attribute-tree based hierarchical hidden credential model
文献类型:会议论文
作者 | Ge Weijin ; Hu Xiaohui |
出版日期 | 2012 |
会议名称 | 2012 International Conference on Electrical Insulating Materials and Electrical Engineering, EIMEE 2012 |
会议日期 | May 25, 2012 - May 27, 2012 |
会议地点 | Shenyang, Liaoning, China |
关键词 | Access control Electrical engineering Insulating materials Trees (mathematics) |
页码 | 604-611 |
中文摘要 | Hidden credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. Current research related to hidden credentials has the shortage that the attribute model cannot provide the complex description. This paper presents a hierarchical hidden credential model which combines the attribute tree structure and the hierarchical identity-based encryption. Attribute tree structure is given that is used to organize sensitive information and the hierarchical hidden credential model is applied to carry and transport credentials, sensitive access control policy, and private resource and so on. This model expands the attribute from a simple atom one to an attribute tree. After the evaluation, it is proven that this model overcomes the shortcomings such as high-load network communication, too many credential exchanges which was caused by attribute-based access control policy. The usability and expansibility of hidden credentials were improved also. © (2012) Trans Tech Publications, Switzerland. |
英文摘要 | Hidden credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. Current research related to hidden credentials has the shortage that the attribute model cannot provide the complex description. This paper presents a hierarchical hidden credential model which combines the attribute tree structure and the hierarchical identity-based encryption. Attribute tree structure is given that is used to organize sensitive information and the hierarchical hidden credential model is applied to carry and transport credentials, sensitive access control policy, and private resource and so on. This model expands the attribute from a simple atom one to an attribute tree. After the evaluation, it is proven that this model overcomes the shortcomings such as high-load network communication, too many credential exchanges which was caused by attribute-based access control policy. The usability and expansibility of hidden credentials were improved also. © (2012) Trans Tech Publications, Switzerland. |
收录类别 | EI |
会议录 | Advanced Materials Research
![]() |
语种 | 英语 |
ISSN号 | 1022-6680 |
ISBN号 | 9783037854518 |
源URL | [http://ir.iscas.ac.cn/handle/311060/15891] ![]() |
专题 | 软件研究所_软件所图书馆_会议论文 |
推荐引用方式 GB/T 7714 | Ge Weijin,Hu Xiaohui. attribute-tree based hierarchical hidden credential model[C]. 见:2012 International Conference on Electrical Insulating Materials and Electrical Engineering, EIMEE 2012. Shenyang, Liaoning, China. May 25, 2012 - May 27, 2012. |
入库方式: OAI收割
来源:软件研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。