On Key Assignment for Hierarchical Access Control. / Crampton, Jason; Martin, Keith M.; Wild, Peter.

Proceedings of 19th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, 2006. p. 98-111.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

On Key Assignment for Hierarchical Access Control. / Crampton, Jason; Martin, Keith M.; Wild, Peter.

Proceedings of 19th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, 2006. p. 98-111.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Crampton, J, Martin, KM & Wild, P 2006, On Key Assignment for Hierarchical Access Control. in Proceedings of 19th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, pp. 98-111. https://doi.org/http://doi.ieeecomputersociety.org/10.1109/CSFW.2006.20

APA

Crampton, J., Martin, K. M., & Wild, P. (2006). On Key Assignment for Hierarchical Access Control. In Proceedings of 19th IEEE Computer Security Foundations Workshop (pp. 98-111). IEEE Computer Society Press. https://doi.org/http://doi.ieeecomputersociety.org/10.1109/CSFW.2006.20

Vancouver

Crampton J, Martin KM, Wild P. On Key Assignment for Hierarchical Access Control. In Proceedings of 19th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press. 2006. p. 98-111 https://doi.org/http://doi.ieeecomputersociety.org/10.1109/CSFW.2006.20

Author

Crampton, Jason ; Martin, Keith M. ; Wild, Peter. / On Key Assignment for Hierarchical Access Control. Proceedings of 19th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, 2006. pp. 98-111

BibTeX

@inproceedings{b0ec946432a444a9b5b735fbf65a90ef,
title = "On Key Assignment for Hierarchical Access Control",
abstract = "A key assignment scheme is a cryptographic technique for implementing an information flow policy, sometimes known as hierarchical access control. All the research to date on key assignment schemes has focused on particular encryption techniques rather than an analysis of what features are required of such a scheme. To remedy this we propose a family of generic key assignment schemes and compare their respective advantages. We note that every scheme in the literature is simply an instance of one of our generic schemes. We then conduct an analysis of the Akl-Taylor scheme and propose a number of improvements. We also demonstrate that many of the criticisms that have been made of this scheme in respect of key udpates are unfounded. Finally, exploiting the deeper understanding we have acquired of key assignment schemes, we introduce a technique for exploiting the respective advantages of different schemes.",
author = "Jason Crampton and Martin, {Keith M.} and Peter Wild",
year = "2006",
doi = "http://doi.ieeecomputersociety.org/10.1109/CSFW.2006.20",
language = "English",
pages = "98--111",
booktitle = "Proceedings of 19th IEEE Computer Security Foundations Workshop",
publisher = "IEEE Computer Society Press",

}

RIS

TY - GEN

T1 - On Key Assignment for Hierarchical Access Control

AU - Crampton, Jason

AU - Martin, Keith M.

AU - Wild, Peter

PY - 2006

Y1 - 2006

N2 - A key assignment scheme is a cryptographic technique for implementing an information flow policy, sometimes known as hierarchical access control. All the research to date on key assignment schemes has focused on particular encryption techniques rather than an analysis of what features are required of such a scheme. To remedy this we propose a family of generic key assignment schemes and compare their respective advantages. We note that every scheme in the literature is simply an instance of one of our generic schemes. We then conduct an analysis of the Akl-Taylor scheme and propose a number of improvements. We also demonstrate that many of the criticisms that have been made of this scheme in respect of key udpates are unfounded. Finally, exploiting the deeper understanding we have acquired of key assignment schemes, we introduce a technique for exploiting the respective advantages of different schemes.

AB - A key assignment scheme is a cryptographic technique for implementing an information flow policy, sometimes known as hierarchical access control. All the research to date on key assignment schemes has focused on particular encryption techniques rather than an analysis of what features are required of such a scheme. To remedy this we propose a family of generic key assignment schemes and compare their respective advantages. We note that every scheme in the literature is simply an instance of one of our generic schemes. We then conduct an analysis of the Akl-Taylor scheme and propose a number of improvements. We also demonstrate that many of the criticisms that have been made of this scheme in respect of key udpates are unfounded. Finally, exploiting the deeper understanding we have acquired of key assignment schemes, we introduce a technique for exploiting the respective advantages of different schemes.

U2 - http://doi.ieeecomputersociety.org/10.1109/CSFW.2006.20

DO - http://doi.ieeecomputersociety.org/10.1109/CSFW.2006.20

M3 - Conference contribution

SP - 98

EP - 111

BT - Proceedings of 19th IEEE Computer Security Foundations Workshop

PB - IEEE Computer Society Press

ER -