enter search term and/or author name
Security analysis in role-based access control
Ninghui Li, Mahesh V. Tripunitara
The administration of large role-based access control (RBAC) systems is a challenging problem. In order to administer such systems, decentralization of administration tasks by the use of delegation is an effective approach. While the use of...
Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems
Giovanni Mella, Elena Ferrari, Elisa Bertino, Yunhua Koglin
This paper proposes an infrastructure and related algorithms for the controlled and cooperative updates of XML documents. Key components of the proposed system are a set of XML-based languages for specifying access-control policies and the path that...
Improved efficiency for revocation schemes via Newton interpolation
Noam Kogan, Tamir Tassa
We present a novel way to implement the secret-sharing-based family of revocation schemes of Naor and Pinkas . The basic scheme of [Naor and Pinkas 2000] uses Shamir's polynomial secret-sharing to revoke up to r users, where r is...