Please use this identifier to cite or link to this item: http://drsr.daiict.ac.in//handle/123456789/331
Title: Prolog based approach to reasoning about dynamic hierarchical key assignment schemes
Authors: Mathuria, Anish M.
Mundra, Anil Kumar
Keywords: Data encryption
Access control
Problem solving
Computer program language
Database security
Autonomic Computing
Cryptographic Key Management
Cryptographic communication protocols
Dynamic Data Sharing
Database management
Access control
Secure Group Communications
Centralized Key Management
Issue Date: 2011
Publisher: Dhirubhai Ambani Institute of Information and Communication Technology
Citation: Mundra, Anil Kumar (2011). Prolog based approach to reasoning about dynamic hierarchical key assignment schemes. Dhirubhai Ambani Institute of Information and Communication Technology, x, 81 p. (Acc.No: T00294)
Abstract: The problem of allowing the higher level users access the information related to lower level is called Hierarchical Access Control Problem. In a hierarchical access control system, users are partitioned into a number of classes - called security classes, which are organized in a hierarchy. Hierarchies arise in systems where some users have higher privileges than others and a security class inherits the privileges of its descendant classes. A basic Hierarchical Key Assignment Scheme is a method of assigning an encryption key to each class in the hierarchy. In literature, there are number of such hierarchy schemes are available and many of them have formal proof models for security properties. Now a days mostly all the schemes have a solution for Dynamic Access Control problem. We found that for dynamic schemes no formal proof model is available so we can not make any arguments on security properties of such schemes. We present a new approach for automatic veri cation using Prolog for the analysis of existing dynamic and static hierarchical key assignment schemes and verify their security properties. We discover some new attacks on existing schemes and proposed a new scheme to overcome those attacks.
URI: http://drsr.daiict.ac.in/handle/123456789/331
Appears in Collections:M Tech Dissertations

Files in This Item:
File Description SizeFormat 
200911022.pdf
  Restricted Access
705.14 kBAdobe PDFThumbnail
View/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.