Hierarchical and shared access control

A Castiglione, A De Santis, B Masucci… - IEEE Transactions …, 2015 - ieeexplore.ieee.org
Access control ensures that only the authorized users of a system are allowed to access
certain resources or tasks. Usually, according to their roles and responsibilities, users are …

Cryptographic hierarchical access control for dynamic structures

A Castiglione, A De Santis, B Masucci… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
A hierarchical key assignment scheme is a method to assign some private information and
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …

Key indistinguishability versus strong key indistinguishability for hierarchical key assignment schemes

A Castiglione, A De Santis… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
A hierarchical key assignment scheme is a method to assign some private information and
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the …

Supporting dynamic updates in storage clouds with the Akl–Taylor scheme

A Castiglione, A De Santis, B Masucci, F Palmieri… - Information …, 2017 - Elsevier
With the wide diffusion of cloud technologies, an ever increasing amount of sensitive data is
moved on centralized network-based repository services, providing elastic outsourced …

Hierarchical and shared key assignment

A Castiglione, A De Santis… - 2014 17th International …, 2014 - ieeexplore.ieee.org
Access control ensures that only the authorized users of a system are allowed to access
certain resources or tasks. Usually, according to their powers and responsibilities, users are …

Hierarchical key assignment schemes with key rotation

R Cimorelli Belfiore, A De Santis, AL Ferrara… - Proceedings of the 29th …, 2024 - dl.acm.org
Hierarchical structures are frequently used to manage access to sensitive data in various
contexts, ranging from organizational settings to IoT networks. A Hierarchical Key …

Hierarchical key assignment with dynamic read-write privilege enforcement and extended ki-security

YR Chen, WG Tzeng - Applied Cryptography and Network Security: 15th …, 2017 - Springer
This paper addresses the problem of key assignment for controlling access of encrypted
data in access hierarchies. We propose a hierarchical key assignment (HKA) scheme RW …

On the relations between security notions in hierarchical key assignment schemes for dynamic structures

A Castiglione, A De Santis, B Masucci… - Information Security and …, 2016 - Springer
A hierarchical key assignment scheme distribute some private information and encryption
keys to a set of classes in a partially ordered hierarchy, so that the private information of …

Key assignment schemes with authenticated encryption, revisited

J Pijnenburg, B Poettering - IACR Transactions on Symmetric …, 2020 - tosc.iacr.org
A popular cryptographic option to implement Hierarchical Access Control in organizations is
to combine a key assignment scheme with a symmetric encryption scheme. In brief, key …

Optimal constructions for chain-based cryptographic enforcement of information flow policies

J Crampton, N Farley, G Gutin, M Jones - … XXIX: 29th Annual IFIP WG 11.3 …, 2015 - Springer
The simple security property in an information flow policy can be enforced by encrypting
data objects and distributing an appropriate secret to each user. A user derives a suitable …