Policy-hiding access control in open environment

@inproceedings{Li2005PolicyhidingAC,
  title={Policy-hiding access control in open environment},
  author={Jiangtao Li and Ninghui Li},
  booktitle={PODC},
  year={2005}
}
In trust management and attribute-based access control systems, access control decisions are based on the attributes (rather than the identity) of the requester: Access is granted if Alice's attributes in her certificates satisfy Bob's access control policy. In this paper, we develop a policy-hiding access control scheme that protects both sensitive attributes and sensitive policies. That is, Bob can decide whether Alice's certified attribute values satisfy Bob's policy, without Bob learning… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 20 CITATIONS, ESTIMATED 31% COVERAGE

64 Citations

051015'07'10'13'16'19
Citations per Year
Semantic Scholar estimates that this publication has 64 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
SHOWING 1-7 OF 7 REFERENCES

A universal automaton

  • Ju P. Ofman
  • Transactions of the Moscow Math Society,
  • 1965
Highly Influential
6 Excerpts

Similar Papers

Loading similar papers…