HIERARCHIC ACCESS CONTROL SYSTEM ON THE BASIS OF ELLIPTIC CRYPTOGRAPHY WITH SELF-ORGANIZATION


Cite item

Full Text

Abstract

The paper presents a system to control access to confidential information transmitted over the network, based on elliptical cryptography. The system is focused on ad hoc networks. The proposed system is characterized by low hardware requirements and lack of main server. The paper presents the analysis of the proposed security access control.

Full Text

ИЕРАРХИЧЕСКАЯ СИСТЕМА КОНТРОЛЯ ДОСТУПА К ИНФОРМАЦИИ НА БАЗЕ ЭЛЛИПТИЧЕСКОЙ КРИПТОГРАФИИ С САМООРГАНИЗАЦИЕЙ
×

References

  1. Otto J.S., Bustamante F.E. Distributed or centralized traffic advisory systems - the application take // IEEE SECON, 2009. - P. 2226.
  2. Nafeesa B.J., Kumar K., Sumathy V Multilevel access control in a MANET for a defense messaging system using elliptic curve cryptography // International Journal of Computer Science & Security (IJCSS). V. 4, Issue 2, 2010. -P. 208-225.
  3. Campista M.E.M., Moraes I.M., Esposito P.M., Amodei A., Cunha D.O., Costa L.H., Duarte O.C. The ad hoc return channel: a low-cost solution for Brazilian interactive digital TV // IEEE Communication Magazine. 2007. - P. 136-143.
  4. Puri A., Chen T. Multimedia Systems, Standards, and Networks. Marcel Dekker Inc, 2000.
  5. Ростовцев А.Г., Маховенко Е.Б. Теоретическая криптография. СПб.: Изд. НПО «Профессионал», 2004. - 480 с.
  6. Akl S., Taylor P. Cryptographic solution to a problem of access control in a hierarchy // ACM Transactions on Computer Systems. V. 1(3), 1983. - P. 239-248.
  7. Chen S., Chung Y.-F., Tian C.-S. A novel key management scheme for dynamic access control in a user hierarchy // COMPSAC-2004. - P. 396397.
  8. Das M. L., Saxena A., Gulati V. P., Phatak D.B. Hierarchical key management scheme using polynomial interpolation // SIGOPS Operating Systems Review. V. 39(1), 2005. - P.40-47.
  9. Hwang M-S., Liu C-H., Lo J-W. An efficient key assignment for access control in large partially ordered hierarchy // Journal of Systems and Software. V. 73(3), 2004. - P. 507-514.
  10. Zhong S. A practical key management scheme for access control in a user hierarchy // Computers and Security. V. 21(8), 2002. - P.750-759.
  11. Zou X., Ramamurthy B., Magliveras S. Chinese remainder theorem based hierarchical access controlfor secure group communications.

Supplementary files

Supplementary Files
Action
1. JATS XML

Copyright (c) 2012 Afonin M.S., Gladkov A.V., Maslennikova E.V., Chervyakov N.I.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies