2014
DOI: 10.4304/jsw.9.8.2033-2042
|View full text |Cite
|
Sign up to set email alerts
|

Algebraic Analysis of Object-Based Key Assignment Schemes

Abstract: The confidentiality of information is an important aspect of security. One way to achieve the confidentiality is through restricting access to information to the authorized users only. Access control can be enforced by using encryption. In this case, all the information is encrypted and keys are assigned to users such that each key reveals the authorized part of the information. Key assignment can be classified as key-based or object-based schemes based on the focus of the scheme. Sabri and Khedri [1] present … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
3

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…There can be several models (implementations) that satisfy the properties of the algebraic structures presented above as given in [1,5]. For example, a cipher can be an RSA cryptosystem.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…There can be several models (implementations) that satisfy the properties of the algebraic structures presented above as given in [1,5]. For example, a cipher can be an RSA cryptosystem.…”
Section: Methodsmentioning
confidence: 99%
“…It is of note that more implementations other than the proposed one do exist. These implementations may have additional properties of encryption, and decryption that could affect the satisfaction of security properties as discussed in [5]. The main contributions of this paper are:…”
Section: Introductionmentioning
confidence: 99%
“…Several researchers use Prover9 in their formal analysis. For example, Sabri and Khedri [6,7,8] use Prover9 in verifying security properties at an abstract level in systems that use key assignment schemes. Cunha and Macedo [9] present a framework for unbounded verification of Alloy specifications using the automatic theorem prover Prover9.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The availability of information ensures that the it is available to users when needed. Several researches are available in the literature related to information security such as the use of encryption to secure data [1], the analysis of information flow [2], and building a secure system [3].…”
Section: Introductionmentioning
confidence: 99%