dc.contributor.advisor | Mathuria, Anish M. | |
dc.contributor.author | Mundra, Anil Kumar | |
dc.date.accessioned | 2017-06-10T14:38:52Z | |
dc.date.available | 2017-06-10T14:38:52Z | |
dc.date.issued | 2011 | |
dc.identifier.citation | Mundra, Anil Kumar (2011). Prolog based approach to reasoning about dynamic hierarchical key assignment schemes. Dhirubhai Ambani Institute of Information and Communication Technology, x, 81 p. (Acc.No: T00294) | |
dc.identifier.uri | http://drsr.daiict.ac.in/handle/123456789/331 | |
dc.description.abstract | The problem of allowing the higher level users access the information related to lower level is called Hierarchical Access Control Problem. In a hierarchical access control system, users are partitioned into a number of classes - called security classes, which are organized in a hierarchy. Hierarchies arise in systems where some users have higher privileges than others and a security class inherits the privileges of its descendant classes. A basic Hierarchical Key Assignment Scheme is a method of assigning an encryption key to each class
in the hierarchy. In literature, there are number of such hierarchy schemes are available and many of them have formal proof models for security properties. Now a days mostly all the schemes have a solution for Dynamic Access Control problem. We found that for dynamic schemes no formal proof model is available so we can not make any arguments on security properties of such
schemes. We present a new approach for automatic veri cation using Prolog
for the analysis of existing dynamic and static hierarchical key assignment
schemes and verify their security properties. We discover some new attacks
on existing schemes and proposed a new scheme to overcome those attacks. | |
dc.publisher | Dhirubhai Ambani Institute of Information and Communication Technology | |
dc.subject | Data encryption | |
dc.subject | Access control | |
dc.subject | Problem solving | |
dc.subject | Computer program language | |
dc.subject | Database security | |
dc.subject | Autonomic Computing | |
dc.subject | Cryptographic Key Management | |
dc.subject | Cryptographic communication protocols | |
dc.subject | Dynamic Data Sharing | |
dc.subject | Database management | |
dc.subject | Access control | |
dc.subject | Secure Group Communications | |
dc.subject | Centralized Key Management | |
dc.classification.ddc | 005.82 MUN | |
dc.title | Prolog based approach to reasoning about dynamic hierarchical key assignment schemes | |
dc.type | Dissertation | |
dc.degree | M. Tech | |
dc.student.id | 200911022 | |
dc.accession.number | T00294 | |