|Cryptographic Role-Based Access Control, Reconsidered
|Liu, B., Michalas, A. and Warinschi, B.
A significant shortcoming of traditional access control mechanisms is their heavy reliance on reference monitors. Being single points of failure, monitors need to run in protected mode and have permanent online presence in order to handle all access requests. Cryptographic access control offers an alternative solution that provides better scalability and deployability. It relies on security guarantees of the underlying cryptographic primitives and the appropriate key distribution/management in the system. In order to rigorously study security guarantees that a cryptographic access control system can achieve, providing formal security definitions for the system is of great importance, since the security guarantee of the underlying cryptographic primitives cannot be directly translated into those of the system.
|Cryptographic Access Control
|16th International Conference on Provable and Practical Security (ProvSec’22)
|Accepted author manuscript
File Access Level
Open (open metadata and files)
|07 Nov 2022
|Lecture Notes in Computer Science
|13600, pp. 282-289
|ProvSec 2022: Provable and Practical Security
|Digital Object Identifier (DOI)