Adaptive Cryptographic Access Control

Adaptive Cryptographic Access Control


Choose Expedited Shipping at checkout for guaranteed delivery by Tuesday, November 20

Product Details

ISBN-13: 9781461426424
Publisher: Springer US
Publication date: 10/13/2012
Series: Advances in Information Security , #48
Edition description: 2010
Pages: 138
Product dimensions: 6.10(w) x 9.25(h) x 0.01(d)

Table of Contents

Introduction.- Distributed Access Control.- Terminology.- General Access Control Models.- Discretionary Access Control.- Other Access Control Paradigms.- Adaptive Access Control.- Efficient Key Management Heuristics.- The Akl and Taylor Key Management Scheme.- A Key Assignment Algorithm.- Enforcing Key Updates Effectively.- Complexity and Security Analysis.- Experimental Result.- Timestamped Key Management.- Timestamped Key Assignment.- Timestamped Key Updates.- Complexity and Security Analysis.- Experimental Results.- Key Management in Outsourced Data Scenarios.- Why Key Management for Outsourced Data is different.- Background on protecting outsourced data.- An Efficient Key Management Technique.- Security Analysis.- Experimental Results and Discussions.- Challenges of Securing Outsourced Data.- Adaptive Key Management.- A Framework for Adaptive Key Updates: Model and Example.- Implementation and Experimental Setup.- Discussions.- Collusion Detection and Resolution.- Detecting Collusion Possibilities.- Adaptive Collusion Detection and Resolution Framework.- Experimental Setup and Results.- Discussions.- Summary and Conclusions.- Summary and Critique.- Areas for Future Work

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews