Hierarchical and Shared Access Control

@article{Castiglione2016HierarchicalAS,
  title={Hierarchical and Shared Access Control},
  author={Arcangelo Castiglione and Alfredo De Santis and Barbara Masucci and Francesco A. N. Palmieri and Aniello Castiglione and Jin Li and Xinyi Huang},
  journal={IEEE Transactions on Information Forensics and Security},
  year={2016},
  volume={11},
  pages={850-865}
}
Access control ensures that only the authorized users of a system are allowed to access certain resources or tasks. Usually, according to their roles and responsibilities, users are organized in hierarchies formed by a certain number of disjoint classes. Such hierarchies are implemented by assigning a key to each class, so that the keys for descendant classes can be efficiently derived from classes higher in the hierarchy. However, pure hierarchical access may represent a limitation in many… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 20 CITATIONS

An Implementation of Efficient Hierarchical Access Control Method for VR/AR Platform

  • 2018 16th International Conference on Emerging eLearning Technologies and Applications (ICETA)
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

User Differentiated Verifiable File Search on the Cloud

  • IEEE Transactions on Services Computing
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 38 REFERENCES

How to share a secret

VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing

  • 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications
  • 2014
VIEW 1 EXCERPT

Similar Papers

Loading similar papers…