Distributed Privilege Enforcement in PACS
| dc.contributor.author | Sturm, Christoph | deu |
| dc.contributor.author | Hunt, Ela | deu |
| dc.contributor.author | Scholl, Marc H. | |
| dc.date.accessioned | 2011-03-24T16:11:32Z | deu |
| dc.date.available | 2011-03-24T16:11:32Z | deu |
| dc.date.issued | 2009 | |
| dc.description.abstract | We present a new access control mechanism for P2P networks with distributed enforcement, called P2P Access Control System (PACS). PACS enforces powerful access control models like RBAC with administrative delegation inside a P2P network in a pure P2P manner, which is not possible in any of the currently used P2P access control mechanisms. PACS uses client-side enforcement to support the replication of confidential data. To avoid a single point of failure at the time of privilege enforcement, we use threshold cryptography to distribute the enforcement among the participants. Our analysis of the expected number of messages and the computational effort needed in PACS shows that its increased flexibility comes with an acceptable additional overhead. | eng |
| dc.description.version | published | |
| dc.format.mimetype | application/pdf | deu |
| dc.identifier.citation | First publ. in: Data and Applications Security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009: proceedings / Ehud Gudes, Jaideep Vaidya (eds.). (Lecture Notes in Computer Science ; 5645) New York: Springer, 2009, pp. 142-158 | deu |
| dc.identifier.doi | 10.1007/978-3-642-03007-9_10 | |
| dc.identifier.ppn | 320437558 | deu |
| dc.identifier.uri | http://kops.uni-konstanz.de/handle/123456789/6338 | |
| dc.language.iso | eng | deu |
| dc.legacy.dateIssued | 2010 | deu |
| dc.rights | terms-of-use | deu |
| dc.rights.uri | https://rightsstatements.org/page/InC/1.0/ | deu |
| dc.subject.ddc | 004 | deu |
| dc.subject.gnd | Datenbank | deu |
| dc.subject.gnd | Datenbanksystem | deu |
| dc.subject.gnd | Datenbankverwaltung | deu |
| dc.subject.gnd | Rollenbasierte Zugriffskontrolle | deu |
| dc.subject.gnd | Zugriffskontrolle | deu |
| dc.subject.gnd | Peer-to-Peer-Netz | deu |
| dc.subject.gnd | Datenverwaltung | deu |
| dc.title | Distributed Privilege Enforcement in PACS | eng |
| dc.type | INPROCEEDINGS | deu |
| dspace.entity.type | Publication | |
| kops.citation.bibtex | @inproceedings{Sturm2009Distr-6338,
year={2009},
doi={10.1007/978-3-642-03007-9_10},
title={Distributed Privilege Enforcement in PACS},
number={5645},
isbn={978-3-642-03006-2},
publisher={Springer Berlin Heidelberg},
address={Berlin, Heidelberg},
series={Lecture Notes in Computer Science},
booktitle={Data and Applications Security XXIII},
pages={142--158},
editor={Gudes, Ehud and Vaidya, Jaideep},
author={Sturm, Christoph and Hunt, Ela and Scholl, Marc H.}
} | |
| kops.citation.iso690 | STURM, Christoph, Ela HUNT, Marc H. SCHOLL, 2009. Distributed Privilege Enforcement in PACS. In: GUDES, Ehud, ed., Jaideep VAIDYA, ed.. Data and Applications Security XXIII. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009, pp. 142-158. Lecture Notes in Computer Science. 5645. ISBN 978-3-642-03006-2. Available under: doi: 10.1007/978-3-642-03007-9_10 | deu |
| kops.citation.iso690 | STURM, Christoph, Ela HUNT, Marc H. SCHOLL, 2009. Distributed Privilege Enforcement in PACS. In: GUDES, Ehud, ed., Jaideep VAIDYA, ed.. Data and Applications Security XXIII. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009, pp. 142-158. Lecture Notes in Computer Science. 5645. ISBN 978-3-642-03006-2. Available under: doi: 10.1007/978-3-642-03007-9_10 | eng |
| kops.citation.rdf | <rdf:RDF
xmlns:dcterms="http://purl.org/dc/terms/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
xmlns:bibo="http://purl.org/ontology/bibo/"
xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
xmlns:foaf="http://xmlns.com/foaf/0.1/"
xmlns:void="http://rdfs.org/ns/void#"
xmlns:xsd="http://www.w3.org/2001/XMLSchema#" >
<rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/6338">
<dcterms:bibliographicCitation>First publ. in: Data and Applications Security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009: proceedings / Ehud Gudes, Jaideep Vaidya (eds.). (Lecture Notes in Computer Science ; 5645) New York: Springer, 2009, pp. 142-158</dcterms:bibliographicCitation>
<dcterms:rights rdf:resource="https://rightsstatements.org/page/InC/1.0/"/>
<dc:creator>Sturm, Christoph</dc:creator>
<dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:11:32Z</dc:date>
<dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
<dcterms:issued>2009</dcterms:issued>
<dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:11:32Z</dcterms:available>
<dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/6338/1/SHS_DAS09.pdf"/>
<dc:format>application/pdf</dc:format>
<dcterms:abstract xml:lang="eng">We present a new access control mechanism for P2P networks with distributed enforcement, called P2P Access Control System (PACS). PACS enforces powerful access control models like RBAC with administrative delegation inside a P2P network in a pure P2P manner, which is not possible in any of the currently used P2P access control mechanisms. PACS uses client-side enforcement to support the replication of confidential data. To avoid a single point of failure at the time of privilege enforcement, we use threshold cryptography to distribute the enforcement among the participants. Our analysis of the expected number of messages and the computational effort needed in PACS shows that its increased flexibility comes with an acceptable additional overhead.</dcterms:abstract>
<dc:contributor>Hunt, Ela</dc:contributor>
<foaf:homepage rdf:resource="http://localhost:8080/"/>
<dc:creator>Scholl, Marc H.</dc:creator>
<dc:rights>terms-of-use</dc:rights>
<void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
<bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/6338"/>
<dc:language>eng</dc:language>
<dc:contributor>Scholl, Marc H.</dc:contributor>
<dc:creator>Hunt, Ela</dc:creator>
<dc:contributor>Sturm, Christoph</dc:contributor>
<dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/6338/1/SHS_DAS09.pdf"/>
<dcterms:title>Distributed Privilege Enforcement in PACS</dcterms:title>
<dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
</rdf:Description>
</rdf:RDF> | |
| kops.description.openAccess | openaccessgreen | |
| kops.flag.knbibliography | true | |
| kops.identifier.nbn | urn:nbn:de:bsz:352-opus-108951 | deu |
| kops.opus.id | 10895 | deu |
| kops.sourcefield | GUDES, Ehud, ed., Jaideep VAIDYA, ed.. <i>Data and Applications Security XXIII</i>. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009, pp. 142-158. Lecture Notes in Computer Science. 5645. ISBN 978-3-642-03006-2. Available under: doi: 10.1007/978-3-642-03007-9_10 | deu |
| kops.sourcefield.plain | GUDES, Ehud, ed., Jaideep VAIDYA, ed.. Data and Applications Security XXIII. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009, pp. 142-158. Lecture Notes in Computer Science. 5645. ISBN 978-3-642-03006-2. Available under: doi: 10.1007/978-3-642-03007-9_10 | deu |
| kops.sourcefield.plain | GUDES, Ehud, ed., Jaideep VAIDYA, ed.. Data and Applications Security XXIII. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009, pp. 142-158. Lecture Notes in Computer Science. 5645. ISBN 978-3-642-03006-2. Available under: doi: 10.1007/978-3-642-03007-9_10 | eng |
| relation.isAuthorOfPublication | 79d29015-25f9-4ec2-bc8e-77a0c07303ba | |
| relation.isAuthorOfPublication.latestForDiscovery | 79d29015-25f9-4ec2-bc8e-77a0c07303ba | |
| source.bibliographicInfo.fromPage | 142 | |
| source.bibliographicInfo.seriesNumber | 5645 | |
| source.bibliographicInfo.toPage | 158 | |
| source.contributor.editor | Gudes, Ehud | |
| source.contributor.editor | Vaidya, Jaideep | |
| source.identifier.isbn | 978-3-642-03006-2 | |
| source.publisher | Springer Berlin Heidelberg | |
| source.publisher.location | Berlin, Heidelberg | |
| source.relation.ispartofseries | Lecture Notes in Computer Science | |
| source.title | Data and Applications Security XXIII |
Dateien
Originalbündel
1 - 1 von 1
Vorschaubild nicht verfügbar
- Name:
- SHS_DAS09.pdf
- Größe:
- 457.67 KB
- Format:
- Adobe Portable Document Format
