Oudkerk et al., 2013 - Google Patents
Cryptographic access control in support of object level protectionOudkerk et al., 2013
- Document ID
- 841167038810970485
- Author
- Oudkerk S
- Wrona K
- Publication year
- Publication venue
- 2013 Military Communications and Information Systems Conference
External Links
Snippet
This paper presents the results of a high-level investigation into the application of cryptographic access control in support of Object Level Protection (OLP). The investigation focused on the concept of attribute-based encryption (ABE) applied to an architecture in …
- 238000009114 investigational therapy 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Unal et al. | A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption | |
EP3616384B1 (en) | Orthogonal access control for groups via multi-hop transform encryption | |
EP3398073B1 (en) | Securely storing and distributing sensitive data in a cloud-based application | |
US20150067330A1 (en) | Method and system for network data access | |
Namasudra et al. | Secure and efficient data access control in cloud computing environment: a survey | |
CN108111540B (en) | Hierarchical access control system and method supporting data sharing in cloud storage | |
US8488782B2 (en) | Parameterizable cryptography | |
Pearson et al. | End-to-end policy-based encryption and management of data in the cloud | |
Kaaniche et al. | Cloudasec: A novel public-key based framework to handle data sharing security in clouds | |
Sabitha et al. | Multi-level on-demand access control for flexible data sharing in cloud | |
Wise et al. | Cloud docs: Secure scalable document sharing on public clouds | |
Velumadhava Rao et al. | Hierarchical group key management for secure data sharing in a cloud‐based environment | |
Kumar | Cryptography during data sharing and accessing over cloud | |
Oudkerk et al. | Cryptographic access control in support of object level protection | |
Blömer et al. | Attribute-based encryption as a service for access control in large-scale organizations | |
Thushara et al. | A survey on secured data sharing using ciphertext policy attribute based encryption in cloud | |
Sowmiya et al. | Secure cloud storage model with hidden policy attribute based access control | |
Yan et al. | Encrypted big data deduplication in cloud storage | |
Abo-alian et al. | Data storage security service in cloud computing: challenges and solutions | |
Mahmoud et al. | A robust cryptographic‐based system for secure data sharing in cloud environments | |
Son et al. | On secure data sharing in cloud environment | |
Priya et al. | A survey: attribute based encryption for secure cloud | |
Thangavel et al. | A survey on security over data outsourcing | |
Contiu | Applied Cryptographic Access Control for Untrusted Cloud Storage | |
Praharaj et al. | A systematic review of Access Control in Cloud Computing |