Distributed Privilege Enforcement in PACS

Zitieren

Dateien zu dieser Ressource

Prüfsumme: MD5:435b2720d97363a70faaa8ce5ba16745

STURM, Christoph, Ela HUNT, Marc H. SCHOLL, 2009. Distributed Privilege Enforcement in PACS. In: GUDES, Ehud, ed., Jaideep VAIDYA, ed.. Data and Applications Security XXIII. Berlin, Heidelberg:Springer Berlin Heidelberg, pp. 142-158. ISBN 978-3-642-03006-2

@inproceedings{Sturm2009Distr-6338, title={Distributed Privilege Enforcement in PACS}, year={2009}, doi={10.1007/978-3-642-03007-9_10}, number={5645}, isbn={978-3-642-03006-2}, address={Berlin, Heidelberg}, publisher={Springer Berlin Heidelberg}, series={Lecture Notes in Computer Science}, booktitle={Data and Applications Security XXIII}, pages={142--158}, editor={Gudes, Ehud and Vaidya, Jaideep}, author={Sturm, Christoph and Hunt, Ela and Scholl, Marc H.} }

<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:bibo="http://purl.org/ontology/bibo/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" > <rdf:Description rdf:about="https://kops.uni-konstanz.de/rdf/resource/123456789/6338"> <dc:contributor>Sturm, Christoph</dc:contributor> <dc:format>application/pdf</dc:format> <dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:11:32Z</dc:date> <dc:rights>deposit-license</dc:rights> <dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:11:32Z</dcterms:available> <dc:creator>Sturm, Christoph</dc:creator> <dc:contributor>Scholl, Marc H.</dc:contributor> <dcterms:rights rdf:resource="http://nbn-resolving.org/urn:nbn:de:bsz:352-20140905103416863-3868037-7"/> <dc:creator>Scholl, Marc H.</dc:creator> <bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/6338"/> <dcterms:issued>2009</dcterms:issued> <dcterms:title>Distributed Privilege Enforcement in PACS</dcterms:title> <dcterms:abstract xml:lang="eng">We present a new access control mechanism for P2P networks with distributed enforcement, called P2P Access Control System (PACS). PACS enforces powerful access control models like RBAC with administrative delegation inside a P2P network in a pure P2P manner, which is not possible in any of the currently used P2P access control mechanisms. PACS uses client-side enforcement to support the replication of confidential data. To avoid a single point of failure at the time of privilege enforcement, we use threshold cryptography to distribute the enforcement among the participants. Our analysis of the expected number of messages and the computational effort needed in PACS shows that its increased flexibility comes with an acceptable additional overhead.</dcterms:abstract> <dc:creator>Hunt, Ela</dc:creator> <dc:language>eng</dc:language> <dc:contributor>Hunt, Ela</dc:contributor> <dcterms:bibliographicCitation>First publ. in: Data and Applications Security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009: proceedings / Ehud Gudes, Jaideep Vaidya (eds.). (Lecture Notes in Computer Science ; 5645) New York: Springer, 2009, pp. 142-158</dcterms:bibliographicCitation> </rdf:Description> </rdf:RDF>

Dateiabrufe seit 01.10.2014 (Informationen über die Zugriffsstatistik)

SHS_DAS09.pdf 132

Das Dokument erscheint in:

KOPS Suche


Stöbern

Mein Benutzerkonto