Title: | attribute-tree based hierarchical hidden credential model |
Author: | Ge Weijin
; Hu Xiaohui
|
Source: | Advanced Materials Research
|
Conference Name: | 2012 International Conference on Electrical Insulating Materials and Electrical Engineering, EIMEE 2012
|
Conference Date: | May 25, 2012 - May 27, 2012
|
Issued Date: | 2012
|
Conference Place: | Shenyang, Liaoning, China
|
Keyword: | Access control
; Electrical engineering
; Insulating materials
; Trees (mathematics)
|
Indexed Type: | EI
|
ISSN: | 1022-6680
|
ISBN: | 9783037854518
|
Department: | (1) Graduate School Chinese Academy of Science Beijing China; (2) Institute of Software Chinese Academy of Sciences Beijing China
|
Abstract: | Hidden credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. Current research related to hidden credentials has the shortage that the attribute model cannot provide the complex description. This paper presents a hierarchical hidden credential model which combines the attribute tree structure and the hierarchical identity-based encryption. Attribute tree structure is given that is used to organize sensitive information and the hierarchical hidden credential model is applied to carry and transport credentials, sensitive access control policy, and private resource and so on. This model expands the attribute from a simple atom one to an attribute tree. After the evaluation, it is proven that this model overcomes the shortcomings such as high-load network communication, too many credential exchanges which was caused by attribute-based access control policy. The usability and expansibility of hidden credentials were improved also. © (2012) Trans Tech Publications, Switzerland. |
English Abstract: | Hidden credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. Current research related to hidden credentials has the shortage that the attribute model cannot provide the complex description. This paper presents a hierarchical hidden credential model which combines the attribute tree structure and the hierarchical identity-based encryption. Attribute tree structure is given that is used to organize sensitive information and the hierarchical hidden credential model is applied to carry and transport credentials, sensitive access control policy, and private resource and so on. This model expands the attribute from a simple atom one to an attribute tree. After the evaluation, it is proven that this model overcomes the shortcomings such as high-load network communication, too many credential exchanges which was caused by attribute-based access control policy. The usability and expansibility of hidden credentials were improved also. © (2012) Trans Tech Publications, Switzerland. |
Language: | 英语
|
Content Type: | 会议论文
|
URI: | http://ir.iscas.ac.cn/handle/311060/15891
|
Appears in Collections: | 软件所图书馆_会议论文
|
There are no files associated with this item.
|
Recommended Citation: |
Ge Weijin,Hu Xiaohui. attribute-tree based hierarchical hidden credential model[C]. 见:2012 International Conference on Electrical Insulating Materials and Electrical Engineering, EIMEE 2012. Shenyang, Liaoning, China. May 25, 2012 - May 27, 2012.
|
|
|