搜索结果: 1-15 共查到“军队指挥学 Access Control”相关记录40条 . 查询时间(0.08 秒)
A Blockchain-Based Access Control Scheme for Smart Grids
smart grids access control blockchain
2019/8/2
At present, the access control schemes in the power grid are centralized. In the centralized system, the data of the network sensor nodes is transmitted by centralized nodes, and the data itself may b...
Organizational Cryptography for Access Control
public-key cryptography elliptic curve cryptosystem
2018/11/21
A cryptosystem for granting/rescinding access permission is proposed, based on elliptic curve cryptography. The `Organizational Cryptosystem' grants access permission not by giving secret (decription)...
CHARIOT: Cloud-Assisted Access Control for the Internet of Things
access control cloud computing Internet of Things
2018/6/27
The Internet of Things (IoT) technology has expanded widely across the world, promising new data management opportunities for industries, companies and individuals in different sectors, such as health...
Monotone Batch NP-Delegation with Applications to Access Control
delegation witness indistinguishability access control
2018/5/2
Consider an access policy for some resource which only allows access to users of the system who own a certain set of attributes. Specifically, we consider the case where such an access structure is de...
Hermes. A framework for cryptographically assured access control and data security
persistent storage operations CRUD cryptographic enforcements of access control
2018/3/5
This paper presents Hermes – a practical data security scheme with a reference implementation, which enables distributed sharing and collaboration, enforcing access control with the help of cryptograp...
Improved Security Notions for Proxy Re-Encryption to Enforce Access Control
Proxy re-encryption applied cryptography unidirectional
2017/9/1
Proxy Re-Encryption (PRE) allows a ciphertext encrypted under Alice's public key to be transformed to an encryption under Bob's public key without revealing either the plaintext or the decryption keys...
Access Control Encryption for General Policies from Standard Assumptions
access control encryption functional encryption information flow control
2017/5/31
Functional encryption enables fine-grained access to encrypted data. In many scenarios, however, it is important to control not only what users are allowed to read (as provided by traditional function...
Strengthening Access Control Encryption
Access control encryption Information flow control Chosen-ciphertext attacks
2017/5/23
Access control encryption (ACE) was proposed by Damgård et al. to enable the control of information flow between several parties according to a given policy specifying which parties are, or are n...
Key-Aggregate Searchable Encryption with Constant-Size Trapdoors for Fine-Grained Access Control in the Cloud
Searchable Encryption Access Control Data Privacy
2017/4/17
Fine-grained access control, especially in shared data environments such as the cloud, is a common scenario. Suppose a data owner encrypts and stores a collection of NN documents in the cloud, and wis...
Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control
Ransomware Access Control
2017/3/6
In this work we investigate the problem of using public consensus networks -- exemplified by systems like Ethereum and Bitcoin -- to perform cryptographic functionalities that involve the manipulation...
Access Control Encryption for Equality, Comparison, and More
Access Control Encryption pairings predicates
2017/2/20
Access Control Encryption (ACE) is a novel paradigm for encryption which allows to control not only what users in the system are allowed to \emph{read} but also what they are allowed to \emph{write}.
Zero Round-Trip Time for the Extended Access Control Protocol
zero-RTT protocols authenticated key exchange extended access control protocol
2017/2/20
The Extended Access Control (EAC) protocol allows to create a shared cryptographic key between a client and a server. It is for instance referenced by the International Civil Aviation Organization for...
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
access control cloud
2017/2/20
Enabling access controls for data hosted on untrusted cloud is attractive for many users and organizations. Recently, many works have been proposed to use advanced cryptographic primitives such as ide...
Universally Composable Cryptographic Role-Based Access Control
Access Control Universal Composability
2016/12/9
In cryptographic access control sensitive data is protected by cryptographic primitives and the desired access structure is enforced through appropriate management of the secret keys. In this paper we...
Analysis of a Secure and Verifiable Policy Update Outsourcing Scheme for Big Data Access Control in the Cloud
Access Control Attribute-based Encryption Policy Updating
2016/7/5
How to flexibly change the access policy after the initial data access policy has
been set is a critical problem to promote attribute-based encryption (ABE) from a theoretical
tool to a practical to...