A Key Management Approach Applied to a Role Hierarchy Scheme
碩士 === 亞洲大學 === 資訊工程學系 === 102 === The role-based hierarchical key assignment problem is to assign sensitive keys to security role-based classes in a partially ordered hierarchy so that legal data accesses among classes can be enforced according to the role’s privileges. In role-based RSA key hierar...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/72280273920291168681 |
id |
ndltd-TW-102THMU0396003 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-102THMU03960032016-03-16T04:14:50Z http://ndltd.ncl.edu.tw/handle/72280273920291168681 A Key Management Approach Applied to a Role Hierarchy Scheme 一個應用於角色階層式架構的金鑰管理方法 Anita Christiana Anita Christiana 碩士 亞洲大學 資訊工程學系 102 The role-based hierarchical key assignment problem is to assign sensitive keys to security role-based classes in a partially ordered hierarchy so that legal data accesses among classes can be enforced according to the role’s privileges. In role-based RSA key hierarchy management scheme, a user is assigned the role which could derive the RSA key corresponding to the assigned role-based class and its successors’ classes in order to access specific contents of resources. A novel scheme based on keys is proposed to manage the cryptographic key for access control in role-based hierarchical system. Both RSA algorithm and Akl approach are applied to the scheme. The performance comparison is presented in this paper. Besides, our scheme provides a very easy implement and simple key storage manner to increase the availability of user access. Chen, Hsing-Chung 陳興忠 2013 學位論文 ; thesis 27 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 亞洲大學 === 資訊工程學系 === 102 === The role-based hierarchical key assignment problem is to assign sensitive keys to security role-based classes in a partially ordered hierarchy so that legal data accesses among classes can be enforced according to the role’s privileges. In role-based RSA key hierarchy management scheme, a user is assigned the role which could derive the RSA key corresponding to the assigned role-based class and its successors’ classes in order to access specific contents of resources. A novel scheme based on keys is proposed to manage the cryptographic key for access control in role-based hierarchical system. Both RSA algorithm and Akl approach are applied to the scheme. The performance comparison is presented in this paper. Besides, our scheme provides a very easy implement and simple key storage manner to increase the availability of user access.
|
author2 |
Chen, Hsing-Chung |
author_facet |
Chen, Hsing-Chung Anita Christiana Anita Christiana |
author |
Anita Christiana Anita Christiana |
spellingShingle |
Anita Christiana Anita Christiana A Key Management Approach Applied to a Role Hierarchy Scheme |
author_sort |
Anita Christiana |
title |
A Key Management Approach Applied to a Role Hierarchy Scheme |
title_short |
A Key Management Approach Applied to a Role Hierarchy Scheme |
title_full |
A Key Management Approach Applied to a Role Hierarchy Scheme |
title_fullStr |
A Key Management Approach Applied to a Role Hierarchy Scheme |
title_full_unstemmed |
A Key Management Approach Applied to a Role Hierarchy Scheme |
title_sort |
key management approach applied to a role hierarchy scheme |
publishDate |
2013 |
url |
http://ndltd.ncl.edu.tw/handle/72280273920291168681 |
work_keys_str_mv |
AT anitachristiana akeymanagementapproachappliedtoarolehierarchyscheme AT anitachristiana akeymanagementapproachappliedtoarolehierarchyscheme AT anitachristiana yīgèyīngyòngyújiǎosèjiēcéngshìjiàgòudejīnyàoguǎnlǐfāngfǎ AT anitachristiana yīgèyīngyòngyújiǎosèjiēcéngshìjiàgòudejīnyàoguǎnlǐfāngfǎ AT anitachristiana keymanagementapproachappliedtoarolehierarchyscheme AT anitachristiana keymanagementapproachappliedtoarolehierarchyscheme |
_version_ |
1718206623843876864 |