Abstract
As distributed computing system grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes increasingly important. In this paper, we present a cryptographic key management solution to the role-based access control (RBAC) model in distributed systems. The key management method used for distributed system is decentralized. Each local domain is managed by its local domain security manager and any key modifications of roles in a local domain will not affect the keys of roles in other local domains.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akl, S.G., Taylor, P.D.: Cryptographic Solution to a Multilevel Security Problem. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advanced in Cryptology
Akland, S.G., Taylor, P.D.: Cryptographic Solution to a Problem of Access Control in a Hierarchy. ACM Transaction on Computer Sysdtems 1(3), 239–248 (1983)
Barka, E., Sandhu, R.: A Role-Based Delegation Model and Some Extensions. In: Proc. of 23rd National Information Systems Security Conference (NISSC 2000) (December 2000)
Blaze, M.: A cryptographic file system for UNIX. In: ACM Conference on Computer and Communications Security, pp. 9–16 (1993)
Extensible Markup Language (XML), http://www.w3.org/XML/
Ferraiolo, D., Sandhu, R., Gavrila, E., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security 4(3), 224–274 (2001)
Fu, K.: Group sharing and random access in cryptographic storage file systems. Master’s thesis, Massachusetts Institute of Technology (1999)
Kaijser, P.: A review of the SESAME development. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, p. 1. Springer, Heidelberg (1998)
Mackinnon, S.T., Taylor, P.D.: An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transaction on Computer systems C-34(9), 797–802 (1985)
Parker, T., Pinkas, D.: SESAME V4 – Overview. SESAME systems documentation, https://www.cosic.esat.kuleuven.ac.be/sesame/
Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-Based Access Control Models. IEEE Computer 29(2) ( February 1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, C., Yang, C., Cheung, R. (2005). Key Management for Role Hierarchy in Distributed Systems. In: Boyd, C., González Nieto, J.M. (eds) Information Security and Privacy. ACISP 2005. Lecture Notes in Computer Science, vol 3574. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11506157_25
Download citation
DOI: https://doi.org/10.1007/11506157_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26547-4
Online ISBN: 978-3-540-31684-8
eBook Packages: Computer ScienceComputer Science (R0)