
Research Project:Secure Meta Data: Secure Content Management In Ambient Environments
ID Code:13262
Deposited On:29 August 2008
More Information:statisticsmetis

Export this item as:

To correct this item please ask your editor

Repository Staff Only: edit this item