中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
attribute-tree based hierarchical hidden credential model

文献类型:会议论文

作者Ge Weijin ; Hu Xiaohui
出版日期2012
会议名称2012 International Conference on Electrical Insulating Materials and Electrical Engineering, EIMEE 2012
会议日期May 25, 2012 - May 27, 2012
会议地点Shenyang, Liaoning, China
关键词Access control Electrical engineering Insulating materials Trees (mathematics)
页码604-611
中文摘要Hidden credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. Current research related to hidden credentials has the shortage that the attribute model cannot provide the complex description. This paper presents a hierarchical hidden credential model which combines the attribute tree structure and the hierarchical identity-based encryption. Attribute tree structure is given that is used to organize sensitive information and the hierarchical hidden credential model is applied to carry and transport credentials, sensitive access control policy, and private resource and so on. This model expands the attribute from a simple atom one to an attribute tree. After the evaluation, it is proven that this model overcomes the shortcomings such as high-load network communication, too many credential exchanges which was caused by attribute-based access control policy. The usability and expansibility of hidden credentials were improved also. © (2012) Trans Tech Publications, Switzerland.
英文摘要Hidden credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. Current research related to hidden credentials has the shortage that the attribute model cannot provide the complex description. This paper presents a hierarchical hidden credential model which combines the attribute tree structure and the hierarchical identity-based encryption. Attribute tree structure is given that is used to organize sensitive information and the hierarchical hidden credential model is applied to carry and transport credentials, sensitive access control policy, and private resource and so on. This model expands the attribute from a simple atom one to an attribute tree. After the evaluation, it is proven that this model overcomes the shortcomings such as high-load network communication, too many credential exchanges which was caused by attribute-based access control policy. The usability and expansibility of hidden credentials were improved also. © (2012) Trans Tech Publications, Switzerland.
收录类别EI
会议录Advanced Materials Research
语种英语
ISSN号1022-6680
ISBN号9783037854518
源URL[http://ir.iscas.ac.cn/handle/311060/15891]  
专题软件研究所_软件所图书馆_会议论文
推荐引用方式
GB/T 7714
Ge Weijin,Hu Xiaohui. attribute-tree based hierarchical hidden credential model[C]. 见:2012 International Conference on Electrical Insulating Materials and Electrical Engineering, EIMEE 2012. Shenyang, Liaoning, China. May 25, 2012 - May 27, 2012.

入库方式: OAI收割

来源:软件研究所

浏览0
下载0
收藏0
其他版本

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。