Show simple item record

dc.contributor.advisorMathuria, Anish M.
dc.contributor.authorMundra, Anil Kumar
dc.date.accessioned2017-06-10T14:38:52Z
dc.date.available2017-06-10T14:38:52Z
dc.date.issued2011
dc.identifier.citationMundra, Anil Kumar (2011). Prolog based approach to reasoning about dynamic hierarchical key assignment schemes. Dhirubhai Ambani Institute of Information and Communication Technology, x, 81 p. (Acc.No: T00294)
dc.identifier.urihttp://drsr.daiict.ac.in/handle/123456789/331
dc.description.abstractThe problem of allowing the higher level users access the information related to lower level is called Hierarchical Access Control Problem. In a hierarchical access control system, users are partitioned into a number of classes - called security classes, which are organized in a hierarchy. Hierarchies arise in systems where some users have higher privileges than others and a security class inherits the privileges of its descendant classes. A basic Hierarchical Key Assignment Scheme is a method of assigning an encryption key to each class in the hierarchy. In literature, there are number of such hierarchy schemes are available and many of them have formal proof models for security properties. Now a days mostly all the schemes have a solution for Dynamic Access Control problem. We found that for dynamic schemes no formal proof model is available so we can not make any arguments on security properties of such schemes. We present a new approach for automatic veri cation using Prolog for the analysis of existing dynamic and static hierarchical key assignment schemes and verify their security properties. We discover some new attacks on existing schemes and proposed a new scheme to overcome those attacks.
dc.publisherDhirubhai Ambani Institute of Information and Communication Technology
dc.subjectData encryption
dc.subjectAccess control
dc.subjectProblem solving
dc.subjectComputer program language
dc.subjectDatabase security
dc.subjectAutonomic Computing
dc.subjectCryptographic Key Management
dc.subjectCryptographic communication protocols
dc.subjectDynamic Data Sharing
dc.subjectDatabase management
dc.subjectAccess control
dc.subjectSecure Group Communications
dc.subjectCentralized Key Management
dc.classification.ddc005.82 MUN
dc.titleProlog based approach to reasoning about dynamic hierarchical key assignment schemes
dc.typeDissertation
dc.degreeM. Tech
dc.student.id200911022
dc.accession.numberT00294


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record