Please use this identifier to cite or link to this item:
http://drsr.daiict.ac.in//handle/123456789/331
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Mathuria, Anish M. | |
dc.contributor.author | Mundra, Anil Kumar | |
dc.date.accessioned | 2017-06-10T14:38:52Z | |
dc.date.available | 2017-06-10T14:38:52Z | |
dc.date.issued | 2011 | |
dc.identifier.citation | Mundra, Anil Kumar (2011). Prolog based approach to reasoning about dynamic hierarchical key assignment schemes. Dhirubhai Ambani Institute of Information and Communication Technology, x, 81 p. (Acc.No: T00294) | |
dc.identifier.uri | http://drsr.daiict.ac.in/handle/123456789/331 | |
dc.description.abstract | The problem of allowing the higher level users access the information related to lower level is called Hierarchical Access Control Problem. In a hierarchical access control system, users are partitioned into a number of classes - called security classes, which are organized in a hierarchy. Hierarchies arise in systems where some users have higher privileges than others and a security class inherits the privileges of its descendant classes. A basic Hierarchical Key Assignment Scheme is a method of assigning an encryption key to each class in the hierarchy. In literature, there are number of such hierarchy schemes are available and many of them have formal proof models for security properties. Now a days mostly all the schemes have a solution for Dynamic Access Control problem. We found that for dynamic schemes no formal proof model is available so we can not make any arguments on security properties of such schemes. We present a new approach for automatic veri cation using Prolog for the analysis of existing dynamic and static hierarchical key assignment schemes and verify their security properties. We discover some new attacks on existing schemes and proposed a new scheme to overcome those attacks. | |
dc.publisher | Dhirubhai Ambani Institute of Information and Communication Technology | |
dc.subject | Data encryption | |
dc.subject | Access control | |
dc.subject | Problem solving | |
dc.subject | Computer program language | |
dc.subject | Database security | |
dc.subject | Autonomic Computing | |
dc.subject | Cryptographic Key Management | |
dc.subject | Cryptographic communication protocols | |
dc.subject | Dynamic Data Sharing | |
dc.subject | Database management | |
dc.subject | Access control | |
dc.subject | Secure Group Communications | |
dc.subject | Centralized Key Management | |
dc.classification.ddc | 005.82 MUN | |
dc.title | Prolog based approach to reasoning about dynamic hierarchical key assignment schemes | |
dc.type | Dissertation | |
dc.degree | M. Tech | |
dc.student.id | 200911022 | |
dc.accession.number | T00294 | |
Appears in Collections: | M Tech Dissertations |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
200911022.pdf Restricted Access | 705.14 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.