Please use this identifier to cite or link to this item: http://drsr.daiict.ac.in//handle/123456789/331
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorMathuria, Anish M.
dc.contributor.authorMundra, Anil Kumar
dc.date.accessioned2017-06-10T14:38:52Z
dc.date.available2017-06-10T14:38:52Z
dc.date.issued2011
dc.identifier.citationMundra, Anil Kumar (2011). Prolog based approach to reasoning about dynamic hierarchical key assignment schemes. Dhirubhai Ambani Institute of Information and Communication Technology, x, 81 p. (Acc.No: T00294)
dc.identifier.urihttp://drsr.daiict.ac.in/handle/123456789/331
dc.description.abstractThe problem of allowing the higher level users access the information related to lower level is called Hierarchical Access Control Problem. In a hierarchical access control system, users are partitioned into a number of classes - called security classes, which are organized in a hierarchy. Hierarchies arise in systems where some users have higher privileges than others and a security class inherits the privileges of its descendant classes. A basic Hierarchical Key Assignment Scheme is a method of assigning an encryption key to each class in the hierarchy. In literature, there are number of such hierarchy schemes are available and many of them have formal proof models for security properties. Now a days mostly all the schemes have a solution for Dynamic Access Control problem. We found that for dynamic schemes no formal proof model is available so we can not make any arguments on security properties of such schemes. We present a new approach for automatic veri cation using Prolog for the analysis of existing dynamic and static hierarchical key assignment schemes and verify their security properties. We discover some new attacks on existing schemes and proposed a new scheme to overcome those attacks.
dc.publisherDhirubhai Ambani Institute of Information and Communication Technology
dc.subjectData encryption
dc.subjectAccess control
dc.subjectProblem solving
dc.subjectComputer program language
dc.subjectDatabase security
dc.subjectAutonomic Computing
dc.subjectCryptographic Key Management
dc.subjectCryptographic communication protocols
dc.subjectDynamic Data Sharing
dc.subjectDatabase management
dc.subjectAccess control
dc.subjectSecure Group Communications
dc.subjectCentralized Key Management
dc.classification.ddc005.82 MUN
dc.titleProlog based approach to reasoning about dynamic hierarchical key assignment schemes
dc.typeDissertation
dc.degreeM. Tech
dc.student.id200911022
dc.accession.numberT00294
Appears in Collections:M Tech Dissertations

Files in This Item:
File Description SizeFormat 
200911022.pdf
  Restricted Access
705.14 kBAdobe PDFThumbnail
View/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.