A Key Management Approach Applied to a Role Hierarchy Scheme

碩士 === 亞洲大學 === 資訊工程學系 === 102 === The role-based hierarchical key assignment problem is to assign sensitive keys to security role-based classes in a partially ordered hierarchy so that legal data accesses among classes can be enforced according to the role’s privileges. In role-based RSA key hierar...

Full description

Bibliographic Details
Main Author: Anita Christiana
Other Authors: Chen, Hsing-Chung
Format: Others
Language:en_US
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/72280273920291168681
id ndltd-TW-102THMU0396003
record_format oai_dc
spelling ndltd-TW-102THMU03960032016-03-16T04:14:50Z http://ndltd.ncl.edu.tw/handle/72280273920291168681 A Key Management Approach Applied to a Role Hierarchy Scheme 一個應用於角色階層式架構的金鑰管理方法 Anita Christiana Anita Christiana 碩士 亞洲大學 資訊工程學系 102 The role-based hierarchical key assignment problem is to assign sensitive keys to security role-based classes in a partially ordered hierarchy so that legal data accesses among classes can be enforced according to the role’s privileges. In role-based RSA key hierarchy management scheme, a user is assigned the role which could derive the RSA key corresponding to the assigned role-based class and its successors’ classes in order to access specific contents of resources. A novel scheme based on keys is proposed to manage the cryptographic key for access control in role-based hierarchical system. Both RSA algorithm and Akl approach are applied to the scheme. The performance comparison is presented in this paper. Besides, our scheme provides a very easy implement and simple key storage manner to increase the availability of user access. Chen, Hsing-Chung 陳興忠 2013 學位論文 ; thesis 27 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 亞洲大學 === 資訊工程學系 === 102 === The role-based hierarchical key assignment problem is to assign sensitive keys to security role-based classes in a partially ordered hierarchy so that legal data accesses among classes can be enforced according to the role’s privileges. In role-based RSA key hierarchy management scheme, a user is assigned the role which could derive the RSA key corresponding to the assigned role-based class and its successors’ classes in order to access specific contents of resources. A novel scheme based on keys is proposed to manage the cryptographic key for access control in role-based hierarchical system. Both RSA algorithm and Akl approach are applied to the scheme. The performance comparison is presented in this paper. Besides, our scheme provides a very easy implement and simple key storage manner to increase the availability of user access.
author2 Chen, Hsing-Chung
author_facet Chen, Hsing-Chung
Anita Christiana
Anita Christiana
author Anita Christiana
Anita Christiana
spellingShingle Anita Christiana
Anita Christiana
A Key Management Approach Applied to a Role Hierarchy Scheme
author_sort Anita Christiana
title A Key Management Approach Applied to a Role Hierarchy Scheme
title_short A Key Management Approach Applied to a Role Hierarchy Scheme
title_full A Key Management Approach Applied to a Role Hierarchy Scheme
title_fullStr A Key Management Approach Applied to a Role Hierarchy Scheme
title_full_unstemmed A Key Management Approach Applied to a Role Hierarchy Scheme
title_sort key management approach applied to a role hierarchy scheme
publishDate 2013
url http://ndltd.ncl.edu.tw/handle/72280273920291168681
work_keys_str_mv AT anitachristiana akeymanagementapproachappliedtoarolehierarchyscheme
AT anitachristiana akeymanagementapproachappliedtoarolehierarchyscheme
AT anitachristiana yīgèyīngyòngyújiǎosèjiēcéngshìjiàgòudejīnyàoguǎnlǐfāngfǎ
AT anitachristiana yīgèyīngyòngyújiǎosèjiēcéngshìjiàgòudejīnyàoguǎnlǐfāngfǎ
AT anitachristiana keymanagementapproachappliedtoarolehierarchyscheme
AT anitachristiana keymanagementapproachappliedtoarolehierarchyscheme
_version_ 1718206623843876864