Preserving confidentiality of security policies in data outsourcing

  title={Preserving confidentiality of security policies in data outsourcing},
  author={Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Gerardo Pelosi and Pierangela Samarati},
Recent approaches for protecting information in data outsourcing scenarios exploit the combined use of access control and cryptography. In this context, the number of keys to be distributed and managed by users can be maintained limited by using a public catalog of tokens that allow key derivation along a hierarchy. However, the public token catalog, by expressing the key derivation relationships, may leak information on the security policies (authorizations) enforced by the system, which the… CONTINUE READING
Highly Cited
This paper has 49 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 33 extracted citations


Publications referenced by this paper.
Showing 1-3 of 3 references

A unified framework for regulating access and information release on the web

  • P. Bonatti, P. Samarati
  • Journal of Computer Security,
  • 2002
Highly Influential
4 Excerpts

Similar Papers

Loading similar papers…