Enforcing access control in virtual organizations using hierarchical attribute-based encryption. / Asim, Muhammad; Ignatenko, Tanya; Petkovic, Milan; Trivellato, Daniel; Zannone, Nicola.
2012 7th International Conference on Availability, Reliability and Security, ARES 2012. IEEE, 2012. p. 212-217 6329184.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Scientific › peer-review
}
TY - GEN
T1 - Enforcing access control in virtual organizations using hierarchical attribute-based encryption
AU - Asim, Muhammad
AU - Ignatenko, Tanya
AU - Petkovic, Milan
AU - Trivellato, Daniel
AU - Zannone, Nicola
PY - 2012
Y1 - 2012
N2 - Virtual organizations are dynamic, interorganizationalcollaborations that involve systems and servicesbelonging to different security domains. Several solutions havebeen proposed to guarantee the enforcement of the accesscontrol policies protecting the information exchanged in adistributed system, but none of them addresses the dynamicitycharacterizing virtual organizations. In this paper we proposea dynamic hierarchical attribute-based encryption (D-HABE)scheme that allows the institutions in a virtual organizationto encrypt information according to a policy in such a waythat only users with appropriate attributes can decrypt it. In addition, we introduce a key management scheme thatdetermines which user is entitled to receive which attributekey from which domain authority.
AB - Virtual organizations are dynamic, interorganizationalcollaborations that involve systems and servicesbelonging to different security domains. Several solutions havebeen proposed to guarantee the enforcement of the accesscontrol policies protecting the information exchanged in adistributed system, but none of them addresses the dynamicitycharacterizing virtual organizations. In this paper we proposea dynamic hierarchical attribute-based encryption (D-HABE)scheme that allows the institutions in a virtual organizationto encrypt information according to a policy in such a waythat only users with appropriate attributes can decrypt it. In addition, we introduce a key management scheme thatdetermines which user is entitled to receive which attributekey from which domain authority.
UR - http://www.scopus.com/inward/record.url?scp=84869446497&partnerID=8YFLogxK
U2 - 10.1109/ARES.2012.78
DO - 10.1109/ARES.2012.78
M3 - Conference contribution
SN - 978-1-4673-2244-7
SP - 212
EP - 217
BT - 2012 7th International Conference on Availability, Reliability and Security, ARES 2012
PB - IEEE
ER -
ID: 32865845